Professional Documents
Culture Documents
Nguyenvanthinh BKC13107 N01K13
Nguyenvanthinh BKC13107 N01K13
UNIT TITLE: 2
ASSIGNMENT NUMBER: 1
SUBMISSION DATE:30/10/2022
1
Summative Feedback:
Internal verification:
2
Table of Contents
(P1) Discuss benefits and constraints ofidifferent network types and standards ......................................... 1
Network protocol .................................................................................................................................. 1
Purpose ofihaving a network .................................................................................................................... 1
File and data sharing- ............................................................................................................................ 1
Resource sharing- .................................................................................................................................. 1
Internal communications- ..................................................................................................................... 2
There are two main network types which are widely used ..................................................................... 2
➢ Peer to peer .................................................................................................................................. 2
➢ Client server .................................................................................................................................. 2
Peer to peer network-........................................................................................................................... 2
Client server network- .......................................................................................................................... 3
Cloud server- ......................................................................................................................................... 3
Cluster Server- ....................................................................................................................................... 4
Centralized server- ................................................................................................................................ 5
Virtualized server- ................................................................................................................................. 5
Network standards ................................................................................................................................ 6
TCP/IP .................................................................................................................................................... 6
Network standards ................................................................................................................................ 7
BAN (body area network)- .................................................................................................................... 7
IEE802.15.6 limitations.......................................................................................................................... 8
PAN (personal area network)- .............................................................................................................. 8
LAN (Local area network)...................................................................................................................... 9
MAN (metropolitan area network)- .................................................................................................... 10
WAN (wide area network) .................................................................................................................. 11
Limitations for WAN............................................................................................................................ 11
Explain the impact of network topology communication and bandwidth requirements (P2) ....................... 11
Bus topology........................................................................................................................................ 12
Ring topology ...................................................................................................................................... 13
Features ofiring topology .................................................................................................................... 14
Advantages ofiring topology ............................................................................................................... 14
Disadvantages ofiring topology........................................................................................................... 14
3
Star topology ....................................................................................................................................... 14
Features ofistar topology .................................................................................................................... 15
Advantages ofistar topology ............................................................................................................... 15
Disadvantages ofistar topology........................................................................................................... 15
Mesh topology .................................................................................................................................... 15
Features ofimesh topology ................................................................................................................. 16
Advantages ofimesh topology............................................................................................................. 16
Disadvantages ofimesh topology ........................................................................................................ 16
Tree topology ...................................................................................................................................... 16
Features ofitree topology ................................................................................................................... 17
Advantages ofitree topology............................................................................................................... 17
Disadvantages ofitree topology .......................................................................................................... 17
Compare common networking principals and how protocols enable the effectectivness of networked
systems(M1)................................................................................................................................................ 17
IPv4 ...................................................................................................................................................... 17
IPv6 ...................................................................................................................................................... 18
FTP ....................................................................................................................................................... 18
HTTP .................................................................................................................................................... 18
SMTP.................................................................................................................................................... 18
Discuss operating principals of networking devices and server types (P3) .................................................. 19
Switch- ................................................................................................................................................. 19
Router- ................................................................................................................................................ 19
Wireless access point .......................................................................................................................... 20
Firewall ................................................................................................................................................ 21
Content filter ....................................................................................................................................... 22
Modem ................................................................................................................................................ 23
Packet shaper ...................................................................................................................................... 24
Vpn concentrator ................................................................................................................................ 25
Server types ........................................................................................................................................ 26
Print server .......................................................................................................................................... 27
File server ............................................................................................................................................ 27
Web server .......................................................................................................................................... 28
4
Email server ......................................................................................................................................... 28
Networking software........................................................................................................................... 28
Client software .................................................................................................................................... 28
Server software ................................................................................................................................... 28
Client operating system ...................................................................................................................... 28
Server operating system ..................................................................................................................... 29
Discuss the interdependence of workstation hardware with relevant networking software (P4) ................. 29
Workistations - .................................................................................................................................... 29
Network interface cards - ................................................................................................................... 29
Server- ................................................................................................................................................. 29
Interconnection devices -.................................................................................................................... 30
Connectors and cabling Leased line cable -......................................................................................... 30
Network media types -........................................................................................................................ 30
Software .............................................................................................................................................. 32
Commercial systems- .......................................................................................................................... 33
System bus .......................................................................................................................................... 33
Local system architecture ................................................................................................................... 34
Explore a range of server types and justify selection of server considering a given scenario (M2) ............. 35
Identify the topology protocol selected for the efficient utilization of a networking system (D1) ............... 37
Written step by step plan on how you are going to design a Local Area Network(P5) ................................. 38
Justification ofithe topology that is used for the networkiis bus topology........................................ 39
Blueprint of the networkisystem ........................................................................................................ 40
Justification ofidevices used for the networki .................................................................................... 40
2. Router- ........................................................................................................................................ 43
3. Cloud- .......................................................................................................................................... 44
4. Server- ......................................................................................................................................... 47
Internal connections ........................................................................................................................... 50
Install and configure network services and applications (M3) ..................................................................... 50
Document the test results and analyze them against expected results (P8) ................................................ 58
Email .................................................................................................................................................... 63
Produce a test plan evaluate the design for the requirements bandwidth(P6) ............................................... 64
Implement a networked system based on your prepared design(P7) ............................................................ 65
5
Group work ......................................................................................................................................... 65
Network design ................................................................................................................................... 65
a) Installing window server 2003 .................................................................................................... 65
a) Set the time zone ........................................................................................................................ 69
b) Configuring network adapter ...................................................................................................... 70
a) Installing active directory ............................................................................................................ 71
Create the domain .............................................................................................................................. 72
Recommend potential enhancements for the networked systems (M4) ....................................................... 84
Implement monitoring and automation ............................................................................................. 84
Implementing a wireless router .......................................................................................................... 85
Discuss significance upgrades and security requirements in your network design : ........................... 85
Use critical reflection to evaluate own work and justify valid conclusions(D3) ........................................ 87
References ................................................................................................................................................... 87
6
(P1) Discuss benefits and constraints ofidifferent network types and standards
What is networking? A computer network is the procedure
ofiexchanging information from one computer to another this
information is shared through nodes which are connected to each other
nodes are identifies as network addresses. data can be shared in two
ways it can either be wirele ss or wired for example WIFI oriusing a
cable. Different types ofinetworks
Network protocol
Network protocols are official standards and policies compromised
ofirules measures and forma ts that describe communication between
two or more devices over a network. Network protocol s govern the
end to end processes ofiappropriate secure and managed data or
network communi cation
➢ Peer to peer
➢ Client server
2
➢ Files and resources are not centrally organized into a specific
shared area they are stored on individual computers and might
be difficult to locate ifithe computers owner doesn’t have a
logical filing system.
Client server network-
This is a computer network which is centralized with a powerful
computer (called the server) is hub to which many less powerful
personal computers or workstations (called clients) are conne cted the
clients run programs and access data which is stored on the server.
Advantages oficlient server network
3
smartphones and devices whic h is a great way to ensure no one
is left out.
Disadvantages oficloud server
➢ Loss oficontrol you’re are essentially trusting another party to take care
ofiyouridate you r trusting that they will maintain their data centers and
servers with the same care as you would some find the lack ofiin house
control ofithe server unnerving.
➢ Technical issues ifiyou experience any technical issues you have no choice
but to call yo ur hosted providers technical support for help because you
won’t be able to fix cloud co mputing issues in-house.
➢ Low connection does not work well ifithe connection is sluggish.
The quality oficloud c omputing servers is one ofithe most vital
contemplations before we decide to provide cloud computing
serveriservice providers. When the serveriis down or the
permorma is not good, we will be damaged because ofipoor
serveriquality.
Cluster Server-
These are computers that are connected to each other and operate
closely to act as a single comp uter. The performance ofia cluster
server can match that ofian expensive computer or sometimes even
resulting in supercomputer capabilities. Basically clusteringiis the
connectivity ofitwo or more servers in order to make it work like one.
Advantages oficluster servers
➢ You can add resources to the cluster afterwards because they are completely
scalable.
➢ Ifione serveriis down, you will be able to fix it while handing the
load to the otheriserver s that means that worked won’t be
stopped.
➢ Simplified management: Clustering simplifies the management
ofilarge or fast rising sys tems.
Disadvantages oficluster servers
➢ The cost for clustering servers is very high because you need
really good hardware and a very good design.
➢ Since clustering is done on two or more servers monitoring them
and maintenance is ver y hard and time consuming.
➢ Sever clustering is not flexible because not all server types can
be clustered many applic ations do not support the clustered
design.
4
Centralized server-
This is a server which acts as the agent foriall communications this
server stores both communi cations and useriaccount information.
Advantages ofia centralized server
5
➢ Management virtual environments need to be instantiated
(create examples on virtual ma chines), monitored, arranged
and saved. There are products that deliver those explanatio ns,
but this is the field in which they are the largest investments in
the area ofivirtualizati on.
Network standards
Networkingistandards describe the rules for data communications that
are needed for interopera bility ofinetworking technologies and
processes. Standards help in creating and maintaining open markets
and allow different vendors to compete on the basis ofithe quality
ofitheiriproducts w hile being compatible with current
marketiproducts.
OSI ia an ISO standard dor worldwide commumnication that defibes a
net working framework for implementing protocols in seven layers.
Control is passed from one layer to the next, beginning from the
application layer (7) down to Presentation Layer (6) down to Session
Layer (5) down t o Transport Layeri(4) down to Network Layer (3)
down to Data - Link Layer (2) down to Physical Layer (1) and back up
the hierarchy.
TCP/IP
TCP/IP id the most commonly used network protocol worldwide and
all nodes connected to the Internet use it. TCP/IP consists ofithe 3 main
protocols
TCP (Transmission Control Protocol- TCP is a standard that
characterizes
how to set up and keep up a system discussion by means o fiwhich
application projects can trade data. TCP works with the Internet
Protocol (IP), which ch aracterizes how PCs send packets ofidata to
each other.
6
Network standards
BAN (body area network)-
this is the interconnection ofimultiple computingidevices worn on or
implanted on a person’s b ody. Examples ofiBAN devices are
smartwatches, heads up display and also mobile medical de vices which
have sensors to monitor data like blood pressure, heart rate. The
network standard f or BAN is IEEE802.15.6TM this network standard
is designed to address and compensate for th e effects ofia body on
network performance.
Benefits ofiBAN (body area network)
➢ With the help ofibody area network and its standards its very
7
beneficial in the medical se ctor because it has sensor nodes
which help in monitoring health conditions each node is able
oficapturing physiological data it also helps in longiterm health
monitoring.
➢ Assists the communication between individual and machine.
➢ Used in military for security purposes
Disadvantages ofiBAN
➢ Battery life
➢ Wired network restriction between body movement
➢ Lack ofiintegration sensors
IEE802.15.6 limitations
8
Advantages ofiPAN
➢ You don’t need any wires for personal area network you only
need Bluetooth to start sha ringidata to those devices
➢ Many devices can be connected to one device at the same time
➢ It’s very easy to
Limitations ofiPAN
Most Bluetooth devices, especially those that run on battery power, are
Class 2 Bluetooth devic es. Class 2 devices have a range ofiabout 10
meters, oriaround 30 feet.
Bluetooth devices work with the 2.4 GHz radio band, which is the same
unlicensed frequency u sed by many other wireless devices. Ifimany
devices in the same area are all using the same stre tch ofibandwidth, it
can lead to general network problems, as the signals collide and
information has to be resent
LAN (Local area network)
This is a group oficomputers and peripheral devices that share common
communication lines or wireless link to a server within a distinct
geographic area. Its network standard is IEEE802.11.
9
Advantages ofiLAN
10
Disadvantages ofiMAN
WAN (wide area network)- This is a network that exists over a large scale
geographical area
Advantages ofiWAN
➢ Centralized data you won’t need to buy email files and backup
servers they can all resid e on head office.
➢ Global business everyone with computer skills is able to do business on the
internet
➢ High bandwidth ifiyou get leased lines for your company then
it gives you a high bandw idth
Disadvantages ofiWAN
Logical topology
Physical topology
Bus topology
Bus topology is a network type in which every computer and network
device is connected to sin gle cable. When it has precisely two
endpoints, then it is called Linear Bus topology.
➢ It is cost effective.
➢ Cable compulsory is least compared to other network topology.
➢ Used in small networks.
➢ It is easy to understand.
➢ Easy to enlarge joining two cables together.
Disadvantages ofiBus topology
➢ Cables fails then the entire network fails.
➢ Ifinetwork traffic is heavy or nodes are more the performance ofithe network
reductions.
➢ Cable has a limited length.
➢ It is slower than the ring topology.
Ring topology
It is called ring topology since it forms a ring as each computer is
connected to additional comp uter, with the last one connected to the
first. Precisely two neighbors for each device.
13
Features ofiring topology
➢ The transmission is unidirectional, but it can be made
bidirectional by consuming 2 conn ections among each
Network Node, it is called Dual Ring Topology
➢ Data is transferred in a consecutive manner that is bit by bit.
Data transmitted, has to pas s through each node ofithe
network, till the destination node.
14
Features ofistar topology
➢ Each node has its own devoted connection to the hub.
➢ Hub acts as a repeater foridata flow.
➢ Can be used with twisted pair, Optical Fiber or coaxial cable.
Advantages ofistar topology
➢ Fast performance with insufficient nodes and low network traffic.
➢ Hub can be promoted easily.
➢ Easy to troubleshoot.
➢ Easy to setup and adapt.
➢ Only that node is affected which has failed, rest ofithe nodes can work
easily.
Disadvantages ofistar topology
➢ Cost ofiinstallation is expensive.
➢ Expensive to use.
➢ Ifithe hub flops, then the whole network is stopped because all
the nodes depend on the hub.
➢ Performance is founded on the hub that is it depends on its size
Mesh topology
It is a point-to-
15
point connection to other nodes or devices. All the network nodes are connected to
each other.
16
Features ofitree topology
➢ Ideal ifiworkstations are positioned in groups.
➢ Used in Wide Area Network
Advantages ofitree topology
➢ Allowance ofibus and star topologies.
➢ Increase ofinodes is possible and easy.
➢ Easily managed and maintained.
➢ Error discovery is easily done.
Disadvantages ofitree topology
➢ Deeply cabled.
➢ Expensive.
➢ Ifimore nodes are added maintenance is difficult.
➢ Central hub fails, network fail
Compare common networking principals and how protocols enable the
effectectivness of networked systems(M1)
IPv4
IPv4 (Internet Protocol Version 4) is the fourth revision ofithe Internet
Protocol (IP) used to to i dentify devices on a network through an
addressing system. The Internet Protocol is designed fo r use in
interconnected systems ofipacket-
switched computer communication networks. Used to connect devices
to the Internet.it uses a 3 2-
17
bit numeric address and the number can range from 0 to 255(its written
in decimal form ofiwhic h it consists ofifourinumbers separated by
decimals).
IPv6
this is the updated version ofiIPv4 and also replaces the IPv4.
IPv6 is a routable protocol that is accountable for the addressing,
routing, and breaking ofipacke ts by the sending host.
HTTP
Hypertext TransferiProtocol (HTTP) is aniapplication-
level protocol used to ask for and transferisite pages between a server
and program. HTTP is the founding ofiinformation communication
for the World Wide Webi.
SMTP
simple mail transfer protocol it’s a protocol used to send mails in a
dcp/ip network without this protocol we wouldn’t be able forward our
emails across networks it works carefully with mail tr ansfer agent.
SMTP offers a set oficodes that shorten the communication ofiemail
messages bet ween email servers.
18
Discuss operating principals of networking devices and server types (P3)
Switch-
switch allows devices to communicate to each other. joins computer’s
together within one local area network. Switches connect multiple
devices on a network, similar to a hub.
Router-
19
the gadget that is used to interface a LAN with a web association is
called Router. Basically a r outer moves packets from one network to
another.
20
Firewall
A firewall is a system designed to stop illegal access to or from a private
network. You can imp lement a firewall in either hardware or software
form, or a mixture ofiboth. Firewalls stop unaut horized internet users
from accessing private networks connected to the internet, particularly
int ranets.
21
Content filter
Content filtering is the use ofia program to screen and/oriexclude
access to web pages or email deemed offensive. Content filtering is
used by corporations as part ofitheir firewalls.
22
Modem
This a network device that both modulates and demodulates analog
carrier signals (called sine w aves) for encoding and decoding digital
information for processing. Modems achieve both ofith ese tasks
concurrently and, for this reason, the term modem is a combination
23
ofi"modulate" and "demodulate."
Packet shaper
The packet shaperiis a device that assembles in amongst the campus
network and the outside net work. All inward and outward traffic passes
through it. Its determination is to classify the traffic passingithrough,
and prioritize that traffic based on rules that we define.
24
Vpn concentrator
A VPN concentrator is a type ofinetworking device that delivers secure
creation ofiVPN connec tions and distribution ofimessages between
VPN nodes.
25
Server types
26
Print server
A print server is a computer that can process print-
related jobs on a network oficomputers. Print servers areiconnected to
a computer network in co mmand to serve the need for printing jobs
in a network that may containimore than one printer. A print server
usually allows users in a computer network to perform a printing job
without having to move files to the computericonnected directly to the
printer. Also known as printer server or network printer, (although the
latter is actually one ofithe properties ofithe print server)
File server
File server is a device that panels access to separately stored files, as
part ofia multiplier system, a file server is a computer attached to a
network that has the primary purpose ofiproviding a loc ation for shared
disk access.
27
Web server
A web server is a system that transports content or services to end
users over the internet. A we b server consists ofia physical server,
server operatingisystem and software used to ease HTTP
communication
Email server
An email server, or simply mail server, is an application oricomputer
in a network whose only p urpose is to act as a virtual post office. The
server stores incomingimail foridistribution to local users and sends
out outgoing messages. This uses a client-
serveriapplication model to send and receive messages using Simple
Mail Transfer Protocol (S MTP).
Ifithis software is not used in the system then the programs will not be
able to run, and the serve r will not be able to process any data.
A decent example oficlient software is drop box, Microsoft Azure and Oracle
database.
Server software
Serverisoftware is a type ofisoftware that is intended to be used,
operated and managed on a co mputing server. It delivers and enables
the harnessingiofiunderlying server computing power for use with an
array ofihigh-end computing services and functions
Interconnection devices -
Interconnection devices are devices that are capable ofigiving
computers the ability to transfer data on a network. Examples
ofiinterconnection devices include the network interface card, net
work bridges, switches and routers. The network interface card (or
NIC for short) is the network adapter that all devices must have in
order to be part ofia network
Connectors and cabling Leased line cable -
A leased line, also known as a dedicated line, connects two locations
for private voice and/or da ta telecommunication service. A leased line
is not a dedicated cable; it is a reserved circuit betw een two points. The
leased line is always active and available for a fixed monthly fee.
Leased lines can span short orilong distances. They maintain a single
open circuit at all times, a s opposed to traditional telephone services
that reuse the same lines for many different conversa tions through a
process called switching
STP cable-
STP stands for Shielded Twisted Pair. It’s a type oficopper telephone
wiring in which each ofit he two copper wires that are twisted together
are coated with an insulating coating that function s as a ground for the
wires. The extra covering in shielded twisted pair wiring protects the
trans mission line from electromagnetic interference leaking into or out
ofithe cable. STP cabling ofte n is used in Ethernet networks, especially
fast data rate Ethernets.
Category 5(CAT 5) –
Normally referred to as an Ethernet cable or LAN cable, a Cat 5 or
category 5 is a network cab le that contains ofifour twisted pairs
oficopper wire finished by an RJ-
45 connector. Cat 5 has a maximum length ofi100m, exceedingithis
length without the aid ofibri dge or other network device could cause
network issues.
UTP-
This is cable that is normally referred to as unshielded twisted pair
cable these cables are comm only used in the computer and
telecommunications industry as Ethernet cables. Unshielded mea ns
no additional shielding like meshes or aluminum foil, which add bulk,
are used. UTP cables are often groups ofitwisted pairs grouped
together with color coded insulators, the number ofiw hich depends on
the purpose
Wireless-
Wireless networks are computer networks that are not connected by
cables ofiany kind. The us e ofia wireless network allows enterprises
to evade the expensive process ofiintroducing cables i nto buildings
or as a connection between different equipment locations
31
Mobile technology-
Mobile technology is a technology which is used for cellular
communication. Before there was no mobile technology to help people
communicate easily but nowadays people can easily comm unicate with
one another there are various mobile technologies for example there is
apple, Sams ung. With the technology nowadays you are able to
connect to wireless internet and Bluetooth y ou can communicate with
people easily on social media once you’re are connected to wireless i
nternet and you can easily share information over Bluetooth. There is
3Giand 4G
3G stands forithe third generation and 4G stands for the fourth
generation and 4G connection is much faster than a 3Giconnection.
Standards
802.2,802.3and 8025
These are standards
that include cables
Bluetooth/802.15
Wireless standard for devices that have short range
ofiwireless connection 802.11
This is the wireless
standard for routers
3G and 4Gi
These are mobile technology standards
Software
Network operating system-
This is a software that allows numerous computers to communicate,
share files and hardware d evices with one another. Previous versions
ofiMicrosoft Windows and Apple operating systems were not designed
for single computeriusage and not network usage.
Virus checker- This a component ofian anti-
virus software package that scans a hard drive for viruses and other
harmful items. These progra ms are made for various operating systems,
32
and scanning methods can be manual or automatic e xample ofithis anti-
virus programs are Kaspersky, vast antivirus.
Firewall-
A firewall is software used to keep the security ofia private network.
Firewalls block unauthori zed access to or from private networks and
are often employed to prevent unauthorized Web use rs or illicit
software from gaining access to private networks connected to the
Internet. Foriexam ple, firewalls are normally used in schools and
colleges to block students from accessing some s ites.
Commercial systems-
Commercial software is any software or program that is intended and
developed for licensing o r sale to end users or that assists a commercial
purpose. Commercial software was once conside red to be branded
software, but now a number ofifree and open-
source software applications are licensed or sold to end users. There
areivarious commercial sys tems here are few examples. Windows,
Linux, Mac os.
server os
System bus
The system bus is a pathway composed oficables and connectors
used to transmit data between a computer microprocessor and the
main memory. The bus provides a communication path for t he data
33
and control signals movingibetween the major components ofithe
computer system. The system bus works by combiningithe functions
ofithe three main buses: namely, the data, addres s and control buses.
Each ofithe three buses has its separate characteristics and
responsibilities.
The system bus combines the functions ofithe three main buses, which are as
follows:
1. The control bus carries the control, timingiand coordination
signals to manage the variou s functions across the system.
2. The address bus is used to specify memory locations for the data being
transferred.
3. The data bus, which is a bidirectional path, carries the actual
data between the processor, the memory and the peripherals.
Without the memory one will not be able to store any data in the
system and data will be displa yed in the system.
34
ofiprocessor: Xeon, Intel
CoreI7 and
I/O devices: an input output device are used for communicating with
the computeriwhere one is able to send and receive data from the
computer.
Without the I/O devices one will not be able to access any data or
35
Virtualization server is a virtualization method that includes dividing a
physical server into a nu mber ofismall, virtual servers with the help
ofivirtualization software. In server virtualization, ea ch virtual server
runs multiple operating system instances at the same time.
I would choose the database server for the chosen scenario because
Database Serverigives new meaning to the word performance in the
client/server world. Performance developments are achi eved
primarily by reducinginetwork traffic, intelligently maintaining
database files, and providin g intelligent lock management. When
associated to otherileading serverisolutions, Advantage D atabase
Server offers exceptional performance without the overhead
associated with other SQL- based database management systems. The
cost will be it will cost around $499 dollars and the r eason why I
choose a database server is because for the given scenario being a
college having a database server will be helpful for looking for student
records. The Operating system requireme nt for the database server is;
Microsoft SQL
Server 2008 R2
Server 2005 R2
SP2
32-bit and 64-bit English Microsoft SQL Server 2008, standard and enterprise
editions
32-bit and 64-bit Oracle™ 10g Release 2 (10.2.0.2 and higher),
standard and enterprise editions 32-bit and 64-bit Oracle 11g Release
Protocol
37
The Ethernet deals with the low level Physical
The topology that Iiwill use in the scenario will be bus topology.
Written step by step plan on how you are going to design a Local Area
Network(P5)
Scenario:
BKACAD is a company specializing in providing information technology services. In the process of
development, the company is growing stronger and has a new branch.
The head office is in building A and the servers are located in the same building and most of the
administration, sales, human resources and management functions are supported in building A. The branch is
located in building B, has a limited number of employees. Both buildings are located in the same facility.
About the network:
The company's branch network has grown without proper planning. The LAN cabling in both offices is Cat5e
Ethernet. The office complex provides an Ethernet link between the two buildings.
The current network is a flat network design with minimal redundancy. A small wireless LAN is occasionally
used by several project managers with laptops and guests at Building B.
38
NETWORK TYPES:
LAN(local area network)
A well-designed LAN will provide consistent, high quality service to
every device attached to the netw ork, no matter its size. Likewise, the
network must be able to provide continuous access to funct
ions such as printing and file sharing. To make sure the network is
fast, efficient and secure, all these aspects should be planned in
advance
A Local Area Network provides connectivity to a relatively small
group ofiusers in a single buil ding, office oricampus. It also typically
connects to the global Internet through a gateway server
, which acts as the main defense against unauthorized access to
network resources. With all this in mind, the main consideration in the
early stages ofiLAN planning is what size it will be and what services
it will provide. While a LAN featuring ten nodes can be set up in as
little as one d ay, a larger network is a bigger undertaking.
Justification ofithe topology that is used for the networkiis bus topology
It is easy to connect a device to the network.
Ifithe computer or peripheral has the appropriate connection device,
then it can be easily added t o the network. The new device connects
to the linear bus topology and becomes part ofithe net work
immediately. For those who need a temporary network that can be
setup quickly, there isn ’t a better option that is available right now.
Ifiseveral users need mutual access to a printer, add ingithe printer to
the network meets that need immediately.
The failure ofione station does not affect the rest ofithe network.
Ifione computer or peripheral should fail when using bus topology, the
rest ofithe network is not affected by this change in performance. The
linear nature ofitheinetwork means that each unit t ransmits to the
backbone and that data is then available to the other units that remain
connected. This makes it an effective way to share uninterrupted
communication.
Extensions can be made to the network.
The size and scope ofibus topology is naturally incomplete. It can,
however, be extended quite e asily. Joining cable with a repeater or
connector allows for additional peripherals or computers t o be added
39
to the network. Although this can increase the number ofipacket
collisions that may occur, it is a simplified solution that can get
people up and working quickly and for a minimal o verall cost.
Multiple peripherals can be supported through bus topology.
Routers, printers, and other data devices can be connected to this
network in addition to comput ers or terminals. This can increase the
speed ofiproductivity because instead ofisending comman ds to a
centralized network, a command can be sent directly to the needed
peripheral. Since it’s a for a college multiple pheriphal devices will
be used therefore bus topology would work best.
Blueprint of the networkisystem
40
devices IP address Subnet mask Default gateway
1. PC-
This a machine or device that does processes, calculations and
operations based on instr uctions provided by a software or
hardware program. It is intendedito perform applications and
provides a variety ofisolutions by combining integrated
hardware and software co mponents.
41
42
2. Router-
This a device that examines the contents ofidata packets
transmitted within a network or to anotherinetwork. Routers
control whether the source and destination are on the same
network or whether data must be transferred from one network
type to another, which re quires summarizingithe data packet
with routing protocol header information for the new network
type.
43
3. Cloud-
This is a type service where cloud computing resources and
substructure are used to ret urn and manage data and services
which is done over the internet.
44
45
46
4. Server-
A server is a computer, a device oria program that is dedicated
to managing network res ources. Servers are often referred to as
dedicated because they carry out hardly any other tasks apart
from their server tasks.
47
5. Switch- In the context ofinetworking a switch is a high-
speed device that receives incoming data packets and redirects
them to their destination on a local area network (LAN)
48
49
Internal connections
The devices used in the network use dissimilar types oficonnection
fromithe wired to the wirele ss which include the following cables
Fiberioptic cable
An optical fiber cable is a type oficable that has a number ofioptical
fibers bundled together, wh ich are usually covered in their individual
protective plastic covers. Optical cables are used to tr ansfer digital data
signals in the form ofilight up to distances ofihundreds ofimiles with
higher t hroughput rates than those achievable via electrical
communication cables.
serial cable
a serial cable used to transfer information between two devices using
a serial communication protocol
Install and configure network services and applications (M3)
- Step 1:
+ Connect the devices depicted in the topology diagram, as well as any cables that are
required.
- Step 2:
50
+ Initialize and reload these devices back to their basic configurations if configuration
files were previously saved on the router and switch.
Router 3 :
Using router rip to route all vlan can media through router
ROUTER 6:
51
Configure router 6 similarly with router
Ad ip address
52
using DHCP to provide ip address automative.
SWITCH 0:
SWITCH 1:
SWITCH 2:
53
SWITCH 5:
SWITCH 6:
54
DHCP server:
55
DNS server:
Mail server:
56
File Transfer protocol server:
57
Document the test results and analyze them against expected results (P8)
Ping
58
The above result shows that the packets sent are 4 and the received
packets are 4 so it means that ping i s working correctly.
IPCOFING
The above result shows the default gateway address and the IP address for the
specific computer
IPCONFIG /ALL
59
The above result shows the IP address the subnet mask the default
gateway the DNS serves and the DH CP server.
Tracert
The above result shows the tracing route from one IP to another
DHCP server
60
The above snippet shows the DCHP server working and giving a PC an IP address
WEB
DNS server
61
The name of the DNS server is
(asignment.com) The address is
192.168.1.7
FTP SERVER
62
The web server is working and its using the IPiaddress 192.168.9.7
63
Produce a test plan evaluate the design for the requirements
bandwidth(P6)
64
Implement a networked system based on your prepared design(P7)
Group work
Network design
65
Step2: select typical and then click next
Step3: click disk image file then click browse and select window 2003 then click
next
66
Step4: enter the product key and type name
68
a) Set the time zone
69
Click start button and go to control panel and the select
there.
70
Enter IP address
Click next
71
Create the domain
Enter domain and clink next
72
As it show below the screenshot that active directory is installed
b) InstallingiDNS server
Click added or remove role then Click DNS server then next and
afterithat enter Zone name Ke nya
73
As it show below DNS was installed successfully
74
c) Installing DHCP server
Click Added or remove and select DHCP server then click next
75
Enter IP address and End IP address and then click next
76
As it show below DHCP is installed
77
Click next
Type the path to folder you want share or click browser to pick the folder and
Click window then new folder known it common pool then okay then click
nex
78
As it show below file server installed
79
In order to add groups in ADstep one click Manage user and computer click and
Then oshwal
.lan then click user
group
There are 2 main reasons for critical data loss: either there was no
backup or the media that was used failed to successfully capture the
data
80
information is being safely captured Anti-Virus Protection
Firewall Protection
We also require that our clients have adequate firewall protection that
keeps personal data in an d hackers out
81
Connections to surge protectors
Updates/System Optimization
Hard drive file organization is checked and any misplaced files are
moved to theiricorrect data f olders
Maintenance
82
trouble starts.
ServeriManagement
We will make sure that your server is
Management
Router Management
Array will ensure your router is configured properly to optimize
network performance andiensur e critical business systems run.
Asset Management
Array will work with you to review your corporate assets and develop
a lifecycle plan for both s oftware and hardware. This process will
ensure that each member ofiyour team is working with the right
technology that will increase workforce productivity.
During your auditing and mapping you might find specific security
vulnerabilities or ways in w hich you could increase security,
performance and reliability. Maybe you’ll run across an incorr ectly
83
configured firewall or maybe physical security threats.
84
to justif y replacing a switch but they are a bonus when upgrading
foriother reasons.
With the advancement ofiWireless routers, one does not need to have
any care or worry about t he surroundings, wireless routers whenever
they are able to work can give you a tremendous am ount ofispeed
without havingito have any wires attached to your device. All you
have to have is youridevice and you can move freely from one place
to the other, within the required range, wit hout having to worry about
anything, like the speed or the breakage oficonnection. You are give n
the option ofifree movement as well as the peace ofimind with the
latest technology ofiwireles s routers therefore students will be able
to use the PCs ofithe college from anywhere in the colle ge.
86
During your auditing and mapping you might find specific security
vulnerabilities or ways in which you could increase security,
performance and reliability. Maybe you’ll run across an incorrectly
configured firewall or maybe physical security threats.
Use critical reflection to evaluate own work and justify valid conclusions(D3)
Subsequent to planning and building this Framework , i observed that this
framework is exceptionally valuable and powerful for the organization's activity .
Here are the audits that i give in the wake of buiding the framework:
assist the chief with canning access data rapidly and anyplace , just there is the web
References
Available at: ComputerNetworkingNotes. (2018). Full Form of
Hardware and Networking Devices. [online] Available at:
https://www.computernetworkingnotes.com
87
reliability, n., n.d. [Online] Available at: Chapter 11 Network
reliability [online] sciencedirect.com. Available at:
https://www.sciencedirect.com/science/article/abs/pii/S092705070580
1288
https://www.networkworld.com/article/2175048/8-ways-to-improve-
wired-network-security.html
https://www.networkcomputing.com/networking/7-tips-upgrading-
your-network https://cordkuttersconnect.com/understanding-the-
advantages-and-disadvantages-of-wireless-routers/
88