INTERNAL VERIFICATION – ASSIGNMENT BRIEF HND in Computing Programme Title: Assessor Name: W.R.S.Nirodha Dewapriya Internal Verifier Name: Unit or Component Number and Title: Unit 02 - Networking Assignment title: LAN Design & Implementation for Alliance Health Assessment criteria targeted by this assignment brief: LO1, LO2, LO3, LO4 Is this an Authorised Assignment Brief published by Pearson? If so, has it been amended by the Assessor in any way? Please give details. N/A (If using the Authorised Assignment Brief ‘off the shelf’ with no amendments, please answer the question marked * in the checklist only) Yes Has this assignment been submitted to the Assignment Checking Service? No √ (If Yes, please keep a copy of the ACS feedback with this form) INTERNAL VERIFIER CHECKLIST Y/N Are the programme and unit details accurate? Y *Are clear deadlines for assessment given? TBC Is the time frame of an appropriate duration? Y Is there a suitable vocational scenario or context? Y Are the assessment criteria to be addressed stated accurately? Y Does each task show which criteria are being addressed? Y Do the tasks meet the assessment requirements of the unit/s? Y Is it clear what evidence the learner needs to generate? Y Is it likely to generate evidence that is valid and sufficient? Y Yes Overall, is the Assignment fit for purpose? √ No *If ‘No’ is recorded the Internal Verifier must recommend actions detailing the issues to be addressed. The Assessor and the Internal Verifier must then confirm that the action has been undertaken and that the Assignment Brief is authorised for use before being issued to learners. Nirodha Dewapriya Networking Unit 02 Page | 1 Target Date for Completion Action required: (If none then please state n/a) Date Action Completed General Comments (if appropriate) Assignment Brief Authorised for Use: Internal Verifier signature Date Assessor signature Lead Internal Verifier signature (if appropriate) Nirodha Dewapriya Date oshada@esoft.lk Networking Date Unit 02 2022/06/13 Page | 2 Higher Nationals Internal verification of assessment decisions – BTEC (RQF) INTERNAL VERIFICATION – ASSESSMENT DECISIONS Programme title BTEC Higher National Diploma in Computing Assessor Unit(s) Assignment title Internal Verifier Unit 02: Networking LAN Design & Implementation for Alliance Health Student’s name List which assessment criteria the Assessor has awarded. Pass Merit Distinction INTERNAL VERIFIER CHECKLIST Do the assessment criteria awarded match those shown in the assignment brief? Y/N Is the Pass/Merit/Distinction grade awarded justified by the assessor’s comments on the student work? Y/N Has the work been assessed accurately? Y/N Is the feedback to the student: Give details: • Constructive? • Linked to relevant assessment criteria? • Identifying opportunities for improved performance? • Agreeing actions? Y/N Y/N Y/N Does the assessment decision need amending? Y/N Y/N Assessor signature Date Internal Verifier signature Date Programme Leader signature (if required) Date Confirm action completed Remedial action taken Give details: Assessor signature Date Internal Verifier signature Date Programme Leader signature (if required) Date Nirodha Dewapriya Networking Unit 02 Page | 3 Higher Nationals - Summative Assignment Feedback Form Student Name/ID Unit Title Unit 02: Assignment Number 1 Networking Assessor Submission Date Date Received 1st submission Re-submission Date Date Received 2nd submission Assessor Feedback: LO1 Examine networking principles and their protocols. Pass, Merit & Distinction P1 P2 Descripts D1 M1 LO2 Explain networking devices and operations. Pass, Merit & Distinction Descripts P3 P4 M2 P6 M3 LO3 Design efficient networked systems. Pass, Merit & Distinction Descripts P5 D2 LO4 Implement and diagnose networked systems. Pass, Merit & Distinction Descripts Grade: P7 P8 Assessor Signature: M4 Date: Resubmission Feedback: Grade: Assessor Signature: Date: Internal Verifier’s Comments: Signature & Date: * Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades decisions have been agreed at the assessment board. Nirodha Dewapriya Networking Unit 02 Page | 4 Assignment Feedback Formative Feedback: Assessor to Student Action Plan Summative feedback Feedback: Student to Assessor Assessor signature Date Student signature Date Nirodha Dewapriya Networking Unit 02 Page | 5 Pearson Higher Nationals in Computing Unit 02: Networking Assignment 01 Nirodha Dewapriya Networking Unit 02 Page | 6 General Guidelines 1. A Cover page or title page – You should always attach a title page to your assignment. Use previous page as your cover sheet and make sure all the details are accurately filled. 2. Attach this brief as the first section of your assignment. 3. All the assignments should be prepared using a word processing software. 4. All the assignments should be printed on A4 sized papers. Use single side printing. 5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page. Word Processing Rules 1. 2. 3. 4. The font size should be 12 point, and should be in the style of Time New Roman. Use 1.5 line spacing. Left justify all paragraphs. Ensure that all the headings are consistent in terms of the font size and font style. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and Page Number on each page. This is useful if individual sheets become detached for any reason. 5. Use word processing application spell check and grammar check function to help editing your assignment. Important Points: 1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the before mentioned compulsory information will result in rejection of your work. 2. Avoid using page borders in your assignment body. 3. Carefully check the hand in date and the instructions given in the assignment. Late submissions will not be accepted. 4. Ensure that you give yourself enough time to complete the assignment by the due date. 5. Excuses of any nature will not be accepted for failure to hand in the work on time. 6. You must take responsibility for managing your own time effectively. 7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may apply (in writing) for an extension. 8. Failure to achieve at least PASS criteria will result in a REFERRAL grade . 9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will then be asked to complete an alternative assignment. 10. If you use other people’s work or ideas in your assignment, reference them properly using HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and a reference list. 11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be reduced to A REFERRAL or at worst you could be expelled from the course Nirodha Dewapriya Networking Unit 02 Page | 7 Student Declaration I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own without attributing the sources in the correct form. I further understand what it means to copy another’s work. 1. I know that plagiarism is a punishable offence because it constitutes theft. 2. I understand the plagiarism and copying policy of Pearson UK. 3. I know what the consequences will be if I plagiarise or copy another’s work in any of the assignments for this program. 4. I declare therefore that all work presented by me for every aspect of my program, will be my own, and where I have made use of another’s work, I will attribute the source in the correct way. 5. I acknowledge that the attachment of this document signed or not, constitutes a binding agreement between myself and Pearson, UK. 6. I understand that my assignment will not be considered as submitted if this document is not attached to the assignment. nirodhadewapriya@gmail.com Student’s Signature: (Provide E-mail ID) Nirodha Dewapriya 2/26/2024 Date: (Provide Submission Date) Networking Unit 02 Page | 8 Higher National Diploma in Computing Assignment Brief Student Name /ID Number Unit Number and Title Unit 2: Networking Academic Year 2022/23 Unit Tutor Assignment Title LAN Design & Implementation for Alliance Health Issue Date Submission Date IV Name & Date Submission format The submission should be in the form of an individual report written in a concise, formal business style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as appropriate, and all work must be supported with research and referenced using Harvard referencing system. Please also provide an end list of references using the Harvard referencing system. The recommended word count is 3,000–3,500 words for the report excluding annexures, although you will not be penalised for exceeding the total word limit. Unit Learning Outcomes: LO1 Examine networking principles and their protocols. LO2 Explain networking devices and operations. LO3 Design efficient networked systems. LO4 Implement and diagnose networked systems. Assignment Brief and Guidance: Nirodha Dewapriya Networking Unit 02 Page | 9 Scenario Alliance Health is a technology-enabled solutions company that optimizes the revenue cycle of the US healthcare industry where its global delivery center is located in Colombo. The company is planning to expand their business operations with their latest branch at Matara and wants it to be one of the state-of-the-art companies in Matara with the latest facilities. Assume you have been appointed as the new network analyst of Alliance Health to plan, design and restructure the existing network. Prepare a network architectural design and implement it with your suggestions and recommendations to meet the company requirements. The floor plan of the head office in Colombo is as follows: Floor 1: Reception area Sales & Marketing Department (10 employees) Customer Services Area – with Wi-Fi facilities Floor 2: Administration Department (30 Employees) HR Department (20 employees) Accounting & Finance Department (15 employees) Audit Department (5 employees) Business Development Department (5 employees) Floor 3 Video conferencing room IT Department (60 employees) The Server Room Nirodha Dewapriya Networking Unit 02 Page | 10 The floor plan of the branch in Matara is as follows: Floor 1: Reception area Customer Services Area– with Wi-Fi facilities Floor 2: Administration Department (10 Employees) HR Department (7 employees) Accounting & Finance Department (8 employees) IT Department (50 employees) Foll ow i ng r equir ements ar e g iv en by the Manag ement. All the departments mus t be separ ated with uni que subnet . T he c onfer enci ng r oom of the head offic e and Customer Serv ic es Ar ea s of each branch are to be equipped w ith Wi -Fi c onnec ti ons . C onnec tivi ty betw een tw o br anc hes (Head Office and M atara ) wo uld allow the intra branch co nnectiv ity between departments. (Use o f VP N is no t com pulso ry) T he nec ess ary I P addr ess cl asses and r ang es m ust be decided by the network designer and sho uld be use d fo r all the departments except the serv er r oom . N umber of s erv ers r equi red for the Serv er r oom need to be decided by the Netwo rk designer and sho uld be assigned with 10 .254. 10.0/ 24 subnet. (Uses static IPs) Sal es and Marketi ng Team also needs to access Netwo rk resources usi ng WIFI co nnectiv ity . ( N o t e : C l e a r l y s t at e y o ur a ss u m pt i o n s . Y ou a re a l l o w e d t o d es i g n t h e ne t w o r k a c c o r d i ng t o y ou r a s s um p t i on s , bu t m a i n r e q u i r e m en t s sh o u l d n ot b e v i o l a te d ) Nirodha Dewapriya Networking Unit 02 Page | 11 Ac tiv ity 01 D iscuss the benefits and co nstraints o f different netwo rk system types that can be im plemented in the Matara branch and the m ain IEEE Ethernet standards that can be used in above L AN and WLAN design . D iscuss the im po rtance and im pact o f netwo rk to po lo g ies and assess the m ain netwo rk proto co l suites that are used in netwo rk design using exam ples. Recommend suitable netwo rk to po lo gy and netwo rk pro to col s for above scenario and evaluate with v alid po in ts how the recommended to po lo gy demo nstrates the efficient utilizatio n o f the netwo rking system of M atara branch. Ac tiv ity 02 D iscuss the operating principles o f network dev ices (Ex: Ro uter, Switch, Etc.) and server ty pes that can be used fo r abov e scenario while explo ring different serv ers that are av ailable in today’s market with their specifications . Re commend server/ servers fo r the abov e scenario and justify your selectio n with v alid po ints . D iscuss the inter -dependence o f workstatio n hardware and netwo rking so ftware and prov ide exam ples for netwo rking so ftware that can be used in abov e network design. Ac tiv ity 03 P repare a written netwo rk design plan to m eet the abo ve -mentio ned user requirements including a blueprint drawn using a mo deling too l ( Ex: M icro so ft Visio , EdrawM ax) .Test and evaluate the pro posed design by analyzing user feedback with the aim o f optimizing yo ur design and im prov ing efficiency. (Suppo rt y our answer by prov iding the VLAN and IP subnetting schem e fo r the abov e scenario and the list of dev ices, netwo rk com po nents and software used to design the netwo rk for abo ve scenario and while justifying yo ur selectio ns. ) Nirodha Dewapriya Networking Unit 02 Page | 12 Install and co nfigure Netwo rk serv ices , dev ices and applicatio ns (Ex: VL AN, WiFi, D NS,Pro xy , Web, Etc.) according to the pro po sed design to accom plish the user requirements and design a detailed M aintenance schedule for abov e Netwo rk. *N ote: - Scr een s hots of C onfig ur ati on scri pts shoul d be pr esented. Ac tiv ity 04 Im plement a netwo rked system based on yo ur prepared design with v alid evidence s. D evelo p test cases and co nduct verificatio n (Ex: P ing, extended ping, trace ro ute, telnet, SSH, etc.) to test the above Network and analyse the test results against the expected results. netwo rked sy stem Recomm end with v alid potential future justificatio ns and enhancem ents for the critically reflect on the im plemented netwo rk, including the plan, desig n, configurations, test s and the decisio ns m ade to enhance the system . Nirodha Dewapriya Networking Unit 02 Page | 13 Nirodha Dewapriya Networking Unit 02 Page | 14 Grading Rubric Grading Criteria Achieved Feedback LO1 : Examine networking principles and their protocols. P1 Discuss the benefits and constraints of different network types and standards. P2 Explain the impact of network topology, communicatio n and bandwidth requirements. M1 Assess common networking principles and how protocols enable the effectiveness Nirodha Dewapriya Networking Unit 02 Page | 15 of networked systems. LO2 : Explain networking devices and operations P3 Discuss the operating principles of networking devices and server types. P4 Discuss the interdependen ce of workstation hardware and relevant networking software M2 Explore a range of server types and justify the selection of a server for a given scenario, regarding cost and performance optimisation LO 1 & LO2 Nirodha Dewapriya Networking Unit 02 Page | 16 D1 Evaluate the topology protocol selected for a given scenario and how it demonstrates the efficient utilisation of a networking system. LO3 : Design efficient networked systems P5 Design a networked system to meet a given specification. P6 Design a maintenance schedule to support the networked system. M3 Analyse user feedback on your designs with the aim of Nirodha Dewapriya Networking Unit 02 Page | 17 optimising your design and improving efficiency. D2 Critically reflect on the implemented network, including the design and decisions made to enhance the system. LO4 : Implement and diagnose networked systems P7 Implement a networked system based on a prepared design. P8 Document and analyze test results against expected results. M4 Nirodha Dewapriya Networking Unit 02 Page | 18 Recommend potential enhancements for the networked systems. D2 Critically reflect on the implemented network, including the design and decisions made to enhance the system. Nirodha Dewapriya Networking Unit 02 Page | 19 Table of contents 1. An overview of the computer network 1.1 Network system types 1.2 What are the types of computer networks 1.3 Types of computer network Designs 1.4 LAN 1.5 MAN 1.6 WAN 1.7 PAN 1.8 SAN 1.9 VPN 1.9.1 CAN 2.Network Topology 2.1 Types of network topologies 2.2 Bus topology 2.3 Star topology 2.4 Ring topology 2.5 Tree topology 2.6 Hybrid Topology 2.7 Suitable network topology for alliance health 3. Network Standards and technologies 3.1 Internet protocols 3.2 IPV4 3.3 IPV6 3.4 VLAN 4. Network Standards 4.1 Institutions regarding network standards and communication 4.2 Ethernet 4.3 Wireless Personal area network 4.4 Other IEEE Network Standards 5. Network models and Protocols 5.1 TCP/IP Model 5.2 Network Protocols 5.3 Application layer protocol 5.4 FTP 5.5 SMTP 5.6 HTTP 5.7 DNS 5.8 DHCP (Dynamic Host configuration protocol) 5.9 Network Time protocol 5.9.1 SNMP Nirodha Dewapriya Networking Unit 02 Page | 20 6. Transmission Control protocol 6.1 User diagram Protocol 6.2 Internet Layer 6.3 Internet Protocol 6.4 Address Resolution Protocol Activity 02 7.1 Network devices and server types 7.2 Hub 7.3 Router 7.4 Switch 7.5 Alliance health Network Devices 7.6 Firewall 7.7 packet shaper, Bridge, Repeater 7.8 Content Filter 7.9 Load balancer 8. Transmission Media Types 8.1 Guided media 8.2 Unguided media 8.3 Networking Software 8.4 Server Software, Servers 8.5 DNS 8.6 Different Server Types 8.7 Selective of server Activity 3 and 4 9.1 IP and subnetting schemes 9.2 Required devices 9.3 Network Design blueprint 9.4 Setting up the network 9.5 Installing server OS 9.6 Network Implementation Using cisco packet tracer 9.7 Switch configuration 9.8 Switches 9.9 Assigning Trunk Ports -Creating VTP Domain -Assigning Ports for VLAN -VLAN checking - Router configuration - Naming the router and activating router - Configuration of dhcp pools 10.1 Testing the network Nirodha Dewapriya Networking Unit 02 Page | 21 -Pinging with same VLAN -Pinging with Other VLAN -Pinging to the servers 10.2 Subnetting Report 10.3 Maintanence schedule for the network 10.4 User feed back Table of Figures figure 1 peer to peer network figure 2 Client server model figure 3 LAN figure 4 MAN figure 5 WAN figure 6 PAN figure 7 CAN figure 8 Network Topologies figure 9 Star toplogy figure 10 Mesh topology figure 11 Ring topology figure 12 Difference between IPV4 and IPV6 figure 13 Network standards figure 14 IEEE standards figure 15 Ethernet IEEE 802.3 figure 16 OSI model figure 17 HTTP figure 18 FTP figure 19 Hub figure 20 FTP figure 21 STP figure 22 UTP figure 23 Coaxial Cable figure 24 Fibre optic cable figure 25 Difference between coaxial Cable and fiber optics figure 26 – figure 67 Setting up the network figure 68- 97 Configuration of switch figure 98 – 101 Router configuration figure 102- 112 Testing the network figure 113 IP and subnetting scheme figure 114 to 117 – User feedback List of tables Nirodha Dewapriya Networking Unit 02 Page | 22 Table 1 Advantages and Disadvantages of PAN....................................................................... 35 Table 2 Pros and Cons of Storage Area Network ..................................................................... 37 Table 3 Advantages and disadvantages of CAN ....................................................................... 40 Table 4 Advantages and disadvantages of Bus topology ......................................................... 43 Table 5 advantages and disadvantages of Star topology ........................................................ 45 Table 6 Advantages and disadvantages of Mesh topology ..................................................... 47 Table 7Pros and cons of ring topology ..................................................................................... 49 Table 8 Advantages and disadvantages of hubs and switches ................................................ 74 Table 9 IP and subnetting scheme ........................................................................................... 97 Table 10 Maintanence shedule .............................................................................................. 154 Nirodha Dewapriya Networking Unit 02 Page | 23 Activity 01 Introduction Company Network Overview This assignment extensively addresses the establishment of a computer network for Alliance Health Company. Each section of the assignment delves into the network architecture, detailing its construction, components, and individual functionalities. The report provides a thorough explanation of protocols, network standards, and network topologies. Furthermore, it outlines the types of servers essential for the company, how they align with Alliance Health's business requirements, their significance, and their impact on the computer network within the context of business processes. This solution is a comprehensive response for Alliance Health Company, aligning with the specified business criteria and incorporating the latest available technologies. 1.1. Network System Types Definition of a Computer Network In essence, a computer network represents a collective assembly of computing devices that establish connections between two or more units to facilitate resource sharing. This connection is established through various transmission mediums, including both wired and wireless methods. The categorization of computer networks encompasses several classifications. Types of Computer Networks An effective means of classifying diverse computer network designs is based on their scope or scale. The networking industry conventionally labels various designs as some form of area network. Key types of area networks include: a) Peer-to-Peer Network b) Client-Server Network c) Cloud Computing Nirodha Dewapriya Networking Unit 02 Page | 24 Understanding the intricacies of the Internet's organizational structure requires an initial comprehension of basic computer network operations. This report delves into the expansive categories of computer networking, providing readers with insights into the organizational frameworks that govern computer networks. 1.1.3 Peer-to-Peer Network A peer-to-peer network is characterized by the collaboration of two or more computers for the purpose of file sharing and device accessibility, without the need for a distinct server computer or dedicated software. Most operating systems inherently possess the capability to function as servers, facilitating resource sharing. Peer-to-peer systems play a crucial role in providing anonymized routing of network traffic, supporting parallel computing environments, and enabling distributed storage, among other functionalities. These networks operate on the principle of decentralized sharing, where each node contributes to the collective resources and services. Peer-to-peer networks not only enhance file-sharing capabilities but also find application in anonymizing network traffic, creating parallel computing environments, and establishing distributed storage systems. The absence of a centralized server distinguishes peer-to-peer networks, offering flexibility and scalability in resource utilization. In summary, this section provides an in-depth exploration of computer networks, delineating their fundamental definitions, classifications based on scope, and a detailed examination of the peer-to-peer network model. The ensuing discussions will further elucidate the intricacies of client-server networks and cloud computing, offering a comprehensive understanding of the diverse landscape of computer network systems. Figure 1 Peer to Peer network Nirodha Dewapriya Networking Unit 02 Page | 25 Client-Server-Network A client-server network is a computing architecture where tasks or workloads are divided between servers, which are powerful computers dedicated to providing services or resources, and clients, which are typically less powerful devices such as personal computers, smartphones, or tablets, that request and consume those services. Figure 2Client server model In a client-server network: 1. **Clients**: These are the devices used by end-users to access services or resources provided by servers. Clients initiate requests for data or services from servers. 2. **Servers**: These are specialized computers or software applications that fulfill requests from clients. Servers are designed to handle a large number of simultaneous requests and are optimized for providing specific services or resources. Examples of servers include web servers, file servers, database servers, and email servers. Client-server networks are widely used in various applications such as web browsing, email communication, file sharing, and database management. This architecture allows for centralized management of resources, efficient resource utilization, and scalability to accommodate a large number of clients. Additionally, client-server networks often provide mechanisms for authentication, authorization, and data security to ensure the confidentiality and integrity of communication between clients and servers. Nirodha Dewapriya Networking Unit 02 Page | 26 What is Cloud computing? Cloud computing refers to the delivery of computing services—including servers, storage, databases, networking, software, analytics, and more—over the Internet ("the cloud") to offer faster innovation, flexible resources, and economies of scale. Rather than owning and maintaining physical data centers and servers, cloud computing enables organizations to access computing resources on-demand from a cloud service provider. Key characteristics of cloud computing include: 1. On-Demand Self-Service Users can provision computing resources (such as virtual machines, storage, or applications) as needed without requiring human intervention from the service provider. 2. Broad Network Access Cloud services are accessible over the network and can be accessed from various devices such as smartphones, tablets, laptops, and desktops. 3. Resource Pooling Cloud providers pool computing resources to serve multiple customers, with different physical and virtual resources dynamically assigned and reassigned according to demand. Customers typically have no control or knowledge over the exact location of the resources provided but may specify certain requirements such as region or data residency. 4.Rapid Elasticity Cloud resources can be rapidly and elastically scaled up or down to accommodate changing demand. This scalability enables businesses to quickly respond to fluctuations in workload without the need for manual intervention. 5. Measured Service Cloud computing resources are monitored, controlled, and billed based on usage. This payas-you-go model allows organizations to only pay for the resources they consume, similar to utilities such as electricity or water. Nirodha Dewapriya Networking Unit 02 Page | 27 Cloud computing offers several deployment models, including Public Cloud Services are provided over the public internet and are available to anyone who wants to purchase them. Examples include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). Private Cloud Computing resources are dedicated to a single organization and are hosted either on-premises or by a third-party provider. Private clouds offer greater control over security, compliance, and customization. -Hybrid Cloud This model combines public and private cloud environments, allowing organizations to leverage the benefits of both. It enables seamless data and application portability between onpremises infrastructure and public cloud services. Multi-Cloud Organizations use multiple cloud providers to distribute workloads across different platforms. This approach helps mitigate vendor lock-in, increases redundancy, and optimizes costs. Cloud computing has revolutionized the way organizations build and manage their IT infrastructure, offering greater agility, scalability, and cost-effectiveness compared to traditional on-premises solutions. Figure 3 Cloud computing Nirodha Dewapriya Networking Unit 02 Page | 28 Cloud computing offers three main IT services 1. Software as a Service (SaaS) 2. Platform as a Service (PaaS) 3. Infrastructure as a Service (IaaS). SaaS involves third-party providers hosting applications and delivering them to customers over the Internet. Examples include CRM, email services, virtual desktops, and games. PaaS provides hardware and software tools for application development over the Internet, eliminating the need for in-house hardware and software installation. Examples include execution runtimes, databases, development tools, and web servers. IaaS delivers virtualized computing resources over the Internet, including virtual machines, servers, and storage. Advantages of cloud computing include increased accessibility, scalability, and costeffectiveness. It allows organizations to access resources on-demand, scale up or down as needed, and pay only for what they use. Additionally, it reduces the need for in-house infrastructure maintenance and offers flexibility for remote work. However, there are also disadvantages to consider. These include concerns about data security and privacy, potential downtime or service interruptions, and dependency on internet connectivity. Additionally, migrating existing systems to the cloud can be complex and may require significant investment in training and infrastructure. Type of Computer Network Designs. In contemporary times, networks serve as the fundamental infrastructure supporting businesses and various industries, owing to their remarkable advancements propelled by technology. These networks are distinguishable based on their scale and characteristics. Network scope refers to the geographical coverage and the quantity of interconnected computing devices. Differentiation is achieved through assessing the extent of geographical area they cover and the number of devices linked within. This differentiation aids in categorizing networks according to their size and capabilities, reflecting the evolution and versatility of networking technologies in meeting diverse organizational and industrial needs. Nirodha Dewapriya Networking Unit 02 Page | 29 Here are some network types that is being used in today’s world a) Local Area Network – LAN b) Metropolitan Area Network – MAN c) Wide Area Network – WAN d) Personal Area Network – PAN e) Storage Area Network – SAN f) Virtual Private Network – VPN g) Controller Area Network – CAN a) Local Area Network – LAN A Local Area Network (LAN) is a type of computer network that spans a relatively small geographic area, typically within a single building or campus. LANs allow multiple devices, such as computers, printers, servers, and other peripherals, to communicate and share resources with each other. Characteristics of a LAN include Limited Geographic Area LANs cover a small physical area, such as a single building, office, or campus. They are designed for use within a confined area to facilitate efficient communication and resource sharing among nearby devices. High Data Transfer Rates LANs typically offer high-speed data transfer rates, allowing for rapid exchange of information between devices. This enables efficient access to shared resources and supports bandwidth-intensive applications such as multimedia streaming or file transfers. Private Infrastructure LANs are often privately owned and operated by an organization or individual. They are not accessible to the general public and are protected by security measures to prevent unauthorized access or tampering. When considering, Ethernet or Wi-Fi Connectivity, LANs can be implemented using wired Ethernet connections or wireless Wi-Fi technology. Ethernet LANs use physical cables to connect devices to a central network switch or hub, while Wi-Fi LANs use wireless access points to provide connectivity to wireless-enabled devices. Nirodha Dewapriya Networking Unit 02 Page | 30 Figure 4 LAN B) Metropolitan Area Network – MAN A Metropolitan Area Network (MAN) is a type of computer network that covers a larger geographical area than a Local Area Network (LAN) but smaller than a Wide Area Network (WAN). It typically spans a city or metropolitan area, connecting multiple LANs and other network segments across a broader geographical region. MANs are designed to provide highspeed connectivity and facilitate communication and resource sharing between different locations within the same metropolitan area. Key characteristics of a Metropolitan Area Network include: Medium to Large Geographic Coverage MANs cover a metropolitan area or urban region, such as a city or county, and may extend over tens of kilometers. They serve as an intermediary between LANs and WANs, connecting multiple sites or campuses within the same geographical area. High-Speed Connectivity MANs offer high-speed data transmission rates, typically ranging from tens to hundreds of megabits per second (Mbps) or even gigabits per second (Gbps). This enables fast and efficient communication between interconnected sites, supporting bandwidth-intensive applications and services. Fiber Optic or Wireless Infrastructure MANs may utilize fiber optic cables, microwave links, or other wireless technologies to interconnect network nodes and transmit data over longer distances. These technologies enable reliable and high-capacity communication over the MAN infrastructure. Nirodha Dewapriya Networking Unit 02 Page | 31 Figure 5 MAN C) Wide Area Network-WAN A Wide Area Network (WAN) is an expansive telecommunications or computer network that spans across vast geographical areas. It primarily relies on internet connections and specialized setups facilitated by internet service providers (ISPs). Often, WANs are synonymous with the internet itself, as it encompasses a multitude of interconnected networks on a global scale. ISPs are key players in establishing WANs, including the World Wide Web. Major entities like satellite companies, service providers, and cable companies operate WANs, constructing extensive networks that cover entire cities or regions. They then offer leasing agreements to customers for network usage. In essence, WANs form the backbone of global communication, enabling seamless connectivity across distant locations. Figure 6 WAN Nirodha Dewapriya Networking Unit 02 Page | 32 Key characteristics of WANs include Large Geographic Coverage WANs cover extensive geographical areas, allowing for communication and data exchange between geographically dispersed locations. Public Infrastructure WANs often rely on public telecommunications infrastructure, such as leased lines, fiber optic cables, satellites, and microwave links, to transmit data across long distances. Internet Backbone The internet itself is considered the largest WAN, connecting millions of networks and devices worldwide. WANs can utilize the internet backbone to establish connections between distant locations. High-Speed Connectivity WANs typically offer high-speed data transmission rates, although the actual speed may vary depending on factors such as distance, infrastructure, and network congestion. Multiprotocol Support WANs support various network protocols and technologies, including TCP/IP, MPLS (Multiprotocol Label Switching), Frame Relay, ATM (Asynchronous Transfer Mode), and others, to facilitate communication between different types of devices and networks. Virtual Private Networks (VPNs) WANs often incorporate VPN technology to create secure, encrypted connections over public networks, enabling remote access and private communication between locations. Centralized Management WANs may be managed centrally by organizations or service providers to oversee network configuration, security, and performance monitoring across distributed locations. Nirodha Dewapriya Networking Unit 02 Page | 33 D) Personal Area Network- PAN A Personal Area Network (PAN) is a type of computer network used for connecting devices within the immediate vicinity of an individual person, typically within a range of around 10 meters (30 feet). PANs are designed to facilitate communication and data exchange between personal devices, such as smartphones, tablets, laptops, wearable devices, and peripherals. Key characteristics of a Personal Area Network include Limited Geographic Range PANs cover a small physical area, usually within the personal space of an individual, such as a room or office. The range is typically limited to around 10 meters, although this can vary depending on the technology used. Wireless Connectivity PANs commonly utilize wireless communication technologies such as Bluetooth, Wi-Fi, Zigbee, or Near Field Communication (NFC) to connect devices without the need for physical cables. This allows for greater mobility and flexibility in device placement. Device Interconnectivity PANs enable devices to communicate and interact with each other, facilitating tasks such as file sharing, printing, synchronization, and remote control. Devices within a PAN may serve different purposes but can collaborate to enhance functionality and user experience. Low Power Consumption Many PAN technologies are designed to be energy-efficient, consuming minimal power to preserve battery life in portable devices. This is particularly important for wireless technologies used in wearable devices, smartphones, and other battery-powered gadgets. Ease of Setup and Use PANs are typically easy to set up and configure, often requiring minimal user intervention to establish connections between devices. Automatic pairing and discovery features simplify the process of adding new devices to the network. Nirodha Dewapriya Networking Unit 02 Page | 34 Figure 7 PAN Advantages and disadvantages of personal area network Advantages Disadvantages Security Easy to use Auto configuration Low latency User freindly Fragmented No broadcasting Multiple connections Unreliable Low priority Table 1 Advantages and Disadvantages of PAN Nirodha Dewapriya Networking Unit 02 Page | 35 E) Storage Area Network -SAN A Storage Area Network (SAN) is a specialized high-speed network that provides access to consolidated, block-level data storage. Unlike traditional storage systems that are directly attached to individual servers, SANs decouple storage devices from servers, allowing multiple servers to access shared storage resources simultaneously. Key characteristics of a Storage Area Network include Centralized Storage SANs centralize storage resources, such as disk arrays, tape libraries, or solid-state drives (SSDs), into a separate network infrastructure dedicated solely to storage. This enables efficient storage management and utilization across multiple servers or hosts. Block-Level Access SANs provide block-level access to data storage, allowing servers to access storage devices at the block level rather than the file level. This provides high-performance, low-latency access to data and enables features such as RAID (Redundant Array of Independent Disks) and volume management. High-Speed Connectivity SANs typically use high-speed storage protocols such as Fibre Channel (FC), iSCSI (Internet Small Computer System Interface), or Fibre Channel over Ethernet (FCoE) to provide fast, reliable data transfer between servers and storage devices. These protocols offer high bandwidth and low latency, making SANs suitable for demanding enterprise applications. Scalability SANs are highly scalable, allowing organizations to easily expand storage capacity and performance as needed. Additional storage devices can be seamlessly added to the SAN without disrupting existing operations, enabling organizations to adapt to changing storage requirements over time. Nirodha Dewapriya Networking Unit 02 Page | 36 Advantages and disadvantages of using Storage Area network Advantages Disadvantages Speed Scalability Fault Torelance Centralized Cost Complexity Vendor-lock on Security Table 2 Pros and Cons of Storage Area Network F) Virtual Private Network- VPN A Virtual Private Network (VPN) is a technology that establishes a secure and encrypted connection over a public network, such as the internet, allowing users to access and transmit data privately and securely. Figure 8 Virtual Private Network Key features of VPNs include Encryption: VPNs encrypt data traffic between the user's device and the VPN server, ensuring that any data transmitted over the network is protected from interception or eavesdropping by unauthorized parties. Nirodha Dewapriya Networking Unit 02 Page | 37 Privacy: By routing data traffic through a VPN server, VPNs mask the user's IP address and hide their online activities from internet service providers (ISPs), government agencies, and other entities that may attempt to monitor or track their online behavior. Anonymity: VPNs provide anonymity by assigning users a temporary IP address from the VPN server's pool of addresses, making it difficult for websites and online services to identify and track individual users. Access Control: VPNs enable users to bypass geographical restrictions and access content that may be blocked or restricted based on their location. By connecting to a VPN server in a different geographic region, users can appear as though they are accessing the internet from that location, allowing them to circumvent censorship and access geo-blocked content. Advantages and disadvantages of using VPN Figure 9 Pros and Cons of Virtual Private network Nirodha Dewapriya Networking Unit 02 Page | 38 G) Controller Area Network - (CAN) Controller Area Network (CAN) is a robust vehicle bus standard designed to allow microcontrollers and devices to communicate with each other within a vehicle without a host computer. It was originally developed by Bosch in the 1980s for automotive applications but has since been adopted in various other industries such as industrial automation, medical devices, and aerospace. Key features of Controller Area Network (CAN) include Serial Communication: CAN uses a serial communication protocol, allowing multiple devices to communicate over a single pair of twisted-pair wires. Message-Based Protocol: Communication in CAN is message-based, with devices sending data packets known as "frames" onto the bus. Each frame contains an identifier that determines its priority and content. Deterministic Communication: CAN provides deterministic communication, meaning that messages are sent and received in a predictable and timely manner. This makes it suitable for real-time applications where timing is critical. Error Detection and Fault Tolerance: CAN includes error detection and fault tolerance mechanisms to ensure reliable communication even in noisy environments. These mechanisms include cyclic redundancy check (CRC) for error detection and fault confinement techniques for isolating faulty nodes. High Data Rates: CAN supports data rates ranging from a few kilobits per second (Kbps) up to several megabits per second (Mbps), depending on the specific CAN protocol variant used. Low Cost and Complexity: CAN is known for its low cost and simplicity, making it a cost-effective solution for networking applications in vehicles and other industries Nirodha Dewapriya Networking Unit 02 Page | 39 Figure 10 Controller Area Network Advantages and Disadvantages of using Controller Area Network-CAN Advantages Disadvantages High reliability Limited bandwith Scalability Limited Distance Low cost Limited data payload Deterministic Communication Lack of security Table 3 Advantages and disadvantages of CAN Nirodha Dewapriya Networking Unit 02 Page | 40 2. What are Network Topologies? A network topology refers to the physical or logical arrangement of devices and connections within a computer network. It defines how devices such as computers, servers, switches, routers, and other network components are interconnected and how data flows between them. Different network topologies, such as bus, star, ring, mesh, and hybrid, have unique characteristics that affect network performance, reliability, scalability, and fault tolerance. For instance, in a bus topology, devices are connected to a single communication line, while in a star topology, all devices connect to a central hub or switch. The choice of network topology depends on factors such as the size of the network, the desired level of redundancy, the cost of implementation, and the specific requirements of the network's users. Overall, selecting the appropriate network topology is crucial for designing an efficient and effective network infrastructure. Figure 11 Network Topologies Nirodha Dewapriya Networking Unit 02 Page | 41 What are the Types of Network Topologies? Network topologies refer to the physical or logical layout of interconnected devices in a computer network. Different network topologies define how devices are connected to each other and how data flows within the network. Some common network topologies include, 1. 2. 3. 4. 5. Bus Topology Star Topology Ring Topology Mesh Topology Tree Topology 1. Bus Topology Bus topology is a type of network topology in which all devices are connected to a single communication line, called a bus. In this setup, data is transmitted along the bus, and all devices on the network receive the data. However, only the intended recipient processes it. Key features of bus topology include Single Communication Line: All devices in a bus network are connected to a single central cable or bus. This cable serves as the communication medium through which data is transmitted between devices. Passive Topology: Bus topology does not require any active components such as switches or routers. Instead, devices are directly connected to the central bus. Broadcast Communication: When a device transmits data onto the bus, the data is broadcast to all devices on the network. However, only the device whose address matches the destination address processes the data. Ease of Installation: Bus topology is relatively easy to install and configure, as it requires minimal cabling and no complex networking equipment. Limited Scalability: As more devices are added to the network, the bus can become congested, leading to performance degradation. Additionally, the failure of the central bus cable can disrupt communication for all devices on the network. Limited Fault Tolerance: Bus topology lacks redundancy, meaning that a single point of failure, such as a break in the central cable, can bring down the entire network. Nirodha Dewapriya Networking Unit 02 Page | 42 Figure 12 Bus topology Advantages and Disadvantages of Bus topology Advantages Disadvantages Simplicity Limited scalability Cost effective Single point of faliure Ease of expansion Limited cable length and distance Efficient use of bandwith Limited security and privacy Table 4 Advantages and disadvantages of Bus topology Nirodha Dewapriya Networking Unit 02 Page | 43 2. Star Topology Star topology is a type of network topology in which all devices are connected to a central hub or switch. In a star topology, each device communicates directly with the central hub, and data flows through the hub to reach other devices on the network. Key features of star topology include Centralized Hub: All devices in a star network are connected to a central hub or switch. This hub serves as the focal point for communication, managing the flow of data between devices. Point-to-Point Communication: In a star network, devices communicate with each other through the central hub. When one device wants to transmit data to another device, it sends the data to the hub, which then forwards it to the intended recipient. Ease of Installation and Management: Star topology is relatively easy to install and manage compared to other topologies. Adding or removing devices from the network can be done without disrupting the rest of the network, as each device connects directly to the central hub. Fault Isolation: If one device or connection fails in a star network, it typically does not affect the rest of the network. This makes troubleshooting and maintenance easier compared to other topologies where a single point of failure can bring down the entire network. Scalability: Star topology can easily accommodate a large number of devices by adding more ports to the central hub or using switches with multiple ports. This scalability makes star topology suitable for both small home networks and large enterprise networks. Dependence on Central Hub: The central hub or switch is a critical component of a star network. If the hub fails, the entire network may become inaccessible until the hub is repaired or replaced. Nirodha Dewapriya Networking Unit 02 Page | 44 Figure 13 Star Topology Advantages and Disadvantages of Star topology Advantages Disadvantages Centralized management Cost Scalability Cabling requirements Performance Limited distance Security Performance degration Table 5 advantages and disadvantages of Star topology Nirodha Dewapriya Networking Unit 02 Page | 45 3. Mesh Topology Mesh topology is a type of network topology in which each device is connected to every other device in the network, forming multiple paths for data to travel. Unlike other topologies where devices are connected in a linear or hierarchical fashion, mesh topology provides redundant connections between devices, enhancing reliability and fault tolerance. Key features of mesh topology include Redundant Connections: In a mesh network, every device has multiple direct connections to other devices. This redundancy ensures that if one connection or device fails, data can still be routed through alternative paths, minimizing downtime and ensuring continuous communication. Fault Tolerance: Mesh topology offers high fault tolerance due to its redundant connections. Even if one or more devices or links fail, the network can automatically reroute traffic along functioning paths, maintaining connectivity. Scalability: Mesh topology is highly scalable, as new devices can be easily added to the network without disrupting existing connections. Each new device can establish direct connections with other devices, expanding the network's capacity and coverage. Flexibility: Mesh networks are inherently flexible, allowing for dynamic routing and self-healing capabilities. Devices in a mesh network can automatically discover and adapt to changes in network topology, optimizing data transmission paths and maximizing network efficiency. Complexity and Cost: Implementing a fully connected mesh network can be complex and costly, especially as the number of devices increases. The sheer number of connections required between devices can lead to higher infrastructure costs and increased management overhead. Performance: Mesh topology typically offers high performance and low latency, especially in networks with a dense mesh of connections. Data can be transmitted quickly between devices along direct paths, minimizing delays and bottlenecks. Mesh topology is commonly used in wireless mesh networks, where devices such as routers, access points, and sensors form a self-configuring mesh network to provide wireless coverage over a large area. It is also used in wired networks where high reliability and fault tolerance are critical, such as in mission-critical applications and industrial control systems. Nirodha Dewapriya Networking Unit 02 Page | 46 Figure 14 Mesh topology Advantages and Disadvantages Of Mesh Topology Advantages Disadvantages Robustness Complexity and Cost Scalability Resource Consumption High reliability Latency Flexibility Configuration and rooting overhead Table 6 Advantages and disadvantages of Mesh topology Nirodha Dewapriya Networking Unit 02 Page | 47 4. Ring Topology In a ring topology, devices are connected in a closed loop or ring configuration, where each device is connected directly to exactly two other devices, forming a continuous pathway for data transmission. Data travels around the ring in one direction, passing through each device until it reaches its destination. Key features of ring topology include: Unidirectional Data Flow Data circulates around the ring in a single direction, passing through each device in the network until it reaches its destination. This uni-directional flow simplifies network operation but can also lead to increased latency if the network becomes congested. Equal Access to Network Resources In a ring topology, each device has equal access to the network resources and bandwidth, as there is no central hub or switch controlling communication. However, the bandwidth is shared among all devices in the network. Fault Tolerance Ring topology offers inherent fault tolerance, as data can still be transmitted around the ring even if one device or connection fails. The data is rerouted in the opposite direction, bypassing the failed device or link. Limited Scalability Ring topology is not easily scalable, as adding or removing devices from the network can disrupt the entire ring. Additionally, the maximum number of devices that can be connected in a ring is limited by factors such as the length of the ring and the signal degradation over distance. Single Point of Failure Despite its fault tolerance, ring topology can suffer from a single point of failure if the ring is broken at any point. This can occur if a device fails or if there is a break in the physical connection between devices. Efficient Data Transmission Data transmission in a ring topology is efficient, as each device regenerates and forwards the data signal to the next device without the need for additional routing or processing. Ring topology was commonly used in early Ethernet networks, but it has largely been replaced by other topologies such as star and mesh due to their better scalability and fault tolerance. However, ring topology is still used in some applications, particularly in industrial control systems and telecommunications networks where fault tolerance and deterministic communication are critical. Nirodha Dewapriya Networking Unit 02 Page | 48 Figure 15 Ring Topology Advantages and disadvantages of ring topology Advantages Disadvantages Efficient Data transfer Single Point of Failure Simple Installation and Expansion Limited Scalability Fault Isolation Data Collision Risk Suitable for Small Networks Difficult to Troubleshoot Table 7Pros and cons of ring topology Nirodha Dewapriya Networking Unit 02 Page | 49 Figure 16 tree topology 5.Tree Topology Tree topology, also known as hierarchical topology, is a type of network topology that combines characteristics of both bus and star topologies. In a tree topology, devices are arranged in a hierarchical structure resembling a tree, with multiple levels of interconnected branches stemming from a single root node. Key features of tree topology include Hierarchical Structure A tree network consists of multiple levels of interconnected branches, with each branch extending from a central root node. Devices are organized in a hierarchical fashion, with parent nodes connecting to child nodes and forming a tree-like structure. Centralized Control The root node serves as the central point of control and management for the entire network. It typically acts as a central hub or switch, connecting multiple branches and facilitating communication between devices. Scalability Tree topology can easily scale to accommodate a large number of devices by adding additional branches or expanding existing branches. This hierarchical structure allows for efficient management of network resources and enables seamless integration of new devices into the network. Redundancy and Fault Tolerance Tree topology offers built-in redundancy and fault tolerance, as data can be rerouted along alternative paths in the event of a link failure or device malfunction. Multiple paths between devices ensure reliable communication and minimize the impact of network disruptions. Segmentation and Isolation Each branch in a tree network can function as a separate network segment, allowing for logical segmentation and isolation of network traffic. This can enhance security and Nirodha Dewapriya Networking Unit 02 Page | 50 performance by limiting the scope of network communication within specific branches or subnetworks. 2.7 Suggesting a Suitable Network Topology for Alliance Health As a network engineer at Alliance Health, considering the company's emerging status in the movie industry and its need for a network that can easily grow, perform well, and be costeffective, I strongly recommend the Hybrid Topology. This topology offers a reliable and comprehensive solution for the company. With multiple sections needing secure and private functions, the Hybrid Topology is chosen for its expandability, ease of setup and maintenance, and convenient administration. While star and hierarchical topologies could also meet the company's needs to some extent, the Hybrid Topology is preferred for its ability to blend elements of different topologies, ensuring smooth and efficient network performance, even under high traffic and with a large number of nodes. In summary, as an efficient and effective network engineer at Alliance Health, I believe that the Hybrid Topology is the most suitable solution for meeting the company's network needs based on the given scenario. 3. Network Related Technologies and Standards. In today's modern world, network technology serves as the primary means for exchanging data and information. As the business industry evolves rapidly, driven by various technologies and their applications, network specialists or technical engineers play a crucial role in configuring network technologies to meet organizational needs. A proficient network engineer recommends the most appropriate network technologies for an organization. In the context of implementing a network solution for Alliance Health, leveraging networkrelated technologies and standards will boost the capabilities of the proposed network solution, ensuring its effectiveness and alignment with the company's requirements. 3.1 Internet Protocols 3.2 what is IPV4? IPv4, or Internet Protocol version 4, is the fourth iteration of the Internet Protocol (IP) suite. It is the most widely used protocol for sending data over networks, including the internet. IPv4 addresses are 32-bit numerical values expressed in dotted-decimal notation (e.g., 192.168.1.1). Each IPv4 address consists of four octets, with each octet representing eight bits. This allows for a total of approximately 4.3 billion unique IPv4 addresses. The internet operates on a technology known as Internet Protocol addresses, with IPv4 representing the fourth iteration of this protocol. IPv4 serves as the backbone for data Nirodha Dewapriya Networking Unit 02 Page | 51 communication, providing a logical connection between devices within a network. It defines IP addresses using a 32-bit format, such as 111.111.111.111, where each section can range from 0 to 255. This allows for a total of 4,294,967,296 unique IPv4 addresses. However, with the increasing global population and widespread internet connectivity, the availability of IPv4 addresses is becoming limited. As a result, there's a growing concern that IPv4 addresses may soon be exhausted. IPv4 provides the basic foundation for addressing and routing packets of data between devices on a network. It defines the format of IP addresses, rules for packet forwarding and routing, and methods for fragmentation and reassembly of data packets. IPv4 also supports various higher-level protocols, such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), which enable reliable and connectionless communication, respectively. Despite its widespread use, IPv4 has limitations, most notably the depletion of available IP addresses due to the exponential growth of internet-connected devices. To address this issue, IPv6 (Internet Protocol version 6) was developed, which provides a much larger address space, allowing for trillions of unique IP addresses. However, IPv4 continues to be used alongside IPv6 in many networks, and mechanisms such as Network Address Translation (NAT) are employed to extend the usability of IPv4 addresses. 3.3 What is IPV6? IPv6, or Internet Protocol version 6, is the most recent version of the Internet Protocol (IP) suite. It is designed to succeed IPv4 and provides a larger address space to accommodate the growing number of devices connected to the internet. IPv6 addresses are 128 bits in length, expressed in hexadecimal notation (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334). Key features of IPv6 include Expanded Address Space: IPv6 provides a significantly larger address space compared to IPv4, allowing for approximately 340 undecillion unique addresses. This enables the allocation of unique addresses to a vast number of devices, supporting the continued growth of the internet and Internet of Things (IoT) devices. Efficient Routing and Packet Processing: IPv6 simplifies the packet header format, leading to more efficient routing and packet processing. This results in improved network performance and reduced overhead compared to IPv4. Autoconfiguration: IPv6 supports stateless address autoconfiguration, allowing devices to automatically generate and configure their own IPv6 addresses without requiring manual intervention or the use of Dynamic Host Configuration Protocol (DHCP). Nirodha Dewapriya Networking Unit 02 Page | 52 IPv6, short for Internet Protocol Version 6, is the latest iteration of internet protocols, designed to address the limitations of its predecessor, IPv4. Developed by the Internet Engineering Task Force (IETF), IPv6 serves the fundamental purpose of identifying and locating devices within networks and routers across the internet. In response to the anticipated depletion of IPv4 addresses, IPv6 introduces significant improvements, notably by extending the length of IP addresses from 32 bits to 128 bits. This enhancement ensures a larger pool of unique addresses to accommodate the growing demands of internet-connected devices, safeguarding the future scalability and functionality of the internet. Differences between IPV4 and IPV6 Figure 17 Differences between IPV4 and IPV6 Nirodha Dewapriya Networking Unit 02 Page | 53 An IP address is a numerical identifier used to locate devices on networks, but it can also be represented in text format for human readability. For example, a 32-bit IPv4 address is written as four numbers separated by periods, each ranging from zero to 255. For instance, 1.160.10.240 is a valid IPv4 address. On the other hand, IPv6 addresses are 128-bit addresses represented in hexadecimal format and separated by colons. An example of an IPv6 address is 3ffe:1900:4545:3:200:f8ff:fe21:67cf. MIT announced plans to sell some of its 16 million IPv4 addresses and use the proceeds to finance its own IPv6 network upgrades. 3.4. What Is VLAN? VLAN stands for Virtual Local Area Network. It is a network technology that allows for the segmentation of a physical network into multiple virtual networks, or VLANs. Each VLAN operates as a separate logical network, even though the devices may physically be connected to the same physical network infrastructure. This allows a group of servers, workstations, and other devices to appear as if they are on the same LAN, regardless of their physical locations. In larger business networks, VLANs are often used to improve traffic management by segmenting the network. Implementing VLANs in Alliance Health's network solution would enhance efficiency by creating new network segments with improved performance and data flow. This technology is deployed to achieve security, scalability, and ease of network management, enabling quick adaptation to network changes and the relocation of server nodes and workstations. In the subsequent sections of the report, I have outlined the allocation of VLANs in the company's network and their assignment to different sectors, providing readers with a comprehensive understanding of VLAN implementation. Key characteristics of VLANs include Logical Segmentation: VLANs enable the logical segmentation of a physical network, allowing different groups of devices to communicate with each other as if they were on separate physical networks. Isolation: Devices within a VLAN are isolated from devices in other VLANs, providing improved security and network management. This isolation prevents unauthorized access and reduces the risk of network attacks. Flexibility: Nirodha Dewapriya Networking Unit 02 Page | 54 VLANs offer flexibility in network design and management, allowing network administrators to group devices based on factors such as department, function, or security requirements. Broadcast Control: VLANs help control broadcast traffic within a network by confining broadcasts to devices within the same VLAN. This reduces network congestion and improves overall network performance. 4. Network Standards The internet working environment is regulated by two complementary sets of rules: standards and models. Standards are regulations that vendors must follow to ensure compatibility with other vendors, making their products valuable to end users. Some vendors may develop unique features that can only be used on their equipment, known as proprietary features. However, implementing proprietary features can limit their usability, making them less desirable for network implementation. Numerous network standards exist today, with new ones constantly being developed. The three primary standards bodies to note are the; 1. ITU – T (International Telecommunication Union) 2. ANSI (American National Standards Institute) 3. IEEE (Institute of Electrical & Electronic Engineering) ITU – T (International Telecommunication Union) The International Telecommunication Union Telecommunication Standardization Sector (ITU-T) is a specialized agency of the International Telecommunication Union (ITU) responsible for developing international standards for telecommunications and information and communication technologies (ICT). It is one of the three sectors of the ITU, alongside the ITU-R (Radio communication) and ITU-D (Development) sectors. The ITU-T, or International Telecommunication Union Telecommunication Standardization Sector, serves as the global standards organization for telecommunications. It can be accessed online at www.itu.int/ITU-T/. Within the ITU-T, study groups comprising experts from various countries convene to create international standards, referred to as "ITU-T Recommendations." These standards play a crucial role in shaping the global infrastructure of information and communication technologies (ICTs). Nirodha Dewapriya Networking Unit 02 Page | 55 ITU-T standards cover a wide range of topics within telecommunications, including network architecture, protocols, interfaces, security, multimedia communication, and more. These standards play a crucial role in ensuring interoperability and compatibility between different telecommunication systems and devices worldwide. ITU-T operates through various study groups, working parties, and expert groups composed of representatives from ITU member states, industry stakeholders, and academia. These groups collaborate to develop, review, and approve standards through a consensus-based process. ITU-T standards are widely adopted by telecommunications operators, equipment manufacturers, and service providers globally, contributing to the development and advancement of telecommunication technologies and services on a global scale. ANSI (American National Standards Institute) The American National Standards Institute (ANSI) is a private, non-profit organization that oversees the development of voluntary consensus standards for products, services, processes, and systems in the United States. Founded in 1918, ANSI's mission is to enhance the competitiveness of businesses and the quality of life for Americans by promoting and facilitating voluntary consensus standards and conformity assessment systems. ANSI serves as the coordinator and administrator of the United States standardization system, accrediting standards development organizations (SDOs) and ensuring that standards are developed in an open, transparent, and consensus-driven manner. ANSI also represents U.S. interests in international standardization activities, collaborating with other national and international standards organizations to develop harmonized standards that facilitate global trade and cooperation. ANSI standards cover a wide range of industries and sectors, including manufacturing, telecommunications, healthcare, information technology, and more. These standards provide guidelines and best practices for ensuring product quality, safety, interoperability, and environmental sustainability. IEEE (Institute of Electrical & Electronic Engineering) IEEE stands for the Institute of Electrical and Electronics Engineers. It is a global professional organization dedicated to advancing technology for the benefit of humanity. IEEE's scope of work covers a wide range of areas within electrical engineering, electronics engineering, computer science, and related disciplines. The IEEE, or Institute of Electrical and Electronics Engineers, is recognized as the largest technical professional organization globally. Its mission revolves around fostering the advancement and application of electro technology and related sciences to serve humanity's benefit, advance the profession, and promote the welfare of its members. Nirodha Dewapriya Networking Unit 02 Page | 56 IEEE is renowned for its development of technical standards, publications, conferences, and educational resources in various fields, including telecommunications, power and energy, computing, robotics, biomedical engineering, and many others. It serves as a platform for researchers, engineers, educators, and professionals to collaborate, exchange knowledge, and contribute to technological advancements. One of the notable contributions of IEEE is its development of industry-leading standards, such as those for wireless communications (e.g., Wi-Fi, Bluetooth), computer networking (e.g., Ethernet), power systems, and semiconductor devices. These standards play a crucial role in ensuring interoperability, reliability, and compatibility of products and systems worldwide. Nirodha Dewapriya Networking Unit 02 Page | 57 4.2 Ethernet (IEEE 802.3) Ethernet, also known as IEEE 802.3, is a widely used networking technology for local area networks (LANs). It defines the physical and data link layers of the OSI model and provides a standardized method for devices to communicate with each other over a LAN. Key features of Ethernet (IEEE 802.3) include Physical Layer Ethernet specifies various physical layer standards, such as twisted pair copper cables (e.g., Cat5e, Cat6), fiber optic cables, and coaxial cables. These cables carry electrical or optical signals between devices on the network. Data Link Layer Ethernet uses the Medium Access Control (MAC) sublayer of the data link layer to manage access to the network medium. It employs Carrier Sense Multiple Access with Collision Detection (CSMA/CD) as the access method, allowing devices to listen for signals on the network before transmitting data to avoid collisions. Frame Format Ethernet frames consist of a preamble, destination and source MAC addresses, type or length field, data payload, and a cyclic redundancy check (CRC) for error detection. The frame format ensures reliable and efficient data transmission over the network Nirodha Dewapriya Networking Unit 02 Page | 58 4.3 Wireless Personal Area Network (IEEE 802.15) A Wireless Personal Area Network (WPAN), defined by IEEE 802.15 standards, is a type of wireless network designed to connect devices within a short range, typically within a few meters to a few tens of meters. These networks are intended for personal use and can support communication between various electronic devices, such as computers, smartphones, tablets, wearable devices, and sensors. A wireless personal area network usually operates within a limited range of approximately 10 meters, making it suitable for short-distance communication. Bluetooth, for instance, serves as an example of this technology and forms the foundation of the IEEE 802.15 standard. Key features of Wireless Personal Area Networks (IEEE 802.15) include Low Power Consumption: WPAN devices are designed to operate with minimal power consumption, making them suitable for battery-powered devices and applications where energy efficiency is critical. Short Range Communication: WPANs typically have a limited range, which helps to minimize interference and ensure secure communication within a confined area, such as a room or personal space. Multiple Frequency Bands: IEEE 802.15 standards support multiple frequency bands, including 2.4 GHz and sub-GHz bands, allowing for flexibility in deployment and coexistence with other wireless technologies. Different Topologies: WPANs can be organized in various network topologies, including point-to-point, star, mesh, and ad-hoc networks, depending on the specific requirements of the application. Nirodha Dewapriya Networking Unit 02 Page | 59 4.4. Other IEEE network standards Other IEEE network standards encompass a variety of specifications and protocols aimed at different aspects of network management and operation: 1. IEEE 802.1: This standard pertains to network management protocols. 2. IEEE 802.2: Specifies standards for the data link layer within the OSI model. 3. IEEE 802.4: Defines the Media Access Control (MAC) layer for certain types of networks. 4. IEEE 802.5: Specifies the MAC layer for token ring networks. 5. IEEE 802.6: Focuses on standards for Metropolitan Area Networks (MANs). 6. IEEE 802.7: Provides specifications for network design, installation, and testing. 7. IEEE 802.3ab: Specifies Gigabit Ethernet transmission over copper wires, allowing for data transfer rates of 1GB/s over distances up to 100 meters using four pairs of CAT5 cable. 8. IEEE 802.3u: Standard supporting data transfer rates of up to 100 Megabits per Second (Mbps). These standards cover a wide range of network technologies and protocols, contributing to the development and standardization of various networking solutions and ensuring interoperability among different devices and systems. 5. Network Models and Protocols. A network model serves as a blueprint or framework for establishing communication between different systems. It is also referred to as a network stack or protocol suite. Typically, a network model is structured into layers, each representing specific functionality. Within these layers, general protocols are defined to perform particular tasks, akin to a set of rules or a language. Thus, a layer typically encompasses a collection of protocols. Network protocols divide complex processes into specific, clearly defined functions and tasks at each level of the network. Within the standard framework, such as the Open Systems Interconnection (OSI) model, individual or multiple network protocols oversee operations at each layer during communication exchanges. There are primarily two networking models: i. OSI Model ii. TCP/IP Model These models delineate the layers and protocols necessary for communication between devices in a network, providing a standardized approach to network architecture and operation. Nirodha Dewapriya Networking Unit 02 Page | 60 OSI Model The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions and interactions of networking systems. It defines a hierarchy of seven layers, each responsible for specific tasks related to data transmission and communication between devices. Here's an overview of each layer: Physical Layer The lowest layer deals with the physical transmission of data over the network medium. It includes specifications for cables, connectors, and other hardware components. Data Link Layer This layer ensures reliable point-to-point and point-to-multipoint communication between devices on the same network segment. It handles error detection, flow control, and framing of data packets. Network Layer The network layer focuses on routing and forwarding data packets across different networks. It determines the optimal path for data transmission based on network topology, addressing, and routing protocols. Transport Layer Responsible for end-to-end communication between devices. It provides reliable and efficient data delivery services, including segmentation, error recovery, and flow control. Session Layer Manages the establishment, maintenance, and termination of sessions between applications. It coordinates data exchange and synchronization between devices. Presentation Layer This layer is responsible for data representation, translation, and encryption. It ensures that data exchanged between applications is in a format that both sender and receiver can understand. Application Layer The topmost layer provides network services directly to end-users and applications. It includes protocols for tasks such as email, file transfer, web browsing, and remote access Nirodha Dewapriya Networking Unit 02 Page | 61 Figure 18 OSI model Nirodha Dewapriya Networking Unit 02 Page | 62 The OSI model serves as a reference framework for understanding and designing network architectures. While actual networks may not strictly adhere to the OSI model, it provides a conceptual framework for organizing and troubleshooting network communications. TCP / IP Model The TCP/IP (Transmission Control Protocol/Internet Protocol) model is another conceptual framework used for understanding and implementing network communications. The TCP/IP model is the foundation of the internet and most modern networking protocols. It provides a flexible and scalable framework for network communication, allowing devices to communicate across diverse network environments. While the TCP/IP model differs from the OSI model in its layer structure and terminology, both frameworks serve as valuable tools for understanding and designing network architectures. 5.2 Network Protocol A network protocol is a set of rules and conventions that governs the communication and interaction between devices in a computer network. These protocols define the format, timing, sequencing, error handling, and other aspects of data transmission, ensuring that data is exchanged reliably and efficiently across the network. Network protocols operate at various layers of the OSI (Open Systems Interconnection) model or the TCP/IP (Transmission Control Protocol/Internet Protocol) model, each layer having its own set of protocols. Network protocols are sets of clearly defined rules governing communication within computer networks. They establish the guidelines and conventions for interactions between different networks, serving as the mechanism through which messages are sent and received. 5.3 Application Layer Protocol The Application Layer Protocol is a category of network protocols that operates at the highest layer of the OSI (Open Systems Interconnection) model or the TCP/IP (Transmission Control Protocol/Internet Protocol) model. These protocols facilitate communication between software applications running on different devices within a network. Here's an overview of the Application Layer Protocol: Functionality: Application Layer Protocols provide specific services and functions to applications, enabling them to exchange data and interact with other applications over the network. These protocols typically handle tasks related to user interfaces, file transfers, email, web browsing, and other application-level services. Nirodha Dewapriya Networking Unit 02 Page | 63 Examples: 1. 2. 3. 4. 5. 6. HTTP (Hypertext Transfer Protocol) FTP (File Transfer Protocol): SMTP (Simple Mail Transfer Protocol) POP3 (Post Office Protocol version 3) IMAP (Internet Message Access Protocol) DNS (Domain Name System) Characteristics Application Layer Protocols are often standardized by organizations such as the IETF (Internet Engineering Task Force) to ensure compatibility and interoperability across different systems and platforms. These protocols may use a client-server model, where one device (the client) initiates a request for a service or resource, and another device (the server) responds to the request. Application Layer Protocols may support various features such as encryption, authentication, and data compression to enhance security and performance. 1. HTTP (Hypertext Transfer Protocol) HTTP is the protocol used for transmitting hypertext documents, such as web pages, over the internet. It defines the format and transmission of requests from clients (web browsers) to servers, and the responses from servers back to clients. HTTP operates on top of TCP/IP and typically uses port 80 for communication. Functionality: HTTP enables users to access and view web pages, submit web forms, download files, and interact with web-based applications. Nirodha Dewapriya Networking Unit 02 Page | 64 2. FTP (File Transfer Protocol) FTP is a protocol used for transferring files between a client and a server on a computer network. It provides a standard set of commands for uploading, downloading, renaming, and deleting files on remote servers. FTP operates on top of TCP/IP and uses ports 20 and 21 for communication. Functionality: FTP facilitates the efficient exchange of files between users and servers, enabling the transfer of documents, images, videos, and other types of files. Figure 20 FTP 3. SMTP (Simple Mail Transfer Protocol) SMTP is the protocol used for sending email messages between email servers over a network. It defines the rules and procedures for message transmission, including addressing, routing, and delivery. SMTP operates on top of TCP/IP and typically uses port 25 for communication. Functionality: SMTP allows users to send outgoing email messages to recipients' email addresses, delivering them to the appropriate mail servers for further processing and eventual delivery to the recipients' inboxes. 4. POP3 (Post Office Protocol version 3) POP3 is a protocol used for retrieving email messages from a remote mail server to a client device. It allows users to download and manage their email messages locally on their Nirodha Dewapriya Networking Unit 02 Page | 65 computers or mobile devices. POP3 operates on top of TCP/IP and typically uses port 110 for communication. POP3 enables users to access their incoming email messages, download them to their devices, and delete them from the server, providing a method for offline email access. 5. IMAP (Internet Message Access Protocol) IMAP is a protocol used for retrieving email messages from a remote mail server to a client device, similar to POP3. However, unlike POP3, IMAP allows users to access and manage their email messages directly on the server, keeping them synchronized across multiple devices. IMAP operates on top of TCP/IP and typically uses port 143 for communication. Functionality: IMAP provides users with the ability to access their email messages from multiple devices while maintaining synchronization between the server and client, enabling features such as folder management, message flags, and server-side searching. 6. DNS (Domain Name System) DNS is a protocol used for translating domain names (e.g., www.example.com) into IP addresses (e.g., 192.0.2.1) on the internet. It provides a distributed database system for mapping human-readable domain names to numerical IP addresses, allowing users to access websites and other internet resources using domain names. DNS operates on top of UDP or TCP/IP and typically uses port 53 for communication. Functionality: DNS facilitates the resolution of domain names to IP addresses, enabling internet users to navigate the web and access online services using easy-to-remember domain names instead of complex numerical IP addresses. Nirodha Dewapriya Networking Unit 02 Page | 66 6. Transport/Host-to-Host Layer Protocol The Transport Layer, also known as the Host-to-Host Layer, is a crucial component of the OSI (Open Systems Interconnection) model or the TCP/IP (Transmission Control Protocol/Internet Protocol) model. This layer is responsible for providing reliable and efficient communication between devices on a network. Here's an overview of the Transport Layer Protocol: Functionality: The Transport Layer Protocol ensures end-to-end communication between source and destination devices, regardless of the underlying network infrastructure. It establishes connections, manages data transfer, and provides error detection and correction mechanisms to ensure the integrity and reliability of transmitted data. The Transport Layer also handles flow control, congestion control, and multiplexing/demultiplexing of data streams to optimize network performance and resource utilization. Nirodha Dewapriya Networking Unit 02 Page | 67 Key Protocols 6.1 Transmission Control Protocol (TCP) TCP is a connection-oriented protocol that guarantees reliable and ordered delivery of data packets between devices. It establishes a virtual circuit between the sender and receiver, handles acknowledgments, and retransmits lost or corrupted packets. 6.2 User Datagram Protocol (UDP) UDP is a connectionless protocol that provides lightweight, unreliable communication between devices. It does not establish a connection before transmitting data and does not guarantee delivery or ordering of packets. UDP is often used for real-time applications where speed and efficiency are prioritized over reliability. Characteristics The Transport Layer operates independently of the underlying network technologies and protocols, allowing different types of networks to interoperate seamlessly. It shields higher-layer protocols (e.g., application layer protocols) from the complexities of network communication, providing a standardized interface for applications to send and receive data. The Transport Layer Protocol ensures that data is delivered accurately and efficiently, even in the presence of network congestion, errors, or disruptions. 6.3 Internet Layer The Network Layer is the third layer of the OSI (Open Systems Interconnection) model and the TCP/IP (Transmission Control Protocol/Internet Protocol) model. It is responsible for routing data packets from the source to the destination across multiple interconnected networks. The Network Layer is responsible for routing and forwarding data packets between devices on different networks, ensuring efficient and reliable communication across interconnected networks. It provides essential services such as addressing, routing, and packet forwarding, enabling seamless connectivity and data transmission in complex network environments. This layer, situated just above the lowest layer in the TCP/IP reference model, establishes a universal logical addressing system. Within the internet layer, key tasks encompass traffic routing, management, fragmentation, and logical addressing. Put simply, it's responsible for efficiently sending data along the best available route when multiple options exist. Common protocols within this layer include Internet Protocol (IP), Internet Control Message Protocol (ICMP), Address Resolution Protocol (ARP), and Reverse Address Resolution Protocol (RARP). Nirodha Dewapriya Networking Unit 02 Page | 68 6.4 Internet Protocols The Internet Protocol (IP) is a fundamental communication protocol used in computer networks, including the internet. It is part of the TCP/IP (Transmission Control Protocol/Internet Protocol) suite, which defines how data packets are transmitted, routed, and received across networks. This , also can be referred as a prescribed set of regulations governing data transmission across networks, adhere to the fundamental principles of communication protocols. The primary role of IP involves addressing hosts and directing datagrams from their source to designated destination hosts, spanning various network types. 6.5. Internet Control Message Protocol (ICMP) The Internet Control Message Protocol (ICMP) serves as an integral part of the TCP/IP protocol suite, operating at the network layer (Layer 3) of the OSI model. Its primary function is to enable communication between network devices for the purpose of network diagnostics, error reporting, and status updates. ICMP messages are encapsulated within IP packets, allowing them to traverse the network alongside regular data traffic. These messages serve various functions essential for the effective operation and management of computer networks. One of the key functions of ICMP is error reporting. When a network device encounters an issue while processing or forwarding IP packets, it generates ICMP error messages to notify the source host of the problem. For instance, if a router determines that it cannot forward a packet due to a network congestion or a routing loop, it will send an ICMP message, such as "Destination Unreachable," back to the originating host. This allows the source host to take appropriate action, such as retransmitting the packet or adjusting its routing tables. ICMP also plays a crucial role in network diagnostics. Tools like Ping and Traceroute utilize ICMP messages to test network reachability and measure network latency. Ping sends ICMP Echo Request messages to remote hosts and awaits their Echo Reply responses, helping administrators verify network connectivity and identify potential issues. Traceroute traces the path packets take to reach a destination by sending ICMP Time Exceeded messages with varying Time-to-Live (TTL) values and analyzing the responses from intermediate routers. Nirodha Dewapriya Networking Unit 02 Page | 69 6.5.Address Resolution Protocol (ARP) The Address Resolution Protocol (ARP) is a fundamental protocol within the TCP/IP suite, primarily responsible for translating network layer addresses (such as IP addresses) into corresponding data link layer addresses (such as MAC addresses). ARP operates at the network interface layer (Layer 2) of the OSI model. When a device needs to communicate with another device on the same local network, it first checks its ARP cache—a table storing mappings of IP addresses to MAC addresses. If the destination IP address is not found in the ARP cache, the device sends an ARP request broadcast message to the network, asking "Who has this IP address?". The device with the matching IP address responds with an ARP reply message, containing its MAC address. Upon receiving the reply, the requesting device updates its ARP cache with the new IP-to-MAC mapping and can then send data directly to the destination device's MAC address. 6.6.Reverse Address Resolution Protocol (RARP) The Reverse Address Resolution Protocol (RARP) is a networking protocol used to obtain the IP address of a device when only its hardware address, such as a MAC address, is known. RARP operates in a manner opposite to the Address Resolution Protocol (ARP). In a RARP request, a device broadcasts its MAC address and requests its corresponding IP address from a RARP server. The RARP server maintains a database mapping MAC addresses to IP addresses and responds to the request with the appropriate IP address. RARP was primarily used in older computer networks, particularly diskless workstations, to allow devices to boot and obtain their IP addresses dynamically. However, RARP has largely been replaced by more advanced protocols such as DHCP (Dynamic Host Configuration Protocol) which offer additional features and flexibility in IP address assignment and configuration. Nirodha Dewapriya Networking Unit 02 Page | 70 Activity 02 7.1. Network Devices & Server Types Network devices are essential components that facilitate communication and data exchange within computer networks. These devices play various roles in ensuring network connectivity, management, and security. Some common network devices include routers, switches, hubs, access points, firewalls, modems, network interface cards (NICs), repeaters, load balancers, and proxy servers. 7.2. Hub What is a hub? A hub is a basic networking device that operates at the physical layer (Layer 1) of the OSI model. Its primary function is to connect multiple devices within a local area network (LAN) and facilitate the exchange of data packets. Hubs are often used in small-scale networks or for temporary setups due to their simplicity and low cost. Physically, a hub typically consists of multiple ports where network cables can be plugged in to connect devices such as computers, printers, or other networking equipment. When a data packet arrives at one of the hub's ports, it is broadcasted to all other ports, regardless of the intended recipient. This means that all devices connected to the hub receive the transmitted data, and each device must determine whether the data is intended for it based on its MAC address. One of the key characteristics of hubs is their lack of intelligence or decision-making capabilities. Unlike switches or routers, hubs do not examine the destination address of incoming data packets or make forwarding decisions based on MAC addresses. Instead, they simply replicate incoming data packets and send them out through all other ports, creating a shared network segment where all devices share the available bandwidth. While hubs are simple and easy to set up, they have several limitations compared to more advanced networking devices. One significant drawback is their inability to segment network traffic. Since all data packets are broadcasted to all devices on the network, hubs can suffer from congestion and reduced network performance, especially in larger networks with heavy traffic. Nirodha Dewapriya Networking Unit 02 Page | 71 Figure 21 A Hub 7.3 Router What is a router? A router is a networking device that operates at the network layer (Layer 3) of the OSI model. Its primary function is to connect multiple networks together and route data packets between them. Routers use logical addressing (such as IP addresses) to determine the best path for data transmission across networks. They make forwarding decisions based on destination IP addresses, allowing data to be transmitted efficiently across interconnected networks. Routers are often used to connect local area networks (LANs) to wide area networks (WANs), such as the internet. They provide functions such as network address translation (NAT), which allows multiple devices on a LAN to share a single public IP address. Routers can also provide security features such as firewall capabilities to protect networks from unauthorized access and malicious attacks. Some advanced routers offer additional features such as virtual private network (VPN) support for secure remote access, quality of service (QoS) for traffic prioritization, and traffic shaping for bandwidth management. Routers typically have multiple ports for connecting to different networks and devices, including Ethernet ports for wired connections and wireless antennas for wireless connectivity. Overall, routers play a crucial role in facilitating communication and data exchange between different networks, enabling the seamless operation of interconnected systems in today's digital world. Routers use logical addressing (such as IP addresses) to determine the best path for data transmission across networks. They make forwarding decisions based on destination IP addresses, allowing data to be transmitted efficiently across interconnected networks. Nirodha Dewapriya Networking Unit 02 Page | 72 Routers are often used to connect local area networks (LANs) to wide area networks (WANs), such as the internet. They provide functions such as network address translation (NAT), which allows multiple devices on a LAN to share a single public IP address. 7.4.Switch What is a Switch? Figure 22 Switch A switch is a networking device that operates at the data link layer (Layer 2) of the OSI model. Its primary function is to connect multiple devices within a local area network (LAN) and facilitate the exchange of data packets. Unlike hubs, which broadcast data packets to all Nirodha Dewapriya Networking Unit 02 Page | 73 connected devices, switches use MAC addresses to forward data packets only to the intended recipient device. This improves network efficiency and reduces network congestion. Switches maintain a table, known as a MAC address table or forwarding table, which maps MAC addresses to the ports on the switch. When a data packet arrives at a switch, it examines the destination MAC address and forwards the packet only to the port associated with that MAC address. This process, known as switching, enables devices to communicate directly with each other without causing unnecessary traffic on the network. Switches come in various configurations, including unmanaged switches, which are simple plug-and-play devices that require no configuration, and managed switches, which offer advanced features such as VLAN support, port mirroring, and Quality of Service (QoS) settings. Managed switches allow network administrators to configure and manage the switch remotely, providing greater control over network traffic and security. Advantages and Disadvantages of Hubs and swtiches Table 8 Advantages and disadvantages of hubs and switches Advantages Disadvantages HUB compatible with most network devices lead to network congestion SWITCH They increase the performance of the network Network connectivity issues Nirodha Dewapriya Networking Unit 02 Page | 74 7.5. Assigning network devices for alliance health As the network consultant for Alliance Health's Matara branch, I have opted to utilize switches and routers as the primary network devices for the network design. Routers will be employed to establish connections between the LANs of different departments, serving as gateways where necessary. On the other hand, switches will be deployed within each department to construct the LAN infrastructure. Switches play a crucial role in the network by efficiently directing data frames to their intended destinations. Unlike hubs, switches have the capability to recognize the destination of a data frame and allocate the full bandwidth of each port accordingly. This ensures optimal data transmission within the LAN, enhancing network performance. In addition to switches and routers, network security devices are essential components for safeguarding the integrity and confidentiality of the network. These security devices monitor network traffic, scanning for any suspicious activity that may indicate a potential security threat. By correlating network activity signatures with databases containing known attack techniques, these devices can identify and block malicious attacks in real-time, bolstering the network's defenses against cyber threats. The combination of switches and routers for network connectivity, along with network security devices for threat detection and prevention, forms a robust and reliable network infrastructure for Alliance Health's Matara branch. 7.6. Firewall What is firewall? A firewall is a network security device or software application designed to monitor and control incoming and outgoing network traffic. It acts as a barrier between a trusted internal network and untrusted external networks, such as the internet, to prevent unauthorized access and protect against cyber threats. Firewalls operate by inspecting data packets as they pass through the network and enforcing predefined security rules or policies. These rules specify which types of traffic are allowed or blocked based on factors such as source and destination IP addresses, port numbers, protocols, and application types. By filtering network traffic, firewalls help prevent unauthorized access to sensitive information, block malicious attacks and malware, and ensure the confidentiality, integrity, and availability of network resources. They are a critical component of any comprehensive network security strategy, providing an essential layer of defense against cyber threats in today's interconnected digital environment. Nirodha Dewapriya Networking Unit 02 Page | 75 7.7 Packet shaper What is packet shaper? A packet shaper, also known as a bandwidth management device, is a network appliance or software application designed to monitor, control, and optimize the flow of data packets across a network. Its primary function is to regulate and prioritize network traffic based on predefined policies or rules, ensuring that critical applications receive the necessary bandwidth and network resources while less important traffic is appropriately managed. Packet shapers work by inspecting data packets as they traverse the network and applying traffic shaping techniques to control the flow of data. This may include limiting the bandwidth available to certain types of traffic, enforcing Quality of Service (QoS) policies to prioritize specific applications or users, and implementing traffic optimization algorithms to improve overall network performance. By dynamically managing network traffic, packet shapers help prevent congestion, reduce latency, and ensure a consistent quality of service for critical applications such as VoIP (Voice over Internet Protocol), video streaming, and online gaming. They are commonly used in enterprise networks, internet service provider (ISP) networks, and other environments where efficient bandwidth management and traffic optimization are essential for maintaining network performance and user satisfaction. 7.8 Repeater What is repeater? A repeater is a network device used to extend the reach or range of a network by regenerating or amplifying signals. It operates at the physical layer (Layer 1) of the OSI model and is typically used in environments where the length of the network cable exceeds the maximum allowable distance, leading to signal degradation or attenuation. When data travels across a network cable, the signal weakens over distance due to factors such as resistance and interference. A repeater receives the weak signal, cleans it up, and retransmits it at a higher power level, effectively boosting the signal strength and allowing it to travel farther without degradation. Repeaters are commonly used in Ethernet networks to extend the reach of network cables beyond the standard maximum distance of 100 meters. They are simple devices that require no configuration and are transparent to network traffic, simply amplifying signals as they pass through. While repeaters can extend the physical reach of a network, they do not actively manage or control network traffic. They are primarily used to overcome signal loss and ensure reliable communication over long distances in wired networks. Nirodha Dewapriya Networking Unit 02 Page | 76 Advantages and disadvantages of repeater Advantages 1. Signal amplification: A repeater boosts the strength of signals, allowing them to travel longer distances without degradation. 2. Signal regeneration: By cleaning up and retransmitting signals, repeaters help maintain signal integrity over long cable runs. 3. Cost-effective solution: Repeaters are relatively inexpensive compared to other network devices, making them a cost-effective solution for extending network reach. Disadvantages 1. Limited functionality: Repeaters operate at the physical layer of the OSI model and simply regenerate signals without any intelligence or control over network traffic. 2. Signal degradation: While repeaters can extend the reach of a network, they cannot eliminate signal degradation entirely, especially over very long cable runs or in noisy environments. 3. Limited scalability: Repeaters are best suited for small-scale deployments or pointto-point connections and may not be suitable for larger, more complex network architectures. Nirodha Dewapriya Networking Unit 02 Page | 77 7.9. Bridge What is bridge? A bridge is a network device used to connect two or more network segments or LANs (Local Area Networks) together, allowing them to communicate with each other. Bridges operate at the data link layer (Layer 2) of the OSI model and are capable of filtering and forwarding data frames between connected network segments based on their MAC (Media Access Control) addresses. The primary function of a bridge is to reduce network congestion and improve overall network performance by selectively forwarding traffic only to the segments where the destination device is located, rather than broadcasting it to all segments. Bridges learn the MAC addresses of devices connected to each network segment by analyzing the source addresses of incoming data frames and building a forwarding table, which is used to make forwarding decisions. Bridges are particularly useful in larger network environments where multiple LANs need to be interconnected, such as in enterprise networks or campus environments. They help segment network traffic, isolate network problems, and improve overall network efficiency by dividing the network into smaller collision domains. Modern bridges are often integrated into switches, which combine the functionality of bridges with additional features such as port management, VLAN support, and advanced network management capabilities. However, the basic principle of bridging – connecting and forwarding traffic between network segments based on MAC addresses – remains the same. Nirodha Dewapriya Networking Unit 02 Page | 78 7.9.1 Content Filter What is content filter? A traffic shaper, also known as a network packet shaper, is a network management tool utilized to manage and regulate the flow of network traffic. Its core purpose revolves around controlling the transmission of data packets within a network, with the aim of prioritizing certain types of traffic while ensuring equitable distribution of network resources. Operating akin to a traffic cop, a network packet shaper actively monitors both incoming and outgoing data packets traversing the network. Its function extends to enforcing predefined rules and policies designed to govern the priority and speed of different categories of traffic. By doing so, it effectively shapes the traffic flow within the network, optimizing its efficiency and ensuring that critical applications or services receive preferential treatment over less important traffic. The role of a packet shaper is multifaceted, encompassing several key objectives. Firstly, it facilitates the prioritization of specific types of traffic, such as mission-critical applications or real-time communication protocols, to ensure their uninterrupted and timely delivery. Additionally, it regulates the bandwidth allocation for different types of traffic, preventing any single application or user from monopolizing network resources to the detriment of others. Furthermore, a packet shaper plays a crucial role in maintaining network performance and stability by mitigating issues such as congestion, latency, and packet loss. Through intelligent traffic shaping algorithms, it optimizes the utilization of available bandwidth, thereby enhancing overall network efficiency and user experience. In summary, a traffic shaper acts as a proactive guardian of network resources, employing sophisticated techniques to manage traffic flow, prioritize critical applications, and maintain optimal network performance. Its versatile capabilities make it an indispensable tool for organizations seeking to streamline their network operations and ensure the reliable delivery of essential services. Nirodha Dewapriya Networking Unit 02 Page | 79 7.9.2 Load balancer A load balancer is a network device or software application designed to evenly distribute incoming network traffic across multiple servers, resources, or nodes within a server farm, data center, or cloud environment. Its primary function is to optimize resource utilization, enhance scalability, improve performance, and ensure high availability of applications or services. Load balancers operate at the application layer (Layer 7) or transport layer (Layer 4) of the OSI model and can perform various functions based on their configuration and capabilities. They act as intermediaries between clients and servers, intercepting incoming requests and directing them to the most appropriate backend server based on predefined algorithms and policies. One of the key features of load balancers is traffic distribution, where they intelligently distribute incoming network traffic among multiple servers or resources based on factors such as server load, response time, or geographic proximity. By spreading the workload across multiple servers, load balancers prevent any single server from becoming overwhelmed with traffic, thus improving overall performance and reliability. Load balancers also play a critical role in ensuring high availability and fault tolerance by continuously monitoring the health and availability of backend servers. If a server becomes unavailable or unresponsive, the load balancer automatically redirects traffic to other healthy servers, thereby minimizing downtime and ensuring seamless failover. Additionally, load balancers can support session persistence, SSL termination, and dynamic scaling, allowing organizations to maintain consistent user experiences, offload encryption tasks, and dynamically adjust server capacity based on demand or traffic patterns. Overall, load balancers are essential components of modern IT infrastructure, providing the foundation for scalable, resilient, and high-performance applications and services in both onpremises and cloud environments. Nirodha Dewapriya Networking Unit 02 Page | 80 8. Transmission Media types Transmission media, also known as communication channels, are the physical pathways through which data is transmitted from one device to another in a network. There are several types of transmission media, each with its own characteristics, advantages, and limitations. 8.1. Guided Media Guided media, also known as wired or bounded media, refers to transmission media that use physical pathways to guide the transmission of electromagnetic signals. The signals are confined within the physical medium, providing a direct path for communication. Some common types of guided media include: 1. Twisted Pair Cable 2. Coaxial Cable 3. Optical Fiber Twisted pair cable Twisted pair cable is a type of guided transmission medium commonly used for multiple telecommunications and computer networks. It consists of pairs of insulated copper wires twisted together to form a cable. The twisting of the wires helps to reduce electromagnetic interference (EMI) and crosstalk, which occur when electrical signals from adjacent wires interfere with each other. There are two main types of twisted pair cable: unshielded twisted pair (UTP) and shielded twisted pair (STP). Unshielded Twisted Pair (UTP) UTP consists of pairs of insulated copper wires twisted together without any additional shielding. It is the most common type of twisted pair cable and is widely used in Ethernet networks, telephone lines, and other communication systems. UTP is relatively inexpensive, flexible, and easy to install. It provides adequate performance for short to medium-distance communication and is suitable for most residential and commercial applications. Nirodha Dewapriya Networking Unit 02 Page | 81 Shielded Twisted Pair (STP) STP consists of pairs of insulated copper wires surrounded by a metallic shield, typically made of foil or braided wire. The shield helps to further reduce electromagnetic interference and provides better protection against external noise and signal degradation. STP is commonly used in environments with high levels of electromagnetic interference, such as industrial settings or areas with large electrical equipment. Figure 23 STP Nirodha Dewapriya Networking Unit 02 Page | 82 Coaxial Cable Coaxial cable, often referred to as coax cable, is a type of electrical cable that is commonly used for transmitting cable television signals, internet data, and other high-frequency electrical signals. It consists of a central conductor, which is usually made of copper or aluminium, surrounded by a dielectric insulating material, and then an outer conductor or shield made of metal braid or foil. The outer conductor is usually covered by a protective layer, which can be made of PVC or another material. The key design feature of coaxial cable is that the central conductor and the outer shield share the same axis, hence the term "coaxial." This design helps to minimize signal interference and loss, making coaxial cable ideal for transmitting high-frequency signals over long distances without significant degradation. Coaxial cable is widely used in various applications, including cable television distribution, internet connectivity (such as cable internet), telecommunications, and networking. Its ability to carry high-frequency signals efficiently makes it a popular choice for transmitting data reliably over long distances. Coaxial cable offers several advantages and disadvantages Advantages Wide Application Range: Coaxial cable is used in various applications, including cable television distribution, internet connectivity, telecommunications, and networking. Signal Quality: Coaxial cable provides high-quality signal transmission, minimizing signal degradation over long distances. Its shielding helps to protect against interference, ensuring reliable data transmission. Broad Bandwidth: Coaxial cable supports a wide range of frequencies, making it suitable for transmitting high-speed data and multimedia content. Disadvantages Limited Distance: While coaxial cable can transmit signals over moderate distances without significant loss, it is not as effective over very long distances compared to fiber optic cables. Signal Interference: Despite its shielding, coaxial cable can still be susceptible to electromagnetic interference (EMI) and radio frequency interference (RFI), especially in densely populated areas or environments with high levels of electromagnetic activity. Nirodha Dewapriya Networking Unit 02 Page | 83 Optical Fiber Cable Optical fiber cable, commonly known as fiber optic cable, is a type of cable that uses optical fibers to transmit data in the form of light pulses. It consists of one or more hair-thin strands of glass or plastic fiber enclosed in a protective sheath. The core of the fiber is where the light travels, surrounded by a cladding layer that reflects light back into the core, allowing it to travel long distances without significant loss. Here are some key features, advantages, and disadvantages of optical fiber cable: Features Light Transmission: Optical fiber cable transmits data using light pulses, allowing for highspeed data transmission over long distances. Low Signal Loss: Fiber optic cable experiences minimal signal loss compared to traditional copper cables, making it suitable for long-distance communication without the need for signal boosters or repeaters. Advantages High Speed: Fiber optic cables offer significantly higher data transmission speeds compared to copper cables, making them ideal for applications requiring fast and reliable data transfer. Security: Fiber optic cables are difficult to tap into, providing a higher level of security for data transmission compared to copper cables, which can be more susceptible to interception. Longer Distances: Optical fiber cables can transmit data over much longer distances without the need for signal amplification, making them suitable for long-haul communication networks. Disadvantages Cost: Fiber optic cables can be more expensive to install initially compared to copper cables, primarily due to the higher cost of fiber optic components and specialized equipment required for installation and maintenance. Fragility: Optical fibers are delicate and can be easily damaged if mishandled during installation or maintenance, requiring careful handling and protection to avoid signal loss or breakage. Compatibility: Fiber optic technology may not be compatible with existing infrastructure in some cases, requiring upgrades or modifications to existing systems for integration. Nirodha Dewapriya Networking Unit 02 Page | 84 Figure 25 coaxial cable Figure 24 fibre optic Nirodha Dewapriya Networking Unit 02 Page | 85 8.2 Unguided Media Unguided media, also known as wireless communication, refers to transmission channels that convey data without the use of physical cables. Instead, they utilize electromagnetic waves or light to transmit signals through the air or free space. Examples include radio waves, microwaves, and infrared signals. Wireless communication is widely used in various applications, including cellular networks, Wi-Fi, Bluetooth, and satellite communication. It offers mobility and flexibility, allowing devices to communicate without being tethered by cables, making it ideal for mobile devices and dynamic environments. However, unguided media are susceptible to interference from other wireless devices and environmental factors, which can degrade signal quality. Security concerns also arise due to the potential for unauthorized access and interception of data. Despite these challenges, wireless communication continues to play a crucial role in modern telecommunications, providing connectivity and convenience in diverse scenarios. examples of unguided media Radio Waves: Radio waves are electromagnetic waves with long wavelengths used for various types of wireless communication, including radio broadcasting, cellular networks, Wi-Fi, Bluetooth, and RFID (Radio Frequency Identification). Infrared Signals: Infrared signals are electromagnetic waves with wavelengths longer than visible light but shorter than microwaves. They are commonly used for short-range communication, such as infrared remote controls, infrared data transmission between devices like smartphones, and infrared communication in some wireless LANs. Light Waves (Visible and Ultraviolet): Light waves, including visible light and ultraviolet (UV) light, can also be used for wireless communication. For example, visible light communication (VLC) uses light-emitting diodes (LEDs) to transmit data through visible light signals, which can be utilized in indoor positioning systems and wireless data transfer in environments where radio frequency communication is restricted. Nirodha Dewapriya Networking Unit 02 Page | 86 Advantages of unguided media Mobility: Unguided media allow for greater mobility as devices can communicate without being physically tethered by cables. This makes them ideal for mobile devices such as smartphones, tablets, and laptops. Flexibility: Wireless communication offers flexibility in deployment, allowing for easy setup and reconfiguration of networks without the need for laying down cables. This makes it suitable for temporary installations or dynamic environments where wired connections may be impractical. Scalability: Wireless networks can be easily expanded to accommodate more devices or cover larger areas by adding additional access points or repeaters. This scalability makes them suitable for both small-scale and large-scale deployments. Cost-effectiveness: In some cases, wireless communication can be more cost-effective than deploying wired infrastructure, especially in situations where laying cables is prohibitively expensive or impractical, such as in remote areas or across bodies of water. Disadvantages of unguided media Interference: Wireless signals can be susceptible to interference from other wireless devices, electronic equipment, and environmental factors such as weather conditions, which can degrade signal quality and reliability. Limited Range: Wireless signals have a limited range compared to wired communication, especially for high-frequency signals. This limitation can result in dead zones or areas with poor signal coverage, particularly in large buildings or outdoor environments. Bandwidth Constraints: Wireless networks typically have lower bandwidth compared to wired networks, which can result in slower data transfer speeds and reduced performance, especially in densely populated areas where multiple devices compete for bandwidth. Reliability: Wireless communication may not be as reliable as wired communication, as it can be affected by factors like signal attenuation, multipath interference, and signal fading. This unreliability can lead to dropped connections or intermittent connectivity issues. Health Concerns: There are ongoing debates and concerns about potential health risks associated with prolonged exposure to electromagnetic radiation emitted by wireless devices and infrastructure. While research in this area is inconclusive, it remains a consideration for some individuals and organizations. Power Consumption: Wireless devices require power to operate, and transmitting and receiving wireless signals can consume more energy compared to wired communication. This can lead to shorter battery life for mobile devices and increased energy costs for wireless infrastructure. Nirodha Dewapriya Networking Unit 02 Page | 87 8.3 Networking Software Deciding the Server OS The operational backbone of Alliance Health's Matara branch relies on the implementation of essential server functionalities, including Dynamic Host Configuration Protocol (DHCP), Mail Server, and Web Server. To facilitate these critical tasks, a reliable server operating system is imperative. Among the multitude of server operating systems available, Microsoft Server 2019 has been selected as the preferred choice for Alliance Health's Matara branch. Microsoft Server 2019 offers a comprehensive suite of features tailored to meet the specific needs of businesses and organizations. Its robust capabilities enable seamless deployment and management of DHCP services, ensuring efficient allocation of IP addresses to network devices. Furthermore, the Mail Server functionality provided by Microsoft Server 2019 facilitates reliable email communication within the organization, fostering collaboration and productivity among staff members. Additionally, the Web Server capabilities of Microsoft Server 2019 empower Alliance Health to establish and maintain a secure and responsive web presence. By leveraging this featurerich operating system, Alliance Health can efficiently host and manage their website, providing vital information to clients and stakeholders while ensuring optimal performance and accessibility. The decision to implement Microsoft Server 2019 at the Matara branch of Alliance Health underscores the commitment to reliability, security, and scalability. With its robust suite of features and proven track record, Microsoft Server 2019 is poised to support Alliance Health's network infrastructure needs, enabling seamless operations and facilitating the delivery of quality healthcare services to the community. The Active directory Active Directory is a fundamental component of Windows Server OS, employed by Microsoft for controlling computers and devices within a network. It serves as a comprehensive toolset for network administrators, facilitating the construction and administration of domains, users, and objects. For instance, administrators can create user groups and allocate specific permissions for accessing designated server folders. Active Directory offers a systematic approach to organizing numerous users into logical groups and subgroups, essential for managing network scalability. Additionally, it ensures access control at each hierarchical level, thereby enhancing security and streamlining network management processes as the network expands. Nirodha Dewapriya Networking Unit 02 Page | 88 8.4.Compatability Compatibility entails the seamless operation of two systems without requiring modification. Software applications are considered compatible when they utilize identical data formats. This concept extends to various products, including hardware and software, whether they are of the same or different types, or even different versions of the same product. In networking, several elements must exhibit compatibility: a) Hardware: Applications should support a range of hardware configurations. b) Operating Systems: Programs need to be compatible with diverse OS platforms like Windows, Unix, and Mac OS. c) Software: Applications should integrate smoothly with other software, such as MS Word with MS Outlook, MS Excel, and VBA. 8.5. Client Server A client-server architecture is a computing model where tasks or workloads are distributed between service providers, called servers, and service requesters, called clients. In this model, clients initiate requests for services or resources from servers, which then process these requests and provide the necessary services or data back to the clients. Key characteristics of a client-server Client and Server Roles: Clients are devices or applications that request services or resources, while servers are devices or applications that provide these services or resources. Communication: Communication between clients and servers typically occurs over a network using protocols such as TCP/IP. Clients send requests to servers, and servers respond to these requests accordingly. Centralized Services: Servers centralize resources and services, allowing clients to access them remotely. This can include file storage, database access, computation, printing services, and more. Scalability: Client-server architectures are scalable, allowing for the addition of more clients or servers as needed to accommodate changes in demand or workload. Nirodha Dewapriya Networking Unit 02 Page | 89 8.5. Server Software Server software, also known as server operating system (OS) or server application software, is a type of software specifically designed to operate and manage server hardware and resources. It enables servers to perform various functions and provide services to clients or other devices on a network. Server software can be divided into two main categories: Server Operating Systems (OS) Server OS is the foundational software that manages the hardware resources of a server and provides essential services and functionalities. It typically includes features such as user management, file and storage management, network services, security mechanisms, and remote administration tools. Examples of server operating systems include Microsoft Windows Server, Linux distributions like Ubuntu Server, CentOS, and Red Hat Enterprise Linux, and Unix-based systems. Server Application Software Server application software refers to additional software applications installed on a server to provide specific services or functionalities to clients or users on a network. These applications run on top of the server OS and utilize its resources to perform their tasks. Examples of server application software include web server software like Apache HTTP Server, Microsoft Internet Information Services (IIS), and Nginx; database server software like MySQL, Microsoft SQL Server, Oracle Database, and PostgreSQL; email server software like Microsoft Exchange Server, Postfix, and Sendmail; and file server software like Samba and FTP servers. 8.6. Domain Name Server A Domain Name Server (DNS) is a fundamental component of the internet's infrastructure that translates human-readable domain names into numerical IP addresses, which are used by computers to identify each other on the network. When you type a domain name (e.g., www.example.com) into your web browser, your device sends a DNS query to a DNS server to resolve the domain name into the corresponding IP address. DNS servers maintain a distributed database called the DNS zone file, which contains mappings of domain names to IP addresses. There are several types of DNS servers: Recursive DNS Servers: These DNS servers respond to DNS queries from clients by either resolving the query directly if the requested domain name is in their cache or recursively querying other DNS servers until they obtain the IP address corresponding to the domain name. Root DNS Servers: These DNS servers are the highest level of the DNS hierarchy and are responsible for providing referrals to other DNS servers that have authoritative information for top-level domains (TLDs) like .com, .net, .org, etc. Nirodha Dewapriya Networking Unit 02 Page | 90 8.7.Mail Server A mail server is a type of server software or hardware that is responsible for sending, receiving, storing, and managing email messages within a network or across the internet. It facilitates the exchange of electronic mail (email) between users and supports various email protocols such as SMTP (Simple Mail Transfer Protocol), POP3 (Post Office Protocol version 3), and IMAP (Internet Message Access Protocol). Key functions of a mail server Sending and Receiving Emails: The mail server accepts outgoing emails from email clients (such as Outlook, Thunderbird, or webmail interfaces) and delivers them to the recipient's mail server. It also receives incoming emails from other mail servers and stores them in the recipient's mailbox. Mailbox Storage: Mail servers typically include storage capabilities to store email messages in users' mailboxes until they are accessed by the recipients. This allows users to access their emails from multiple devices and locations. User Authentication and Authorization: Mail servers authenticate users' credentials to ensure that only authorized users can send and receive emails. They also enforce access control policies to protect users' mailboxes from unauthorized access. Spam Filtering and Virus Scanning: Mail servers often include built-in spam filtering and virus scanning features to detect and prevent unsolicited emails (spam) and malicious email attachments from reaching users' mailboxes. Message Routing and Delivery: Mail servers route email messages between sender and recipient mailboxes based on the recipient's email address. They use DNS (Domain Name System) to look up the recipient's mail server and deliver the message to the correct destination. Queue Management: Mail servers maintain a queue of outgoing emails waiting to be delivered to their recipients. They manage the queue to ensure efficient and reliable delivery of emails, retrying delivery attempts if necessary. Examples of popular mail server software include Microsoft Exchange Server, Postfix, Sendmail, and Exim Nirodha Dewapriya Networking Unit 02 Page | 91 8.8 Printer Server A printer server, also known as a print server, is a device or software application that facilitates the management and sharing of printers within a network. Its primary function is to centralize printer resources and make them accessible to multiple users or devices connected to the network. key functions and features of a printer server Printer Management: A printer server allows network administrators to centrally manage and configure printers, including setting up printer properties, configuring print queues, and managing printer access permissions. Print Queuing: Printer servers typically include print queue management functionality, which allows users to submit print jobs to a centralized queue. The printer server then processes and prioritizes the print jobs, ensuring that they are printed in the order they were received and that printer resources are utilized efficiently. Driver Management: Printer servers often store printer drivers and make them available to client devices, eliminating the need for individual devices to install printer drivers locally. This simplifies printer setup and ensures that users can easily print to network printers without having to manually install drivers. Access Control: Printer servers allow administrators to control access to printers by setting permissions and restrictions on who can use specific printers and what actions they can perform, such as printing in color or printing double-sided. Monitoring and Reporting: Printer servers typically include monitoring and reporting tools that allow administrators to track printer usage, monitor printer status and performance, and generate reports on print activity and usage trends. Printer servers can be implemented using dedicated hardware devices, such as standalone print servers that connect directly to printers via USB or Ethernet, or they can be implemented using software applications that run on existing server hardware. Additionally, many modern network printers include built-in print server functionality, allowing them to be directly connected to the network without the need for an external print server. Nirodha Dewapriya Networking Unit 02 Page | 92 8.9 Proxy Server A proxy server acts as an intermediary between clients and other servers on the internet. When a client (such as a web browser) requests a resource (such as a web page or a file) from another server (such as a website server), the request is first sent to the proxy server. The proxy server then forwards the request to the destination server on behalf of the client, receives the response from the destination server, and forwards it back to the client. Proxy servers can serve various purposes and offer several benefits Anonymity and Privacy: Proxy servers can hide the IP address of clients from the destination server, providing anonymity and privacy for users browsing the internet. This is often used by individuals who want to protect their online identity and location. Content Filtering and Access Control: Proxy servers can be configured to filter and control access to specific websites or types of content based on predefined rules. This is commonly used by organizations to enforce internet usage policies and prevent access to inappropriate or unauthorized websites. Caching: Proxy servers can cache frequently requested web pages and files, storing copies locally. When a client requests a cached resource, the proxy server can serve it directly from the cache without needing to fetch it from the destination server. This reduces bandwidth usage and improves performance by speeding up access to frequently accessed content. Load Balancing: Proxy servers can distribute incoming client requests across multiple backend servers, helping to balance the load and ensure optimal performance and availability of services. Security: Proxy servers can act as a security gateway, inspecting incoming and outgoing traffic for malicious content and blocking potential threats such as malware, viruses, and phishing attacks. They can also provide encryption and secure tunneling capabilities to protect sensitive data transmitted over the internet. Nirodha Dewapriya Networking Unit 02 Page | 93 8.9.1 Web Server A web server is a software application or hardware device that serves web content to clients over the internet or an intranet. It hosts websites, web applications, and other web-based content, making them accessible to users via web browsers. When a user requests a web page or resource (such as HTML files, images, videos, or scripts), the web server processes the request, retrieves the requested content, and sends it to the user's web browser for display. Key functions and features of a web server HTTP Protocol Support: Web servers support the Hypertext Transfer Protocol (HTTP) and its secure variant, HTTPS, for communication between web clients (such as web browsers) and the server. HTTPS encrypts data transmitted between the client and the server, providing security and privacy for sensitive information. Content Storage and Retrieval: Web servers store web content, such as HTML files, images, CSS stylesheets, JavaScript files, multimedia files, and other resources, in a file system or database. When a client requests a web page or resource, the web server retrieves the content from storage and sends it to the client. Request Handling: Web servers handle incoming HTTP requests from clients, parsing the requests, identifying the requested resources, and executing the appropriate actions to fulfill the requests. This may involve processing dynamic content generated by server-side scripting languages (such as PHP, Python, or Ruby) or interacting with databases to retrieve dynamic data. Virtual Hosting: Web servers support virtual hosting, allowing multiple websites or domains to be hosted on the same server. Each website is associated with a unique domain name or IP address and can have its own configuration settings, content, and security policies. Security Features: Web servers include security features to protect against common web-based threats, such as denial-of-service (DoS) attacks, cross-site scripting (XSS) attacks, SQL injection attacks, and unauthorized access to sensitive resources. These features may include access control, authentication mechanisms, encryption, and secure communication protocols. Nirodha Dewapriya Networking Unit 02 Page | 94 8.9.2 Server Selection When selecting servers for different tasks, it's crucial to evaluate factors like performance, reliability, and scalability. This ensures that the chosen servers can effectively handle the workload, maintain uptime, and accommodate growth as needed for optimal operation. Requirement Identification Requirement identification for server selection at Alliance Health involves analyzing factors such as anticipated workload, performance needs, data storage requirements, security considerations, and scalability. This process ensures that the selected servers can meet the organization's operational demands effectively and efficiently while aligning with its longterm goals. Server Type Determining the best server type for Alliance Health depends on several factors, including the organization's specific requirements, budget, scalability needs, and regulatory compliance considerations. Networking Consider the network bandwidth requirements, especially for data-intensive applications. Ensure server compatibility with VLANs, diverse network interfaces, and security features. This involves verifying support for segregating network traffic, accommodating different connectivity options, and implementing protective measures. Operating System and Software Compatibility Verify that the server can run the intended operating system and software smoothly. Cost Contrast initial expenses, ongoing operational costs, and potential savings associated with energy-efficient hardware. Environmental Considerations Consider heat production and electricity consumption, particularly for on-premises installations. Nirodha Dewapriya Networking Unit 02 Page | 95 8.9.3 Identification And Selection of The server For Alliance Health In the scenario of Enclave Films and Alliance Health, the primary need is to establish an efficient network solution for the organization. When implementing such a solution, several crucial factors need consideration, including the selection of the most appropriate server for the company's needs. The provided information below outlines various types of servers available in the market, along with their key specifications and features. Server Type:- Dell EMC PowerEdge T440 Tower Server Processor:- Intel Xeon E3-1225 v5 Ram:- 12GB UDIMM (up to 64 GB) Storage:- 1-2 TB 7.2 RPM Price:- approx.: 312,560/= Nirodha Dewapriya Networking Unit 02 Page | 96 Activity 3 and 4 9.1. Network Design Plan The network design plan for the Mathara Branch must accommodate Alliance Health's requirement for six separate subnets, each dedicated to a specific department. Additionally, unique VLANs need to be established for each department as per Alliance Health's directives. Table 9 IP and subnetting scheme IP and subnetting Schemes Dep. Users B. Size Network Address First IP Address Last IP Address Broadcast IP Address Subnet Mask Class IT 50 64 192.168.10.0 192.168.10.1 192.168.10.62 192.168.10.63 255.255.255.192 /26 Customer Service Area Account & Finance 11 14 192.168.10.64 192.168.10.65 192.168.10.78 192.168.10.79 255.255.255.240 /28 8 14 192.168.10.80 192.168.10.81 192.168.10.94 192.168.10.95 255.255.255.240 /28 HR 7 14 192.168.10.96 192.168.10.97 192.168.10.110 192.168.10.111 255.255.255.240 /28 Admin 10 14 192.168.10.112 192.168.10.113 192.168.10.126 192.168.10.127 255.255.255.240 /28 Reception 4 6 192.168.10.128 192.168.10.129 192.168.10.134 192.168.10.135 255.255.255.248 /29 The block size specified in this table serves the purpose of identifying the subnet block associated with the IP addresses assigned to devices within each department. A static IP address, 10.254.10.0, is allocated for the server within the network, while DHCP IP addresses are assigned to all other devices. Furthermore, dedicated VLANs are set up for each department, and there are wireless internet facilities available specifically in the Customer Service Area. Nirodha Dewapriya Networking Unit 02 Page | 97 9.2 List of required Devices 1. Computers and Laptops 2. Ethernet Cables – Fast Ethernet and Giga Ethernet Cables 3. Routers 4. Switches 5. Servers 9.3 Network Design Blueprint Figure 26 network design blueprint Nirodha Dewapriya Networking Unit 02 Page | 98 Figure 27 setting up the network Nirodha Dewapriya Networking Unit 02 Page | 99 Figure 28 Figure 29 Figure 30 Figure 31 Nirodha Dewapriya 100 Networking Unit 02 Page | Figure 32 Figure 33 Figure 34 Figure 35 Nirodha Dewapriya 101 Networking Unit 02 Page | Figure 32 setting up the network Figure 33 Figure 33 Nirodha Dewapriya 102 Networking Unit 02 Page | Figure 34 Figure 35 Nirodha Dewapriya 103 Networking Unit 02 Page | Figure 36 Figure 37 Figure 37 Nirodha Dewapriya 104 Networking Unit 02 Page | Figure 38 Figure 38 Figure 39 Figure 39 Nirodha Dewapriya 105 Networking Unit 02 Page | Figure 40 Figure 40 Figure 41 Figure 41 Nirodha Dewapriya 106 Networking Unit 02 Page | Figure 42 Figure 42 Figure 43 Figure 43 Nirodha Dewapriya 107 Networking Unit 02 Page | Figure 44 Figure 44 Figure 45 Figure 45 Nirodha Dewapriya 108 Networking Unit 02 Page | Figure 46 Figure 46 Figure 47 Figure 47 Nirodha Dewapriya 109 Networking Unit 02 Page | Figure 48 Figure 48 Figure 49 Figure 49 Nirodha Dewapriya 110 Networking Unit 02 Page | Figure 50 Figure 50 Figure 51 Figure 51 Nirodha Dewapriya 111 Networking Unit 02 Page | Figure 52 Figure 53 Figure 53 Nirodha Dewapriya 112 Networking Unit 02 Page | Figure 54 Figure 54 Figure 55 Figure 55 Nirodha Dewapriya 113 Networking Unit 02 Page | Figure 56 Figure 56 Figure 57 Figure 57 Nirodha Dewapriya 114 Networking Unit 02 Page | Figure 58 Figure 58 Figure 59 Figure 59 Nirodha Dewapriya 115 Networking Unit 02 Page | Figure 60 Figure 60 Figure 61 Figure 61 Nirodha Dewapriya 116 Networking Unit 02 Page | Figure 62 Figure 62 Figure 63 Figure 63 Nirodha Dewapriya 117 Networking Unit 02 Page | Figure 64 Figure 64 Figure 65 Figure 65 Nirodha Dewapriya 118 Networking Unit 02 Page | Figure 66 Figure 66 Figure 67 Figure 67 Nirodha Dewapriya 119 Networking Unit 02 Page | 9.5 Network Implementation design by cisco packet tracer Figure 68 Figure 68 Nirodha Dewapriya 120 Networking Unit 02 Page | 9.6 Configuration Of switch Through cisco packet tracer In this network setup, devices are connected to ports 0/1 through 0/22 on the switches, while network devices are connected to ports 0/23 and 0/24. Ports 0/23 and 0/24 are configured as trunk ports. Each switch's device ports are assigned to specific VLANs, ensuring access only to their designated VLANs. 9.7 Switches Figure 69 Figure 69 Nirodha Dewapriya 121 Networking Unit 02 Page | Figure 70 Figure 70 Nirodha Dewapriya 122 Networking Unit 02 Page | Figure 71 Figure 71 Nirodha Dewapriya 123 Networking Unit 02 Page | Figure 72 Figure 72 Nirodha Dewapriya 124 Networking Unit 02 Page | Figure 73 Figure 73 Nirodha Dewapriya 125 Networking Unit 02 Page | Figure 74 Figure 74 Nirodha Dewapriya 126 Networking Unit 02 Page | 9.8 Assigning Trunk ports through Cisco packet tracer Figure 75 Figure 75 Figure 76 Figure 76 Nirodha Dewapriya 127 Networking Unit 02 Page | Figure 77 Figure 77 Figure 78 Figure 78 Nirodha Dewapriya 128 Networking Unit 02 Page | Figure 79 Figure 79 Figure 80 Figure 80 Nirodha Dewapriya 129 Networking Unit 02 Page | Figure 81 Figure 81 Figure 82 Figure 82 Nirodha Dewapriya 130 Networking Unit 02 Page | Figure 83 Figure 83 Figure 84 Figure 84 Nirodha Dewapriya 131 Networking Unit 02 Page | Figure 85 Figure 85 Figure 86 Figure 86 Nirodha Dewapriya 132 Networking Unit 02 Page | Figure 87 Figure 87 Figure 88 Figure 88 Nirodha Dewapriya 133 Networking Unit 02 Page | Figure 89 Figure 89 Figure 90 Figure 90 Nirodha Dewapriya 134 Networking Unit 02 Page | Figure 91 Figure 91 Figure 92 Figure 92 Nirodha Dewapriya 135 Networking Unit 02 Page | Figure 93 Figure 93 Figure 94 Figure 94 Nirodha Dewapriya 136 Networking Unit 02 Page | Figure 95 Figure 95 Figure 96 Figure 96 Nirodha Dewapriya 137 Networking Unit 02 Page | Figure 97 Figure 97 Nirodha Dewapriya 138 Networking Unit 02 Page | 9.9 Router Configuration Figure 98 Figure 98 Figure 99 Figure 99 Nirodha Dewapriya 139 Networking Unit 02 Page | Figure 100 Figure 100 Figure 101 Figure 101 Nirodha Dewapriya 140 Networking Unit 02 Page | 10. Testing The network VLAN-Pinging Test scenario = Account and Finance Department Switch Description = Pinging PC0- PC8 Expected Result = Ping Successful Received Result = Ping Successful Loss 0% Grade = Success Figure 102 Figure 102 Nirodha Dewapriya 141 Networking Unit 02 Page | Test scenario = Administrator Department Switch Description = Pinging PC2- PC9 Expected Result = Ping Successful Received Result = Ping Successful Pass Figure 103 Figure 103 Nirodha Dewapriya 142 Networking Unit 02 Page | • • • • • Test scenario = Reception Switch Description = Pinging PC2- PC10 Expected Result = Ping Successful Received Result = Ping Successful Pass Figure 104 Figure 104 Nirodha Dewapriya 143 Networking Unit 02 Page | • • • • • Test scenario = IT department Switch Description = Pinging PC2- PC11 Expected Result = Ping Successful Received Result = Ping Successful Pass Figure 104 Figure 104 Nirodha Dewapriya 144 Networking Unit 02 Page | • • • • • Test scenario = customer service Switch Description = Pinging PC6- PC11 Expected Result = Ping Successful Received Result = Ping Successful Pass Figure 105 Figure 105 Nirodha Dewapriya 145 Networking Unit 02 Page | • Test scenario = Reception To customer service Switch • Description = Pinging PC6- PC11 • Expected Result = Ping Successful • Received Result = Ping Successful • Pass Figure 106 Figure 106 Nirodha Dewapriya 146 Networking Unit 02 Page | • • • • • Test scenario = IT department to Account departent Description = Pinging PC5- PC11 Expected Result = Ping Successful Received Result = Ping Successful Pass Figure 107 Figure 107 Nirodha Dewapriya 147 Networking Unit 02 Page | • • • • • Test scenario = HR Department Description = Pinging Expected Result = Ping Successful Received Result = Ping Successful Pass Figure 108 Figure 108 Nirodha Dewapriya 148 Networking Unit 02 Page | 10.1 Pinging to servers • • • • • Test scenario = IT Department PC to Server Description = Pinging PC0 - Server Expected Result = Ping Successful Received Result = Ping Successful Pass Figure 109 Figure 109 Nirodha Dewapriya 149 Networking Unit 02 Page | • • • • • Test scenario = HR Department PC to Server Description = Pinging PC2 - Server Expected Result = Ping Successful Received Result = Ping Successful Pass Figure 110 Figure 110 Nirodha Dewapriya 150 Networking Unit 02 Page | • • • • • Test scenario = Admin Department PC to Server Description = Pinging PC3 - Server Expected Result = Ping Successful Received Result = Ping Successful Pass Figure 111 Figure 111 Nirodha Dewapriya 151 Networking Unit 02 Page | • • • • • Test scenario = Reception Department PC to Server Description = Pinging PC4 - Server Expected Result = Ping Successful Received Result = Ping Successful Pass Figure 112 Figure 112 Nirodha Dewapriya 152 Networking Unit 02 Page | 10.2 Subnetting report Figure 113 Figure 113 Nirodha Dewapriya 153 Networking Unit 02 Page | 10.3 Maintenance schedules for the network A maintenance strategy is essential for ensuring network security, stability, and costeffectiveness. This plan includes routine checks on hardware and software to detect and resolve issues proactively, minimizing downtime. Additionally, it improves security measures by identifying vulnerabilities, safeguarding important data, and lowering operational expenses. By prioritizing preventive maintenance, businesses can save resources and time, ensuring uninterrupted operations and meeting customer expectations. Hence, implementing a maintenance plan is vital for maintaining high network performance and dependability. Table 10 Maintanence shedule Nirodha Dewapriya 154 TASK Frequency Hardware and clean up Monthly Back up Data Weekly Software Update Monthly (2 x per month) Hardware Update If required Only Fixing Bugs Weekly Checking Check up network Speed Weekly Networking Unit 02 Page | 10.4 User feedback Figure 114 Figure 114 Nirodha Dewapriya 155 Networking Unit 02 Page | Figure 115 Figure 115 Figure 116 Figure 116 Figure 117 Figure 117 Nirodha Dewapriya 156 Networking Unit 02 Page |