Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 27

networking design and implementation for bio tek company

Unit 9: Networking

2022
HND Digital Technologies GBS
Student:
Tutor:Word
David Oyebisi
Count: x,xxx

Jan 2022 Cohort – Group A1 or B1


Table of Contents
Introduction........................................................................................................................................5
Part 1: Networking Principles, Protocols and Operations for BioTek.................................6
Functional benefits and constraints Network........................................................................6
Types of Networks......................................................................................................................6
Network benefits and constraints..............................................................................................6
Network Standards.....................................................................................................................6
Network topologies......................................................................................................................6
Types network topologies..........................................................................................................6
Types of network topologies......................................................................................................6
Advantages and disadvantages network topologies..............................................................7
Impact of network topology........................................................................................................7
Network standards and protocols............................................................................................7
Common networking principles.................................................................................................7
Network standards and protocols.............................................................................................7
Networking devices......................................................................................................................7
Network devices..........................................................................................................................7
End devices.................................................................................................................................7
Relationship between network hardware and software......................................................8
Network Server..............................................................................................................................8
Types of Network Server...........................................................................................................8
Recommendation of topology for BioTek Company............................................................8
Part 2: Design and Implementation of BioTek Network System...........................................8
Network Design.............................................................................................................................8
Network Design Goal for Bio Tek..........................................................................................8
Network Diagram and Evaluation and Testing..................................................................9
Installation and configuration of Network Services.........................................................9
Network Maintenance Schedule..........................................................................................10
Network Implementation...........................................................................................................10
Network Testing..........................................................................................................................10
Conclusion and recommendations............................................................................................12
References.......................................................................................................................................13

pg. 1
STUDENT NAME AND ID NUMBER

Pearson BTEC Level 4 Higher National Certificate


Qualification
in Digital Technologies (General)

Academic Year 2021-2022

Unit Number & Name Unit 9: Networking

Unit Leader David Oyebisi

Unit Lecturer David Oyebisi, Marzieh Farahani

Network Design and Implementation for BioTek


Assignment Title
Company

Type of Assignment Report

Weighting 100%

Issue Date Week Commencing 25/04/2022


05/08/2022
Formative Submission Date (5th August at 14:00 using Formative submission
link on Moodle).
19/08/2022
Summative Submission Date (19th August at 14:00 using Summative
submission link on Moodle).

David Oyebisi, Marzieh Farahani, Teza Soe,


Assessor
Kayode Adenuga

IV name Sunita Kotta

pg. 2
Student Declaration

This is to confirm that this submission is my own work, produced without any external help

except for acceptable support from my lecturer. It has not been copied from any other

person’s work (published or unpublished) and has not previously been submitted for

assessment either at GBS or elsewhere. I confirm that I have read and understood the

‘GBS Academic Good Practice and Academic Misconduct: Policy and Procedure’ available

on Moodle.

I confirm I have read and understood the above Student Declaration.

Student Name (print)

Signature

Date

Report: Covering LO1 and LO2


Networking Principles, Protocols and Operations for BioTek
Report: Covering LO3 and LO4
Design and Implementation of BioTek Network System

pg. 3
Introduction

pg. 4
Part 1: Networking Principles, Protocols and Operations for BioTek

Functional benefits and constraints Network

A network is a set of devices that are connected by physical connection in way to exchange data
and share resources like links, nodes of a communication network. Network topology can be used
to define or describe the arrangement of various types of telecommunication networks, including
command and control radio networks, industrial field busses and computer networks.

Types of Networks

Networks are divided into categories based on their characteristics, but in this section will only
analyse the advantages and disadvantages of three domain types:

 LAN (Local Area Network)

LAN network is a group of devices connected together in a certain area such as school, hospital,
office. The server is used to provide services to workstations.

The devices in the LAN can exchange information and transfer data easily to each other, can use the
same devices as printers, high data transfer rates, low installation costs and administration simple
network (Using server-workstation model).

However, LAN connection range is small, can only be used in offices, buildings and Workstations can
only use services provided by the server.

 WAN (Wide Area Network)

WAN network has unlimited distance connection. Commonly used in multinational companies. They
don’t connect individual routers but interconnect other networks like LANs or MANs. WAN can be
public or operated by companies in order to link different locations over long distances.

pg. 5
MAN (Metropolitan Network)

A metropolitan area network (MAN) is a computer network that connects computers within a
metropolitan area, can be a single large city, towns, or any given large area with multiple
buildings. MAN is larger than a local area network (LAN) but smaller than a wide area
network (WAN). MANs do not have to be in urban areas, the term ‘metropolitan’ implies the
size of the network, not the demographics of the area that it serves.

Network benefits and constraints

 LAN Network:

Advantages:
o Since data is stored on a local server, it can be guaranteed to be secure;
o Another type of sharing made easy here is the Software sharing. A single computer with
the licensed software can be shared among other users in the network;
o Sharing of resources such as hard disk drives, DVD drives and Printers are made easy
in Local Area Network;
o For the purpose of identification, each computers on the LAN is assigned with a MAC
address.
Disadvantages:
o Even though LAN saves lots of money in terms of resource sharing, the initial cost
involved in setting up the network is quite high;
o Since it is rather easy to gain access to programs and other types of data, security
concerns are a big issue in LAN;
o LAN often faces hardware problems and system failure;
o LAN is usually made to cover up a limited distance (up to 10km)

pg. 6
 WAN Network:
Advantages:
o Is providing a connectivity over a long distance or large geographical area;
o It support global market and global business;
o Message can be sent very quickly to anyone else on the network;
o Many WAN providers offer business-class support. That means you get a specific
amount of uptime monthly, quarterly, or yearly as part of your SLA
Disadvantages:
o Is difficult to maintain because is an complex network;
o Since WAN has more technologies combined to each other, it faces more security issues
comparing to LAN and MAN
o Is also very costly because we have to pay every time for transferring data;
o Very much dependency on third party because it is a public network;

 MAN Network:
Advantages:
o When you use MAN, the speed of data transfer between computers is faster and more
cost-effective
o A MAN can use available private networks and shared public resources like the Internet,
which makes it cost-effective in many applications enterprise ethernet metropolitan area
network uses.
o MAN is a good way to use the Internet, especially when you want to connect to LAN
computers to avoid using a WAN Network
o If you want to create a wireless network for your computer or mobile phone in your living
room, you can use MAN for that purpose
o MAN provides a single point of failure, but it can prevent an entire network from taking a
break if the original router fails

Disadvantages:
o The MAN Network is limited in the number of connected devices, and there are some
devices that cannot be connected to a MAN.
o Many network tools do not support MAN. For example, Citrix and ArcView do not support
MAN
o MAN is relatively cheap to set up and maintain. However, the cost of using MAN is
higher than using WAN
o MAN does not have the function that can dynamically control the route between
computers. For example, if you want to use an IP address in MAN, you must manually
assign a route to each computer
o MAN has a few network cards, and you cannot use MAN with over two network cards

pg. 7
Network Standards:

Network protocols are a set of rules, conventions, and data structures that dictate how
devices exchange data across networks.
In other words, network protocols can be equated to languages that two devices must
understand for seamless communication of information, regardless of their infrastructure and
design disparities.

Network topologies

Network topology is the way that the nodes on a network are organized in relation to one
another.
In other words, a network topology is a mapping that shows the routes that devices use to
communicate with each other via a network.
With the insights provided by network topology, teams are in a stronger position to trace the
flow of data within a network, troubleshoot networking performance problems, identify
network segments that are likely to lead to traffic bottlenecks and so on.

Types of network topologies

There are two types of network topologies:

 Physical
Physical topology emphasizes the physical layout of the connected devices and nodes, while
the logical topology focuses on the pattern of data transfer between network nodes.
This is one of the types of network topology that provides the layout of computer cables and
other network devices.

pg. 8
 Logical
This topology provides information about the physical design of a network.
Different types of Physical Topologies are:
1. P2P Topology
2. Bus Topology
3. Ring Topology
4. Star Topology
5. Tree Topology
6. Mesh Topology
7. Hybrid Topology

Peer to Peer (P2P): network is a type of network in which two or more computers connect
without any centralized server. Each computer in P2P behaves like a client and server. Each
computer share resources and use resources of other computers in the network.

Bus Topology: All the devices/nodes are connected sequentially to the same backbone or
transmission line. This is a simple, low-cost topology, but its single point of failure presents a
risk.

pg. 9
Ring Topology: All network devices are connected sequentially to a backbone as in bus
topology except that the backbone ends at the starting node, forming a ring.
Ring topology shares many of bus topology's disadvantages so its use is limited to networks
that demand high throughput.

Star Topology: All the nodes in the network are connected to a central device like a hub or
switch via cables.
Failure of individual nodes or cables does not necessarily create downtime in the network
but the failure of a central device can.
This topology is the most preferred and popular model.

pg. 10
Tree Topology: A root node is connected to two or more sub-level nodes, which themselves
are connected hierarchically to sub-level nodes. Physically, the tree topology is similar to bus
and star topologies; the network backbone may have a bus topology, while the low-level
nodes connect using star topology. Mesh Topology: The topology in each node is directly
connected to some or all the other nodes present in the network. This redundancy makes
the network highly fault-tolerant but the escalated costs may limit this topology to highly
critical networks.

Mesh Topology: In a mesh topology, each device is linked to every other device on the
network through a devoted point-to-point link. When we say dedicated it means that the link
only brings data for the two linked devices just.

Hybrid Topology: A combination of any two or more network topologies. Instances can
occur where two basic network topologies, when connected together, can still retain the
basic network character, and therefore not be a hybrid network. For example, a tree network
connected to a tree network is still a tree network. Therefore, a hybrid network accrues only
when two basic networks are connected and the resulting network topology fails to meet one
of the basic topology definitions.

pg. 11
Advantages and disadvantages network topologies

Peer to Peer:

 Advantages
o No single point of failure.
o Scalable bandwidth and storage. Unlimited and Automatic; It’s a
distributed decentralized architecture; Nodes get added, as more and
more people interact with your data.
o Zero data storage and bandwidth costs, you don’t have to shell out money
to corporations for storing your data.
o No third-party intervention, data is secure. Share only with friends you
intend to share with.
o It’s an open neutral platform with all the nodes having equal privileges, no
corporate intervention.

 Disadvantages
o Though P2P file transfer is getting safer over time with encryption and
stuff still malware can be bundled with the files you download and can
spread through your device.
o Copyrighted content can be easily distributed there is no control over it.
o If all the nodes are offline your data is unavailable.

Bus Topology:

 Advantages
o Easy to set up, handle, and implement.
o Best-suited for small networks and costs less.

o Disadvantages
o The cable length is limited. This limits the number of network nodes that
can be connected.
o This network topology can perform well only for a limited number of
nodes. When the number of devices connected to the bus increases, the
efficiency decreases.
o It is suitable for networks with low traffic. High traffic increases load on the
bus, and the network efficiency drops.
o It is heavily dependent on the central bus. A fault in the bus leads to
network failure.
o It is not easy to isolate faults in the network nodes. Each device on the
network "sees" all the data being transmitted thus posing a security risk.

pg. 12
Ring topology:

 Advantages
o The data being transmitted between two nodes passes through all the
intermediate nodes.
o In comparison to a bus a ring is better at handling load.
o A central server is not required for the management of this topology.
o The traffic is unidirectional and the data transmission is high-speed.
o The adding or removing of network nodes is easy, as the process requires
changing only two connections.
o The configuration makes it easy to identify faults in network nodes

 Disadvantages

o There is heavy dependency on the wire connecting the network nodes in the
ring.
o The failure of a single node in the network can cause the entire network to
fail.
o Data sent from one node to another has to pass through all the intermediate
nodes. This makes the transmission slower in comparison to that in a star
topology.
o The movement or changes made to network nodes affect the entire
network's performance.
o The transmission speed drops with an increase in the number of nodes.

Star Topology:
o Advantages

o Data packets do not have to pass through many nodes like in the case of a
ring network. Thus with the use of a high-capacity central hub traffic load can
be handled at fairly decent speeds.
o It also achieves isolation of each device in the network.
o Due to its centralized nature the topology offers simplicity of operation.
o Adding or removing network nodes is easy, and can be done without
affecting the entire network.
o Due to the centralized nature it is easy to detect faults in the network
devices.
o As the analysis of traffic is easy the topology poses lesser security risk.

 Disadvantages

o The setup cost is quite high.

pg. 13
o Network operation depends on the functioning of the central hub. Hence,
central hub failure leads to failure of the entire network.
o Also, the number of nodes that can be added, depends on the capacity of the
central hub.

Tree Topology:
o Advantages
o The tree topology is useful in cases where a star or bus cannot be
implemented individually. It is most-suited in networking multiple departments
of a university or corporation where each unit (star segment) functions
separately and is also connected with the main node (root node).
o The network can be expanded by the addition of secondary nodes. Thus
scalability is achieved.
o The advantages of centralization that are achieved in a star topology are
inherited by the individual star segments in a tree network.
o Each star segment gets a dedicated link from the central bus. Thus failing of
one segment does not affect the rest of the network.
o Fault identification is easy.

o Disadvantages
o Owing to its size and complexity maintenance is not easy and costs are high.
Configuration is difficult in comparison to that in other topologies.
o As multiple segments are connected to a central bus the network depends
heavily on the bus. Its failure affects the entire network.
o Though it is scalable the number of nodes that can be added depends on the
capacity of the central bus and on the cable type.

Mesh Topology:
o Advantages
o The arrangement of the network nodes is such that it is possible to transmit
data from one node to many other nodes at the same time.
o Point-to-point contact between every pair of nodes makes it easy to identify
faults.
o It can handle heavy traffic as there are dedicated paths between any two
network nodes.
o The failure of a single node does not cause the entire network to fail as there
are alternate paths for data transmission.

o Disadvantages

pg. 14
o The arrangement where in every network node is connected to every other
node of the network many connections serve no major purpose. This leads to
redundancy of many network connections.
o Owing to its complexity the administration of a mesh network is difficult.
o A lot of cabling is required and the costs incurred in setup and maintenance
are high.

Hybrid Topology:

 Advantages

o Scalability is one of the reasons it is so popular in the networking field.


o In hybrid topology, it works well even after increasing the traffic.
o This network topology is easy to upgrade and new equipment can be added
to it.
o The size of this network topology can be increased at any time.

 Disadvantages
o Designers often have a hard time trying to come up with a plan to lay down
the network.
o It involves a lot of equipment, as a result of which a lot of electric power is
required.
o If there is a problem with the network hub the network does not work
properly.
o The design of this topology is very difficult.

Impact of network topology

Importance of network topology Helps us better understand the networking concepts. Plays
a crucial role in performance. Helps reduce the operational and maintenance costs such as
cabling costs. A network topology is a factor in determining the media type to be used to
cable a network.

How important topologies are for networks? The star and extended star are the most
popular topologies for Ethernet networks. This type network is easy to setup, relatively
inexpensive, and provides more redundancy than other topologies, like bus topology.
Within this framework, each node is independently connected to a central hub via a physical
cable thus creating a star-like shape. All data must travel through the central node before it
reaches its destination.

pg. 15
Which topology network is the most reliable? Mesh network is the most stable and reliable
topology. Mesh networks are resistant to failure because of the large degree of
interconnectivity. There’s no single point of failure. Even if a node or two fails the network
won’t go down.
Network standards and protocols

 OSI Model:

The Open Systems Interconnection Model (OSI model) was designed by the
International Organization for Standardization (IOS) as a reference model for open
communication through various technical systems.
The OSI model is the result of such standardisation attempts and, as conceptual
framework, offers a design basis for creating communication standards independently of
manufacturers.
In order to achieve this, the OSI model subdivides the complex process of network
communication into seven levels, also referred to as layers
o Physical Layer - Provide Physical medium to Transfer bits
o Data Link Layer – Deliver Error free Transfer Data Frames
o Network Layer – Send Packets from Source to Destination Point
o Transport Layer – Produce reliable message delivery from process to process
o Session Layer – Using to establish, manage, and terminate sessions
o Presentation Layer – Responsible for translation, compression and encryption
o Application Layer – Provide services to all users

 TCP/IP Model
IEEE

pg. 16
TCP/IP Model is a more optimized and practically implemented model. It has taken the
reference from the OSI Model and put a lot of emphasis on accuracy.
It includes several steps that ensure the data sent from one host to another host must
reach on without any failures, or in the case, failure or loss of data happens then It
doesn’t need to retransmit the whole data. Instead, it only sends the incorrect data or
the data.
And to achieve this, there are a lot of excellently designed algorithms that run behind to
make this possible.

As an example let’s suppose, there are two hosts (computers) Host A and B. And Host
A wants to send 10MB of data to Host B. For this, According to TCP/IP Model Protocols,
the data is divided into small pieces and then it will be sent. 1MB each, But it is not
necessarily that it will be of fixed size and 1MB. Packets sizes are mostly in KB
(KiloByte).
TCP/IP Model is a practically implemented version of the OSI Model. Although layers
are different in TCP/IP Model in comparison with the OSI Model. The layers are grouped
according to the task performed by each layer.
o Network Interface layer
o Internet Layer
o Transport Layer
o Application Layer

Common networking principles

Recent estimations of the number of hosts attached to the Internet show a continuing growth
since 20 years.
However, although the number of hosts attached to the Internet is high, it should be
compared to the number of mobile phones that are in use today. More and more of these
mobile phones will be connected to Internet.
Furthermore thanks to the availability of TCP/IP implementations requiring limited resources
such as uIP we can expect to see a growth of TCP/IP enabled embedded devices.

pg. 17
Network standards and protocols

Computer networks are used to allow several hosts to exchange information between
themselves.
In order to allow any host to send messages to any other host in the network, the easiest
solution is to organise them as a full-mesh with a direct and dedicated link between each
pair of hosts.
Such a physical topology is sometimes used, especially when high performance and high
redundancy is required for a small number of hosts.

Protocols are necessary for effective communication and include:


• Common language and grammar
• An identified sender and receiver
• Confirmation or acknowledgment requirements
• Speed and timing of delivery
Protocols used in network communications also define:
• Message encoding
• Message Size
• Message Formatting and Encapsulation
• Message Timing
• Message delivery options

Protocols and standards are what make networks work together. Protocols make it possible
for the various components of a network to communicate with each other. Standards also
make it possible for network components manufactured by different companies to work
together.
Protocols are important for networking because they are the standard that describe how
Certain devices (host) Communicate and exchange data.
Each subnet in a larger Network have unique Subnet address. Devices (Host) Connected
through hubs and switches are on the same Subnet.

Networking devices

Basic elements of a computer network include hardware, software, and protocols. The
interrelationship of these basic elements constitutes the infrastructure of the network.

pg. 18
Computer networking devices are units that mediate data in a computer network and are also called
network equipment. Units which are the last receiver or generate data are called hosts or data
terminal equipment.

Network devices

 Repeater:

A repeater is an electronic device that receives a signal and retransmits it so that the signal can
cover longer distances without degradation. Because repeaters work with the actual physical
signal, and do not attempt to interpret the data being transmitted, they operate on the physical
layer, the first layer of the OSI model

 Hub:

Hub is connecting computers together in a star topology network. Hubs operate in the physical
layer of the OSI model and have no intelligence.

 Modem:

Modem (modulator-demodulator) is a device that turns the digital 1s and 0s of a personal


computer into sounds that can be transmitted over the telephone line of Plain Old Telephone
Systems (POTS) and once received on the other side converts those sounds back into a form
used by a USB, Ethernet, serial, or network connection.

 Bridge:

A bridge is a class of network device that is designed to connect networks at OSI Level 2 which is
the data link.

 Wireless access point:

A wireless access point can be WAP or AP like a device that allows wireless communication
devices to connect to a wireless network using Wi-Fi, Bluetooth or related standards. WAP
usually connects to a wired network and can relay data between the wireless devices (such as
computers or printers) and wired devices on the network

 Router:

The router accepts network packets, looks at the destination address on each packet, then
sends that packet in the direction that gets that packet one hop closer to it's destination. If it
doesn't know where to send a packet it generates an error packet back to the sender.

pg. 19
End devices

End-device meaning A source or destination device in a networked system. For example a


user’s PC is an end device and so is a server. Network switches, routers and other
equipment work in between to enable messages to travel from one end device to the other.

Relationship between network hardware and software

When we are asked to imagine a computer system we generally think of a box known as a
monitor, keyboard, mouse, and some electronic cables.
But computers are much more than this. A computer system consists of two important parts
known as hardware and software.
The part of a system that we can touch, feel and see is known as hardware. The software is
a part of a computer system that can’t be seen, touched or feel but it tells the computer
system how to operate the hardware.

What is a hardware?
Hardware is a physical part of the computer that can be felt, touched, and houses various
other parts of a computer system. For example, memory, processors, peripheral devices,
etc. Hardware is tangible. Every system requires hardware to execute the desired function of
software and store the information.

Hardware Hardware can be divided into 4 groups


- Input Devices
- Output Devices
- Internal Components
- Secondary Storage Devices

What is software?
Software is a set of instructions that tells a computer to perform a specific task or set of
tasks. The software can be classified into various categories depending on the nature of the
source code, accessibility and the basis of applications.

pg. 20
Types of Software
Two major of type networks are:
- System Software
- Application Software
 At the same time, discuss the interdependence of terminal hardware in
conjunction with relevant software in relation to application availability, cost of
ownership and other critical factors that can impact the network performance.

dependence of workstation hardware with relevant networking software.

Network Server

Types of Network Server

explore a range of server types and justify the selection of a server, considering the
given scenario regarding cost and performance optimisation.

Recommendation of topology for BioTek Company

In the proposed network for BioTek, identify the topology protocol selected for the
efficient utilisation of the networking system…

Part 2: Design and Implementation of BioTek Network System

Network Design

Network Design Goal for Bio Tek

Scalability:

Availability:

pg. 21
Manageability

Security

Network Diagram and Evaluation and Testing

Network Components

Static IP configuration of the Server

pg. 22
End Device Network Device Cables

Describe the network type and topology used, benefits etc

Testing of network design may include:

Verify that your design meets the key business and technical goals

Justify LAN and WAN technology and device selection

Identify possible connectivity problems

Analyse the effects of network link failures on performance

Identify risks that may hinder implementation

etc

https://www.ccexpert.us/network-design-2/chapter-12-testing-your-network-design.html

Installation and configuration of Network Services

Install and configure your network. Also include network services. DHCP; static vs dynamic IP
addressing etc.

Screenshots

Network Maintenance Schedule

Develop a network maintenance schedule for the network

You may want to use table

Tasks Maintenance Schedule Checking Schedule

(day/week/Month)

Fault Management

Configuration
Management

Accounting

pg. 23
Management
Security
Management

Network Implementation

Screenshots of your implantation

investigate test results against expected results.

Network Testing

Use network commands Ping, IPConfig, Tracert. PathPing etc. to test your network
Screenshots of your test results

pg. 24
Conclusion and recommendations

Conclusion
Use critical reflection to evaluate your network design, installation, configuration, and testing
procedure for the given scenario, while justifying the valid conclusions.

pg. 25
References

pg. 26

You might also like