0% found this document useful (0 votes)
81 views60 pages

Assignment Networking

The document outlines an assignment for a BTEC HND in IT focusing on networking, specifically the development of a local area network (LAN) for MadZoo Digital, a software development start-up. It covers various network types, topologies, hardware requirements, and implementation strategies, emphasizing the importance of effective communication and collaboration within the organization. The assignment includes a detailed plan for designing, testing, and maintaining the LAN, ensuring it meets the specific needs of MadZoo Digital.

Uploaded by

Sajeen Mubarek
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
81 views60 pages

Assignment Networking

The document outlines an assignment for a BTEC HND in IT focusing on networking, specifically the development of a local area network (LAN) for MadZoo Digital, a software development start-up. It covers various network types, topologies, hardware requirements, and implementation strategies, emphasizing the importance of effective communication and collaboration within the organization. The assignment includes a detailed plan for designing, testing, and maintaining the LAN, ensuring it meets the specific needs of MadZoo Digital.

Uploaded by

Sajeen Mubarek
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

lOMoARcPSD|38403053

Assignment networking

BTEC HND in IT ( IDM Nations Campus)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by muhammad sathir (sathirmhd576@[Link])
lOMoARcPSD|38403053

Assignment Brief (RQF)


Higher National Diploma in Computing

Course Ti琀琀le Pearson BTEC Level 5 Higher Na琀椀onal Diploma in Compu琀椀ng

Unit Number and Title: Unit 2 – networking

Assignment Title A Windows Applica琀椀on for MadZoo Digital

Name of the Learner

Ref. No. of the Learner Pearson Regd. No.

Assignment Number Batch No & Semester

Issue Date Submission Date

Date Received 1st


Re-submission Date
submission

Unit Assessor: Academic Year 2023 - 2024

Assessor Summa琀椀ve Feedback

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

Grade: Assessor Signature: Date:

Resubmission Feedback - Forma琀椀ve

Date
Grade: Assessor Signature:

Internal Veri昀椀er’s Comments

Signature of the IV Date

ii

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

Student Agreement: Student Signature

I understand the feedback given to me and agree to carry out the ac琀椀ons in
Date
future works as required and indicated.

Please note that grade decisions are provisional. They are only con昀椀rmed once internal and external
modera琀椀on has taken place and grades decisions have been agreed at the assessment board.

STUDENT ASSESSMENT SUBMISSION AND DECLARATION

Student name: Assessor name:

Issue date: Submission date: Submi琀琀ed on:

Programme:

Unit:

Assignment number and 琀椀tle:

Plagiarism

iii

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

Plagiarism is a par琀椀cular form of chea琀椀ng. Plagiarism must be avoided at all costs and students
who break the rules, however innocently, may be penalised. It is your responsibility to ensure
that you understand correct referencing prac琀椀ces. As a university level student, you are
expected to use appropriate references throughout and keep carefully detailed notes of all your
sources of materials for material you have used in your work, including any material
downloaded from the Internet. Please consult the relevant unit lecturer or your course tutor if
you need any further advice.

Student Declara琀椀on

Student declara琀椀on

I cer琀椀fy that the assignment submission is en琀椀rely my own work and I fully understand the consequences
of plagiarism. I understand that making a false declara琀椀on is a form of malprac琀椀ce.

Student signature: Date:

iv

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

Table of Contents
Assignment Brief (RQF)............................................................................................................i

Higher National Diploma in Computing......................................................................................i

LO1. Introduction............................................................................................................................1

1.1. Background.......................................................................................................................1

1.2. Problem statement.............................................................................................................1

1.3. Objective...........................................................................................................................1

1.4. Network types...................................................................................................................2

1.4.1. LAN (Local Area Network).......................................................................................3

1.4.2. MAN (Metropolitan Area Network)..........................................................................4

1.4.3. PAN (Personal Area Network)..................................................................................5

1.4.4. WAN (Wide Area Network)......................................................................................5

1.5. Network topologies...........................................................................................................6

1.5.1. Star Topology............................................................................................................8

1.5.2. Bus Topology.............................................................................................................8

1.5.3. Ring Topology...........................................................................................................9

1.5.4. Tree Topology...........................................................................................................9

1.5.7. Network communication.........................................................................................11

1.6. Network principles..........................................................................................................15

1.7. Plan..................................................................................................................................20

LO2. Hardware..............................................................................................................................21

2.1. Network devices..............................................................................................................21

2.1.1. Hub............................................................................................................................21

2.1.2. Switch........................................................................................................................22

2.1.3. Router........................................................................................................................23

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

2.1.4. Bridge........................................................................................................................25

2.1.5. Gateway.....................................................................................................................26

2.1.6. Repeater.....................................................................................................................27

2.1.7. Load balancer.............................................................................................................28

2.2. Inter-dependance..............................................................................................................29

2.3. Server types.....................................................................................................................30

LO3. Implementation.....................................................................................................................32

3.1. Design..............................................................................................................................32

3.2. Justification......................................................................................................................35

3.3. Test plan...........................................................................................................................37

3.4. Installation and configuration..........................................................................................39

3.5. Maintenance.....................................................................................................................41

LO4. Conclusion............................................................................................................................42

4.1. Implementation................................................................................................................42

4.2. Verification......................................................................................................................43

4.3. Design vs Implementation...............................................................................................45

4.4. Critical evaluation............................................................................................................46

4.5. Future enhancements.......................................................................................................47

References......................................................................................................................................48

vi

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

Figure 1: types of networks.............................................................................................................2


Figure 2: LAN..................................................................................................................................3
Figure 3: MAN................................................................................................................................4
Figure 4: PAN..................................................................................................................................5
Figure 5: WAN................................................................................................................................6
Figure 6: TOPOLOGY....................................................................................................................7
Figure 7: STAR TOPOLOGY.........................................................................................................8
Figure 8: Bus Topology...................................................................................................................8
Figure 9: Ring Topology.................................................................................................................9
Figure 10:Tree Topology.................................................................................................................9
Figure 11:Mesh Topology.............................................................................................................10
Figure 12:Hybrid Topology...........................................................................................................10
Figure 13: bandwidth.....................................................................................................................14
Figure 14:Circuit switching...........................................................................................................16
Figure 15:Packet Switching...........................................................................................................17
Figure 16: message switching........................................................................................................19
Figure 17: hub................................................................................................................................22
Figure 18: switch...........................................................................................................................23
Figure 19: router............................................................................................................................24
Figure 20: bridge............................................................................................................................25
Figure 21: gateway........................................................................................................................26
Figure 22: repeater.........................................................................................................................27
Figure 23: load balancer................................................................................................................28
Figure 24:interdependence.............................................................................................................29
Figure 25: networking design........................................................................................................32
Figure 26:assigning IP address......................................................................................................33
Figure 27: configure switch...........................................................................................................34
Figure 28: firewall.........................................................................................................................35
Figure 29: ping...............................................................................................................................44
Figure 30: extended ping...............................................................................................................45

vii

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

Abstract
This project focuses on the networking development process for MadZoo Digital, a start-up firm
specializing in software development and network solutions. The primary goal is to build and
construct a local area network (LAN) that meets the organization's various divisions' demands.
MadZoo Digital emphasizes the importance of networking implementation in promoting
effective communication, collaboration, and data exchange. Different network types are
investigated, considering their advantages and disadvantages, and standards must be applied to
ensure interoperability and security. Network communication rules are explored, as are the
impact of network topologies on performance.

Bandwidth needs are discussed, and the merits and downsides of common network concepts are
discussed. Protocols' function in promoting connectivity and efficient operation of networked
systems is presented, with real examples of switching concepts in action.

The assignment delves further into the operation of networking devices, emphasizing their
unique applications and functions. Different types of servers are investigated, and the
interdependence of workstation hardware and networking software is discussed, emphasizing
their collaborative nature. A variety of server types are chosen based on a specific scenario,
considering cost and performance optimization. The decision is justified by proving how the
chosen server fits the organization's needs.

The project culminates with a step-by-step strategy for designing the LAN, justifying device
selection, providing an assessment test plan, and choosing and configuring network services. A
maintenance schedule is also provided to maintain the networked system's continued efficacy.
Overall, this assignment provides a thorough approach to developing and executing an
innovative LAN for MadZoo Digital, considering networking concepts, protocols, devices, and
the organization's special requirements.

viii

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

Acknowledgement
I would like to express my sincere appreciation and gratitude to my Sir Shafeer, for sir
invaluable guidance, support, and mentorship throughout the process of completing this project
on the importance of networking implementation in MadZoo Digital. Thank you, sir, for your
unwavering support, mentorship, and belief in my potential.

ix

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

LO1. Introduction.
A start-up with a focus on network solutions, MadZoo Digital was founded in 2020. They assist
marketers in connecting with affluent audiences by translating ideas into immersive experiences
using the power of data, creativity, and technology. Due to strong demand, the company is
developing and introducing new divisions, such as Research & Development, Project
Management Office, Information Security, and Customer Service.

1.1. Background.
MadZoo Digital is a start-up focused in software development and network solutions. Through
data-driven tactics, creative design, and smart technology, the company strives to help marketers
engage with aspirational and affluent customers.

1.2. Problem statement.


The intent is to design and construct a local area network (LAN) for MadZoo Digital while
taking into account the needs of all departments. The goal is to build an innovative and efficient
network that allows for seamless communication and connectivity. The difficulty entails
selecting appropriate technologies, protocols, and devices while keeping scalability,
dependability, security, and performance in mind. To evaluate the performance of the LAN and
identify areas for improvement, a detailed test strategy and a justified maintenance schedule are
required. The final deliverables should include evidence of the implemented network,
documentation, and configuration details. The goal is to design a well-planned and effective
LAN solution that solves MadZoo Digital's specific requirements while also promoting
productivity and collaboration across departments.

1.3. Objective.
MadZoo Digital's objective is to be a top provider of software development and network
solutions, assisting companies in successfully connecting with their target audiences and
achieving their business objectives. The company aspires to offer outstanding experiences that
increase customer engagement, enhance brand reputation, and contribute to the growth and
success of its customers by combining data-driven strategy, creative expertise, and cutting-edge
technology. MadZoo Digital seeks to be at the forefront of industry innovations, consistently

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

reinvent its services, and exceed customer expectations in order to establish itself as a trusted
partner in the digital landscape.

1.4. Network types.


"A computer network is a collection of computers that are linked together to share resources."
The internet is a computer network in and of itself. It is a digital telecommunications network
where nodes share resources through communication channels. Networks facilitate
communication through email, video conferencing, instant messaging, file sharing, and make
information more accessible and maintainable among users. These networks facilitate file
sharing and enable diverse user interactions, making information more accessible and
maintainable. (Types of Network, 2023)

Figure 1: types of networks

A computer network has various devices or medium that aid in communication between two
different devices known as network devices.

Router, switch, bridge, hub, Gateway, Modem, and Repeater are some examples. The network is
the interconnection of various devices, referred to as hosts, that are linked by multiple pathways
to send and receive data or media. The computer network is classified into four categories, which
are listed below: (Types of Network, 2023)

1. LAN (Local Area Network)


2. MAN (Metropolitan Area Network)

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

3. PAN (Personal Area Network)


4. WAN (Wide Area Network)

Protocols are used in networking in a variety of ways. A protocol is a set of rules or algorithms
that describe how two entities communicate across a network, and distinct protocols are specified
at each layer of the OSI Model.

1.4.1. LAN (Local Area Network)


The Local Area Network (LAN) is a computer network that links computers within a certain
geographic region, such as a home, school laboratory, university campus, or office building. The
LAN (Local Area Network) covers a small geographical area. Users on a wireless LAN have
unfettered movement within the coverage area. Wireless networks have grown in popularity in
homes and small companies due to their ease of installation. The structure of linkages between
devices and network segments is described by network topology. At the data connection layer
and physical layer, a wide range of LAN topologies are employed. (Types of Network, 2023)

Figure 2: LAN

Advantages

 High data transmission rate


 Ease of Setup
 Centralized Data

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

 Low Cost

Disadvantages

 It just covers a little region.


 Cables and connections are readily damaged.
 Administrative time is required.

1.4.2. MAN (Metropolitan Area Network)


The Metropolitan Area Network (MAN) is a computer network that, like the Local Area
Network (LAN), encompasses a whole city or university. Metropolitan Area Networks connect
users to computer resources over a large geographic area or region. This network is larger or
more extensive than the Local Area Network. (Types of Network, 2023)

Figure 3: MAN

Advantages

 Offers Data management that is centralized


 File transfer is quick
 the internet is faster since it uses fiber optics.

Disadvantages

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

 Due to the vast network size, it is difficult to manage.


 Hacking danger
 High installation costs since fiber optics are required.

1.4.3. PAN (Personal Area Network)


The Personal Area Network is used to link devices that are central to a person's workspace. This
network allows data to be sent between devices such as computers, smartphones, tablets, and
personal digital assistants. (Types of Network, 2023)

Figure 4: PAN

Advantages

 Much less expensive


 Restricted to a narrow region
 Links to many devices at the same time

Disadvantages

 confined space
 Data Transmission is Slow
 Radio signal interference

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

1.4.4. WAN (Wide Area Network)


The Wide area Network (WAN) is a telecommunications network that spans a vast geographical
region and is mostly used for computer networking. These networks are frequently built using
leased telecommunications lines. The WAN links several smaller networks, such as the Local
Area Network. Computers connected to the Wide Area Network are frequently linked via public
networks such as telephone lines. This network can be connected through leased lines or
satellites. (Types of Network, 2023)

Figure 5: WAN

Advantages

 covers a large region


 High Bandwidth
 Multiple people can share and connect to the internet at the same time.

Disadvantages

 Expensive initial investment


 The network is huge and complicated, making it difficult to manage.
 Less safe

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

1.5. Network topologies.


The physical or logical arrangement of your network's nodes, devices, and connections is
referred to as network topology. Consider your network to be a city, and the topology to be the
road map. There are several methods to arrange and maintain a network, just as there are
numerous ways to arrange and manage a city, such as ensuring that avenues and boulevards may
enable movement between the busiest areas of town. Each has pros and cons, and depending on
your company's needs, different arrangements might provide you with a higher level of
connectivity and security. (Contributor, 2019)

Figure 6: TOPOLOGY

Building a durable, secure, and easy-to-maintain local area network (LAN) architecture can be
make-or-break for your organization. Depending on the total network size and your aims, there
are various different types of network architecture that are ideal for different reasons.

Here are some of the common network topologies,

 Star topology
 Bus Topology
 Ring Topology
 Figure 9: Ring Topology
 Tree Topology

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

 Mesh Topology
 Hybrid Topology

1.5.1. Star Topology


The most popular network architecture is a star topology, which is designed so that every node in
the network is directly connected to one central hub through coaxial, twisted-pair, or fiber-optic
cable. As a server, this central node supervises data transmission (information received from any
node on the network must travel through the central one to reach its destination) and serves as a
repeater, which aids in data loss prevention. (Contributor, 2019)

Figure 7: STAR TOPOLOGY

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

1.5.2. Bus Topology


A bus topology directs all network devices down a single wire flowing in a single direction from
one end of the network to the other, which is why it's also known as a "line topology" or
"backbone topology." Data flow on the network similarly follows the cable's path, travelling in
just one way. (Contributor, 2019)

Figure 8: Bus Topology

1.5.3. Ring Topology


Ring topology is the arrangement of nodes in a circle (or ring). The data can move in either way
or both directions across the ring network, with each device having precisely two neighbors. A
ring topology network is half-duplex, which means data may only flow in one way at a time.
Ring topologies may be made full-duplex by connecting network nodes with a second link,
resulting in a dual ring topology. (Contributor, 2019)

Figure 9: Ring Topology

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

1.5.4. Tree Topology


The tree topology structure takes its name from the fact that the central node serves as a type of
trunk for the network, with nodes branching outward in a branch-like pattern. Whereas each node
in a star topology is directly connected to the central hub, the nodes in a tree topology are
connected via a parent-child hierarchy. Those linked to the central hub are connected to other
nodes in a linear fashion, thus two connected nodes have just one common connection. The tree
topology pattern is frequently used for wide area networks to accommodate numerous dispersed
devices since it is both incredibly flexible and scalable. (Contributor, 2019)

Figure 10:Tree Topology

1.5.5. Mesh Topology

A mesh topology is an extensive and complicated system of point-to-point connections that


connects nodes. Mesh networks can be either full or partial mesh networks. Partial mesh
topologies are generally interconnected, with just a few nodes having two or three connections,
whereas full mesh topologies are completely linked. Mesh topologies' web-like structure allows
for two types of data transmission: routing and flooding. When data is routed, nodes utilize logic
to find the quickest path from source to destination, however when data is flooded, information
is provided to all nodes in the network without the requirement for routing logic. (Contributor,
2019)

10

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

Figure 11:Mesh Topology

1.5.6. Hybrid Topology

Hybrid topologies integrate two or more different topological structures; for example, the tree
topology combines the bus and star patterns. Hybrid architectures are most popular in bigger
organizations where each departments have customizable network topologies according to their
demands and network consumption. (Contributor, 2019)

Figure 12:Hybrid Topology

1.5.7. Network communication


Today's communications are built on the interconnection of systems and computer networks,
which are developed utilizing a variety of communication protocols. When creating an internet
connection, for example, there are several protocols to consider, and these protocols will differ
based on the sort of connection that is required. Furthermore, when it comes to data transfer and
message exchange across networks, communication via the Internet is not the sole method of
communication. Network protocols describe the features of the connection in all instances.

11

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

A protocol is a collection of rules: network protocols are formal standards and regulations that
specify the exchange of data packets to establish communication between two servers or more
devices through a network. They are made up of constraints, processes, and formats.

Network protocols

TCP (transfer Control Protocol) and IP (Internet Protocol) are the two most essential protocols
for data transfer across the Internet. We may connect devices that access the network by using
these together (TCP/IP); additional communication protocols linked with the Internet include
POP, SMTP, and HTTP. despite the fact that most people are unaware of it and have no idea
how it works. These protocols enable data flow from our gadgets, allowing us to surf websites,
send emails, listen to music online, and so on.

Network protocols are classified into numerous types:

 Basic packet communication protocols such as TCP/IP and HTTP are examples of
network communication protocols.
 Network security protocols (HTTPS, SSL, and SFTP) establish security in network
interactions between servers.
 Network management protocols, such as SNMP and ICMP, enable network maintenance
and administration.

The Open System Interconnection (OSI) paradigm logically arranges network protocol families
into network layers. The goal of this Open System Interconnection is to create an environment on
which to build communication architectures across different systems. (Interserver., 2019)

layers of the OSI model:

Layer 1 Protocols - Physical Layer

 USB: Universal Serial Bus


 Ethernet: Ethernet physical layer
 DSL: Digital subscriber line
 Etherloop: Ethernet and DSL combination
 Infrared: Infrared radiation

12

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

 Frame Relay
 SDH: Synchronous Digital Hierarchy
 SONET: Synchronized optical network

Layer 2 Protocols - Data Link

 DCAP: Data Link Switching Client Access Protocol


 FDDI: Fiber Data Distribution Interface
 HDLC: High-level Data Link Control
 LAPD: Link Access Protocol D-channel
 PPP: Point-to-Point Protocol
 STP: Spanning Tree Protocol
 VTP VLAN: Virtual Trunking Protocol for Virtual LAN
 MPLS: Multi-Protocol Label Switching

Layer 3 Protocols - Network

 ARP: Address Resolution Protocol


 BGP: Border Gateway Protocol
 ICMP: Internet Control Message Protocol
 IPv4: Internet Protocol version 4
 IPv6: Internet Protocol version 6
 IPX: Internetwork Packet Exchange
 OSPF: Open Shortest Path First
 RARP: Reverse Address Resolution Protocol

Layer 4 Protocols - Transport

 IL: Originally converted as a transport layer for 9P


 SPX: Sequenced Packet Exchange
 SCTP: Stream Control Transmission Protocol
 TCP: Transmission Control Protocol
 UDP: User Datagram Protocol
 iSCSI: Internet Small Computer Systems Interface
 DCCP: Datagram Congestion Control Protocol

13

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

Layer 5 Protocols - Session

 NFS: Network File System


 SMB: Server Message Block
 RPC: Remote Procedure Call
 SDP: Sockets Direct Protocol
 SMB: Server Message Block
 SMPP: Short Message Point-to-Point

Layer 6 Protocols - Presentation

 TLS: Transport Layer Security


 SSL: Secure Socket Layer
 XDR: External Data Representation
 MIME: Multipurpose Internet Mail Extensions

Layer 7 Protocols - Application

 DHCP: Dynamic Host Configuration Protocol


 DNS: Domain Name System
 HTTP: Hypertext Transfer Protocol
 HTTPS: Hypertext Transfer Protocol Secure
 POP3: Post Office Protocol 3
 SMTP: Simple Mail Transfer Protocol
 Telnet: Telecommunications Network Protocol

Bandwidth

The maximum ability of a wired or wireless communications link to transport data via a network
connection in a certain length of time is referred to as network bandwidth. The number of bits,
kilobits, megabits, or gigabits that may be delivered in one second is sometimes referred to as
bandwidth.

The bandwidth of a data link controls how much data it can send and receive at the same time.
The amount of water that may flow via a conduit is analogous to bandwidth. The greater the
diameter of the pipe, the more water that can flow through it at the same time. The same concept

14

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

holds true for bandwidth. The larger the capacity of the communication channel, the more data it
can handle per second.

A web page's bandwidth influences how quickly it will load in a browser. This is likely the most
crucial thing to consider when selecting a web hosting platform. It is critical to think about how
the website and internet connection will affect bandwidth. A website with a lot of graphics may
take 10 GB or more in bandwidth. A simpler website will also need less bandwidth. A quicker
internet connection allows you to download online pages and videos more quickly, while a
higher bandwidth improves the user experience. (sharmadevesh769, 2023)

Figure 13: bandwidth

1.6. Network principles.


Network principles are the underlying notions that govern the design, implementation, and
operation of computer networks. These concepts are critical for ensuring that diverse devices and
systems can connect and share data seamlessly. Network protocols and standards are critical in
facilitating communication and data sharing across various devices and systems.

Network protocols are a collection of rules, standards, and data formats that govern how devices
communicate data across networks. These protocols are crucial to how network devices
communicate with one another. The gadgets would be unable to communicate with each other
without network protocols. (communications@[Link], 2023)

15

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

Network protocols include Transmission Control Protocol/Internet Protocol (TCP/IP), User


Datagram Protocol (UDP), and File Transfer Protocol (FTP), among others. Each procedure has
advantages and downsides. TCP/IP, for example, is dependable and assures that data is sent
without mistakes, although it is slower than UDP.

Switching

In computer networks, switching mechanisms are used to link devices and allow them to interact
with one another. We can also use switching strategies to move data from one device to another.

Switching enables many devices to share the same communication channel at the same time. As
a result, the network's efficiency improves. Additionally, switching allows the network to route
data to its intended destination. It also includes a method for error detection and repair. Circuit
switching, packet switching, and message switching are the three basic switching mechanisms
used in computer networks. (Datta, 2023)

o Circuit switching

In traditional telephone networks, users mostly employ circuit switching. When two devices in a
circuit-switched network wish to interact, they create a connection by establishing a dedicated
channel between them. This route is only available for the length of the conversation. As a result,
no other devices may utilize it at that moment.

Once the connection is established, users may transport data between devices via the dedicated
way. This path is often made up of a series of interconnected switches or nodes that route the
data to its final destination. (Datta, 2023)

16

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

Figure 14:Circuit switching

Circuit switching is not widely utilized in computer networks since it is inefficient for data
transmission. The dedicated path is reserved for the length of the conversation. As a result, we
waste a lot of bandwidth at certain periods. Furthermore, circuit switching is unsuitable for
networks with large traffic levels.

However, in some specialized applications, like as satellite communications, where the latency
of packet switching might be prohibitive, we still employ circuit switching.

Advantages

o For the length of the conversation, circuit switching creates a dedicated communication
link between two devices. As a result, we set aside enough bandwidth for the whole
session. This results in assured bandwidth, which is useful for applications requiring a
consistent data flow.
o There is no packet loss since we reserve the dedicated communication for the duration of
the talk. Finally, circuit switching ensures consistent performance.

Disadvantages

17

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

o Circuit switching necessitates the use of a dedicated communication route for the length
of the connection. As a result, the dedicated link is not used at these periods, resulting in
wasteful bandwidth consumption.
o
o Circuit switching is not well suited for high-traffic networks. In big networks, this
restricts the scalability of circuit switching.
o
o Finally, dedicated resources, such as switches or nodes, are required to construct the
dedicated communication line. As a result, the expenses of building and maintaining
circuit-switched networks may be prohibitively expensive.

o Packet Switching

Packet switching is a means of transmitting data across a network. We separate data into
individual packets and send them across the network independently. Each packet contains the
contents as well as the destination address needed to route the packet to its destination.

In packet switching, each packet travels across the network independently and might take several
pathways to its destination. Because we may send numerous packets across the same network at
the same time, this method makes better use of network resources. (Datta, 2023)

Figure 15:Packet Switching

18

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

The Internet is built on packet switching, which employs the Transmission Control
Protocol/Internet Protocol (TCP/IP) set of protocols to communicate between devices. In this
system, we send packets between devices, and routers along the way utilize the destination
address information in each packet to route it to the next hop until it reaches its destination.

Advantages

o It enables many packets to be broadcast over the network at the same time, making better
use of the available bandwidth. Packet switching is a strong and dependable data transfer
technology. Because we route packets individually over the network, if one packet is lost
or delayed, it has no effect on the delivery of subsequent packets. Packet switching is
extremely adaptable. It adapts quickly to shifting traffic patterns and network
circumstances.

Disadvantages

o The act of dividing data into packets and appending header information to each packet
can add overhead and latency to the transmission process. This might lengthen the time it
takes packets to reach their destination. Furthermore, it has the potential to lower total
data transfer speed. It is susceptible to security risks such as packet snooping. This has
the potential to jeopardize the privacy and security of data transferred across the network.
Furthermore, especially in bigger or more complicated networks, it can be difficult to set
up and administer.

o Message Switching

Message switching was a prominent data transfer mechanism in the early days of networking,
prior to the advent of packet switching. A message is divided into fixed-length blocks or frames
in message switching. Furthermore, we send each frame via the network individually.
Furthermore, until the full message is received, each intermediary node keeps the frames.
Finally, the message is sent to its destination via the nodes. Unlike packet switching, message
switching is a store-and-forward data transport technique. That is, each intermediary node saves
the complete message until it can be transmitted to the next node. When compared to packet

19

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

switching, this might result in longer transmission delays. We can only send each message if an
intermediary node gets all of its components. (Datta, 2023)

Figure 16: message switching

Advantages

o Message switching is a very dependable data transport technology. The full message is
stored by each intermediary node until it can be transmitted to the next node. Because we
hold each message at intermediary nodes before sending it, we limit the chance of data
loss or corruption.
o It is a basic data transmission technology that does not need complicated routing
algorithms or network management approaches. This makes it simple to set up and
administer, especially in tiny or low-bandwidth networks.
o Message switching offers a lower overhead than other data transfer techniques. This
means that there is greater accessible bandwidth for data transmission.

Disadvantages

o When compared to other approaches, such as packet switching, message switching has a
larger delay. Furthermore, because each intermediary node must keep the complete
message until it can be sent, it might be wasteful in terms of network resource
consumption.

20

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

o Finally, each communication necessitates greater network resources. As a result,


message-switching networks may be incapable of supporting huge numbers of devices or
high-bandwidth applications.

Practical situation

1. Packet switching
o To transfer data between devices on the Internet, packet switching is used.
o Packet switching is used by video streaming services to provide video material to
customers.
o To provide real-time gaming experiences, online gaming platforms employ packet
switching.
2. Circuit switching
o Analog telephone networks employ circuit switching to create a dedicated
communication link between two devices for the duration of the communication
session.
o Optical mesh networks employ circuit switching to offer a guaranteed data rate
between the transmitter and receiver.
o The Public Switched Telephone Network (PSTN) employs circuit switching to create
a dedicated communication link between two devices for the duration of the
communication session.
3. Message switching
o Early computer networks featured message switching.
o Message switching was employed by telegraph message switching centers.

1.7. Plan.
The most appropriate topology protocol would be the Star Topology with the TCP/IP protocol
suite based on the scenario of deploying a client-server architecture in the company.

The Star Topology is well-suited for client-server architectures because it provides for a
centralized server that can effectively manage requests from several clients. In this architecture,
each department's PCs (clients) would be connected to a central switch or hub, which would then
be connected to the server.

21

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

The TCP/IP protocol suite is the best option for efficient network use. TCP/IP is a widely used
collection of protocols for internet communication that is extremely scalable, dependable, and
adaptable. It ensures accurate and efficient data transmission between the server and clients.

Implementing the client-server architecture with the Star Topology and TCP/IP protocol suite
would allow for effective communication between clients in different departments and the
central server. The server would process requests, maintain data, and give services to clients,
guaranteeing smooth operations and optimal network use.

LO2. Hardware.
2.1. Network devices.
Network devices are, at their heart, communication devices. They are the components necessary
for hardware communication and interaction on a computer network. Electronic equipment such
as fax machines, computers, printers, and other IT infrastructure may be included in this gear.
The fundamental function of network devices is to send and receive data in a timely and secure
manner. "Network Devices" refers to a large category of communication equipment that includes
hubs, switches, routers, bridges, gateways, load balancers, modems, repeaters, and other devices.
(A Guide to Network Devices - Restorepoint, 2023)

2.1.1. Hub
A Network Hub is one of the most popular networking devices that may be found on any small
network, such as a home or business network. The physical layer of the OSI model is where the
hub functions. It is the most basic networking equipment, hence it is inexpensive. A hub is just a
repeater with many ports. A hub's role in networking is similar to that of a repeater. It broadcasts
data and transmits data in the form of binary bits.

Types of hub,

o Passive Hub
o Active Hub

22

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

o Intelligent Hub

Functions,

o When a Hub gets data from one of the connected devices, it sends it to all of the other
ports without first checking for the target device, except the port through which the data
was received. The diagram below depicts the operation of a HUB.

Figure 17: hub

2.1.2. Switch
A switch is a physical component in a network that filters and forwards network packets from
one networking device (switch, router, computer, server, and so on) to another. It is common in
local area networks (LANs) to deliver each incoming message frame by inspecting the physical
device address, also known as the Media Access Control address (MAC address).

23

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

Figure 18: switch

A switch is really a multiport network bridge that employs hardware addresses to process and
forward data at the OSI model's data link layer (layer 2). By integrating routing operations,
certain switches may also handle data at the network layer (layer 3). These switches are also
known as layer 3 switches or multilayer switches.

Functions,

o Connect numerous hosts: A switch often provides a large number of ports for cable
connections, enabling star topology routing. It is typically used to link numerous
computers to a network.
o Message is forwarded to a certain host: A switch, like a bridge, employs the same
forwarding or filtering logic on each port. When a host on the network or a switch
delivers a message to another host on the same network or switch, the switch receives and
decodes the frames to read the message's physical (MAC) address.
o control traffic: A switch in networking can easily control traffic entering and departing
the network, as well as link devices such as PCs and access points.

2.1.3. Router
The router is a physical or virtual internetworking equipment that receives, analyzes, and
transmits data packets between computer networks. A router checks a data packet's destination IP

24

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

address and utilizes headers and forwarding tables to determine the best path to transport the
packets. Cisco, 3Com, HP, Juniper, D-Link, Nortel, and other well-known firms manufacture
routers.

A router operates on the third layer of the OSI model and is based on a computer's IP address. It
communicates between two or more networks using protocols like as ICMP. It is also called as
an intelligent device since it can automatically compute the optimal route to transfer network
packets from source to destination. In LAN (Local Area Network) and WAN (Wide Area
Network) contexts, a router is employed. It is used in workplaces for connectivity, for example,
and it may also connect distant networks, such as those from Bhopal to Mumbai. It
communicates with other routers in the network. It transfers data across a network using the
routing protocol.

Figure 19: router

A router operates on the third layer of the OSI model and is based on a computer's IP address. It
communicates between two or more networks using protocols like as ICMP. It is also called as
an intelligent device since it can automatically compute the optimal route to transfer network
packets from source to destination.

Functions,

25

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

o A router operates on the OSI model's third layer (Network Layer), and it may connect
with its neighboring devices through IP addresses and subnets.
o A router delivers high-speed internet access via several ports such as gigabit, fast-
Ethernet, and STM link port.
o It enables users to adjust the network port according to their needs.
o The central processing unit (CPU), flash memory, RAM, Non-Volatile RAM, console,
network, and interface card are the key components of routers.

2.1.4. Bridge
A bridge in a computer network is one kind of network device, used to separate a network into
sections. Every section in the network represents a collision domain that has separate bandwidth.
So that network performance can be improved using a bridge. In the OSI model, a bridge works
at layer-2 namely the data link layer. The main function of this is to examine the incoming traffic
and examine whether to filter it or forward it.

Figure 20: bridge

Functions,

o This networking device divides local area networks into many pieces.
o It operates at the data connection layer in the OSI paradigm.

26

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

o It is used to save the MAC address of a PC in a network and also to reduce network
traffic.

2.1.5. Gateway
A gateway is a network hardware device that is used to communicate between two networks that
utilize different transmission protocols, and it serves as an entrance and exit "Gate" for the
networks, allowing all data to bypass the gateway before being routed. Gateways can be used to
connect WANs and LANs. The gateway works as a "Translator" between two systems that
employ different communication protocols, data formats, or architectures. It might be a server,
router, firewall, or any other network device that allows traffic to flow into and out of the
network.

Figure 21: gateway

Functions,

o It enables the movement of all information over the Web and serves as the entrance point
for numerous networks, allowing users to execute a variety of operations such as sending
email, navigating the Web, purchasing products and services via the Web, and so on.
o It acts as a link between sensors and internet gadgets.
o The use of a gateway increases the battery life of sensors and other devices.

27

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

o It is possible to communicate with sensors and internet devices using multiple protocols
and then transform the data into a common protocol that can be delivered to the cloud by
utilizing a gateway.
o It aids in reducing latency when preparing information.

2.1.6. Repeater
Repeaters are network hardware devices that act at the physical layer of the OSI model to
amplify or regenerate signals before retransmitting them. "Signal Boosters" are another name for
repeaters. A repeater may extend a data signal from one network segment and then pass it to
another, thereby increasing the network size. The repeater allows data to be sent over long
distances while still ensuring data security and quality. It may also re-transmit data while
securely retaining the signals. Due to the limitations of signal propagation over larger distances,
a repeater was launched for wired data communication networks, but now easy installation in
wireless networks for cell scaling is available.

28

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

Figure 22: repeater

Functions,

o Repeaters merely provide the ability to join networks.


o The repeater's principal duty is to receive signals for one LAN terminal cable and then
regenerate and retransmit all signals in their original form over additional cable segments.
o A repeater guarantees that enhanced transmissions are not discarded or become faint
before reaching their target.
o Most repeaters can renew signal strength, although this is done before broadcasting.
o A repeater operates at the physical layer of the OSI model and is invisible to all protocols
that operate in the layer above the physical layer.
o The network may be grown beyond the size limit of a single physical cable segment by
utilizing repeaters.

29

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

2.1.7. Load balancer


A load balancer functions as a "traffic cop" in front of your servers, directing client requests to
all servers capable of completing those demands in a way that maximizes speed and capacity
utilization while ensuring that no single server is overworked, which might decrease
performance. If a single server fails, the load balancer transfers traffic to the other servers that
are operational. When a new server is added to the server group, the load balancer begins
sending requests to it automatically.

Figure 23: load balancer

Functions,

o Distributes client requests or network load among numerous servers in an effective


manner.
o Ensures high availability and dependability by delivering requests only to servers that are
online; allows for the addition or removal of servers as demand requires

2.2. Inter-dependance.
In networking, interdependence refers to the link between distinct networks in which nodes in
one network require assistance from nodes in another network. This notion is an area of network
research that deals with phenomena generated by complicated network interactions. Here are a
few crucial points concerning interconnected networks:
30

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

Interdependent networks rely on nodes from other networks.

When a node in one network fails, the dependent nodes in other networks fail, which can cause
more harm to the initial network, resulting in cascading failures and potentially catastrophic
effects.

Interdependence across networks can lead to fragmentation as a result of a rapid cascade, which
can be studied to better understand the interaction and robustness of nodes in various networks.

Infrastructure networks are highly interdependent, with power stations that comprise the nodes of
the power grid requiring fuel transported via a network of roads or pipes and being controlled by
nodes of the communications network.

Dependency links reflect the requirement for network assistance, whereas links in a conventional
network represent connectivity.

Figure 24:interdependence

The source nodes SA and SB are considered to be self-sufficient in terms of both power and
communication in the initial phase (tstep1), while the remainder of the nodes and lines are
blacked out. As we get to tstep2, we can restore A1 and B1 since they supply power and
communication to each other. We can restore A3 in step 3 since we have electricity from A1 and
a communication link from B1. In step 4, we restore A4 and B3. Finally, in tstep5, we may
restore A2 and B2. (Figure 1: Illustrative example of interdependent networks, 2023)

31

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

2.3. Server types.


A server is a computer program or a device that delivers functionality to clients, which are other
programs or devices. This design is known as the client-server model. A single overall
computation is dispersed among several processes or devices. Servers can deliver a variety of
services. These services involve distributing data or resources among numerous customers or
conducting calculation for a client. A single server can serve several clients, while a single client
can access multiple servers. A client process and a server process can both operate on the same
device. It can also connect to a server across a network and execute on a separate device.
Database servers, mail servers, print servers, file servers, web servers, application servers, and
gaming servers are examples of servers. (Servers in Computer Network, 2018)

1. Application server - These servers host web applications (computer programs that run
inside a web browser), allowing network users to run and utilize them without having to
install a copy on their own machines. These servers are not required to be part of the
World Wide Web. Clients are computers equipped with a web browser.
2. Catalog server - These servers keep an index or table of contents of information that may
be discovered throughout a vast dispersed network. A distributed network may comprise
computers, users, files shared via file servers, and web apps. Directory servers and name
servers are two examples of catalog servers. Their clients are any computer programs that
need to find something on the network.
3. Communications server - These servers maintain the environment required for one
communication endpoint to locate and communicate with other endpoints. Depending on
the network's openness and security standards, these servers may or may not include a
directory of communication endpoints and a presence detection service. Their clients
serve as communication hubs.
4. Computing server - These servers use a network to share massive quantities of computing
resources such as CPU and random-access memory. These servers may be used for any
computer software that requires more CPU power and RAM than a typical desktop
computer can provide. To implement the client-server concept, the client must be a
networked computer.
5. Database servers- manage and share any type of database across a network. A database is
a structured collection of data that may be shown in a table. Spreadsheets, accounting
32

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

software, asset management software, and nearly any computer application that consumes
well-organized data, especially in huge amounts, are clients of these servers.
6. Fax server - A fax server is a server that shares one or more fax machines via a network,
eliminating the need for physical access. These servers' clients are any fax sender or
recipient.
7. File server - Distributes files and directories over a network, as well as storage space for
files and folders. Clients are designed to be networked computers, yet local programs can
also be clients.
8. Game servers- allow many computers or gaming devices to play multiplayer games.
Their clients are personal PCs or game consoles.
9. letter server - These servers enable email communication in the same manner that a post
office enables snail letter communication. Clients of these servers are email senders and
receivers.
10. Print server - These servers distribute one or more printers across a network, eliminating
the need for physical access. Their customers are computers that require printing.
11. Proxy server - This server operates as an intermediate between a client and a server,
taking incoming client communication and forwarding it to the server. Content
management and filtering, enhancing traffic throughput, preventing unwanted network
access, and simply routing data across a big and complicated network are all reasons to
utilize a proxy server. Clients can be any networked machine.
12. Web server - A server that hosts web pages. A web server is what makes the World Wide
Web possible. Each website is served by one or more web servers. Clients are computers
that have a web browser.

Apache HTTP Server: Apache is a popular open-source web server that is well-known for its
flexibility and large feature set. For many years, it has been a major participant in the web server
business. Apache is well-known for its capacity to manage several concurrent connections as
well as its support for a diverse set of modules and extensions. It is very customisable and works
well with a variety of operating systems.

Justification:

33

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

Cost: Because Apache HTTP Server is open-source and freely available, it is a low-cost choice.
There are no license fees while utilizing Apache, which helps to save costs.

Performance: Apache works well in cases with a large number of concurrent connections. It
features a strong and mature design that can successfully manage enormous traffic levels.

LO3. Implementation.
3.1. Design.

Figure 25: networking design

Step 1: launch cisco packet tracer,

 On the PC, run the Cisco Packet Tracer program.

Step 2: setup the physical topology,

 Following the installation of the workspace, the appropriate devices should be connected
to the network.

34

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

 The network for MadZoo firm consists of four networks: research and development (5
PCs & 1 Printer), project management (3 PCs), information security (3 PCs), and
customer service (2 PCs & 1 Printer).
 Each of these networks has a switch that allows these devices to be connected to one
another.
 A router is used to bring these networks together.
 Another network is set up to store data in a server.

Step 3: assign IP addresses,

 Click the "Config" tab after selecting a device (PC, printer, or server).
 Configure each device's IP address, subnet mask, default gateway, and DNS server
settings.

Figure 26:assigning IP address

Step 4: set up DHCP server

 Determine which device (PC or server) will function as the DHCP server.
 Enable the DHCP service by clicking the "Services" tab.

35

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

 Configure the IP address range, subnet mask, default gateway, and DNS server settings
for DHCP.

Step 5: configure switch

 To access the command line interface, double-click the switch and pick the "CLI" tab.
 Follow the following steps in the figure below,

Figure 27: configure switch

Step 6: test connectivity

 Ping between devices to check they are connected.


 To verify connectivity to other devices, start a command prompt and run the ping
command from the "Desktop" tab on each PC.

Step 7: implement security measures

 Configure access control lists (ACLs) on the switch to manage traffic flow and improve
security.
 Use a fire wall in between the router and the networks in order to protect the data that
containing in these networks.

36

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

Figure 28: firewall

Step 8: document the LAN network

 Using the necessary tools in Cisco Packet Tracer, draw a network diagram.
 Record the IP addresses, VLAN configurations, switch settings, and any security
measures that are in place.

Step 9: save and evaluate the LAN network

 In Cisco Packet Tracer, save your project for future reference.


 Perform a performance, scalability, and security audit on the LAN network. Make any
required changes or enhancements.

3.2. Justification.

1. Switches:
 Switches are necessary for establishing a LAN network and allowing
communication among devices on the local network.
 They include many ports for connecting PCs, printers, and other devices, making
data transfer more efficient.
 Switches include characteristics such as VLAN support, QoS capabilities, and
link aggregation, allowing for improved network administration and performance
optimization.
2. PCs:
 Employees' principal gadgets for day-to-day work are personal computers (PCs).
 Each department requires a specified number of PCs in order for their employees
to do their duties properly.

37

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

 PCs are selected based on their processing power, memory, and other specs that
fit the company's needs.
3. Printers:
 Printers are required for departments that require tangible document output, such
as research and development and customer service.
 The printers chosen should fulfill the printing requirements of the individual
departments in terms of quality, speed, and functionality.
4. Firewall:
 The firewall is an important security mechanism that guards the LAN network
from unauthorized access, threats, and assaults.
 It monitors and filters network traffic according to established criteria, preventing
harmful activity and ensuring network security.
 Firewalls can also enable VPN (Virtual Private Network) connection and
intrusion detection/prevention, hence improving network security.
5. Router:
 The router serves as a bridge between the LAN network and other networks, such
as the internet.
 It connects employees to the internet, allowing them to access online resources,
interact with other parties, and use cloud services.
 Routing protocols and traffic control functions are enabled by routers, providing
effective data routing between the LAN and external networks.
6. Server:
 The server is crucial to the network's and its users' ability to access different
services and resources.
 It can house programs, databases, and files that employees must access and share.
 Servers allow centralized data storage, backup and recovery capabilities, and
improved staff communication.

38

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

3.3. Test plan.


Objective: The objective of this test plan is to assess the proposed architecture based on the
bandwidth and cost restrictions specified by the user.

Testing scope: The following elements are included in the scope of the test plan:

1. Bandwidth: Determine if the network infrastructure can manage the needed bandwidth for
each department.

2. Cost Constraints: Assess the proposed design's overall cost-effectiveness.

Testing approach:

1. Bandwidth Testing:

a. Determine the available network bandwidth.


b. Determine the anticipated bandwidth needs for each department based on their activities,
applications, and services.
c. Run network load testing to mimic predicted demand and track real bandwidth
consumption.
d. Contrast the measured and needed bandwidth for each department.
e. Ensure that the measured bandwidth is equal to or greater than the necessary bandwidth
for all departments.

2. Cost Constraints Testing:

a. 2.1. Determine the cost of the suggested design by taking into account the following
factors:
- The cost of computers, printers, servers, and routers.
- The cost of networking hardware (switches, cables, and so on).
- Software license costs (if applicable).
- The expense of upkeep and support.
b. 2.2. Compare the overall cost of the suggested design to the budget allotted for the
project

39

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

c. Confirm that the suggested design fits within the budget limits.

Test cases:

1. Bandwidth Testing:

a. Test Case 1: Department of Research and Development


- Simulate network traffic from PCs in the Research and Development department.
- Calculate the bandwidth used during peak usage.
- Contrast the observed bandwidth with the necessary bandwidth.
- Expected Outcome: The measured bandwidth should be equal to or greater than
the necessary bandwidth.
b. Test Case 2: Department of Project Management
- Simulate network traffic from PCs in the Project Management Office department.
- Calculate the bandwidth used during peak usage.
- Contrast the observed bandwidth with the necessary bandwidth.
- Expected Outcome: The measured bandwidth should be equal to or greater than
the necessary bandwidth.
c. Case 3: Department of Information Security
- Simulate network traffic from the PCs in the Information Security department.
- Calculate the bandwidth used during peak usage.
- Contrast the observed bandwidth with the necessary bandwidth.
- Expected Outcome: The measured bandwidth should be equal to or greater than
the necessary bandwidth.
d. Test Case 4: Customer Service Department
- Simulate network traffic from Customer Service department's PCs.
- Measure the bandwidth consumed during peak usage.
- Compare the measured bandwidth with the required bandwidth.
- Expected Outcome: Measured bandwidth should meet or exceed the required
bandwidth.
2. Cost Constraints Testing:
a. Case 5: Total Cost Assessment

40

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

- Determine the estimated cost of the suggested design (computers, printer(s),


server, router, networking equipment, software licenses, maintenance/support).
- Contrast the overall cost with the project's allotted budget.
- Expected Outcome: The overall cost should be less than the budgeted amount.
3. Overall validation:
a. Confirm that the measured bandwidth and overall cost fulfill all departments' criteria.
b. If any inconsistencies are discovered, investigate and identify viable solutions to the
problems.
c. Perform extra testing iterations if the design is modified.

3.4. Installation and configuration.


Dynamic Host Configuration Protocol (DHCP)

DHCP, which stands for Dynamic Host Configuration Protocol, is a network protocol that is
used to automatically assign IP addresses to computers and devices connected to the internet.

It enables computers and other internet-connected devices to automatically receive their IP


address from a central server rather than manually setting them each time they connect to the
network. Users benefit from this since they don't have to memorize complex network settings or
manually setup their connection every time they need to connect to the internet.

1. Determine DHCP Server Placement:


- Select the server or network device where the DHCP server software will be installed.
Ascertain that it has the required network connectivity and permissions.
2. Install DHCP Server Software:
- On the specified server or network device, install the DHCP server software. The
installation procedure may differ depending on the operating system or DHCP server
software you use.
- DHCP server software examples include DHCPd (ISC DHCP), Windows Server
DHCP, and the DHCP service on Cisco Systems.
3. Configure DHCP Server:
- After installation, proceed with setting the DHCP server as follows:
1. IP Address Scope:

41

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

o Define the IP address range that will be assigned to client devices by the
DHCP server.
o Enter the scope's starting and terminating IP addresses, subnet mask, default
gateway, and DNS server addresses.
2. Lease Duration:
o Define the lease period, which is the amount of time a client may use an
issued IP address before it must be renewed.
o Based on your network requirements and the estimated number of devices,
select a suitable lease length.
3. DHCP Options:
o Configure DHCP options to offer clients with extra network parameters.
o Configure domain name, DNS servers, NTP servers, and other pertinent
information.
4. Reservations:
o Assign specific IP addresses to devices by creating reservations.
o Specify the MAC address and the corresponding IP address for devices that
require a static assignment.
4. Activate DHCP Server:
- Start delivering DHCP requests from client devices by activating the DHCP server.
- Check that the DHCP service is operating and that it is set to start automatically when
the system boots.
5. Verify DHCP Functionality:
- Connect a client device to the network and verify it is set to automatically get an IP
address (DHCP client mode).
- The DHCP server should provide the client with an IP address, subnet mask, default
gateway, and other configurable information.
6. Monitoring and Troubleshooting:
- Keep an eye on the DHCP server for any possible problems.
- Track DHCP server performance, lease allocations, and client activities using logging
and monitoring tools.

42

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

- Any difficulties that develop, such as IP address conflicts or network connectivity


concerns, must be resolved.

3.5. Maintenance.
1. Equipment Inventory and Documentation:
- Compile an inventory of all computers, printers, and network devices in each
department.
- Keep a record of each device's specs, serial numbers, and settings for future reference.
- Keep a consolidated record of network diagrams, IP addresses, and software
licensing.
2. Preventive Maintenance:
- To avoid dust collection and overheating, schedule periodic inspections and cleanings
of computers, printers, and network equipment.
- Perform frequent hardware checks, including power supply, fans, and cables, to
proactively detect and fix possible issues.
- Perform system backups and data integrity checks to protect against data loss.
3. Network Performance Optimization:
- Examine network traffic patterns for possible bottlenecks and adjust network
parameters accordingly.
- Monitor and regulate bandwidth utilization to ensure that the network runs smoothly.
- To prioritize key applications and services, use Quality of Service (QoS) rules.
4. Security Measures:
- Update and patch operating systems, software programs, and firmware on a regular
basis to address security vulnerabilities.
- Install and maintain strong firewalls and intrusion detection/prevention systems.
- Perform routine security audits and penetration testing to identify and mitigate any
risks.
5. Printer and Peripheral Maintenance:
- Regularly clean and maintain printers, scanners, and other peripherals.
- To ensure high-quality printing, calibrate and align printer heads.
- To reduce damage and downtime, train users on correct printer and peripheral
handling.
43

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

6. Disaster Recovery and Backup:


- Implement a backup solution for essential data and systems that is automated.
- Test the restoration procedure on a regular basis to assure data recovery in the case of
a failure or calamity.
- Create a detailed catastrophe recovery strategy that includes clearly defined roles and
duties.
7. User Training and Support:
- Provide users with regular training on network usage, data security, and best
practices.
- Set up a help desk or support system to quickly respond to user inquiries and fix
difficulties.
- Maintain a knowledge base or FAQ area to provide self-help tools to users.

LO4. Conclusion.
4.1. Implementation.
- Network infrastructure:
- Set up a central network switch or switches to connect all of the computers
and printers in the various departments.
- Set up the network switch(es) to accommodate the desired number of devices
while also providing adequate network bandwidth.
- Research and development department:
- Connect the network switch to the 5 PCs and 1 printer in the Research and
Development department.
- Assign IP addresses to each machine and set them to automatically get IP
addresses using DHCP (Dynamic Host Configuration Protocol).
- Set up the Research and Development team's file sharing and shared network
resources.
- Project management office:
- Connect the network switch to the three PCs in the Project Management
Office.
44

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

- Assign IP addresses to each machine and setup DHCP to automatically assign


IP addresses.
- Configure file sharing and shared network resources for the Project
Management team.
- Information security department
- Connect the network switch to the three PCs in the Information Security
Department.
- Assign IP addresses to each machine and setup DHCP to automatically assign
IP addresses.
- Set up proper network security measures to protect sensitive data, such as
firewall setups and access controls.
- Customer service department:
- Connect the network switch to the two PCs and one printer in the Customer
Service Department.
- Assign IP addresses to each machine and setup DHCP to automatically assign
IP addresses.
- To provide printing capabilities, set up shared printer access for the Customer
Service team.
- Network configuration and security:
- Set up the necessary network settings, such as IP addresses, subnet masks,
default gateways, and DNS servers.
- Put in place network security measures including firewalls, intrusion detection
systems, and regular security upgrades.
- Network maintenance
- Monitor and maintain network infrastructure on a regular basis, including
checking for connectivity issues, ensuring software and firmware upgrades are
performed, and addressing any performance or security concerns.
- Backup essential network configurations and data on a regular basis to avoid
data loss.

45

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

4.2. Verification.
1) Open the Command Prompt: On your computer, open the Command Prompt by clicking
on the Windows button and entering "cmd" into the search box.
2) Ping the following command: Enter "ping" and the IP address or domain name of the
device to be tested. It would be "ping [Link]" in this case.
3) Enter the following: To run the Ping command, press Enter.
4) View the outcomes: Examine the Ping command results to check if the device is
reachable and how long it takes to obtain a response. The number of packets transmitted,
received, and lost, as well as the round-trip time (RTT) for each packet, will be displayed
in the results.

Figure 29: ping

5) To use extended Ping, type "ping" followed by the IP address or domain name of the
device you wish to test, then add the "-t" option to ping the device continually. It would
be "ping -t [Link]" in this case.
6) View the outcomes: Examine the results of the extended Ping command to determine
whether or not the device is reachable and how long it takes to obtain a response. The

46

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

number of packets transmitted, received, and lost, as well as the RTT for each packet,
will be updated in real time.

Figure 30: extended ping

7) Analyze the results: Examine the Ping and extended Ping commands to see if the device
is reachable and how long it takes to obtain a response. If there are dropped packets or
excessive RTT values, network connectivity difficulties may exist and must be resolved.

4.3. Design vs Implementation.


Test Results:

- Destination IP: [Link]


- Number of packets sent: 4
- Packets received successfully: 4
- Packet loss: 0

Analysis:

The test results show that all four packets were properly delivered and received without loss after
the ping and extended ping verification to the IP address [Link]. This result is good,

47

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

indicating a steady and dependable network connection between the source and destination IP
addresses.

In terms of expected outcomes, obtaining 100% success with no packet loss corresponds to the
intended outcome for a ping test. It indicates that network connectivity to the provided IP address
is stable and uninterrupted, with no visible difficulties interfering with communication between
the source and destination.

4.4. Critical evaluation.


To facilitate device expansion and the usage of VLANs (Virtual Local Area Networks). VLANs
provide for logical network segmentation, allowing for more effective network administration
and expansion. It is easier to accommodate additional devices and grow the network as needed
by allocating devices to certain VLANs independent of their physical location. By grouping
devices based on departments or particular requirements, VLANs provide flexibility, security,
and efficient network use.

Quality of Service (QoS) is crucial in ensuring that critical applications and communication
devices receive the network resources and prioritization they require. Proper bandwidth
management becomes increasingly important as the network expands and more communication
devices are added. QoS allows traffic to be prioritized, ensuring that critical communication
devices such as VoIP phones or video conferencing systems receive the necessary bandwidth and
latency, resulting in a flawless communication experience.

Another essential factor is the incorporation of wireless access points (WAPs). By deploying
WAPs around the premises, wireless devices may be easily connected and expanded. Additional
WAPs can be built as the number of wireless devices grows to ensure enough coverage and
bandwidth. To allow higher device density and deliver faster wireless rates, WAPs must support
the most recent wireless standards, such as Wi-Fi 6.

Finally, centralized network administration is highly suggested to facilitate network management


and system expansion. Administrators can centrally monitor and manage network infrastructure
by using network management software or controllers. This centralized method allows for rapid
configuration updates, troubleshooting, and the installation of additional devices without
generating network service interruptions.

48

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

4.5. Future enhancements.


Prioritizing security requirements is critical for making enhancements and modifications to the
networked system. Security is critical in protecting network infrastructure, data, and devices
against unauthorized access, malicious activity, and possible threats.

Network segmentation and VLANs: By separating separate departments or critical portions of


the network, network segmentation and VLANs can improve security. The possibility for lateral
movement by attackers is reduced by logically isolating network components. It also allows for
the deployment of customized security policies and controls suited to the needs of each segment,
hence boosting overall network security posture.

Intrusion Detection and Prevention Systems (IDPS): Using IDPS systems can assist identify and
prevent harmful network activity. IDPS analyzes network traffic, identifies possible threats or
intrusion attempts, and generates warnings or performs mitigation steps. IDPS solutions help to
maintain a secure network environment by proactively recognizing and responding to security
problems.

Encryption and virtual private networks (VPNs): When sending sensitive data over public
networks or between remote locations, it is critical to use encryption methods and virtual private
networks (VPNs). Encryption protects data during transmission by rendering it unreadable to
unauthorized parties. VPNs protect and encrypt remote access tunnels, preserving data security
and integrity.

References

49

Downloaded by muhammad sathir (sathirmhd576@[Link])


lOMoARcPSD|38403053

A Guide to Network Devices - Restorepoint. (2023, 06 26). Retrieved from restorepoint:


[Link]

communications@[Link]. (2023, 06 26). Network Monitoring Software by


ManageEngine OpManager. Retrieved from ManageEngine OpManager:
[Link]

Contributor, s. (2019, 08 15). What is Network Topology? Best Guide to Types & Diagrams .
Retrieved from DNSstuff: [Link]

Datta. (2023, 03 08). Switching Techniques in Computer Networks | Baeldung on Computer


Science. Retrieved from baeldung: [Link]
computer-networks

Figure 1: Illustrative example of interdependent networks. (2023, 06 26). Retrieved from


ResearchGate: [Link]
interdependent-networks_fig1_321246250

Interserver., J. (2019, 08). Common Network Protocols. Retrieved from interserver:


[Link]

Servers in Computer Network. (2018, 10 03). Retrieved from GeeksforGeeks:


[Link]

sharmadevesh769. (2023, 06 26). What is Bandwidth? Definition, Working, Importance, Uses.


Retrieved from geeksforgeeks: [Link]
definition-working-importance-uses/

Types of Network. (2023, 06 25). Retrieved from tutorialandexample:


[Link]

50

Downloaded by muhammad sathir (sathirmhd576@[Link])

You might also like