Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
13 views115 pages

Networking Assignmentmy

This document outlines an assignment brief for a networking course at ESOFT Metro Campus, focusing on LAN design and implementation for Alliance Health. The assignment requires students to design a network architecture for a new branch, addressing specific requirements such as subnetting and connectivity. It includes guidelines for submission, assessment criteria, and internal verification processes.

Uploaded by

wofyy.store
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views115 pages

Networking Assignmentmy

This document outlines an assignment brief for a networking course at ESOFT Metro Campus, focusing on LAN design and implementation for Alliance Health. The assignment requires students to design a network architecture for a new branch, addressing specific requirements such as subnetting and connectivity. It includes guidelines for submission, assessment criteria, and internal verification processes.

Uploaded by

wofyy.store
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 115

Networking Assignment(my)

networking (ESOFT Metro Campus)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by wofyy. store
INTERNAL VERIFICATION – ASSIGNMENT BRIEF
Programme Title: HND in Computing
Assessor Name: Mr.Bevan
Internal Verifier Name:

Unit or Component Number and


Title: Unit 02 - Networking

Assignment title: LAN Design & Implementation for Alliance Health


Assessment criteria targeted by
this assignment brief: LO1, LO2, LO3, LO4

Is this an Authorised Assignment N/A


Brief published by Pearson? If so,
has it been amended by the
Assessor in any way? Please give
details.
(If using the Authorised Assignment Brief
‘off the shelf’ with no amendments, please
answer the question marked * in the
checklist only)

Has this assignment been Yes No


submitted to the Assignment
Checking Service?
(If Yes, please keep a copy of the ACS

feedback with this form)

INTERNAL VERIFIER CHECKLIST Y/N

Are the programme and unit details accurate? Y

*Are clear deadlines for assessment given? TBC

Is the time frame of an appropriate duration? Y

Is there a suitable vocational scenario or context? Y

Are the assessment criteria to be addressed stated accurately? Y

Does each task show which criteria are being addressed? Y

Do the tasks meet the assessment requirements of the unit/s? Y

Is it clear what evidence the learner needs to generate? Y

Is it likely to generate evidence that is valid and sufficient? Y

Overall, is the Assignment fit for purpose? Yes √ No


*If ‘No’ is recorded the Internal Verifier must recommend actions detailing the issues to be addressed. The Assessor
and the Internal Verifier must then confirm that the action has been undertaken and that the Assignment Brief is
authorised for use before being issued to learners.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 1

Downloaded by wofyy. store


Action required: Target Date for Date Action
(If none then please state n/a) Completion Completed

General Comments (if appropriate)

Assignment Brief Authorised for Use:

Internal Verifier signature Date

Assessor signature
Date

Lead Internal Verifier signature (if


appropriate) [email protected] Date 2022/06/13

M.A.NAJA MOHAMED
UNIT02−NETWORKING 2
E195225

Downloaded by wofyy. store


Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)
INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Programme title BTEC Higher National Diploma in Computing

MR.BEVAN
Assessor Internal Verifier
Unit 02: Networking
Unit(s)

Assignment title
LAN Design & Implementation for Alliance Health
M.A.NAJA MOHAMED
Student’s name
List which assessment criteria Pass Merit Distinction
the Assessor has awarded.

INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded match


those shown in the assignment brief? Y/N

Is the Pass/Merit/Distinction grade awarded


justified by the assessor’s comments on the Y/N
student work?
Has the work been assessed
Y/N
accurately?
Is the feedback to the student:
Give details:
• Constructive? Y/N
• Linked to relevant assessment criteria? Y/N
• Identifying Y/N
opportunities for improved
performance? Y/N
• Agreeing actions?
Does the assessment decision
Y/N
need amending?

Assessor signature Date

Internal Verifier signature Date


Programme Leader signature (if required)
Date

Confirm action completed


Remedial action taken
Give details:

Assessor signature Date

Internal Verifier
Date
signature

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 3

Downloaded by wofyy. store


Programme Leader
Date
signature (if
required)

M.A.NAJA MOHAMED
UNIT02−NETWORKING 4
E195225

Downloaded by wofyy. store


Higher Nationals − Summative Assignment Feedback Form
Student Name/ID M.A.NAJA MOHAMED/E195225
Unit Title Unit 02: Networking

Assignment Number 1 Assessor


17/08/2023 Date Received
Submission Date
1st submission
Date Received 2nd
Re-submission Date
submission

Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction P1 P2 M1 D1
Descripts

LO2 Explain networking devices and operations.


Pass, Merit & Distinction P3 P4 M2
Descripts

LO3 Design efficient networked systems.


Pass, Merit & Distinction P5 P6 M3 D2
Descripts

LO4 Implement and diagnose networked systems.


Pass, Merit & Distinction P7 P8 M4
Descripts

Grade: Assessor Signature: Date:

Resubmission Feedback:

Grade: Assessor Signature: Date:

Internal Verifier’s Comments:

Signature & Date:

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 5

Downloaded by wofyy. store


* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.

Assignment Feedback
Formative Feedback: Assessor to Student

Action Plan

Summative feedback

Feedback: Student to Assessor

Assessor Date
signature

Student Date
signature

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 6

Downloaded by wofyy. store


Pearson Higher Nationals in
Computing
Unit 02: Networking
Assignment 01

General Guidelines

1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 7

Downloaded by wofyy. store


2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.

Word Processing Rules

1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.

Important Points:

1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body
except for the before mentioned compulsory information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness,
you may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non−submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in−text citation
and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could
be reduced to A REFERRAL or at worst you could be expelled from the course

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 8

Downloaded by wofyy. store


Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct form. I further understand what it means to
copy another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of Pearson UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my own,
and where I have made use of another’s work, I will attribute the source in the correct way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Pearson, UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.

Student’s Signature: Date:


(Provide E-mail ID) (Provide Submission Date)

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 9

Downloaded by wofyy. store


Higher National Diploma in Computing
Assignment Brief
Student Name /ID Number M.A.NAJA MOHAMED/E195225

Unit Number and Title Unit 2: Networking

Academic Year 2022/23

Unit Tutor

Assignment Title LAN Design & Implementation for Alliance Health

Issue Date 22/05/2023

Submission Date 17/08/2023

IV Name & Date Networking/2023-08-17

Submission format

The submission should be in the form of an individual report written in a concise, formal business
style using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using
Harvard referencing system. Please also provide an end list of references using the Harvard
referencing system. The recommended word count is 3,000–3,500 words for the report excluding
annexures,
although you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:

LO1 Examine networking principles and their protocols.

LO2 Explain networking devices and operations.

LO3 Design efficient networked systems.

LO4 Implement and diagnose networked systems.

M.A.NAJA MOHAMED
UNIT02−NETWORKING 10
E195225

Downloaded by wofyy. store


Assignment Brief and Guidance:

Scenario

Alliance Health is a technology−enabled solutions company that optimizes the revenue cycle of the
US healthcare industry where its global delivery center is located in Colombo. The company is
planning to expand their business operations with their latest branch at Matara and wants it to be
one of the state−of−the−art companies in Matara with the latest facilities.

Assume you have been appointed as the new network analyst of Alliance Health to plan, design
and restructure the existing network. Prepare a network architectural design and implement it
with your suggestions and recommendations to meet the company requirements.
The floor plan of the head office in Colombo is as
follows: Floor 1:
 Reception area
 Sales & Marketing Department (10 employees)
 Customer Services Area – with Wi−Fi facilities

Floor 2:
 Administration Department (30 Employees)
 HR Department (20 employees)
 Accounting & Finance Department (15 employees)
 Audit Department (5 employees)
 Business Development Department (5 employees)

Floor 3
 Video conferencing room
 IT Department (60 employees)
 The Server Room

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 11

Downloaded by wofyy. store


The floor plan of the branch in Matara is as follows:
Floor 1:
 Reception area
 Customer Services Area– with Wi−Fi facilities

Floor 2:
 Administration Department (10 Employees)
 HR Department (7 employees)
 Accounting & Finance Department (8 employees)
 IT Department (50 employees)

Following requirements are given by the Management.


 All the departments must be separated with unique subnet .

 The conferencing room of the head office and Customer Services Areas of each
branch are to be equipped with Wi- Fi connections .

 Connectivity between two branches ( Head Office and Matara) would allow the
intra branch connectivity between departments. ( Use of VPN is not compulsory)

 The necessary IP address classes and ranges must be decided by the network
designer and should be used for all the departments except the server room .

 Number of servers required for the Server room need to be decided by the Network
designer and should be assigned with 10 . 254 . 10 . 0 / 24 subnet. ( Uses static IPs )

 Sales and Marketing Team also needs to access Network resources using WIFI
connectivity.

( Note: Clearly state your assumptions. You are allowed to design the network according to your
assumptions, but main requirements should not be violated)

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 12

Downloaded by wofyy. store


Activity 01
 Discuss the benefits and constraints of different network system types that can be
implemented in the Matara branch and the main IEEE Ethernet standards that can
be used in above LAN and WLAN design.

 Discuss the importance and impact of network topologies and assess the main
network protocol suites that are used in network design using examples.
Recommend suitable network topology and network protocols for above scenario
and evaluate with valid points how the recommended topology demonstrates the
efficient utilization of the networking system of Matara branch.

Activity 02
 Discuss the operating principles of network devices ( Ex: Router, Switch, Etc.) and
server types that can be used for above scenario while exploring different servers
that are available in today’ s market with their specifications . Recommend
server/ servers for the above scenario and justify your selection with valid points .

 Discuss the inter−dependence of workstation hardware and networking software


and provide examples for networking software that can be used in above network
design.

Activity 03
 Prepare a written network design plan to meet the above−mentioned user
requirements including a blueprint drawn using a modeling tool ( Ex: Microsoft Visio,
Edraw Max) . Test and evaluate the proposed design by analyzing user feedback with
the aim of optimizing your design and improving efficiency.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 13

Downloaded by wofyy. store


( Support your answer by providing the VLAN and IP subnetting scheme for the above
scenario and the list of devices, network components and software used to design the
network for above scenario and while justifying your selections. )

 Install and configure Network services , devices and applications ( Ex: VLAN, WiFi,
DNS, Proxy, Web, Etc.) according to the proposed design to accomplish the user
requirements and design a detailed Maintenance schedule for above Network.

* Note: - Screen shots of Configuration scripts should be presented.

Activity 04
 Implement a networked system based on your prepared design with valid
evidences.

 Develop test cases and conduct verification ( Ex: Ping, extended ping, trace route,
telnet, SSH, etc.) to test the above Network and analyse the test results against
the expected results. Recommend potential future enhancements for the
networked system with valid justifications and critically reflect on the
implemented network, including the plan, desig n, configurations, tests and the
decisions made to enhance the system.

M.A.NAJA MOHAMED
UNIT02−NETWORKING 14
E195225

Downloaded by wofyy. store


M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 15

Downloaded by wofyy. store


Contents
Acknowledgement..........................................................................................................................21
ACTIVITY 1......................................................................................................................................22
Interduction to the system........................................................................................................22
What is Network?......................................................................................................................22
Using a computer network has benefits:..............................................................................22
Types of computer Network......................................................................................................23
Personal Area Network (PAN)................................................................................................24
Local Area Network (LAN)......................................................................................................25
Campus Area Network (CAN).................................................................................................26
Metropolitan Area Network (MAN).......................................................................................27
Wide Area Network (WAN)...................................................................................................28
Other Types of Computer Networks.........................................................................................28
Wireless Local Area Network (WLAN)...................................................................................29
Storage Area Network (SAN).................................................................................................29
System−Area Network (SAN)..................................................................................................30
Passive Optical Local Area Network (POLAN)........................................................................30
Enterprise Private Network (EPN).........................................................................................31
Virtual Private Network (VPN)...............................................................................................31
Home Area Network (HAN)...................................................................................................32
Types of Transmission Media....................................................................................................33
Guided media.........................................................................................................................33
Unguided Media.....................................................................................................................35
Network Topologies...................................................................................................................37
Physical Topology...................................................................................................................37
Logical Topology.....................................................................................................................42
Network Protocol.......................................................................................................................43
1. Network Communication Protocols:..................................................................................43
2. Network Security Protocols:..............................................................................................44
3. Network Management Protocols:......................................................................................45
How Network Protocol Works...............................................................................................45

M.A.NAJA MOHAMED
E195225
UNIT02−NETWORKING 16

Downloaded by wofyy. store


What are OSI model layers?......................................................................................................46
How do network protocols work at each tier of the OSI model?.........................................47
Network Communication Standards..........................................................................................48
IEEE (Institute of Electrical and Electronics Engineers).........................................................48
Ethernet (IEEE 802.3):............................................................................................................48
Wi−Fi (IEEE 802.11):................................................................................................................50
DNS (Domain Name System):................................................................................................51
VoIP (Voice over Internet Protocol):......................................................................................51
Network Models.........................................................................................................................52
OSI Model (Open Systems Interconnection)..........................................................................53
TCP/IP Model (Transmission Control Protocol/Internet Protocol).......................................54
Justification.................................................................................................................................55
ACTIVITY 02....................................................................................................................................56
Network Devices........................................................................................................................56
Bridge.....................................................................................................................................56
Hub.........................................................................................................................................58
Switch.....................................................................................................................................59
Router.....................................................................................................................................60
Modem...................................................................................................................................60
Repeater.................................................................................................................................61
Gateway.................................................................................................................................62
Access Point...........................................................................................................................62
Server Types...............................................................................................................................63
Origin Servers.........................................................................................................................64
Proxy Servers..........................................................................................................................64
Web Servers...........................................................................................................................65
Database Servers....................................................................................................................66
Cloud Servers.........................................................................................................................67
Mail Servers............................................................................................................................67
DNS Servers............................................................................................................................68
DHCP Server...........................................................................................................................69

M.A.NAJA MOHAMED
E195225
UNIT02−NETWORKING 17

Downloaded by wofyy. store


Server available in the market...................................................................................................70
Lenovo Think System SR650 Rack Server..............................................................................71
Cisco UCS C240 M5 Rack Server............................................................................................71
Dell PowerEdge R740 Rack Server.........................................................................................71
HPE ProLiant DL380 Gen10 Rack Server................................................................................71
Activity 3........................................................................................................................................75
Blue print of the Network..........................................................................................................75
VLAN and IP subnetting schema................................................................................................76
Recommended hardware and software of the network...........................................................77
Maintenance schedule...............................................................................................................78
Daily Tasks:.............................................................................................................................78
Weekly Tasks:.........................................................................................................................78
Monthly Tasks:.......................................................................................................................79
Bi−Annual Tasks:.....................................................................................................................79
Annual Tasks:.........................................................................................................................79
Network design feedback..........................................................................................................80
Configuring the network............................................................................................................91
Assigning IP address for IT department.................................................................................91
VLAN Assigning...............................................................................................................................93
Assigning password for the router........................................................................................94
Configuring DHCP in a router.................................................................................................95
Maintenance schedule...............................................................................................................96
Activity 4........................................................................................................................................97
Matara branch network system................................................................................................97
Test cases...................................................................................................................................97
FUTURE ENHANCEMENTS........................................................................................................103
CONCLUSION............................................................................................................................103
References....................................................................................................................................105

M.A.NAJA MOHAMED
UNIT02−NETWORKING 18
E195225

Downloaded by wofyy. store


Figure 1: TYPES OF COMPUTER NETWORKS........................................................................24
Figure 2: PAN................................................................................................................................25
Figure 3: LAN................................................................................................................................26
Figure 4: CAN................................................................................................................................27
Figure 5: MAN...............................................................................................................................27
Figure 6: WAN...............................................................................................................................28
Figure 7: WLAN............................................................................................................................29
Figure 8: SAN (Anon., n.d.)...........................................................................................................30
Figure 9: SAN (Anon., n.d.)...........................................................................................................30
Figure 10: POLAN.........................................................................................................................31
Figure 11: EPN...............................................................................................................................31
Figure 12: VPN..............................................................................................................................32
Figure 13: HAN (Anon., n.d.)........................................................................................................32
Figure 14: BUS TOPOLOGY........................................................................................................38
Figure 15: RING TOPOLOGY......................................................................................................39
Figure 16: STAR TOPOLOGY.....................................................................................................39
Figure 17: MESH TOPOLOGY.....................................................................................................40
Figure 18: TREE TOPOLOGY......................................................................................................41
Figure 19: HYBRID TOPOLOGY................................................................................................42
Figure 20: TCP (Anon., n.d.)......................................................................................................54
Figure 21: BRIDGE (Anon., n.d.)..................................................................................................58
Figure 22: HUB (Anon., n.d.)........................................................................................................59
Figure 23: SWITCH (Anon., n.d.)...............................................................................................59
Figure 24: ROUTER (Anon., n.d.)..............................................................................................60
Figure 25: MODEM (Anon., n.d.)...............................................................................................61
Figure 26: REPEATER (Anon., n.d.)..........................................................................................62
Figure 27: GATEWAY (Anon., n.d.)............................................................................................62
Figure 28: ACCESSPOINT (Anon., n.d.)....................................................................................63
Figure 29: ORIGIN SERVER (Anon., n.d.)................................................................................64
Figure 30: PROXY (Anon., n.d.).................................................................................................65
Figure 31: WEB SERVER (Anon., n.d.).....................................................................................66
Figure 32: DATABASE (Anon., n.d.).........................................................................................66
Figure 33: CLOUD (Anon., n.d.).................................................................................................67
Figure 34: MAIL (Anon., n.d.)....................................................................................................68
Figure 35: DNS (Anon., n.d.)......................................................................................................68
Figure 36: DHCP (Anon., n.d.)....................................................................................................69
Figure 37: FEEDBACK FORM.....................................................................................................80
Figure 38: FEEDBACK FORM.....................................................................................................81
Figure 39: FEEDBACKFORM......................................................................................................82
Figure 40: FEEDBACKFORM......................................................................................................82
Figure 41: FEEDBACKFORM......................................................................................................83

M.A.NAJA MOHAMED
E195225
UNIT02−NETWORKING 19

Downloaded by wofyy. store


Figure 42: FEEDBACKFORM......................................................................................................84
Figure 43: USER FEEDBACK......................................................................................................85
Figure 44: USER FEEDBACK......................................................................................................86
Figure 45: USER FEEDBACK......................................................................................................87
Figure 46: USER FEEDBACK......................................................................................................88
Figure 47: USER FEEDBACK......................................................................................................89
Figure 48: USER FEEDBACK......................................................................................................90
Figure 49: assigning ip...................................................................................................................91
Figure 50: assigning ip...................................................................................................................92
Figure 51: assigning vlan...............................................................................................................93
Figure 52: pssword for router.........................................................................................................94
Figure 53: DHCP............................................................................................................................95
Figure 54: network design by Cisco packet tracer.........................................................................97
Figure 55: checking ip in It department..........................................................................................98
Figure 56: ping...............................................................................................................................99
Figure 57: DHCP..........................................................................................................................100
Figure 58: VLAN.........................................................................................................................101
Figure 59: password.....................................................................................................................102

M.A.NAJA MOHAMED
UNIT02−NETWORKING 20
E195225

Downloaded by wofyy. store


Acknowledgement
M.A.Naja Mohamed from HND 86 here. I'd want to offer my heartfelt gratitude to everyone who
made it possible for me to finish this project. I am extremely grateful to our instructor, Mr.
Bevan, whose stimulating advice and encouragement helped me to plan my project, particularly
in Networking notes and constructing the assignment.

M.A.NAJA MOHAMED
UNIT02−NETWORKING 21
E195225

Downloaded by wofyy. store


ACTIVITY 1

Interduction to the system


I was just hired as the network analyst for Alliance Health, a healthcare technology solutions
company situated in the United States. The company is extending its operations by constructing a
new branch in Matara, for which I am responsible for designing and restructuring the existing
network infrastructure to meet the needs of the company. This includes developing an
architectural design for the network and implementing it with proposals to optimize the
healthcare industry's revenue cycle. Alliance Health, which has a global delivery center in
Colombo, is dedicated to offering its clients with cutting-edge amenities.

What is Network?
A computer network is a collection of interconnected nodes or computing devices that
communicate with one another to exchange information and resources. These devices can be
connected to a network through cable or wireless media. The networked devices exchange data
once a connection has been made using communication protocols such TCP/IP, Simple Mail
Transfer Protocol, and Hypertext Transfer Protocol. (Yasar, 2023)

Using a computer network has benefits:

 Resource sharing- A computer network can be used by businesses of all sizes to share
resources and important assets. Printers, files, scanners, and copy machines are examples
of resources that can be shared. Computer networks are especially helpful for larger,
more dispersed enterprises since they may communicate with their personnel through a
single, shared network.
 Flexibility- People can use adaptable communication and resource-sharing strategies based
on their requirements and preferences thanks to modern computer networks. For instance,

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 22

Downloaded by wofyy. store


some people might prefer to connect via email or instant messaging, while others could
favour an app like WhatsApp.
 Higher connectivity- People can stay connected wherever they are because to computer
networks. Employees can connect and work remotely using tools like video calling and
document sharing apps like Zoom and Google Docs.

 Data security and management- Data is concentrated on shared servers in a computer


network. Network administrators may better monitor and safeguard their company's
valuable data assets thanks to this. They can implement security controls like multifactor
authentication across all devices and carry out routine data backups.
 Storage capacity- Most businesses grow over time and produce a lot of data that needs
to be stored. Computer networks, particularly those using cloud-based technology, are
capable of storing enormous amounts of data and backups on a centralized remote server
that is always available to everyone.
 Entertainment- Computer networks, particularly the internet, provide a variety of
entertainment options, from video and music streaming to computer gaming. For
instance, only a local or home-based LAN or a wide area network (WAN), such the
internet, can be used to run multiplayer games. (Yasar, 2023)

Types of computer Network


 Personal Area Network (PAN)
 Local Area Network (LAN)
 Campus Area Network (CAN)
 Metropolitan Area Network (MAN)
 Wide Area Network (WAN)

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 23

Downloaded by wofyy. store


Figure 1: TYPES OF COMPUTER NETWORKS

(Anon., n.d.)

Personal Area Network (PAN)


The most fundamental kind of computer network is a PAN. This network is limited to a single
user, meaning that all computing device communication is focused solely on the user's
workspace. PAN gives a network range of 1 to 100 meters between a person and a
communicating device. With very little expense and very simple maintenance, it has a very high
transmission speed.
Technology used in this includes Bluetooth, IrDA, and Zigbee.
Examples of PAN are USB, computer, phone, tablet, printer, PDA, etc.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 24

Downloaded by wofyy. store


Figure 2: PAN

(Anon., n.d.)

Local Area Network (LAN)


The most used type of network is LAN. A local area network, or LAN, is a type of computer
network that links computers together via a common communication connection. Two or more
computers connected via a server make up a LAN. Ethernet and Wi-Fi are the two key
technologies used in this network. It has a range of up to 2 km and a very high transmission
speed, all of which require little maintenance.
Networking in a house, school, library, lab, college, office, etc. are examples of LAN.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 25

Downloaded by wofyy. store


Figure 3: LAN

(Anon., n.d.)

Campus Area Network (CAN)


While being smaller than a MAN, CAN is larger than a LAN. This particular kind of computer
network is frequently utilized in establishments like schools and colleges. This network is
dispersed over multiple buildings on the campus, so it only covers a small area of land. Ethernet
technology, with a range of 1 to 5 kilometres, is mostly used by CAN.
It has a very high transmission speed and a low maintenance and operating expense.
Networks that cover buildings such as schools, colleges, and others are examples of CAN.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 26

Downloaded by wofyy. store


Figure 4: CAN

(Anon., n.d.)

Metropolitan Area Network (MAN)


While being smaller than a WAN, a MAN is larger than a LAN. This kind of computer network
uses a shared communication path across a city, town, or metropolitan area to link computers
that are separated by distance. With a range of 5 km to 50 km, this network typically uses FDDI,
CDDI, and ATM technology. It has an average transmission speed. It is expensive and
challenging to keep up with.
Networking among towns and cities, a single large city, a large area contained within several
structures, etc. are examples of MAN.

Figure 5: MAN

(Anon., n.d.)

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 27

Downloaded by wofyy. store


Wide Area Network (WAN)
A WAN is a kind of computer network that utilizes a common communication path to connect
machines separated by a great distance. It spans numerous locations rather than being limited to
only one. A collection of local area networks that connect with one another at distances more
than 50 kilometres is another way to define WAN.
Here, we make use of dial-up and leased-line technology. It has a very slow transmission speed,
requires a lot of maintenance, and is highly expensive.
The Internet serves as the most prevalent WAN example.

Figure 6: WAN

(Anon., n.d.)

(swetha_vazhakkat, 2023)

Other Types of Computer Networks


 Wireless Local Area Network (WLAN)
 Storage Area Network (SAN)
 System-Area Network (SAN)
 Passive Optical Local Area Network (POLAN)
 Enterprise Private Network (EPN)

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 28

Downloaded by wofyy. store


 Virtual Private Network (VPN)
 Home Area Network (HAN)

Wireless Local Area Network (WLAN)


A WLAN uses wireless network technology, such as Wi-Fi, yet functions as a local area
network. Instead of using physical cables like in a LAN, this network enables wireless
communication between devices.
Wi-Fi is the most popular type of WLAN.

Figure 7: WLAN

(Anon., n.d.)

Storage Area Network (SAN)


A high-speed computer network called SAN links collections of storage devices to numerous
servers. LAN and WAN are not necessary for this network. The storage resources are instead
transferred from the network to the SAN's powerful network. Access to block-level data storage
is made possible via a SAN.
A network of disks accessed by a network of servers is an example of SAN.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 29

Downloaded by wofyy. store


Figure 8: SAN (Anon., n.d.)

System-Area Network (SAN)


A SAN is a specific kind of computer network that links a collection of powerful machines. It is
a high-bandwidth, connection-oriented network. A SAN is a kind of LAN that can handle huge
requests for big volumes of information. Applications processing on this network benefit from its
excellent network performance.
SAN is utilized by Microsoft SQL Server 2005 via a virtual interface adaptor.

Figure 9: SAN (Anon., n.d.)

Passive Optical Local Area Network (POLAN)


An alternative to a LAN in terms of computer networks is a POLAN. In order to disperse users
and devices, POLAN uses optical splitters to divide an optical signal from a single strand of
single-

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 30

Downloaded by wofyy. store


mode optical fiber into several streams. POLAN is a point-to-multipoint LAN architecture, to put
it briefly.

Figure 10: POLAN

(Anon., n.d.)

Enterprise Private Network (EPN)


EPN is a type of computer network mostly used by businesses that want a secure connection over
various locations to share computer resources.

Figure 11: EPN

(Anon., n.d.)

Virtual Private Network (VPN)


A VPN is a kind of computer network that enables users to send and receive data as if they were
connected to a private network even if they are not by extending a private network across the
internet. An online virtual point-to-point connection enables users to remotely access a private

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 31

Downloaded by wofyy. store


network. By acting as a conduit for a secure network connection, a VPN shields you from
harmful sources.

Figure 12: VPN

(Anon., n.d.)

Home Area Network (HAN)


There may be more than one computer in many of the homes. A network should be constructed
comparable to the local area network (LAN) in that home to connect those PCs and with other
peripheral devices. The term "Home Area Network" (HAN) refers to a particular kind of network
that enables a user to link numerous PCs and other digital devices inside the home. The HAN
promotes network-wide resource, file, and program sharing. Both cable and wireless
communication are supported.

Figure 13: HAN (Anon., n.d.)

(swetha_vazhakkat, 2023)

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 32

Downloaded by wofyy. store


Types of Transmission Media
A channel between the sender and receiver serves as the transmission medium in computer
networks. The data from sender is sent to receiver through transmission media.

The transmission media is categorized in following two types:


 Guided media
 Unguided media

Guided media
Signals are sent through a physical path in guided media. High speed and security are two of
guide media's characteristics. Wired or bounded transmission media are other names for guided
media. There are three types of Guided media:
 Twisted pair
 Coaxial cable
 Optical fiber cable
Twisted Pair
Two insulated wires are twisted together to form twisted pair cable. The signal travels on one
wire from source to destination, and the ground reference wire travels on the other wire. To
prevent external electromagnetic interference, twisting is used. It is the transmission medium that
is most commonly employed.
Advantages of Twisted pair cable:
 Installation is easy
 Lightweight cable
 High speed
Disadvantages of Twisted pair cable:
 Poor security
 Not durable, easy to break
 Attenuation is high

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 33

Downloaded by wofyy. store


Types of twisted pair cable
 Unshielded Twisted-Pair Cable
 Shielded Twisted-Pair Cable
Coaxial cable
A metal foil shield and an insulating cover both surround the center conductor of a coaxial wire.
A plastic cover is placed over the entire cable. The noise is muffled by the aluminum foil screen.
Coaxial Cable Types
 BaseBand Transmission cable: It is employed for the quick transmission of a single
signal. For digital transmission, it is employed.
 BroadBand Transmission Cable: This type of cable is used to transmit numerous signals
at once. For analog transmission, it is employed.
Advantages of Coaxial cable:
 High speed data transmission.
 Better noise reduction compared to twisted pair cable.
 High bandwidth.
Disadvantages of Coaxial cable:
 It is more expensive than twisted pair cable.
 The whole network consists of a single cable so any fault can cause the failure of entire
network.
Fiber-Optic Cable
Optical-fiber cable is another name for fiber-optic cable. It is made of glass, and the idea of light
reflecting off of glass serves as the foundation for data transmission.
The optical fibers in fiber optic cable have a plastic coating. These optical fibers use light pulses
to transmit the data.
The cable is shielded by the plastic coating from changes in temperature, electromagnetic
interference, and other forms of wiring problems.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 34

Downloaded by wofyy. store


Advantages of fiber optic cable:
 High bandwidth
 High speed
 Reliable

Unguided Media
Unguided media does not convey data from source to destination through a physical medium.
We already know that the Guided media transmits data from source to destination via physical
medium like cables and wires. However, unlike directed media, the unguided media transmits
data using air as the transmission medium. It is known as wireless transmission media as a result.
Types of Unguided media
 Microwave Transmission
 Radio Transmission
 Infrared Transmission

Microwave transmission
The electromagnetic wave frequency range used in microwave communication is somewhere
between 1 and 300 GHz. There are two forms of microwave transmission:
Terrestrial Type Microwave Transmission
Satellite Type Microwave Transmission

Radio Transmission
Radio waves are electromagnetic waves with a very low frequency that can travel in any
direction within a certain range.
The frequency range for radio transmissions is 3 KHz to 1GHz.
The antennas don't have to be perfectly aligned or placed in a specific way to send and receive
signals during radio communications.
It is not possible to isolate the connection inside a building since radio waves are omnidirectional
(they travel in all directions).

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 35

Downloaded by wofyy. store


Advantages of Radio Transmission:
 Radio waves are mainly used for Wide Area Networks (WAN) for example: Mobile
networks.
 Suitable for longer distance communications.
 Signals can penetrate walls.

Disadvantages of Radio Transmission:


 Waves are omnidirectional so faces interference from other signals of same frequency so
disturbance can be there.
 Not possible to isolate the communication inside the building.

Infrared Transmission
The highest frequency waves are infrared waves, which have a range of 300GHz to 400 THz.
Suitable for communicating across short distances.
In comparison to other media, the data send rate is high due to the high bandwidth.
These waves are perfect for solitary conversations because they cannot pass through walls.
Advantages of Infrared Transmission:
 Secure
 High speed
 High frequency signals
 High data transfer rate
Disadvantages of Infrared Transmission:
 Sun rays interfere with the infrared rays so not ideal for outdoor communication.
 Suitable for short distance communication only.
 Cannot penetrate walls so difficult to establish a communication between two different
rooms.
(SINGH, 2023)

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 36

Downloaded by wofyy. store


Network Topologies
Greek terms for "place" and "study," topo and logy, are the roots of the word topology. A
topology is used in computer networks to describe how a network is physically connected and
how information flows logically through the network. A topology primarily outlines how devices
are interconnected and communicate with one another.
There are two types of topologies:
1. Physical topology
2. Logical topology

Physical Topology:
The arrangement of the computers or nodes in a computer network is referred to as its physical
topology. It is the configuration of different components (links, nodes, etc.), including the
positioning of devices and the installation of software in a computer network. In other terms, we
can say that it is the actual configuration of the network's nodes, computers, and connections.

Typical physical topologies are listed below:

 Bus Topology
 Ring Topology
 Star Topology
 Mesh Topology
 Tree Topology
 Hybrid Topology

Bus Topology
The simplest type of topology is called a bus topology, in which network communication takes
place over a single bus or channel. There are numerous taps and droplines linked to the bus.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 37

Downloaded by wofyy. store


Figure 14: BUS TOPOLOGY

(Anon., n.d.)
Following are the advantages of Bus topology:
 Simple to use and install.
 If a node fails, it will not affect other nodes.
 Less cabling is required.
Following are the disadvantages of Bus topology:
 Efficiency is less when nodes are more (strength of signal decreases).
 If the bus fails, the network will fail.
 A limited number of nodes can connect to the bus due to limited bus length.

Ring Topology
When two computers are joined to create a ring, the topology is known as a ring topology.
Following are the advantages of Ring topology:
 Easy Installation.
 Less Cabling Required.
 Reduces chances of data collision (unidirectional).
Following are the disadvantages of Ring topology:
 If a node fails, the whole network will fail.
 Slow data transmission speed (each message has to go through the ring path).
 Difficult to reconfigure (we have to break the ring).

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 38

Downloaded by wofyy. store


Figure 15: RING TOPOLOGY

(Anon., n.d.)

Star Topology
A computer network structure known as the "star topology" involves connecting each node to a
single central hub.

Figure 16: STAR TOPOLOGY

(Anon., n.d.)

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 39

Downloaded by wofyy. store


Following are the advantages of Star topology:
 Centralized control.
 Less Expensive.
 Easy to troubleshoot (the faulty node does not give response).
Following are the disadvantages of Star topology:
 If the central device fails, the network will fail.
 The number of devices in the network is limited (due to limited input-output port in a
central device).

Mesh Topology
A computer network topology known as a mesh topology has nodes connected to one another. In
other words, there is direct connection between the network nodes.

Figure 17: MESH TOPOLOGY

(Anon., n.d.)

Following are the advantages of Mesh topology:


 Dedicated links facilitate direct communication.
 No congestion or traffic problems on the channels.
 Very fast communication.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 40

Downloaded by wofyy. store


Following are the disadvantages of Mesh topology:
 Very high cabling required.
 Cost inefficient to implement.
 Complex to implement and takes large space to install the network.

Tree Topology:
A computer network architecture known as a "tree topology" is one in which all nodes are either
directly or indirectly connected to the main bus cable. Bus and Star topologies are combined to
create Tree topology.

Figure 18: TREE TOPOLOGY

(Anon., n.d.)

Following are the advantages of Tree topology:


 Large distance network coverage.
 Fault finding is easy by checking each hierarchy.
 Least or no data loss.
Following are the disadvantages of Tree topology:
 Cabling and hardware cost is high.
 Complex to implement.
 Hub cabling is also required

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 41

Downloaded by wofyy. store


Hybrid Topology
A hybrid topology is a combination of two or more topologies used in computer architecture.
They are the most extensively used in actual use.

Figure 19: HYBRID TOPOLOGY

(Anon., n.d.)

Following are the advantages of Hybrid topology:


 It can handle a large volume of nodes.
 It provides flexibility to modify the network according to our needs.
 Very reliable (if one node fails it will not affect the whole network).
Following are the disadvantages of Hybrid topology:
 Complex design.
 Expensive to implement.
 Multi-Station Access Unit (MSAL) required.
(Janishar Ali, 2020)

Logical Topology
A notion in networking known as logical topology describes the design of the communication
system used by each node in a network. A network's logical topology can be dynamically
maintained and changed using network hardware like routers and switches.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 42

Downloaded by wofyy. store


Two of the most common logical topologies are:

Bus topology:

Ethernet transfers data using a logical bus topology. A node broadcasts the data to the entire
network under a bus topology. The data is transmitted, and every node in the network hears it
to see if it is for them.

Ring topology:

In this topology, a network can only allow one node to transport data at a time. Tokens enable
this method (only nodes with tokens can send data in a network), preventing collisions from
occurring.
(Rouse, 2012)

Network Protocol
Network protocols are a set of guidelines that specify how connected devices transmit
information conveniently and securely over a network. For devices to communicate regardless of
variations in software, hardware, or internal processes, protocols act as a common language.

Types of network protocols

1. Network Communication Protocols:


These protocols establish the guidelines and standards for data transport via networks. Syntax,
authentication, semantics, and error detection are only a few of the characteristics of analog and

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 43

Downloaded by wofyy. store


digital communications that are governed by communication protocols. Several essential
network communication protocols are:
 Hyper-Text Transfer Protocol (HTTP): known as the internet protocol that enables
communication between a server and browser.
 Transmission Control Protocol (TCP): a dependable, connection-oriented protocol that
aids in the sequential transmission of data packets to guarantee data arrives at the
destination on time and duplicate-free.
 Internet Protocol (IP): helps with data packet routing across networks. For the purpose
of delivering packets across a network, IP comprises addressing and control information.
It functions with TCP. TCP aligns the packets in the correct order while ensuring that
they are delivered to the correct address.
 User Datagram Protocol (UDP): Unlike TCP, which requires a connection between the
application and server before sending a message, UDP is a connectionless protocol. For
use situations like broadcasts or multicast connections, it works well.
 File Transfer Protocol (FTP): creates two TCP connections, one for data transfer and
the other for control, to enable file sharing between servers. The control connection
transfers control information, such as passwords, to secure data recovery in the event of
data loss, while the data transfer connection transports the actual files.

2. Network Security Protocols:


By using these protocols, network connections can send data securely. The steps to protect data
from any unwanted access are specified by network security protocols. To protect, these
protocols use encryption and cryptography. The most popular network security protocols are
listed below:
 Secure File Transfer Protocol (SFTP): helps to securely transfer files across a network
by authenticating the client and server and utilizing public-key encryption.
 Hyper-Text Transfer Protocol Secure (HTTPS): overcomes the limitations of HTTP
by utilizing data encryption to protect the privacy of data transferred between the browser
and server. A secure variant of HTTP is HTTPS.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 44

Downloaded by wofyy. store


 Secure Socket Layer (SSL): mostly uses encryption to protect sensitive data and secure
internet connections. Server-client and server-server communication are both made
possible by the SSL protocol.

3. Network Management Protocols:


In order to administer and monitor the network and ensure continuous communication, network
managers need standardized policies and processes. The use of network management protocols
guarantees rapid problem solving and top network performance. Essential network protocol
management includes the following:
 Simple Network Management Protocol (SNMP): helps network device managers keep
track of endpoint data to proactively evaluate network performance and identify network
issues for speedy remediation.
 Internet Control Message Protocol (ICMP): aids in identifying network connectivity
problems. In order to aid in network troubleshooting, network devices use ICMP to
deliver error messages, highlight congestion and timeouts, and relay other operational
data.

How Network Protocol Works


Understanding how connected devices communicate over a network requires knowledge of how
network protocols operate. The Open Systems Interface (OSI) paradigm, which is the most
widely used, illustrates how computer systems communicate via a network. This seven-layer
model depicts the seven layers of communication between two network devices.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 45

Downloaded by wofyy. store


Across each OSI model layer, network protocols divide the communication process into separate
activities. At each layer, one or more protocols are active to support network communication. To
facilitate network-to-network connections, the Internet Protocol (IP), for instance, routes data by
controlling information such as data packets' source address and destination. As a result, it is
known as a network layer protocol.

What are OSI model layers?


OSI model has the following seven layers:
 Layer 1 - Physical Layer: Physical connection between the two network devices is
made possible by the first layer. It enables data transmission in bits while controlling,
among other things, topography, voltage, cabling or wireless technologies, and bit rate.
 Layer 2 - Data Link Layer: A network connection is needed between any two nodes
that are joined physically. By dividing packets into frames and transferring them from
source to destination, the data link layer aids in the establishment and termination of
connections. This layer corrects issues brought on by broken, duplicate, or missing
frames.
 Layer 3 - Network Layer: This layer serves two main purposes. The first task is
dividing segments into network packets and reassembling the packets at the receiver's
end. The second makes sure packets are sent along the best path possible across the
physical network.
 Layer 4 - Transport Layer: Incoming data in its raw form from the layer above is
divided into "segments" and reassembled at the transport layer on the receiving end. This
layer oversees error control by ensuring that the data received is accurate and handles
flow control by adjusting data transmission to the connection speed of the receiving
device.

 Layer 5 - Session Layer: This layer creates a session between the devices that want to
communicate and exchange data. The session layer creates sessions, monitors their

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 46

Downloaded by wofyy. store


performance throughout data transfer, and closes the appropriate sessions when the
communication is finished.
 Layer 6 - Presentation Layer: By making sure that information syntax and semantics
are correctly represented, this layer sets up data for the application layer. By specifying
how the connected devices should encrypt and compress data to ensure proper data
transfer at the receiver's end, it also regulates file-level security.
 Layer 7 - Application Layer: User software like web browsers and email clients have
access to the network's top tier, the application layer. This layer's protocols enable
programs to send and receive data, as well as to give users access to clear and pertinent
information.

How do network protocols work at each tier of the OSI model?


At each tier of the OSI model, one or more protocols are used to facilitate communication. Here
is a brief overview of how network protocols operate at each tier of the OSI architecture.
 Layer 1: Physical Layer Protocols: These protocols offer a connection point between
hardware and the network medium.
 Layer 2: Data Link Layer Protocols: While proactively recognizing and fixing packet
transmission faults, the protocols functioning at this level guarantee the framing of
packets.
 Layer 3: Network Layer Protocols: Administrators can efficiently route packets while
controlling network flow and congestion to avoid the depletion of network resources by
utilizing the appropriate selection of network layer protocols.
 Layer 4: Transport Layer Protocols: These protocols guarantee accurate end-to-end
packet delivery across networks and ensure that the packets are received in the correct
order.
 Layer 5: Session Layer Protocols: By smoothly establishing and terminating sessions
for communication, protocols at the session layer assist in managing user sessions and
conversations.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 47

Downloaded by wofyy. store


 Layer 6: Presentation Layer Protocols: To seamlessly hide the differences in data
formats across various systems, these protocols are required for data encoding and
decoding.
 Layer 7: Application Layer Protocols: These protocols aid in formatting user requests
for usage on a network.
(engineers, 2022)

Network Communication Standards


The established protocols and guidelines that control how systems and devices interact and
exchange information within a network are referred to as network communication standards.
These specifications guarantee interoperability, compatibility, and effective data flow between
various devices and network elements.

IEEE (Institute of Electrical and Electronics Engineers)


In order to promote dependable and uniform procedures in a range of technology-related
industries, the Institute of Electrical and Electronics Engineers (IEEE) has developed technical
specifications and guidelines known as IEEE Standards. These guidelines provide a uniform
framework that ensures the high caliber, security, interoperability, and compatibility of a range
of hardware, software, and technical improvements.

Here are explanations of some main IEEE standards you mentioned

Ethernet (IEEE 802.3):


a widely accepted standard for wired local area networks (LANs) that specifies the requirements
for the physical and data link layers, including the usage of twisted-pair or fiber-optic cables.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 48

Downloaded by wofyy. store


Advantages of Ethernet
 Ubiquity: Since Ethernet is one of the most extensively used networking technologies, it
is simple to identify devices and parts that operate with it. This widespread use
guarantees compatibility and a large selection of products.
 Reliability: Ethernet has established itself as a dependable and robust LAN technology.
It has a lengthy history of productive use across numerous sectors.

 Speed: From the initial 10 Mbps (Ethernet) to 100 Mbps (Fast Ethernet), 1 Gbps (Gigabit
Ethernet), and even higher speeds like 10 Gbps, 40 Gbps, and 100 Gbps, Ethernet has
grown to enable faster rates. Networks are able to scale up to handle rising data transfer
demands because to this.
 Cost: Since Ethernet components like network interface cards (NICs) and switches have
grown more widely used and more economical over time, many enterprises find it to be
cost-effective.
Disadvantages of Ethernet
 Physical Limitations: Ethernet has range restrictions. The structure of bigger networks
may be constrained by the maximum cable length for some Ethernet types (for example,
100 meters for conventional Ethernet), especially in industrial or campus locations.
 Collision Domains: As network traffic grows, traditional Ethernet (10BASE-T and
100BASE-TX) runs on a shared channel, which could result in collisions and reduced
efficiency. Even while contemporary Ethernet types (such full-duplex Gigabit Ethernet)
mitigate this, legacy configurations must still take this into account.
 Complexity: The management and setup of Ethernet switches and routers in bigger
networks can be challenging, particularly when working with VLANs (Virtual LANs)
and other sophisticated capabilities.
 Security: Ethernet has few security protections, especially in its early versions. Modern
Ethernet configurations can incorporate security features, but to protect against threats,
network managers still need to put good security policies in place.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 49

Downloaded by wofyy. store


Wi-Fi (IEEE 802.11):
A wireless local area network protocol that enables radio frequency connections and
communications between devices. Different Wi-Fi standards (such as 802.11ac and 802.11ax)
offer varying degrees of speed and range.
Advantages of Wi-Fi
 Wireless Convenience: Wi-Fi eliminates the requirement for physical cords, enabling
the connection of devices without being bound to one particular area. Particularly mobile
devices like laptops, cellphones, and tablets benefit from this versatility.

 Ease of Installation: A Wi-Fi network may be set up easily, and the majority of
contemporary gadgets come equipped with Wi-Fi functionality. As a result, adding
additional devices to the network is simple and doesn't require a lot of cabling.
 Mobility: Through smooth switching between access points (APs), Wi-Fi enables
devices to move across the service area without losing connectivity. For connectivity to
be maintained in bigger areas or buildings, this is crucial.
Disadvantages of Wi-Fi
 Limited Range: Wi-Fi signal range is constrained, particularly when compared to
conventional Ethernet. The effective range can be further decreased by barriers like walls
and interference from other electronic devices.
 Interference: Wi-Fi uses unlicensed radio frequencies, which means that other Wi-Fi
networks, microwaves, Bluetooth devices, and other sources could interfere with it. The
wireless connection's quality may suffer as a result of this interference.
 Security Concerns: If Wi-Fi networks are not configured properly, they may be subject
to security breaches. The network may be attempted access by unauthorized users, which
could result in data breaches or unlawful use.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 50

Downloaded by wofyy. store


DNS (Domain Name System):
A program that converts sensible domain names (like www.example.com) into IP addresses so
that users can access websites.
Advantages of DNS
 Human-Readable Addresses: Instead of having to remember a string of numbers for an
IP address, DNS enables consumers to access websites using meaningful and simple-to-
remember domain names. The internet is more accessible thanks to this strategy that is
user-friendly.
 Redundancy: Redundancy was considered when designing DNS. There are numerous
DNS servers, and in the event that one server is down, another server can step in to
maintain domain name resolution.
 Load Balancing: By dispersing traffic among various servers or data centers, DNS can
be used for load balancing. This enhances the performance of websites and applications
and optimizes resource usage.
Disadvantages of DNS
 Propagation Delay: There may be a propagation delay before changes to DNS records
(such as altering IP addresses) are fully reflected across all DNS servers. Some users
could experience erratic access during this delay.
 Privacy Concerns: Users' online behavior can be revealed via DNS requests and
responses. Concerns about privacy are raised since this information can be used to track
and profile people.
 Complexity: Although DNS is a crucial component of the internet's infrastructure,
configuring and managing it may be challenging, especially for businesses with
complicated network architectures and several domains.

VoIP (Voice over Internet Protocol):


A group of protocols that enable audio and video communication across IP networks, enabling
voice and video communication.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 51

Downloaded by wofyy. store


Advantages of VoIP
 Cost Savings: Particularly for long-distance and international calls, VoIP is often less
expensive than traditional landline phone services. VoIP eliminates the requirement for
dedicated phone lines by utilizing the existing IP network infrastructure.
 Flexibility: With VoIP, customers can place calls from any location that has an internet
connection. For remote work, business travel, and keeping connectivity, this flexibility is
beneficial.
 Scalability: Scaling VoIP systems is simple. Compared to traditional telephony systems,
adding new users or expanding the system to handle an increase in call volume is
typically simpler.

Disadvantages of VoIP
 Quality of Service (QoS): VoIP calls are sensitive to the state of the network. Degraded
call quality, such as dropped calls or voice distortion, can be brought on by poor network
quality, latency, or heavy data traffic.
 Reliability: VoIP is dependent on IP networks like the internet. If backup plans are not in
place, VoIP service may be interrupted in the event of a network or power outage.
 Security Concerns: Security risks like eavesdropping, packet sniffing, and VoIP-specific
attacks can affect VoIP transmission. To defend against these dangers, encryption and
suitable network security measures are crucial.

Network Models
Network models offer organized frameworks for planning, structuring, and comprehending many
facets of computer networks. The concepts and protocols used in networking can be standardized
with the use of these models. The OSI (Open Systems Interconnection) model and the TCP/IP
model are two well-known network models. Here is a description of each:

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 52

Downloaded by wofyy. store


OSI Model (Open Systems Interconnection)
The OSI model is a theoretical framework that divides a networking or communications system's
functions into seven different layers. The model aids in comprehending how these levels interact
and each layer has particular duties. For conceiving network communication and creating
compatible network protocols, the OSI model is crucial.
There are the seven OSI layers:
 Physical Layer: relates to the actual data transfer through the network medium.
 Data Link Layer: Within a local network segment, it is in charge of framing data,
identifying errors, and allocating addresses.
 Network Layer: handles data packet forwarding, routing, and logical addressing (IP
addresses) across several network segments.
 Transport Layer: manages flow control, error recovery, and end-to-end communication
between devices.
 Session Layer: connects devices and establishes, maintains, and ends connections
between them.
 Presentation Layer: focuses on data compression, data format conversion, data
encoding, and data encryption.
 Application Layer: offers user communication services that are application-specific and
controls network services like email, file transfer, and remote access.
Advantages of the OSI Model:
 Modularity and Layer Abstraction
 Standardization
 Clear Responsibilities
 Troubleshooting
 Educational Tool
Disadvantages of the OSI Model:
 Complexity
 Not a Direct Implementation
 Lack of Direct Mapping to Real Protocols

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 53

Downloaded by wofyy. store


 Limited Adaptation

TCP/IP Model (Transmission Control Protocol/Internet Protocol)


The TCP/IP model, also known as the Internet protocol suite and a fundamental foundation for
network communication, has been essential in the development and functioning of the modern
internet. In a networked context, it provides a logical technique to arrange capabilities and
communication protocols. The TCP/IP concept consists of four levels, each of which is in charge
of a certain communication task.

Figure 20: TCP (Anon., n.d.)

The four layers of the TCP/IP model are:


 Network Interface Layer: handling the delivery of data packets over the physical
medium in a manner akin to that of the OSI Data Link and Physical Layers.
 Internet Layer: Similar to the OSI Network Layer, this layer is in charge of addressing,
forwarding, and routing data packets, with IP serving as its primary protocol.
 Transport Layer: corresponds to the OSI Transport Layer and offers flow control,
error correction, and end-to-end communication. In this layer, protocols like TCP and
UDP function.
 Application Layer: Applications-specific protocols are included in this layer to help in
communication between software programs. Although it doesn't precisely correspond to
any one OSI layer, it has features from both the OSI Application Layer and Presentation
Layer.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 54

Downloaded by wofyy. store


Advantages of the TCP/IP Model:
 Simplicity
 Real-World Implementation
 Scalability
 Flexibility
 Interoperability
Disadvantages of the TCP/IP Model:
 Limited Modularity
 Lack of Presentation Layer
 Reduced Clarity
 Less Emphasis on Formality

Justification
I chose hybrid topology to build a syntactic solution in the Matara branch for the aforementioned
situation. The Matara Branch facility will have the most modern amenities available to the
management. After analyzing each topology, it was decided that the hybrid topology was the
most suitable.
A hybrid topology incorporates two or more different network topologies, such as a bus, star, or
mesh topology.
This kind of topology may be useful when a business wants to combine the advantages of many
topologies to create a more reliable and resilient network.
For instance, the bus topology can provide a simple and cost-effective method of connecting
multiple devices, but the star topology can provide a high level of resilience and fault tolerance.
A mesh topology can be combined with another topology, such as a star topology, to create a
hybrid topology that has the benefits of both topologies.
For instance, a mesh topology can provide high connectivity and redundancy while a star
topology can provide high dependability and fault tolerance. For instance, a mesh topology can
provide high connectivity and redundancy while a star topology can provide high dependability
and fault tolerance. Bus, star, and mesh topologies are examples of hybrid topologies, which
integrate two or more different network topologies to produce a more reliable and stable
network.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 55

Downloaded by wofyy. store


ACTIVITY 02

Network Devices
Networking devices are the pieces of hardware or software required for hardware on a network
to connect and communicate with one another.
They are not just computer and wire. There should be some specific hardware devices that can
manage digital network connections and fulfil their individual duties well. These gadgets aid in
the same.
Different Types of Network Devices
 Bridge
 Hub
 Switch
 Router
 Modem
 Repeater
 Gateway
 Access Point

Bridge
A bridge is a device that has a physical address and can forward information. Technically
speaking, using a bridge, packets are screened and sent according to physical address.
Types of bridges:
Transparent Bridge:
 They don't allow multipath routing and their network lacks connections.
 Transparent bridges are unnoticeable to other networked devices.
 Create the bridging table, which will store various nodes or devices' MAC addresses.
 To every host linked to the network, it is transparent.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 56

Downloaded by wofyy. store


 Transparent bridge records, monitoring all the hosts and bridges that are linked, and
maintaining the source route address of the incoming frames.

Source Routing Bridge:


 The source routing bridge places a focus on connections and employs several routes to
reach the precise destination.
 The origin of the network's other devices can see the routing bridge.
 The routing activities are carried out by the source station, and the frame travels along a
predetermined path.
 It is transparent because the discovery frame that travels throughout the entire network
teaches the bridges where the destination address is.
 The bridge address and number must be manually input and must be distinct; moving the
bridge can be difficult.

Translational Bridge:
 Only permits connection to non-routable protocols like maintenance operation protocol
(MOP), local area transport (LAT), and network basic input/output system (NetBIOS).
 Depending on how the device is implemented and set up, the translational bridge may be
visible or invisible.
 A bridge links two separate or dissimilar LAN protocol types, such as an Ethernet or
Token ring network.
 Depending on the direction of movement and the required fields, add or remove
information from the frame.
 When converting between Ethernet and Token ring frame formats, a translational bridge
can configure each other's source and destination addresses.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 57

Downloaded by wofyy. store


Figure 21: BRIDGE (Anon., n.d.)

Hub
Network cables are connected to a connectivity device to create a network segment. A Hub is the
name of this communication device. In most cases, hubs don't filter data; instead, they route
incoming data frames or packets to one or more elements. Nowadays, any network that has
computers linked to it uses a central switch, often known as a hub.
Types of Hub:
Active Hub
 Along with the network, they can strengthen, relay, and purify the signals.
 They have their own power, thus they don't require any from outside.
 They each function as a repeater and a wiring center.
 Increasing the space between them will assist.
Passive Hub
 They collect wiring from the nodes.
 An active hub is the source of the power supply
 They do not help to extend the distance between nodes
Intelligent Hub
 They give the system devices flexible data.
 aid the controller in creating each hub port and monitoring traffic through the hub
 They can be managed remotely and function as an Active hub.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 58

Downloaded by wofyy. store


Figure 22: HUB (Anon., n.d.)

Switch
 The switch's productivity can be increased thanks to the way it is constructed.
 It has a buffer built in.
 A multi-port bridge is what it is.
 Prior to forwarding data, it checks for mistakes. As a result, it only forwards the perfect
packet to the right port—which doesn't include any errors—improving efficiency and
performance.
 Simply said, it is an improved hub. Similar to a hub, a switch connects to the computer
device by a single line, but the switch is clever about where it transmits the data that
enters one of its ports.

Figure 23: SWITCH (Anon., n.d.)

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 59

Downloaded by wofyy. store


Router
A connecting device called a router can forward and filter data based on a logical address. When
it comes to TCP/IP networks, the IP address would be used. They have a significant impact on a
vast TCP/IP network. TCP/IP routing technologies and network routers have actually contributed
to the Internet's current size. They manage the flow of traffic and maintain network efficiency.

Figure 24: ROUTER (Anon., n.d.)

Modem
 In our way of life, a modem is kind of another eye-catching network equipment. As a
result, if you are discovered, you receive an internet connection at your home via a wire
(various types of cables). Our internet data is stored on this line outside of the internet.
 However, our computer produces binary data, which comes in a wide range of 0s and 1s.
A modem, on the other hand, is used to transmit analog signals through a wire.
 The signal between the binary data or digital data of a computer and, consequently, the
analog signal of a telephone line is modulated and demodulated by a modem, which
functions as both a modulator and a demodulator.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 60

Downloaded by wofyy. store


Figure 25: MODEM (Anon., n.d.)

Repeater
 A repeater is a device that enhances signals after receiving them. In other terms, a
repeater is a device that, after receiving a signal, sends it out again at a stronger signal so
that it can travel farther.
 For instance, in a university setting, the dorms might be segregated from the majority of
the school buildings wherever the ISP connection enters. Different types of cables have
restrictions in terms of the distances they will carry the information, thus if the university
administration wants to pull a wire between the dorms and the main field, they will need
to employ repeaters if there is more room.

 The entire formation is known as network topology when these network devices adopt a
chosen configured form on a network and receive a chosen name for their configuration.
Under some conditions, adding more network devices to a network topology is referred
to as daisy chaining.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 61

Downloaded by wofyy. store


Figure 26: REPEATER (Anon., n.d.)

Gateway
 We can deduce the meaning of something just from its name. It is a connection that
connects the networks and allows them to communicate using entirely distinct
networking protocols. They primarily serve as the intermediary who transfers data from
one system to another after translating it.
 Additionally, these are protocol converters that can be used at various networking layers.
Typically, they are more complex than switches and routers.

Figure 27: GATEWAY (Anon., n.d.)

Access Point
Although an AP can have a wired or wireless link, it often refers to a wireless device. An AP can
perform as a router that sends data to another access point or a bridge that connects a standard
wireless network to wireless devices. Both functions operate on the second OSI layer, the data
link layer. A wireless LAN (WLAN) transmitter and receiver are produced by wireless
connection points (WAPs). Access points typically consist of a networked machine with an
antenna, transmitter, and adaptor built in.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 62

Downloaded by wofyy. store


Figure 28: ACCESSPOINT (Anon., n.d.)

Advantages of Networking Devices


 Working with them is effortless and incredibly effective since connection devices,
whether acting independently or in concert, do an inspiring job of simultaneously
managing millions of Internet requests every second worldwide.
 Therefore, you can be confident that your networking hardware will enable you to access
the entire world from wherever you are and using whatever computer you've been using.
(Swati Tawde, 2023)

Server Types
A specific kind of computer called a server is made to deliver information, resources, and
services to other computers, often referred to as clients, across a network. In a variety of
computing environments, including small enterprises, huge data centers, and the internet as a
whole, servers are essential. They are made to do particular jobs, assist several users, and offer
centralized management and control.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 63

Downloaded by wofyy. store


Common Types of Server

Origin Servers
Incoming internet requests are heard by and addressed by an origin server. It frequently works in
tandem with edge and caching servers. One or more programs offer web content to clients
through origin servers.
It is frequently used to provide info to clients similar to a webpage. Some Origin servers can be
sluggish. This is due to the fact that speed is affected by the separation between the client and the
server. Loading is delayed because the server must process client requests and responses.
Using a Content Delivery Network (CDN), you can lessen the origin servers' latency. Distributed
servers that cache content close to the client make up a CDN. As a result, there is less time delay
between an origin server and a client.
HTML pages, JavaScript files, photos, and videos are just a few of the online assets that CDNs
can deliver with ease. These resources help with the distribution of internet material.

Figure 29: ORIGIN SERVER (Anon., n.d.)

Proxy Servers
An application that serves as a middleman between a client and a server is called a proxy server.
They conceal the client's identity while processing a request on its behalf. They transmit the
response received from the origin server.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 64

Downloaded by wofyy. store


Proxy servers serve as content management systems. They enhance network security by filtering
encrypted data, logging, accessing services, and logging. Different sorts of protocols are used by
proxy servers to complete tasks.
To assist in obscuring the identity of your devices on the internet, you can build your own proxy
server. This can lower your risk of getting attacked. Proxy servers are used by businesses to
censor the web material that can be accessed through their network. They collaborate with origin
servers to enhance security and lower latency.

Figure 30: PROXY (Anon., n.d.)

Web Servers
A web server is a piece of hardware and software that handles web requests. Network protocols
are used by web servers to handle material. Included in this group are the protocols HTTP
(Hypertext Transfer Protocol), SMTP (Simple Mail Transfer Protocol), and FTP (File Transfer
Protocol).
The content of websites is displayed via web servers. They handle, archive, and deliver content
to users via the web. Data is transferred between connected devices and the web server hardware
via connections.
How a user accesses the data is managed by the software. Web servers are useful for hosting
websites and storing data for web-based programs.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 65

Downloaded by wofyy. store


Figure 31: WEB SERVER (Anon., n.d.)

Database Servers
Databases with data or information are managed by database servers. Any server that manages
files for a database application can be one of them. They manage authorized users' access to the
database.
On database servers, databases are created by programmers using scripting languages like SQL.
To access the database, applications must establish a connection with the database server.
Data backups are kept centrally on database servers. They enable network applications and
authorized users to access the data. Database servers are used by businesses to censor client
queries and safeguard data.
Both one database and multiple databases can share the same server. Oracle or Microsoft SQL
Server are a couple of examples of database servers.

Figure 32: DATABASE (Anon., n.d.)

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 66

Downloaded by wofyy. store


Cloud Servers
A cloud server is a centralized server that a cloud service provider hosts remotely. Clients can
use an internet connection to access the server. Cloud servers can store, process, and deliver data
just like physical servers can. Regardless of location, cloud servers offer services to clients
remotely. Physical servers that are distributed over the internet are known as cloud servers.
This is accomplished using a procedure known as virtualization. A virtual resource is made
when a hypervisor abstracts physical servers. The automated delivery of the virtual resource to
clients via the internet follows.
Cloud server users don't possess or maintain their own physical servers. Instead, server services
are offered by a third-party business. The infrastructure-as-a-service (IaaS) business model is
this. It is a type of cloud computing that offers online virtual services. Customers pay to use
cloud servers to manage resources, store them, and scale at any time. Clients can each have their
own private or hybrid (on-premises and virtual) cloud or share a public cloud. A couple of
examples of cloud server providers include Microsoft Azure and Amazon Web Services.

Figure 33: CLOUD (Anon., n.d.)

Mail Servers
The transmission and receiving of mail over a network is controlled by mail servers. Distributes
messages to other mail servers, clients, and recipients after receiving mail from clients. Over a
network like the internet, mail servers manage and distribute mails.
Email services are powered by a mail server. It transfers emails from one mail server to another
after receiving them from a client. Any type of computing software, such as that on a desktop or

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 67

Downloaded by wofyy. store


mobile device, can be a client. Information is processed and delivered by mail servers using
SMTP. You can send emails from your app or website using Gmail's free SMTP server. Gmail,
Yahoo, and other clients are a few examples of those that use mail servers.

Figure 34: MAIL (Anon., n.d.)

DNS Servers
Domain names are converted into corresponding IP addresses by a DNS (Domain Name Service)
server. When you enter a domain name into your browser, a DNS server is consulted. Every
device on a computer network has a unique IP address. When connected to the internet, they
utilize their IP address to identify themselves.
You can avoid memorizing IP addresses by using a DNS server. Instead, entering a domain name
results in the IP address, which then leads to the desired resource. There are DNS servers that are
dynamic and those that are static. Either manually do it or use a free dynamic DNS service.

Figure 35: DNS (Anon., n.d.)

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 68

Downloaded by wofyy. store


DHCP Server
A DHCP (Dynamic Host Communication Protocol) server sets up the client machines' network
settings. It distributes IP addresses to machines connected to a LAN network dynamically. You
would need to manually set up IP addresses for each device on your network if you didn't have a
DHCP server.

Figure 36: DHCP (Anon., n.d.)

(DINDI, 2023)

Advantage of server
 Centralized Resource Management
 High Reliability and Availability
 Scalability
 Efficient Data Management
 Remote Access and Management
 Security Enhancements
 Specialized Services
 Resource Allocation

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 69

Downloaded by wofyy. store


 Cost Efficiency
 Collaboration and Data Sharing

Disadvantages of server
 Cost
 Complexity
 Downtime and Maintenance
 Security Concerns
 Energy Consumption
 Initial Setup Time
 Compatibility Issues
 Scalability Challenges
 Limited Mobility
 Skill Dependency

Server available in the market


Different Servers Available in Today's Market:

 Lenovo Think System SR650 Rack Server


 Cisco UCS C240 M5 Rack Server
 Dell PowerEdge R740 Rack Server
 HPE ProLiant DL380 Gen10 Rack Server

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 70

Downloaded by wofyy. store


Lenovo Think System SR650 Rack Server
The flexible and powerful Lenovo Think System SR650 Rack Server is designed to deliver
dependable processing power for a variety of data center and enterprise workloads. It belongs to
Lenovo's Think System server family, known for its scalability, adaptability, and cutting-edge
features. The Think System SR650 is designed to fit inside standard server racks, making it
perfect for conditions seen in data centers.

Cisco UCS C240 M5 Rack Server


At the time of my most recent knowledge update in September 2021, the Cisco UCS C240 M5
Rack Server is a part of Cisco's Unified Computing System (UCS) family. Computing,
networking, storage access, and virtualization resources are all included in a single, integrated
system under the name of Cisco UCS, a data center platform. It aims to improve data center
operations' efficiency and scalability while also improving performance.

Dell PowerEdge R740 Rack Server


The Dell PowerEdge R740 Rack Server is designed for a variety of commercial and data center
workloads and is high-performance and flexible. It belongs to Dell Technologies' PowerEdge
server family, which is famous for bringing together performance, scalability, and dependability.
Because it is designed to fit into standard server racks, the PowerEdge R740 is suitable for data
center situations.

HPE ProLiant DL380 Gen10 Rack Server


As of my most recent information update in September 2021, Hewlett Packard Enterprise (HPE)
offers a popular server model called the HPE ProLiant DL380 Gen10 Rack Server. It is a
member of the HPE ProLiant server family, known for its dependability, strength, and agility.
The ProLiant DL380 Gen10 is designed for data center and enterprise environments and offers a
variety of capabilities to handle various workloads and applications.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 71

Downloaded by wofyy. store


Recommended server
Dell PowerEdge R740: Because it offers high-performance computing capability and supports
several virtual machines at once, this server is a great option for the IT department. With up to 28
cores and 1.5TB of memory, the server is a great option for executing sophisticated services and
applications. The server also offers security measures that are pre-installed, such as hardware
root of trust and system lockdown mode, that can assist defend against online threats and data
breaches.

Here are some examples of networking software that could be used into the Matara
branch's network architecture:
 PUTTY: This program for network file transfers, serial consoles, and terminal emulators
is free and open-source. It supports a number of different network protocols, including
SSH, Telnet, and Rlogin. It can be used to securely access servers and network devices
from a distance.
 Cisco Network Assistant: A centralized interface for setting and controlling Cisco
devices, including as switches, routers, and access points, is offered by this free network
administration solution. It can be used to diagnose network problems, set up VLANs, and
monitor network performance.
 Nagios: This is an effective free and open-source tool for network monitoring that can
keep an eye on network equipment, services, and programs in real time. When network
problems occur, it can transmit alerts, enabling network managers to act swiftly and fix
problems.

IEEE Ethernet Standard: The IEEE 802.1Q standard, generally referred to as VLAN (Virtual
LAN) tagging, is something I advise using. A physical network can be divided into several
virtual networks (VLANs) using this standard. VLANs can offer isolation while utilizing the
same physical network infrastructure, which is advantageous given the complexity of the
organization's activities and the requirement for security.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 72

Downloaded by wofyy. store


Network Topologies:
1. Logical Topology: An organization with several departments that needs scalability and
redundancy should use a "Hierarchical" or "Tree" logical structure. This strategy offers a
structured structure that is scalable and well-organized, with distinct layers for
distribution and core activities. It guarantees effective administration and simple
communication.
2. Physical Topology: I advise combining "Star" and "Mesh" physical topologies given the
necessity for flexibility and the need for a cutting-edge facility.
 Star Topology: All end devices (workstations, servers, etc.) are directly connected to the
central hub (core switch), making maintenance simple and reducing downtime in the
event of a connection failure.
 Mesh Topology: A mesh architecture can offer redundancy and resilience for crucial
services like the server farm and high-availability connections. There are fewer single
points of failure because each gadget is directly connected to numerous other devices.

Network Protocols

1. TCP/IP Protocol Suite: This forms the basis of contemporary networking by offering
the required addressing (IPv4/IPv6), routing, and data transmission protocols. While IP
(Internet Protocol) manages addressing and routing, TCP (Transmission Control
Protocol) makes sure that data is delivered reliably.
2. VLAN Segmentation: As was already noted, the VLAN protocol (IEEE 802.1Q) is
essential for network segmentation since it makes certain that various departments and
services stay separate despite using the same physical infrastructure.
3. STP (Spanning Tree Protocol): STP is necessary in a network with redundant
connections to prevent loops. It contributes to the preservation of a loop-free topology,
avoiding broadcast storms, and guaranteeing network stability.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 73

Downloaded by wofyy. store


4. DHCP (Dynamic Host Configuration Protocol): By automating IP address distribution,
DHCP improves the effectiveness and simplicity of network management. It also makes
it possible for the Matara branch to quickly provision fresh devices.

Justification

1. Performance: By dividing network traffic into distinct segments, lowering the number of
broadcast domains, and enabling effective management and scalability, the proposed
VLANs and logical hierarchy improve performance. With the use of VLANs, it is made
sure that crucial services, like servers, have their own segments to avoid excessive
congestion.

2. Reliability: The star and mesh physical topologies work together to offer redundancy,
making sure there are backup connections in case one fails. Loops are avoided by STP,
which protects the stability of the network.
3. Security: VLANs isolate network portions, greatly enhancing security. In the healthcare
industry, where data privacy is critical, this is essential. Each department may have its
own VLAN, and firewall rules may be used to regulate access between VLANs.
4. Scalability: Scalability is made possible by the hierarchical logical structure and the
integration of physical topologies. It is possible to introduce new divisions, services, or
equipment without significantly disrupting current operations.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 74

Downloaded by wofyy. store


Activity 3

Blue print of the Network

M.A.NAJA MOHAMED
UNIT02−NETWORKING 75
E195225

Downloaded by wofyy. store


VLAN and IP subnetting schema
Matara branch
Departments Network Broadcast Subnet Mask Default No.of VLAN
Address Address Gateway Users

IT Department 198.128.1.0 198.128.1.63 255.255.255.192 198.128.1.2 50 10

Administration 198.128.1.64 198.128.1.79 255.255.255.240 198.128.1.65 10 20


Department

Accounting 198.128.1.80 198.128.1.95 255.255.255.240 198.128.1.81 8 30


And Finance

HR 198.128.1.96 198.128.1.111 255.255.255.240 198.128.1.97 7 40


Department

Reception 198.128.1.112 198.128.1.119 255.255.255.248 198.128.1.113 3 50


Area

Customer 198.128.1.120 198.128.1.127 255.255.255.248 198.128.1.121 3 60


Service

M.A.NAJA MOHAMED
UNIT02−NETWORKING 76
E195225

Downloaded by wofyy. store


Recommended hardware and software of the network
The hardware and software listed below are suggested for use in the Alliance Health network
implementation by the Matara branch's network analyst.
PC- Use of the Dell OptiPlex 7000 Micro PC is advised for the network implementation. The
Dell OptiPlex 7000 Micro PC comes highly recommended for improved and seamless
corporate operations. Additionally, it is advised to use PCs with the following specifications or
better, such as the HP EliteDesk, Lenovo ThinkCentre, Microsoft Surface Studio, and ASUS
ExpertBook. These PCs were selected for the Matara branch mostly due to their performance.
Specifications:
Connection with Ethernet RJ-45
RAM with 8GB DDR4 or higher
Storage SSD with 512 GB
CPU 12th Gen Intel Core i5-12500T vPro or higher

Laptops-The Toshiba Dryna Book with the following specs is the suggested laptop for the
network implementation. Additionally, any brand that meets the requirements below can be
utilized in addition to laptops bearing the Toshiba mark, which is strongly advised.
Specifications:
OS with Windows 10 or higher
CPU with Intel(R) Core(TM) i5-6300U CPU @ 2.40GHz 2.50 GHz or higher
RAM with 8GB or higher

Switch- Ubiquiti is recognized for providing affordable networking solutions, and their UniFi
Switch Series is no exception. Their UniFi Switch series offers managed switches with
complex capabilities like PoE choices, VLAN compatibility, and others that are simply handled
by their UniFi Controller software.
Router- The ASUS RT-AX88U is a router that can be a suitable fit for your requirements.
Strong coverage, support for the most recent Wi-Fi standards, a variety of capabilities, and
outstanding

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 77

Downloaded by wofyy. store


reliability are all features that this router offers. However, it's crucial to remember that the
"best" router can change depending on your unique needs and tastes.
Printers- LaserJet Pro MFP M428fdw from HP This multifunction monochrome laser printer
(MFP) provides quick print times, good print quality, and a range of networking options. It has
security features including secure printing and is appropriate for medium to high printing
volumes.
Firewall- Next-Generation Firewalls from Palo Alto Networks: Palo Alto is renowned for its
cutting-edge firewall technology. Their firewalls include user-based policies, content filtering,
granular application visibility and control, and robust security capabilities. They provide high
availability and scalability solutions.
DNS server- Alliance Health's Matara location has been using Cloudflare DNS. The primary
benefits of using Cloudflare DNS are its outstanding performance, high level of privacy, and
community forum for support.

Maintenance schedule

Daily Tasks:
 Backup Verification:
 Check the accuracy of automated backups of vital configurations and data.
 Security Checks:
 Keep an eye out for any questionable activity in the security alerts and records.
 Look for software patches and upgrades to fix any security flaws.

Weekly Tasks:
 Network Performance Analysis:
 Investigate patterns in network performance indicators and potential bottlenecks.
 Software Updates:
 Update and patch your computers', servers', and network's software.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 78

Downloaded by wofyy. store


 Check to see if your antivirus and antimalware definitions are current.
 Review Logs:
 Review event logs and system logs for errors, warnings, and potential issues.

Monthly Tasks:
 Hardware Health Check:
 Inspect the physical condition of network hardware for signs of wear or malfunction.
 Clean dust from equipment to prevent overheating.
 User Access Review:
 To establish appropriate access controls, review user accounts and permissions.
 Accounts that are no longer needed should be disabled or deleted.
 Data Backup Test:
 Perform test restores from backup to ensure data integrity and recovery readiness.
 Network Security Audit:
 Perform a thorough security audit to find weaknesses and potential threats.
 Examine access controls, intrusion detection systems, and firewall rules.
 Network Documentation Update:
 Update network topology, diagrams, and documentation to reflect any alterations.

Bi-Annual Tasks:
 Hardware and Software Upgrades:
 Based on performance and compatibility, determine whether hardware upgrades or
replacements are necessary.
 Review software licenses, and if required, think about updating to newer versions.
 Physical Cable Inspection:
 Inspect network cables for signs of damage or wear and replace as needed.
 Reorganize cable management to maintain a clean and organized environment.

Annual Tasks:
 Network Policy Review:

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 79

Downloaded by wofyy. store


 Review the security protocols, rules, and practices for the network.
 Update the policies to reflect any organizational or regulatory changes.
 Capacity Planning:
 Analyze the network's capacity and decide whether you need to add more resources to
handle expansion.

Network design feedback

Figure 37: FEEDBACK FORM

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 80

Downloaded by wofyy. store


Figure 38: FEEDBACK FORM

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 81

Downloaded by wofyy. store


Figure 39: FEEDBACKFORM

Figure 40: FEEDBACKFORM

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 82

Downloaded by wofyy. store


Figure 41: FEEDBACKFORM

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 83

Downloaded by wofyy. store


Figure 42: FEEDBACKFORM

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 84

Downloaded by wofyy. store


Figure 43: USER FEEDBACK

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 85

Downloaded by wofyy. store


Figure 44: USER FEEDBACK

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 86

Downloaded by wofyy. store


Figure 45: USER FEEDBACK

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 87

Downloaded by wofyy. store


Figure 46: USER FEEDBACK

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 88

Downloaded by wofyy. store


Figure 47: USER FEEDBACK

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 89

Downloaded by wofyy. store


Figure 48: USER FEEDBACK

The user feedback mentioned above, which was obtained from alliance Health, indicates a
successful network design. The primary topics covered by users are connectivity, security and
privacy, performance, communication, dependability, interoperability, and network support.
Overall, the network design performed as intended and met the needs of the users.

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 90

Downloaded by wofyy. store


Configuring the network

Assigning IP address for IT department

Figure 49: assigning ip

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 91

Downloaded by wofyy. store


Figure 50: assigning ip

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 92

Downloaded by wofyy. store


VLAN Assigning

Figure 51: assigning vlan

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 93

Downloaded by wofyy. store


Assigning password for the router

Figure 52: pssword for router

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 94

Downloaded by wofyy. store


Configuring DHCP in a router

Figure 53: DHCP

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 95

Downloaded by wofyy. store


Maintenance schedule
Task Daily Weekly Monthly
Updating software and other
components in network
Cleaning the devices
Keeping backups of necessary
Information
Monitoring system performance
Security testing and maintaining
Updating documentation

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 96

Downloaded by wofyy. store


Activity 4

Matara branch network system

Figure 54: network design by Cisco packet tracer

Test cases
CASE TASK EXPECTED ACTUAL STATUS
ID RESULT RESULT
001 To check the Assigned IP IP address and Success
IP address in address and subnet mask
IT subnet masks are are visible
departments visible in
are assigned command
properly prompt

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 97

Downloaded by wofyy. store


Figure 55: checking ip in It department

CASE TASK EXPECTED ACTUAL STATUS


ID RESULT RESULT
002 Ping Reply from Reply Success
198.128.1.122 to 198.128.1.12 received
198.128.1.123 3

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 98

Downloaded by wofyy. store


Figure 56: ping

CASE TASK EXPECTED ACTUAL STATUS


ID RESULT RESULT
003 Checking DHCP DHCP Success
whether the success success

M.A.NAJA MOHAMED
E195225 UNIT02−NETWORKING 99

Downloaded by wofyy. store


DHCP properly message
assigned or not shown

Figure 57: DHCP

CASE TASK EXPECTED ACTUAL STATUS


ID RESULT RESULT
004 Checking VLAN and VLAN and Success
whether the fast Ethernet fast Ethernet
VLAN and fast are

M.A.NAJA MOHAMED UNIT02−NETWORKING


E195225 100

Downloaded by wofyy. store


Ethernet are should be successfully
appropriately assigned connected as
assigned and expected
accessed

Figure 58: VLAN

CASE TASK EXPECTED ACTUAL STATUS


ID RESULT RESULT

M.A.NAJA MOHAMED UNIT02−NETWORKING


E195225 101

Downloaded by wofyy. store


004 Checking the When Password is Success
password is enabling the asked
working in router
router password
should be
asked

Figure 59: password

M.A.NAJA MOHAMED UNIT02−NETWORKING


E195225 102

Downloaded by wofyy. store


FUTURE ENHANCEMENTS
As the technological sector develops, security concerns will likewise steadily grow, necessitating
the improvement of the network's encryption system in order to preserve the system's secrecy
and the use of biometric devices. To prevent unauthorized access to the system's data, which
could pose a major threat to the business, this system is being implemented. Client computers
should typically have less processing power, memory, and storage than servers. The server will
offer backup facilities, remote control, and system security. VPN configuration can be applied to
the system for strong network encryption to safeguard data flow when browsing the internet and
sustain internet traffic. In order to prevent data loss through physical damage, natural disasters,
or any other issue where the system data cannot be retrieved, a cloud system can also be applied
to the system. Through the introduction of this methodology, the data and resources of the
organization can be safeguarded, and network crashes can be managed. A separate network will
be built to allow outside users to use the network.

CONCLUSION
This system's primary goal is to process and store client data so that it can be processed by the
organization via this efficient communication channel. Although several mistakes were found,
they were finally corrected. This network's design complies with and fully satisfies all requests
and recommendations made by ALLIANCE HEALTH. DHCP is used to assign IP addresses to
the network's devices.

According to the plan the network the below decisions have been made.

Devices
 Switch
 Router
Network model
 MAN

M.A.NAJA MOHAMED UNIT02−NETWORKING


E195225 103

Downloaded by wofyy. store


Network topology
 Hybrid topology
Network protocols
 OSI model
Security methodology
 Firewall
 Proxy server
 IDS
 IPS

M.A.NAJA MOHAMED UNIT02−NETWORKING


E195225 104

Downloaded by wofyy. store


References
Anon., n.d. [Online]
Available at:
data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wBDAAsJCQcJCQcJCQkJCwkJCQ
kJCQsJCwsMCwsLDA0QDBEODQ4MEhkSJRodJR0ZHxwpKRYlNzU2GioyPi0pMBk7IRP/2wBDAQc
ICAsJCxULCxUsHRkdLCwsLCwsLCwsLCwsLCwsLCwsLCwsLCwsLCwsLCwsLCwsLCwsLCwsLCwsLC
wsLCwsLCz/wAARCAC3AUoDASIAAhEB
[Accessed 16 JULY 2022].
Anon., n.d. [Online]
Available at: https://www.google.com/url?sa=i&url=https%3A%2F%2Feduinput.com%2Fwhat−
is−computer− network
%2F&psig=AOvVaw2VISH0RyXRxKTIsAnwwnGx&ust=1692280578021000&source=im
ages&cd=vfe&opi=89978449&ved=0CBAQjRxqFwoTCIDLr−2q4YADFQAAAAAdAAAAABAE
[Accessed 1 5 2023].
Anon., n.d. [Online]
Available at: https://www.google.com/url?sa=i&url=https%3A%2F%2Feduinput.com%2Fwhat−
is−computer− network
%2F&psig=AOvVaw2VISH0RyXRxKTIsAnwwnGx&ust=1692280578021000&source=im
ages&cd=vfe&opi=89978449&ved=0CBAQjRxqFwoTCIDLr−2q4YADFQAAAAAdAAAAABAE
[Accessed 1 5 2023].
Anon., n.d. [Online]
Available at: https://www.google.com/imgres?imgurl=https%3A%2F%2Fen.vcenter.ir%2Fwp−
content%2Fuploads%2F2017%2F10%2FWireless−Local−Area−Network−
WLAN.jpg&tbnid=FW3uhf5K4fblVM&vet=12ahUKEwj7zZ−3r−
GAAxXF5TgGHTqIBOkQMygMegUIARCOAQ..i&imgrefurl=https%3A%2F%2Fen.vcenter.ir%2
[Accessed 2 5 2023].
Anon., n.d. [Online]
Available at: https://www.google.com/imgres?imgurl=https%3A%2F%2Fdata− flair.training
%2Fblogs%2Fwp−content%2Fuploads%2Fsites%2F2%2F2021%2F09%2Fpassive−
optical−local−area−network−
POLAN.jpg&tbnid=yqtY74FGSdNb0M&vet=12ahUKEwidi_mvseGAAxVjoekKHbEvCeoQMygOeg
QIARBo..i&imgrefu
[Accessed 3 5 2023].
Anon., n.d. [Online]
Available at:
https://www.google.com/imgres?imgurl=http%3A%2F%2Fpercorso.altervista.org%2Fepn.jpg
&tbnid=9UnG8DLjmDuYYM&vet=12ahUKEwiwhqftseGAAxW0h2MGHdPmA30QMygNegQIARB
o..i&imgrefurl=http%3A%2F%2Fpercorso.altervista.org%2Fing.php&docid=_−mf3aBVP7j−
2M&w=638&h=479&q=EPN%
[Accessed 3 5 2023].

M.A.NAJA MOHAMED UNIT02−NETWORKING


E195225 105

Downloaded by wofyy. store


Anon., n.d. [Online]
Available at:
https://www.google.com/imgres?imgurl=https%3A%2F%2Fupload.wikimedia.org%2Fwikipedi
a%2Fcommons%2Fthumb%2F0%2F00%2FVirtual_Private_Network_overview.svg%2F330px−
Virtual_Private_Network_overview.svg.png&tbnid=G2XaYWMx3YR−
sM&vet=12ahUKEwjZlNehsuGAAxUNmmMGHW57A
[Accessed 3 5 2023].
Anon., n.d. [Online]
Available at:
https://www.google.com/imgres?imgurl=https%3A%2F%2Fc8.alamy.com%2Fcomp%2F2AEW
49G%2Fhome−area−network−han−
2AEW49G.jpg&tbnid=_J0Z9dUFPW8MAM&vet=12ahUKEwjhr9vOsuGAAxXjoOkKHZlgA54QMy
gDegQIARBc..i&imgrefurl=https%3A%2F%2Fwww.alamy.com%2Fhome−area−network−han−i
[Accessed 3 5 2023].
Anon., n.d. [Online]
Available at:
https://www.google.com/imgres?imgurl=https%3A%2F%2Fcdn1.byjus.com%2Fwp− content
%2Fuploads%2F2022%2F07%2Fbus−
topology.png&tbnid=idEwum5udAKiBM&vet=12ahUKEwih2pSis−
GAAxUk2jgGHaDEDxwQMygBegQIARB2..i&imgrefurl=https%3A%2F%2Fbyjus.com%2Fgate%2
Fbus−topology−note
[Accessed 4 5 2023].
Anon., n.d. [Online]
Available at:
https://www.google.com/imgres?imgurl=https%3A%2F%2Fwww.itrelease.com%2Fwp−
content%2Fuploads%2F2021%2F06%2FFull−Mesh−
Topology.jpg&tbnid=3o3CR7ldufYdYM&vet=12ahUKEwjh9IbvtOGAAxVcmmMGHWzNCgMQM
ygFegQIARB−..i&imgrefurl=https%3A%2F%2Fwww.itrelease.com%2F2021%2F
[Accessed 5 5 2023].
Anon., n.d. [Online]
Available at:
https://www.google.com/imgres?imgurl=https%3A%2F%2Fwww.zenarmor.com%2Fdocs%2Fa
ssets%2Fimages%2Fhow−tree−topology−works−
d6f5ca7d199c5cfe29dd4d35ed669871.png&tbnid=m4sscD0TYy3oxM&vet=12ahUKEwjZhIKcte
GAAxW6z6ACHZgNDqYQMygCegQIARBV..i&imgrefurl=https%3A%2F%2F
[Accessed 5 5 2023].
Anon., n.d. [Online]
Available at:
https://www.google.com/imgres?imgurl=https%3A%2F%2Fwww.itrelease.com%2Fwp−
content%2Fuploads%2F2020%2F07%2FWhat−is−hybrid−
topology.jpg&tbnid=0l95WhCZC2qx9M&vet=12ahUKEwi0qufJteGAAxUJz6ACHTbrA8gQMygCe

M.A.NAJA MOHAMED UNIT02−NETWORKING


E195225 106

Downloaded by wofyy. store


gQIARB4..i&imgrefurl=https%3A%2F%2Fwww.itrelease.com%2F20
[Accessed 5 5 2023].
Anon., n.d. [Online]
Available at:
https://www.google.com/imgres?imgurl=https%3A%2F%2Fsymbols.getvecta.com%2Fstencil_
37%2F26_bridge.035209e7fc.svg&tbnid=I592v_tEGm61CM&vet=12ahUKEwjGr5HGtuGAAxUP
m2MGHYpGBcMQMygQegUIARCWAQ..i&imgrefurl=https%3A%2F%2Fvecta.io%2Fsymbols%2
F37%2Fbasic−network%2F
[Accessed 6 5 2023].
Anon., n.d. [Online]
Available at:
https://www.google.com/imgres?imgurl=https%3A%2F%2Fthecybersecuritymancom.files.wor
dpress.com%2F2018%2F01%2Fhub4.png&tbnid=giU3HEP7tl5BnM&vet=12ahUKEwiY_bLstuGA
AxWSpekKHUBADY8QMygJegUIARCHAQ..i&imgrefurl=https%3A%2F%2Fthecybersecurityman.
com%2F2018%2F01%2
[Accessed 6 5 2023].
Anon., n.d. [Online]
Available at:
https://www.google.com/imgres?imgurl=https%3A%2F%2Fpimages.toolbox.com%2Fwp−
content%2Fuploads%2F2022%2F07%2F26120446%2FCiscos−Industry−Standard−Network−
Switch.png&tbnid=ON07W−w934MxOM&vet=12ahUKEwjuiJqKt−
GAAxXRz6ACHdoYB7wQMygAegQIARB0..i&imgrefurl=https%3
[Accessed 6 5 2023].
Anon., n.d. [Online]
Available at:
https://www.google.com/imgres?imgurl=https%3A%2F%2Fmedia.geeksforgeeks.org%2Fwp−
content%2Fuploads%2F11−40.png&tbnid=ZdvAcE5e8HIahM&vet=12ahUKEwiW2−uvt−
GAAxVE_TgGHVQnBZYQMygNegUIARCOAQ..i&imgrefurl=https%3A%2F%2Fwww.geeksforgee
ks.org%2Fintroduction−of−a−ro
[Accessed 6 5 2023].
Anon., n.d. [Online]
Available at:
https://www.google.com/imgres?imgurl=https%3A%2F%2Fwww.computerhope.com%2Fjarg
on%2Fc%2Fcablemod.png&tbnid=−ScT−xHwqXlTVM&vet=12ahUKEwizopXWt−
GAAxVL_zgGHVsgDT4QMygAegQIARB0..i&imgrefurl=https%3A%2F%2Fwww.computerhope.c
om%2Fjargon%2Fm%2Fmodem.htm&docid=PgTI
[Accessed 6 5 2023].
Anon., n.d. [Online]
Available at:
https://www.google.com/imgres?imgurl=https%3A%2F%2Ft4tutorials.com%2Fwp− content%2Fuploads
%2F2017%2F12%2Frepeaters.png&tbnid=jwXiNJUAc92K7M&vet=12ahUK

M.A.NAJA MOHAMED UNIT02−NETWORKING


E195225 107

Downloaded by wofyy. store


EwiNg5f3t− GAAxXpz6ACHULyCYEQMygJegUIARCIAQ..i&imgrefurl=https%3A%2F
%2Ft4tutorials.com%2Fc omputer−network−d
[Accessed 7 5 2023].
Anon., n.d. [Online]
Available at:
https://www.google.com/imgres?imgurl=https%3A%2F%2F3.imimg.com%2Fdata3%2FBF%2F
NO%2FGLADMIN−17648%2Fnetwork−gateway−250x250.jpg&tbnid=gpee2mNiQ−
M9zM&vet=12ahUKEwij_cGUuOGAAxXi_DgGHaqaDYoQMygyegUIARDkAQ..i&imgrefurl=https
%3A%2F%2Fm.indiamart.com%2Fimpcat%2F
[Accessed 7 5 2023].
Anon., n.d. [Online]
Available at:
https://www.google.com/imgres?imgurl=https%3A%2F%2Fwww.linksys.com%2Fdw%2Fimage
%2Fv2%2FBGBH_PRD%2Fon%2Fdemandware.static%2F−%2FLibrary−Sites−Linksys−Shared−
Library%2Fdefault%2Fdw9f454509%2Fimages%2FArticles%2Fwhat−is−a−wifi−access−
point%2Fwhat−is−a−wifi−a
[Accessed 7 5 2023].
Anon., n.d. [Online]
Available at:
https://www.google.com/imgres?imgurl=https%3A%2F%2Fwww.keycdn.com%2Fimg%2Fsupp
ort%2Forigin−server−
explained.png&tbnid=xAiaC6coG07jZM&vet=12ahUKEwj0zOHuuOGAAxWt5TgGHRLlBAcQMyg
AegQIARBd..i&imgrefurl=https%3A%2F%2Fwww.keycdn.com%2Fsupport%2Forigin−
server&doc
[Accessed 7 5 2023].
Anon., n.d. [Online]
Available at:
https://www.google.com/imgres?imgurl=https%3A%2F%2Fwww.paloaltonetworks.com%2Fco
ntent%2Fdam%2Fpan%2Fen_US%2Fimages%2Fcyberpedia%2Fdiagram−proxy− server.png
%3Fimwidth%3D480&tbnid=ufs−h2oRNwfbaM&vet=12ahUKEwiT29−
bueGAAxVym2MGHVPlBHsQMygNegUIARCPAQ..i&imgrefu
Anon., n.d. [Online]
Available at:
https://www.google.com/imgres?imgurl=https%3A%2F%2Fi0.wp.com%2Fwww.exabytes.my%
2Fblog%2Fwp−content%2Fuploads%2F2022%2F09%2Fweb− server.jpg%3Fresize
%3D468%252C250%26ssl%3D1&tbnid=uo_gp7QHsiddCM&vet=12ahUKEw
jHn5naueGAAxWx2zgGHZbFC7QQMygMegUIARCNAQ..i&imgrefu
[Accessed 2023].
Anon., n.d. [Online]
Available at:

M.A.NAJA MOHAMED UNIT02−NETWORKING


E195225 108

Downloaded by wofyy. store


https://www.google.com/imgres?imgurl=https%3A%2F%2Fjenkov.com%2Fimages%2Fsoftwar
e−architecture%2Fclient−server−2.png&tbnid=IIc2HzNMhQ6h2M&vet=12ahUKEwjc−
uT9ueGAAxXemmMGHRI2CsQQMyhEegUIARCHAg..i&imgrefurl=https%3A%2F%2Fjenkov.com
%2Ftutorials%2Fsoftware−arc
[Accessed 2023].
Anon., n.d. [Online]
Available at:
https://www.google.com/imgres?imgurl=https%3A%2F%2Fstatic.javatpoint.com%2Fcloudpag
es%2Fimages%2Fcloud−server.png&tbnid=RuBSFGxy−
6qCLM&vet=12ahUKEwj67JmouuGAAxWcz6ACHYDdDYYQMygAegQIARB0..i&imgrefurl=https
%3A%2F%2Fwww.javatpoint.com%2Fcloud−server&docid=9W
Anon., n.d. [Online]
Available at:
https://www.google.com/imgres?imgurl=https%3A%2F%2Fwww.samlogic.net%2Farticles%2Fi
mages%2Fclient−and−mail−server−
x2.gif&tbnid=priD0r1htI4thM&vet=12ahUKEwiE2MTBuuGAAxVOx6ACHTraDW8QMygCegQIAR
B4..i&imgrefurl=https%3A%2F%2Fwww.samlogic.net%2Farticles%2Fmail−s
Anon., n.d. [Online]
Available at:
https://www.google.com/imgres?imgurl=https%3A%2F%2Fassets.gcore.pro%2Fblog%2Fdns−
servers−what−they−are−and−how−they−work%2F1631695472.jpg&tbnid=_bMKagT−
Ltfc8M&vet=12ahUKEwjmv9nyuuGAAxVloekKHYq_DrUQMygDegQIARB6..i&imgrefurl=https%
3A%2F%2Fgcore.com%2Flearni
Anon., n.d. [Online]
Available at:
https://www.google.com/imgres?imgurl=https%3A%2F%2Fskillsireupload.s3.amazonaws.com
%2Fupload%2Fphotos%2F2020%2F11%2Fu9OU3TtZKtcYM2a4CkgX_23_e4389543609182c3b4
7caa88fe2620aa_image.png&tbnid=l5tmMh8d9YYaMM&vet=12ahUKEwjYsLOXu−
GAAxU3mmMGHTSSC8MQMygBegQIARB2.
Anon., n.d. digitalthinkerhelp.com. [Online]
Available at:
https://www.google.com/imgres?imgurl=https%3A%2F%2Fdigitalthinkerhelp.com%2Fezoimgf
mt%2Fi.ibb.co%2FjLR8DKq%2FCampus−Area− Network1.jpg%3Fezimgfmt%3Drs
%3A364x173%2Frscb1%2Fngcb1%2FnotWebP&tbnid=pEt_1
CfmEaPs2M&vet=12ahUKEwi29dTTrOGAAxWzkGMGHXRUC6oQMygFegQIAR
[Accessed 2 5 2023].
Anon., n.d. geeksforgeeks. [Online]
Available at:
https://www.google.com/url?sa=i&url=https%3A%2F%2Fwww.geeksforgeeks.org%2Ftypes−
of−computer−networks%2F&psig=AOvVaw1−
Y8KaqD_1JTsfCGQkojb_&ust=1692280317491000&source=images&cd=vfe&opi=89978449&v

M.A.NAJA MOHAMED UNIT02−NETWORKING


E195225 109

Downloaded by wofyy. store


ed=0CBAQjRxqFwoTCOCh1vKp4YADFQAAAAAdAAAAABAI
[Accessed 1 5 2023].
Anon., n.d. geeksforgeeks.COM. [Online]
Available at:
https://www.google.com/imgres?imgurl=https%3A%2F%2Fmedia.geeksforgeeks.org%2Fwp−
content%2Fuploads%2F20210817121003%2Fman−
300x192.png&tbnid=8F_5ZmT2NiRa6M&vet=12ahUKEwjgoJenreGAAxVYmmMGHQO7ChIQM
ygCegQIARB4..i&imgrefurl=https%3A%2F%2Fwww.geeksforgeeks.org%2
[Accessed 2 5 2023].
Anon., n.d. ttgtmedia. [Online]
Available at:
https://www.google.com/imgres?imgurl=https%3A%2F%2Fcdn.ttgtmedia.com%2Frms%2Fonli
neimages%2Fns−star_network_topology−
h_half_column_mobile.png&tbnid=pP6iSnEeYFkW8M&vet=12ahUKEwjht7ixtOGAAxXi_DgGHa
qaDYoQMygRegUIARCWAQ..i&imgrefurl=https%3A%2F%2Fwww.techtarg
[Accessed 4 5 2023].
Anon., n.d. www.computerhope.com. [Online]
Available at:
https://www.google.com/url?sa=i&url=https%3A%2F%2Fwww.computerhope.com%2Fjargon
%2Fr%2Fringtopo.htm&psig=AOvVaw32RPxgT7JNhymZuP9ZRpU3&ust=1692283072579000&s
ource=images&cd=vfe&opi=89978449&ved=0CBAQjRxqFwoTCNi2gpO04YADFQAAAAAdAAAA
ABAE
[Accessed 4 5 2023].
Anon., n.d. www.friktoria.com. [Online]
Available at:
https://www.google.com/imgres?imgurl=https%3A%2F%2Fwww.friktoria.com%2Fimages%2F
services%2Fvps−vds%2Fsan−1.jpg&tbnid=a_eE−H3x4fFyDM&vet=12ahUKEwjf48f5r−
GAAxWtkmMGHUHfDM4QMygCegQIARB6..i&imgrefurl=https%3A%2F%2Fwww.friktoria.com
%2Fen%2Fwhat−is−storage−area
[Accessed 2 5 2023].
Anon., n.d. www.lyfin360.com. [Online]
Available at:
https://www.google.com/imgres?imgurl=https%3A%2F%2Fwww.lyfin360.com%2Fwp− content
%2Fuploads%2F2020%2F08%2FWAN−full−
form.jpg&tbnid=1meQmpu5CJrU3M&vet=12ahUKEwjH37fOruGAAxUG6DgGHdPvAosQMygUe
gUIARCeAQ..i&imgrefurl=https%3A%2F%2Flyfin360.com%2Fwan−full−form%2F
[Accessed 2 5 2023].
Anon., n.d. www.networkstraining.com. [Online]
Available at:
https://www.google.com/imgres?imgurl=https%3A%2F%2Fwww.networkstraining.com%2Fw
p−content%2Fuploads%2F2018%2F11%2FSYSTEM−

M.A.NAJA MOHAMED UNIT02−NETWORKING


E195225 110

Downloaded by wofyy. store


AREA.jpg&tbnid=ozIJ9JqkiHq5GM&vet=12ahUKEwiFn−
LYsOGAAxV6mmMGHeazCiwQMygDegQIARBh..i&imgrefurl=https%3A%2F%2Fwww.networks
training.com%2F
[Accessed 3 5 2023].
Anon., n.d. WWW.technopediasite.COM. [Online]
Available at:
https://www.google.com/url?sa=i&url=https%3A%2F%2Fwww.technopediasite.com%2F2021
%2F07%2Flocal−area−network−lan−
concept.html&psig=AOvVaw32Xts2ctJ72bElJaTWLHVJ&ust=1692280945463000&source=imag
es&cd=vfe&opi=89978449&ved=0CBAQjRxqFwoTCMihmZ2s4YADFQAAAAAdAAAAA
[Accessed 2 5 2023].
DINDI, S., 2023. makeuseof. [Online]
Available at: https://www.makeuseof.com/basic−server−types−used−in−computer−networking/
engineers, n. a. s., 2022. solarwinds. [Online]
Available at: https://www.solarwinds.com/resources/it−glossary/network−protocols
Janishar Ali, A. S., 2020. after academy. [Online]
Available at:
https://afteracademy.com/blog/what−is−network−topology−and−types−of−
network−topology/
Rouse, M., 2012. techopedia. [Online]
Available at: https://www.techopedia.com/definition/25890/logical−topology
SINGH, C., 2023. beginnersbook. [Online]
Available at: https://beginnersbook.com/2021/12/types−of−transmission−media−guided−and−
unguided/
Swati Tawde, P. P., 2023. educba. [Online]
Available at: https://www.educba.com/types−of−network−devices/
swetha_vazhakkat, a., 2023. Types of Computer Networks. [Online]
Available at: https://www.geeksforgeeks.org/types−of−computer−networks/
Yasar, K., 2023. techtarget. [Online]
Available at: https://www.techtarget.com/searchnetworking/definition/network

M.A.NAJA MOHAMED UNIT02−NETWORKING


E195225 111

Downloaded by wofyy. store


Grading Rubric

Grading Criteria Achieved Feedback

LO1 : Examine networking principles and their protocols.

P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Assess common networking principles and how protocols
enable the effectiveness of networked systems.

LO2 : Explain networking devices and operations

P3
Discuss the operating principles of networking devices and
server types.

M.A.NAJA MOHAMED UNIT02−NETWORKING


E195225 112

Downloaded by wofyy. store


P4
Discuss the interdependence of workstation hardware and
relevant networking software
M2
Explore a range of server types and justify the selection of a
server for a given scenario, regarding cost and performance
optimisation

LO 1 & LO2
D1 Evaluate the topology protocol selected for a given scenario and
how it demonstrates the efficient utilisation of a networking
system.
LO3 : Design efficient networked systems

P5
Design a networked system to meet a given specification.
P6
Design a maintenance schedule to support the networked
system.

M.A.NAJA MOHAMED UNIT02−NETWORKING


E195225 113

Downloaded by wofyy. store


M3
Analyse user feedback on your designs with the aim of
optimising your design and improving efficiency.
D2
Critically reflect on the implemented network, including the
design and decisions made to enhance the system.
LO4 : Implement and diagnose networked systems

P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D2 Critically reflect on the implemented network, including the
design and decisions made to enhance the system.

M.A.NAJA MOHAMED UNIT02−NETWORKING


E195225 114

Downloaded by wofyy. store

You might also like