Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 43

ASSIGNMENT FRONT SHEET

Qualification BTEC Level 5 HND Diploma in Computing


Unit number and
Unit 2: Networking
title
Date Received 1st
Submission date December, 30th 2019 December, 25th 2019
submission
Date Received 2nd
Re-submission Date
submission
Student Name Chu Tiến Đạt Student ID GCS 18584

Class GCS0706A Assessor name Hồ Nguyễn Phú Bảo

Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the
consequences of plagiarism. I understand that making a false declaration is a form of malpractice.
Student’s signature

Grading grid

P1 P2 P3 P4 P5 P6 P7 P8 M1 M2 M3 M4 D1 D2 D3
❒ Summative Feedback:

❒ Resubmission Feedback:

Grade: Assessor Signature: Date:

Signature & Date:

ASSIGNMENT BRIEF SHEET

Qualification BTEC Level 5 HND Diploma in Computing

Unit number Unit 2: Networking

Assignment title Networking Infrastructure

Academic Year Fall 2019(Part 2)

Unit Tutor Hồ Nguyễn Phú Bảo

Issue date Submission date December 30 th 2020

IV name and date

Submission format

Part 1

The submission is in the form of an individual written report. This should be written in a concise, formal
business style using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using the Harvard
referencing system. Please also provide a bibliography using the Harvard referencing system. The
recommended word limit is 2,000–2,500 words, although you will not be penalized for exceeding the total word
limit.

Part 2

The submission is in the form of an individual evidence portfolio. This assignment can be completed as a group,
but each student must produce their own portfolio, which will contain:

 A LAN design plan and blueprint and justification document.

 A fully completed test plan including an evaluation of results and recommendations for improvements to
LAN.

 A proposed and justified maintenance schedule.

Part 3

 Evidence of an implemented network.

You are required to make use of headings, paragraphs, subsections and illustrations as appropriate, and all work
must be supported with research and referenced using the Harvard referencing system.

Unit Learning Outcomes

LO1: Examine networking principles and their protocols.

LO2: Explain networking devices and operations.

LO3: Design efficient networked systems.

LO4: Implement and diagnose networked systems.

Assignment Brief

You are employed as a Network Engineer by Nguyen Networking Limited, a high-tech networking solution
development company, which have branches in Hồ Chí Minh City, Hà Nội, Đà Nẵng and Cần Thơ.

The company has been contracted to implement a networking project from a local educational institute. The
specification of the project is given below:

People: 200 students, 15 teachers, 12 marketing and administration staff, 05 higher managers including the
head of academics and the program manager, 03 computer network administrators.
Resources: 50 student lab computers, 35 staff computers, 03 printers.

Building: 03 floors, all computers and printers are on the ground floor apart from the IT labs – one lab located
on the first floor and another located on the second floor.

As a first task, the CEO of the company Mr. Nguyen has asked you to investigate and explain networking
principles, protocols and devices and submit a report.

Part 1
You will need to produce a report that includes the following:
1. An introduction to provide an overview of your report.

2. Benefits and constraints of different types of networks and networking standards.

3. The impact of network topology, speed of communication and bandwidth requirements.

4. Effectiveness of networking systems.

5. Discussion on operating principles of networking devices and server types and networking software.

6. Discuss the relationship of workstation hardware with networking software.

7. Explore a range of server types and justify the selection of a server, considering a given scenario
regarding cost and performance optimization.

8. For the given specification, identify the topology protocol for the efficient utilization of a networking
system.

The CEO Mr. Nguyen is happy with your first report and now he has asked you to analyze the specification
from the institution, as given earlier.

You need to design and implement the networking project within a given time frame:

Part 2 - Design efficient networked systems


1. Prepare a written step-by-step plan of how you are going to design a Local Area Network including a
blueprint of your LAN.

2. Justify your choice of devices for your network design.

3. Produce a test plan to evaluate this design for the requirements of bandwidth and cost constraints as per
user specifications.

4. Justify the security requirements and quality of services needed for selection of accessories.

5. Suggest a maintenance schedule to support the networked system.

Part 3 - Implement test and diagnose networked systems


1. Implement a networked system based on your prepared design.

2. Conduct verification with e.g. Ping, extended ping, trace route, telnet, SSH, etc.

3. Record the test results and analyze these against expected results.

4. Investigate what functionalities would allow the system to support device growth and the addition of
communication devices.

5. Discuss the significance of upgrades and security requirements in your recommendations.

ASSESMENT CRITERIA

Learning Outcomes and Assessment Criteria

Pass Merit Distinction

LO1 Examine networking principles and their protocols. LO1 & 2


D1 Considering a given scenario,
P1 Discuss the benefits and M1 Compare common
identify the topology protocol
constraints of different network types networking principles and selected for the efficient
and standards. how protocols enable the utilization of a networking
effectiveness of networked system.
P2 Explain the impact of network systems.
topology, communication and
bandwidth requirements.

LO2 Explain networking devices and operations

P3 Discuss the operating principles of M2 Explore a range of server


networking devices and server types. types and justify the selection
of a server, considering a
P4 Discuss the inter-dependence of given scenario regarding cost
workstation hardware with relevant and performance
networking software. optimisation.

LO3 Design efficient networked systems

P5 Design a networked system to M3 Install and configure D2 Design a maintenance


meet a given specification. network services and schedule to support the
applications on your choice. networked system.
P6 Test and evaluate the design to
meet the requirements and analyse
user feedback.

LO4 Implement and diagnose networked systems

P7 Implement a networked system M4 Recommend potential D3 Use critical reflection to


based on a prepared design. enhancements for the evaluate own work and
networked systems. justify valid conclusions.
P8 Document and analyse test results
against expected results.
Contents
P1 Discuss the benefits and constraints of different network types and standards. The two most common
types of network infrastructures are.................................................................................................................................................. 6
+ Local Area Network (LAN):........................................................................................................................................................... 6
Advantages of local area network (LAN).................................................................................................................................... 7
Disadvantages of local area network (LAN).............................................................................................................................. 7
+Wide Area Network (WAN)........................................................................................................................................................... 7
Advantages of a wide area network (WAN)............................................................................................................................... 8
Disadvantages of a wide area network (WAN)......................................................................................................................... 8
Network standard:............................................................................................................................................................................ 10
P2 Explain the impact of network topology, communication and bandwidth requirements..................................10
P3 Discuss the operating principles of networking devices and server types...............................................................15
Server type:...................................................................................................................................................................................... 19
Web..................................................................................................................................................................................................... 19
File....................................................................................................................................................................................................... 19
Database........................................................................................................................................................................................... 19
Virtualization.................................................................................................................................................................................. 19
Mail..................................................................................................................................................................................................... 19
The operating principles of server types:................................................................................................................................ 19
Application Servers...................................................................................................................................................................... 19
Client Servers.................................................................................................................................................................................. 19
FTP Servers x.................................................................................................................................................................................. 19
List Servers...................................................................................................................................................................................... 19
Mail Servers x...................................................................................................................................................................................... 19
Open Source Servers......................................................................................................................................................................... 19
Proxy Servers....................................................................................................................................................................................... 20
Real-Time Communication Servers............................................................................................................................................ 20
Server Platforms................................................................................................................................................................................. 20
Telnet Servers..................................................................................................................................................................................... 20
Virtual Servers.................................................................................................................................................................................... 20
Web Servers x...................................................................................................................................................................................... 20
P4 Discuss the inter-dependence of workstation hardware with relevant networking software.........................21
P5: Design a networked system to meet a given specification............................................................................................. 22
200 Feet High Speed Cat5 Cat5e RJ45 Patch Ethernet Network Internet DSL Cable (200 FT, Black) for PC,
Mac, Laptop, (US Seller),.., By Cable N Wireless,USA........................................................................................................... 23
Switch TP-Link TL SG1024D 24-Port Gigabit.......................................................................................................................... 23
Router Linksys WRT1900ACS....................................................................................................................................................... 23
CANON LBP 2900............................................................................................................................................................................. 23
P6 Test and evaluate the design to meet the requirements and analyse user feedback............................................24
Performance Test:............................................................................................................................................................................. 24
Stress test:............................................................................................................................................................................................. 24
Types of Stress Testing:................................................................................................................................................................... 25
Systemic Stress Testing:.................................................................................................................................................................. 25
P7: Implement a networked system based on a prepared design...................................................................................... 27
P8 Document and analyse test results against expected results. Add failure test........................................................27

P1 Discuss the benefits and constraints of different network types


and standards.
The two most common types of network infrastructures are

+ Local Area Network (LAN):


Local area network (LAN) is a computer network in a small geographical area such as a home, school,
computer lab, office building or group of buildings.

A LAN consists of connected workstations and personal computers, each capable of accessing and
sharing data and devices, such as printers, scanners and data storage devices, anywhere on the LAN.
LANs are characterized by higher data and data transfer rates and there is no need for leased lines.
https://www.techopedia.com/definition/5526/local-area-network-lan (1)
https://image.shutterstock.com/image-vector/lan-local-area-network-one-600w-1450373921.jpg

Advantages of local area network (LAN)


• All resources are linked to a single network and, if any machine requires any resources, it can be shared with the
computer needed. DVD drive, printers, scanners, modems and hard drives are tool types. For each machine, there
is no need to buy separate resources, and it saves money.

Disadvantages of local area network (LAN)


• If the server device is not properly set up and there is a security leak, then unauthorized users can also access
the data. Therefore, privacy policy and guidelines on the server should be set correctly.

• Local area networks are typically installed in or around a house and can not spread to the wider area

+Wide Area Network (WAN).


A wide area network (WAN) is a network that exists over a large-scale geographical area. A WAN connects
different smaller networks, including local area networks (LANs) and metro area networks (MANs). This ensures
that computers and users in one location can communicate with computers and users in other locations. WAN
implementation can be done either with the help of the public transmission system or a private network.
https://www.techopedia.com/definition/5409/wide-area-network-wan

Advantages of a wide area network (WAN)


• Wan covers a large geographic area of 1000 km or more If your office is located in different cities or countries,
you can connect branches of your office by wan. ISP (Internet Service Provider) can provide you with leased lines
to connect through branch offices.
Disadvantages of a wide area network (WAN)
• Compared to MAN and LAN, WAN has more security issues. WAN has a mix of many technologies that can
create a security void.

• This costs more money to set up WAN for the first time in the office. Routers, switches, and extra security
software may be purchased.

The difference between LAN and WAN is that LAN has a small area of connection and WAN is consists of
multiple LANs connected to each other.

https://previews.123rf.com/images/sergeyvasutin/sergeyvasutin1708/sergeyvasutin170800105/85424239-
vector-red-wan-word-with-blue-linear-icons-on-white-background-round-web-banner-concept-of-wide-area.jpg

+Metropolitan Area Network (MAN).


A metropolitan area network (MAN) is similar to a local area network (LAN) but spans an entire city or campus.
MANs are formed by connecting multiple LANs. Thus, MANs are larger than LANs but smaller than wide area
networks (WAN).
MANs are extremely efficient and provide fast communication via high-speed carriers, such as fiber optic cables.
https://www.techopedia.com/definition/8238/metropolitan-area-network-man
https://www.freecram.com/uploads/CISA/c03b75821e6a12b9554a60dca7e2edf2.jpg
+Storage Area Network (SAN):
A storage area network (SAN) is a secure high-speed data transfer network that provides access to
consolidated block-level storage. An SAN makes a network of storage devices accessible to multiple
servers. SAN devices appear to servers as attached drives, eliminating traditional network bottlenecks.
SANs are sometimes also referred to (albeit redundantly) as SAN storage, SAN network, network SAN,
etc.
https://www.techopedia.com/definition/1116/storage-area-network-san

https://ars.els-cdn.com/content/image/3-s2.0-B9780124046276000075-f07-13-9780124046276.jpg
Network standard:
• • Gigabit Wi-Fi refers to the forthcoming 802.11ac Wireless LAN standard that enables data transfer rates of
433Mbps per spatial stream and up to 1.3Gbps for three (three) hardware antennas.

• Also sometimes referred to as "5 G Wi-Fi," Gigabit Wi-Fi operates only in the 5 GHz frequency range (where
there is far less potential for interference at the moment) compared to the 802.11n spec, which operates in both
5 GHz and 2.4 GHz. Gigabit Wi-Fi products, including 802.11n, will offer backward compatibility with previous
802.11 specifications.

P2 Explain the impact of network topology,


communication and bandwidth requirements
-Types of Topologies
+ Bus
+ Star
+ Ring
+ Mesh
+ Tree
+ Hybrid
-Bus topology
Bus topology is a network type in which every computer and network device is connected to single cable. It
transmits the data from one end to another in single direction. No bi-directional feature is in bus topology .

https://1.bp.blogspot.com/-wCyt7C1_JpM/WpnWUqzx-
9I/AAAAAAAAAEk/fJ7HKFs35aUKaARdXJIpR5kJrZPW50_0ACLcBGAs/s1600/main-qimg-
7fcbfda26c33c2aa41403290410a3242-c.jpg
Advantages of Bus Topology

• Easy to connect a computer or peripheral to a linear bus.


• Requires less cable length than a star topology.

Disadvantages of Bus Topology

• Entire network shuts down if there is a break in the main cable.

• Terminators are required at both ends of the backbone cable.

• Difficult to identify the problem if the entire network shuts down


• Not meant to be used as a stand-alone solution.

http://www.omnisecu.com/basic-networking/network-topologies-bus-topology.php

-Star Topology
In star topology, all the devices are connected to a single hub through a cable. This hub is the central node and all
others nodes are connected to the central node. The hub can be passive in nature i.e. not intelligent hub such as
broadcasting devices, at the same time the hub can be intelligent known as active hubs. Active hubs have
repeaters in them.

https://encrypted-tbn0.gstatic.com/images?
q=tbn:ANd9GcSc7f83Y9Rh2frFLaThfSKaG24xJ0za9HPadawhPoX70EXGXzXAFQ&s
Advantages of star topology

Centralized management of the network, through the use of the central computer, hub, or switch.
Easy to add another computer to the network.
If one computer on the network fails, the rest of the network continues to function normally.
Disadvantages of star topology
May have a higher cost to implement, especially when using a switch or router as the central network
device.
The central network device determines the performance and number of nodes the network can handle.
If the central computer, hub, or switch fails, the entire network goes down and all computers are
disconnected from the network.
https://www.computerhope.com/jargon/s/startopo.htm
Ring Topology
In this topology, it forms a ring connecting a devices with its exactly two neighbouring devices.
Advantages of Ring Topology:
Flow of data is in circular direction which minimizes the chance of packet collision.
The uni-directional ring topology provides very high speed.
It has better performance than bus topology, even when the nodes are increased.
Ring network can handle high volume of nodes in a network (Robust).
It can handle heavy traffic as compared to bus topology due to Token passing principal.
Ring topology provides good communication over a long distance.
The maintenance of ring network is much easier compared to the bus network.
There is no need of network server to control the flow of data.
Troubleshooting in ring network is much easier because cable faults can be easily located.
Ring network is less costly compared to the other topologies I.e. (mesh, hybrid, and tree topology).
Disadvantage of Ring Topology:
A single break in the cable can cause disturbance in the entire network
In Uni-directional Ring, a data packet (token) must pass through all the nodes.
Addition and removal of any node in a network is difficult and can cause issue in network activity.
Ring network is much slower than Ethernet network under normal load conditions.
https://computernetworktopology.com/ring-topology-advantages-disadvantages/

-Mesh Topology
In mesh topology, every device is connected to another device via particular channel.

Advantages of Mesh Topology :


Adding or removing any device is not effecting the network.
This creates a large source of data and useful information that many users connected to the network
can avail.
A fault is diagnosed easily.
Good in security and privacy.
It is relatively power efficient.
Disadvantages of Mesh Topology :
In case of wired network, it required cables in bulk.
Overall cost of this network is way too high as compared to other network topologies.
Installation can be more difficult.
https://www.orosk.com/mesh-topology/
-Tree Topology
Conjunction with the characteristics of the bus, the device connects the cap cable the smaller
computer and to Twisted pair cable is often used.

https://i0.wp.com/computernetworktopology.com/wp-content/uploads/2019/03/tree-topology.jpg?
resize=688%2C544&ssl=1
Advantages of Tree Topology
It is a mixture of bus and star topology, as leaf nodes can add more nodes in the hierarchical chain, this
provides high scalability.
If one of their nodes gets damaged, other nodes in a network are not affected. This provides easy
monitoring and detection of faults.
Supported by a number of vendors of hardware and software.
For individual segments, point-to-point wiring.
Disadvantages of Tree Topology
Compared with star and bus topology, broad cabling is required.
The whole network breaks on the failure of a node.
It is very difficult to configure the tree network than other topologies of the network.
https://computernetworktopology.com/tree-topology/
-Hybrid Topology

This is simply a topology that refers to the case of the use of more than one topology. Ti is a
combination of the topology of stars and rings.

https://www.researchgate.net/profile/Zulfiqar_Ali58/publication/329420203/figure/fig2/AS:7004644
29547536@1544015142903/Hybrid-Network-topology.jpg
Advantages
Used to create larger networks It is easy to detect large volumes of fault

Disadvantages
It is difficult to install and configure more costly than other topologies.
The effect of current technology, connectivity and norms on the network:
OSPF: is a routing protocol that is commonly used either by a single network or a group network for a larger
network. It is planned by the task force for Internet Technology. It can also be used as a protocol for gateways.
FTP: File Transfer Protocol (FTP) is mainly a standard network protocol used to transfer data from client to host or
from server to server. When a user or administrator wants to upload a file to a website, they need a username,
password, and host address.
SMTP: Simple protocol for mail transfer is like a media that transfers e-mail. SMTP operates with POP3 support at
all times.
TCP / IP: a group of protocol stacks is the Transmission Control Protocol and the Internet Protocol. It's basically
different protocol towing. TCP / IP is intimately linked to FTP, SMTP, and HTTP.
-Data Communications
• Signal transmission
• Telephone line sending and receiving information
• Encoding, interfacing, signal integrity, multiplexing, etc. Networking
• Topology & architecture for interconnecting devices
• Communications system networks
Bandwidth:
Bandwidth is the ability of a wired or wireless network communication link to transmit, in a given amount of
time, the maximum amount of data from one point to another over a computer network or internet connection
— usually one second.
Bandwidth, synonymous with capacity, describes the rate of data transfer. Bandwidth is not a network speed
calculation — a common misconception.
Average load expected; peak load expected; availability of local internet; cost constraints, performance.
• Average load expected; peak load expected; availability of local internet; cost constraints, performance.
The effect of the criteria for network bandwidth:
• Bandwidth affects how long it takes for the Internet to download or upload information. A link with plenty of
bandwidth available offers a user experience that is seamless and sensitive. The more bandwidth available, the
quicker data can be transferred; furthermore, this imposes the rule of rising returns. Once you have enough
bandwidth, there is no further effect on Internet efficiency.

P3 Discuss the operating principles of networking


devices and server types.
There are many types of tools for networking: Hub, Switch, Bridge, Router and Gateway.

Hub:First is Hub, a Hub is a physical interface capable of connecting devices to share information. The
Hub will then send the message to the other devices that have linked to the Hub when a computer
sends a message to the Hub.

This is a very useful way of sharing information at work, especially in an office.
The system is the easiest and lowest priced.
Also known as the Repeater Multiport. Physical layer functions like Repeater.
Data transfer to all ports + Hubs
Hubs:- Cheap price
Also known as Multi-port Repeater-
Physical Layer works like Repeater-
Transfer of data for all connected ports

https://cdn.mos.cms.futurecdn.net/c49783c4a8e1ccd6691e1b50ba506b0d.jpg

Bridge:
A bridge is a type of computer network interface that connects to other bridge networks using the same 
protocol.
Bridge devices work on the Open System Interconnect (OSI) model's data link layer, linking and interacti
ng between two different networks. Bridges are similar to repeaters and hubs, transmitting data to each 
node.Nevertheless, bridges preserve the address table for media access control (MAC) as soon as new s
egments are found, and subsequent transmissions are sent to the receiver only.

http://alien.slackbook.org/blog/wp-content/uploads/2011/03/wrt54gl-300x211.jpg
 Router: A router is an Internet-connected device that communicates with your home devices. A typical
home has a number of internet-connected devices— personal computers, laptops, smartphones,
printers, thermostats, smart televisions, and more. These devices form a network with your router. A
router is the easiest and most effective way to manage incoming and outgoing Internet traffic on that
network.
The information traveling on your home network

could be an email, a movie, or a live feed from your baby cam, each of which takes up varying amounts
of bandwidth. Making sure that information is delivered quickly3 and correctly is a big task — and
getting bigger.
Gateway: A gateway is a computer network node (router), a main stop point for data on its way to or
from other networks. We can connect and send data back and forth thanks to gateways. Besides
gateways (as well as a lot of other hardware and software), the Internet would not be used to us.
The gateway is the device in an office that routes traffic from a workstation to the external network that 
supports the web pages. The gateway is the Internet Service Provider that gives you access to the whole 
Internet for basic internet connections at home.

https://cdn.shopify.com/s/files/1/1439/1668/products/usg_03_1024x1024.png?v=1475833310

Server type:

Web

File

Database

Virtualization

Mail

The operating principles of server types:


Application Servers

Application servers Application servers also referred to as middleware, and often connect the two,
occupy a large chunk of computing territory between database servers and end user.
Client Servers
A server in the client / server programming model is a program that receives and fulfills requests from cli
ent programs on the same or other computers.

FTP Servers
File Transfer Protocol, one of the oldest Internet services, enables one or more files to be securely
transferred between computers while maintaining data security and synchronization and transfer
control.

List Servers
List servers offer a way to better manage mailing lists, whether they are shared sites open to the public o
r lists with one-way ads.

Mail Servers
Mail servers distribute and store mail across corporate networks (via LANs and WANs) and nearly as
omnipresent and essential as web servers across the Web.
Open Source Servers
Open source software is a critical part of many IT infrastructures, ranging from your basic open source
server operating system to cloud software that will help you do your job.

Proxy Servers
Proxy servers sit between a client program (usually a web browser) and an external server (usually another web
server) to filter requests, improve performance, and share connections.

Real-Time Communication Servers


Real-time communication servers, commonly known as chat servers or IRC servers and sometimes referred to as
IM servers, allow large numbers of users to exchange information almost instantly.

Server Platforms
A term often used synonymously with the operating system, a platform is the underlying hardware or software of
the system and is thus the engine operated by the server.

Telnet Servers
A Telnet server enables users to connect to a host computer and perform tasks on the remote computer as if they
were running.

Virtual Servers
In 2009, the number of virtual servers deployed was higher than that of physical servers. Virtualization of the
server has become almost ubiquitous in the data center today. Server Watch examines the latest trends from
hypervisors to hybrid clouds in virtualization technology.

Web Servers
Definition: A computer running websites is a web server. It is a computer program that distributes as needed web
pages. The web server's basic goal is to store, process and provide users with web pages. Hypertext Transfer
Protocol (HTTP) is used to allow this intercommunication. Most of these web pages are static content, including
HTML documents, images, style sheets. Check and so on. In addition to HTTP, a web server also supports SMTP
(Simple Mail Transfer Protocol) and FTP (File Transfer Protocol) protocols for email, file transfer and storage.

Description: A web server's main role is to view the content of the website. If a web server is not publicly exposed
and used internally, it is considered an intranet server. When someone asks a website by adding the URL or
domain address to the address bar of a web browser (such as Chrome or Firefox) (such as
www.economictimes.com), the client sends a request to the Internet to access the correction. This address's web
page. A Domain Name Server (DNS) translates this URL to a Web Server address (for example 192.168.216.345).
P4 Discuss the inter-dependence of workstation
hardware with relevant networking software.
Network software is an extremely broad term for a range of software aimed at the design and
implementation of modern networks. Various types of network software support the creation,
calibration and operation of networks.
In using network software, the size and scope of a network plays a key role in decision making.
Companies or other parties can choose specific network software tools for setup and installation. Other
network software resources help administrators and security personnel to monitor a network to protect
it against a range of attacks, to prevent data breaches, or to limit unauthorized access. Other tools help
to make network operations work better.
Another category of network software is related to network virtualization. With new virtual networks,
various tools take the place of old legacy systems built on physical hardware setups.
In general, network software must be applied according to security needs. This can include factors such
as whether a network is attached to the global Internet as well as specific goals and objectives for use.
https://www.techopedia.com/definition/4317/network-software
2.Overview of hardware and software
Recall that information systems contain both hardware and software. Hardware is the part of an
information system you can touch — the physical components of the technology. Computers,
keyboards, disk drives, iPads, and flash drives are all examples of information systems hardware.
Software is the set of instructions that tells the hardware what to do. When programmers create
software programs, what they are really doing is simply typing out lists of instructions that tell the
hardware what 0are many types of application software as well. For example, word processing or
spreadsheet applications are productivity software, and antivirus programs installed on a computer are
an example of utility software.
3. The relationship between hardware and software
Essentially, computer software controls computer hardware. These two components are
complementary and cannot act independently of one another. In order for a computer to
effectively manipulate data and produce useful output, its hardware and software must work
together. Without software, computer hardware is useless. Conversely, computer software
cannot be used without supporting hardware. Similarly, computer software has to first be
loaded into the computer’s hardware and then executed. There are several categories of
software, with the two main categories being operating-system software, which makes the
hardware usable, and application software, which does something useful. Examples of operating
systems include Microsoft Windows on a personal computer and Google’s Android on a mobile
phone. Examples of application software are Microsoft Excel and Angry Birds.

https://www.sophia.org/tutorials/the-relationship-between-hardware-and-software
P5: Design a networked system to meet a given
specification.
 This is my idea of a LAN.
First floor :i Have a Staff manager room and bussiness room 2 Switch and one severs and 3 admin pc , 8 pc and
3 printer

Second floor I Have a lab room one switch and 23 pc

Third floor: I have student room . Room in student class have 22 pc and one switch
First floor

Equipment Quality Numbers Price for each The price of


quantity
Cable 200 Feet High Speed Cat5 X5 28$ 140$
Cat5e RJ45 Patch Ethernet
Network Internet DSL Cable
(200 FT, Black) for PC, Mac,
Laptop, (US Seller),.., By
Cable N Wireless,USA

Pc - CPU: Intel Core i3-9100 X56 380$ 21,280$


(3.60 GHz - 4.20 GHz / 6MB /
4 core, 4 Thread)
- RAM: 1 x 4GB DDR4
2666MHz
- VGA: Intel UHD Graphics
630
- storage: 1TB HDD 7200RPM
Switch Switch TP-Link TL X5 78$ 390$
SG1024D 24-Port Gigabit

Router Router Linksys X2 230$ 460$


WRT1900ACS 

Printer CANON LBP 2900 X3 150$ 450$

Server Dell PowerEdgeR430 (E5- X2 3625$ 7250$


2620/8GB/1*2T SAS/optical
drive/4 backplane/3 years on-
site service)
Total 29970$

P6 Test and evaluate the design to meet the


requirements and analyse user feedback.
Performance Test:
Quality testing is the method of evaluating a workloaded system, network, software program or unit's
speed, responsiveness and stability. Quality testing may require comprehensive laboratory testing or may
occur in the manufacturing environment of a specific scenario.
Performance tests include:

 Software
 Network configuration
 Hardware
 Tools

We need a clear plan and reasonable calculations to test this stage is quite complicated
Performance metrics are to be determined
 response time.
 Constraints.
 State the conditions for successful operation.
Planning and performance test design

 Calculate each circumstance and case if there is a sudden increase or decrease in the consumer
and data. Therefore, to handle each situation, we need two or more versions.

This test may takes 1 month or maybe longer depend on your resource.

Stress test:
Stress testing is described as a form of software testing to verify the system's stability and reliability.
This test primarily tests the machine under extremely heavy load conditions for its robustness and error
handling.

Stress testing is also extremely valuable for the following reasons:

To check whether the system works under abnormal conditions.

Displaying appropriate error message when the system is under stress.


System failure under extreme conditions could result in enormous revenue loss

It is better to be prepared for extreme conditions by executing Stress Testing.

Types of Stress Testing:


Following are the types of stress testing and are explained as follows:

Distributed Stress Testing: Testing is done on all server clients in distributed client-server systems. Stress
server's function is to distribute a collection of stress tests to all stress clients and monitor the client's
status. The server adds the client's name and starts sending data for testing after the client contacts the
server.

Meanwhile, lient machines, meanwhile, send a signal or heartbeat that it is connected to the server. If
no signals from the client computer are provided by the server, it needs to be further examined for
debugging. A server may connect to the 2 clients (Client1 and Client2) from the figure, but it can not
send or receive a Client 3 signal.

Night run is the best way to run these scenarios for stress testing. Large server farms need a more
efficient method to assess which machines have suffered stress failures to examine.

System Stress Testing: This test focuses on identifying data locking and blocking vulnerabilities, network
problems and performance gaps in a system

Transactional stress testing: stress testing is conducted between two or more applications on one or
more transactions. It is used to fine tune and optimize the device

Systemic Stress Testing:


This is integrated stress testing which can be tested across multiple systems running on the same server.
It is used to find defects where one application data blocks another application.

Exploratory stress testing: This is one of the methods of stress testing used to test the system for specific
criteria or situations that are unlikely to take place in a real scenario. It is used in unforeseen situations
such as:

 A large number of users logged at the same time


 If a virus scanner started in all machines simultaneously
 If Database has gone offline when it is accessed from a website,
 When a large volume of data is inserted to the database simultaneously

Stress Testing process can be done in 5 major steps: • Planning the Stress Test: Here you collect data
from the system, evaluate the system, identify the stress test objectives. (this take about 1 day) • Create
Automation Scripts: You develop the automatic stress test scripts in this process, generate the test data
for the stress scenarios. (this • Script Execution: In this stage, you run the Stress testing automation
scripts and store the stress results. (this can take 2 to 3 day) • Results Analysis: After completion, the
results of the stress test are evaluated and bottlenecks are identified. • Tweaking and optimizing: at this
stage, you are fine-tuning the system, changing the configuration, optimizing the code with the desired
benchmark. (This also takes 2 days to make sure that everything is all right) Eventually, you run the
whole cycle again to determine that the desired results were accomplished through the changes. For
example, it is necessary to have 2 to 3 cycles of the stress test process to achieve the performance goals .

Failure Test It is a way to gauge the capacity of a system in order to ensure whether a system is capable
of allocating extra resource. The entire process is an effort to create a backup system. Failover Testing
aims to verify that a system is efficiently handling extra resource like additional CPU or servers during a
failure.

Step 1: Data Collection The first step in a root cause failure analysis is data collection. During this step,
NTS will collect information about how the device failed and when it occurred. We will also work with
you to determine your goals for the failure analysis examination, determine how the part should
operate, and consult with additional subject matter experts, if needed.(this may take 1day to complete
depend on the numbers of devices)

We will be conducting tests on the product being analyzed during this phase. Checking a representative
sample of failed devices and those that work properly is normal. This can help determine which
components will malfunction and when the failure will occur. If necessary, in checking for malfunction
analysis, we prefer non-destructive tests. It helps to provide the most accurate data for the consumer
and is more cost-effective. Sometimes the diagnosis of failure involves cross-sections of the material or
thermal monitoring. We carry out these tests later in the data collection process in these cases.

Step 2: Analyze Data Collected to Determine Root Cause Failure Determining the root cause of the
failure is the next step in the failure analysis process. Device failure is seldom the outcome of a single
incident. Our experience has shown that even a "fast" failure has multiple inputs. It means that there
are often different ways of preventing potential loss. Consider this example of an electronic device
failure. An organization has received customer complaints of a device short circuiting periodically and
contracts with NTS to conduct a root cause failure analysis. Electronic failure analysis tests show the
component short circuits because depending on where the metal in the part is located the metal used is
of the wrong hardness. (this will take 2 days)

Step 3: Determining Corrective Actions For most companies, the most important part of a root cause
deficiency report is assessing corrective actions. You will provide a comprehensive report on both the
causes and effects of system failure when using NTS for root cause analysis. NTS can also provide
recommendations for troubleshooting. (this only take 1 day)

In some cases, we find that failure occurs when customers use a device for too long or in the wrong
operating conditions. In these cases, our recommendations might include additional product education
for marketing and sales staff. These employees can then provide this information to customers. This
prevents device failures from improper use or application. We can also help you determine whether
corrective action is needed. It is inappropriate for some companies to determine the economic costs of
fixing unusual product failure. When system failure is uncommon and has minimal effects, it may be
more cost-effective to repair failed components than to alter the production process. Checking for
failure detection will give you the information you need to make an informed decision .
ToTal Time like 4 days

P7: Implement a networked system based on a


prepared design.

P7-quan-trong-2.pkt

P8 Document and analyse test results against


expected results. Add failure test
I will first perform the performance test. I randomly select any computer, then ping that computer to
another computer on another floor.
Here's how:
I would choose PC 46 located on the 3rd floor, ping to PC35 on the 1st floor

I will first go to (pc 46) select (office) then select (command prompt)
then enter the ping + command line with the number I defined for the machine 35
I will choose PC0 on the 2nd floor instead of PC 35 to make sure I can ping each room and there are no
errors.

Steps similar to above and here will give the maximum results:
I will continue to check if I can connect to the Internet:
Here is the implementation:
I will choose pc46 as a template. First go to Pc46 and select the desktop, then select the web browser
Then enter the server address
Here's the result
After the performance test, I went to the Stess test.
The stages of the stress test are as follows:
I will choose any 2 -> (PC 52) (pc4)
then I go to PC52 to select the desktop, the next step select it (command prompt) and enter the
command line ping -t number PC4

press the ctrl c key to complete the command


failure test
The following test goes to the failure test stage
To complete this test, you must turn off the router and schedule a ping to any computer to another
room and another floor.

I turned off the router


I chose (pc 14) 3rd floor and (pc 26) on the 2nd floor to do this test

I went to PC 14 to choose the desktop (command prompt), then I entered the ping command and the
number of computers defined for PC 26

Here's the result


I chose (pc 0) 3rd floor and (pc 37) on the 2nd floor to do this test

I went to PC 0 to choose the desktop (command prompt), then I entered the ping command and the
number of computers defined for PC 37

Here's the result


If you try another result, choose two machines from the same ping floor to try and get the result that
you will be able to ping.
I will choose computer 38 and computer 34
When I turned on the router, I performed the ping test from floor to floor

I will choose 2 machines on a different floor to take the test


Reference
(1)Techopedia.com. (2019). What is a Local Area Network (LAN)? - Definition from Techopedia. [online] Available at:
https://www.techopedia.com/definition/5526/local-area-network-lan [Accessed 30 Dec. 2019].
(2) Anon, (2019). [online] Available at: https://image.shutterstock.com/image-vector/lan-local-area-network-
one-600w-1450373921.jpg( [Accessed 30 Dec. 2019].
(3) Techopedia.com. (2019). What is a Wide Area Network (WAN)? - Definition from Techopedia. [online] Available at:
https://www.techopedia.com/definition/5409/wide-area-network-wan [Accessed 30 Dec. 2019].
(4) Previews.123rf.com. (2019). [online] Available at:
https://previews.123rf.com/images/sergeyvasutin/sergeyvasutin1708/sergeyvasutin170800105/85424239-
vector-red-wan-word-with-blue-linear-icons-on-white-background-round-web-banner-concept-of-wide-
area.jpg [Accessed 30 Dec. 2019].
(5) Techopedia.com. (2019). What is Metropolitan Area Network (MAN)? - Definition from Techopedia. [online]
Available at: https://www.techopedia.com/definition/8238/metropolitan-area-network-man [Accessed 30 Dec.
2019].
(6) Freecram.com. (2019). [online] Available at:
https://www.freecram.com/uploads/CISA/c03b75821e6a12b9554a60dca7e2edf2.jpg [Accessed 30 Dec. 2019].
(7) Techopedia.com. (2019). What is a Storage Area Network (SAN)? - Definition from Techopedia. [online] Available
at: https://www.techopedia.com/definition/1116/storage-area-network-san [Accessed 30 Dec. 2019].
(8) Ars.els-cdn.com. (2019). [online] Available at: https://ars.els-cdn.com/content/image/3-s2.0-
B9780124046276000075-f07-13-9780124046276.jpg [Accessed 30 Dec. 2019].
(9) 1.bp.blogspot.com. (2019). [online] Available at: https://1.bp.blogspot.com/-wCyt7C1_JpM/WpnWUqzx-
9I/AAAAAAAAAEk/fJ7HKFs35aUKaARdXJIpR5kJrZPW50_0ACLcBGAs/s1600/main-qimg-
7fcbfda26c33c2aa41403290410a3242-c.jpg [Accessed 30 Dec. 2019].
(10) Omnisecu.com. (2019). What is Bus Toplogy, Advantages and Disadvantages of Bus Topology. [online] Available
at: http://www.omnisecu.com/basic-networking/network-topologies-bus-topology.php [Accessed 30 Dec.
2019].
(11) Encrypted-tbn0.gstatic.com. (2019). [online] Available at: https://encrypted-tbn0.gstatic.com/images?
q=tbn:ANd9GcSZyto632GJ94YlLLRF7IQnyzdxK8FcuxAgNSTIVb2bFOfGpWbe [Accessed 30 Dec. 2019].
(12) Definitions, S. and Hope, C. (2019). What is Star Topology?. [online] Computerhope.com. Available at:
https://www.computerhope.com/jargon/s/startopo.htm [Accessed 30 Dec. 2019].
(13) Computer Network Topology. (2019). What is Ring Topology? | Advantages & Disadvantages of Ring Topology.
[online] Available at: https://computernetworktopology.com/ring-topology-advantages-disadvantages/
[Accessed 30 Dec. 2019].
(14) Orosk.com. (2019). Buy Organic YouTube Views Services at best price - SKTMED.com. [online] Available at:
https://www.orosk.com/mesh-topology/ [Accessed 30 Dec. 2019].
(15) I0.wp.com. (2019). [online] Available at: https://i0.wp.com/computernetworktopology.com/wp-
content/uploads/2019/03/tree-topology.jpg?resize=688%2C544&ssl=1 [Accessed 30 Dec. 2019].
(16) Computer Network Topology. (2019). What is Tree Topology? Advantages & Disadvantanges of Tree Topology.
[online] Available at: https://computernetworktopology.com/tree-topology/ [Accessed 30 Dec. 2019].
(17) Anon, (2019). [online] Available at:
https://www.researchgate.net/post/How_can_we_access_to_journals_impact_factor_2019_in_excel_format
[Accessed 30 Dec. 2019].
(18) Cdn.mos.cms.futurecdn.net. (2019). [online] Available at:
https://cdn.mos.cms.futurecdn.net/c49783c4a8e1ccd6691e1b50ba506b0d.jpg [Accessed 30 Dec. 2019].
Alien.slackbook.org. (2019). [online] Available at: http://alien.slackbook.org/blog/wp-
content/uploads/2011/03/wrt54gl-300x211.jpg [Accessed 30 Dec. 2019].
Cdn.shopify.com. (2019). [online] Available at:
https://cdn.shopify.com/s/files/1/1439/1668/products/usg_03_1024x1024.png?v=1475833310 [Accessed 30
Dec. 2019].
Guru99.com. (2019). What is STRESS Testing in Software Testing? Tools, Types, Examples. [online] Available at:
https://www.guru99.com/stress-testing-tutorial.html?
fbclid=IwAR0CXr4ykWbkcROEnk3U73xDaOnEuj0XQAePIF9qRMV923ERjK07y0RSjuY#2 [Accessed 30 Dec.
2019].

You might also like