Sei sulla pagina 1di 45

ASSIGNMENT BRIEF SHEET

QUALIFICATION BTEC HN Diploma in Computing and system Development


UNIT Unit 43: Networking Infrastructure
UNIT CODE A/601/1964
QCF LEVEL 5 BTEC HIGHER NATIONAL DIPLOMA

CREDIT VALUE 15
Assignment Issue
Assignment Due: Submitted:
Date:
Assessor Name : HOÀNG ĐỨC QUANG

Learner: PHẠM NGỌC CƯỜNG-GCS18568

Assignment Title: Networking Infrastructure


Aim of the To enable learners to understand computer networking
assignment concepts, how they work, how they operate and the protocols,
standards and the models associated with networking
technology.

Unit Learning LO1: Examine networking principles and their protocols.


Outcomes LO 2: Explain networking devices and operations.
You are employed as a Network Engineer by an SME [insert
Assignment Brief &
here either a named SME or enable students to choose an SME
Guidance
and use the following insertion ‘an SME of your choice’.
(see Appendix for Students should be encouraged to use their own place of work, if
assessment criteria appropriate] and have been asked to investigate and explain
and grade networking principles, protocols and devices.
descriptors)
You will need to produce a report for the CEO that includes the
following:
1. An introduction to provide an overview of your report.
2. An explanation of networking principles, protocols and
devices, including benefits and constraints of networked
solutions, the impact of network topology, communication
and bandwidth requirements, effectiveness of networking
systems, operating principles of networking devices and
server types and networking software.
Unit Learning LO3 Design efficient networked systems.
Outcomes LO4 Implement and diagnose networked systems.
Assignment Brief You are employed as a network engineer by a high-tech
and Guidance networking solution development organisation and are working
on a project for a local educational institution. You will need to
analyse the specification from the institution below for
completion of this project within a given timeframe:
People: 200 students, 15 teachers, 12 marketing and
administration staff, 5 higher managers including the head of
academics and the programme manager, 3 computer network
administrators
Resources: 50 student lab computers, 35 staff computers, 3
printers
Building: 3 floors, all computers and printers are on the ground
floor apart from the IT labs – one lab located on the first floor
and another located on the second floor.
Part 1 Design efficient networked systems

1. Prepare a written step-by-step plan of how you are


going to design a Local Area Network including a
blueprint of your LAN.
2. Justify your choice of devices for your network design.
3. Produce a test plan to evaluate this design for the
requirements of bandwidth and cost constraints as per
user specifications.
4. Justify the security requirements and quality of
services needed for selection of accessories.
5. Suggest a maintenance schedule to support the
networked system.

Part 2 Implement test and diagnose networked systems

1. Implement a networked system based on your


prepared design.
2. Conduct verification with e.g. Ping, extended ping,
trace route, telnet, SSH, etc.
3. Record the test results and analyse these against
expected results.
4. Investigate what functionalities would allow the system
to support device growth and the addition of
communication devices.
5. Discuss the significance of upgrades and security
requirements in your recommendations.
Student guidelines The objective for this task is to address and exhibit
understand networking principals.
You are required to carry out research by using supportive
materials like books, websites, etc., and give a feedback of the
findings on all assessment criteria
1. The answers need to be reflected to the given case study.

Assignment Format Fonts

 Use a clear, readable font such as Verdana, Calibri,


Tahoma or Arial, and be consistent and use the same font
throughout
 Use black text on a white background. Avoid coloured
backgrounds or text in a colour other than black unless
you have special permission to use them (for example, if
you’re dyslexic)
 Use 12 point for the body of your assignment

Spacing

 Use 1.5 or double spacing and fairly wide margins:

Word Count

 The (approx.) word limit for this assignment 4000 to 4500


words
 Any specified word limit in the assignment brief is for
guidance purpose only. It is there to give an indication of
the level of depth that may be needed to provide sufficient
evidence.

Reference List 

 You must ensure that all external sources used to provide


evidence in your work must be referenced accordingly to
avoid plagiarism and collusion
 You must use correct and consistent Harvard referencing
style
 A full reference list should be at the end of the
assignment, and should start on a new page labelled
‘References’ or ‘Reference List’

Submission Format The submission is in the form of an individual written report. This
should be written in a concise, formal business style using single
spacing and font size 12. You are required to make use of
headings, paragraphs and subsections as appropriate, and all
work must be supported with research and referenced using the
Harvard referencing system. Please also provide a bibliography
using the Harvard referencing system. The recommended word
limit is 2,000–2,500 words, although you will not be penalised for
exceeding the total word limit.

Learners declaration
I certify that the work submitted for this assignment is my own and research sources are
fully acknowledged.
Student signature: PHẠM NGỌC CƯỜNG Date:
02/05/2019

Criteria Reference

LO Learning Outcome AC In this assessment you will have the Task


(LO) opportunity to present evidence that No.
shows you are able to:

LO Examine networking P1 Discuss the benefits and constraints of


1 principles and their different network types and standards.
protocols
P2 Explain the impact of network topology,
communication and bandwidth
requirements.

LO Explain networking P3 Discuss the operating principles of


2 devices and networking devices and server types.
operations
Implement a network design topology
infrastructure based on a prepared
design and list the different type of
topologies.

P4 Discuss the inter-dependence of


workstation hardware with relevant
networking software.

LO3 Design efficient P5 Design a networked system to meet a


networked systems given specification.

P6 Test and evaluate the design to meet


the requirements and analyse user
feedback.

LO4 Implement and P7 Implement a networked system based


diagnose networked on a prepared design.
systems

P8 Document and analyse test results


against expected results.

Higher Grade Achievement (Where applicable)

Grade Descriptor Comment’s /tick Grade Descriptor Comment’s /tick

M1: Compare D1: Considering a


common networking given scenario,
principles and how identify the topology
protocols enable the protocol selected for
the efficient
effectiveness of
utilisation of a
networked systems.
networking system.

M2: Explore a range D2: Design a


of server types and maintenance
justify the selection schedule to support
of a server, the networked
considering a given system
scenario regarding
cost and
performance
optimisation.

M3: Install and D3: Use critical


configure network reflection to
services and evaluate own work
applications on your and justify valid
choice conclusions

M4: Recommend
potential
enhancements for
the networked
systems.

Assignment Feedback

Formative Feedback: Assessor to Student

Action Plan

Summative feedback

Assessor Signature Date

Student Signature Date


ASSIGNMENT FRONT SHEET

QUALIFICATION
BTEC HN Diploma in Computing and Unit 43: Networking Infrastructure
system Development
UNIT CODE A/601/1964
QCF LEVEL 5 BTEC HIGHER NATIONAL DIPLOMA
CREDIT VALUE 15
Issue Date: Completion Date: Submitted:
Assignment Title : Understanding of networking infrastructures
management

GRADING GRID

P1 P2 P3 P4 P5 P6 P7 P8 M1 M2 M3 M4 D1 D2 D3

LO Learning Outcome AC In this assessment you will have the Task


(LO) opportunity to present evidence that No.
shows you are able to:

LO Examine networking P1 Discuss the benefits and constraints of


1 principles and their different network types and standards.
protocols
P2 Explain the impact of network topology,
communication and bandwidth
requirements.

LO Explain networking P3 Discuss the operating principles of


2 devices and networking devices and server types.
operations
Implement a network design topology
infrastructure based on a prepared
design and list the different type of
topologies.

P4 Discuss the inter-dependence of


workstation hardware with relevant
networking software.

LO3 Design efficient P5 Design a networked system to meet a


networked systems given specification.

P6 Test and evaluate the design to meet


the requirements and analyse user
feedback.

LO4 Implement and P7 Implement a networked system based


diagnose networked on a prepared design.
systems

P8 Document and analyse test results


against expected results.

Learners declaration
I certify that the work submitted for this assignment is my own and research sources are
fully acknowledged.
Student signature: PHẠM NGỌC CƯỜNG Date:
02/05/2019
Assignment Feedback

Formative Feedback: Assessor to Student

Action Plan

Summative feedback

Assessor Signature Date

Student Signature Date

Learners declaration
I certify that the work submitted for this assignment is my own and research sources are
fully acknowledged.
Student signature: PHẠM NGỌC CƯỜNG Date:
02/05/2019

TABLE OF CONTENT

LO1: Examine networking principles and their


protocols…………………………………………………………10
 Discuss the benefits and constrains of different network types and standards (P1)
…………… 10
 Explain the impact of network topology, communication and bandwidth
requirements (P2)…………16

LO2. Explain networking devices and operations (P3)……………23

 Discuss the operating principles of networking devices and server


types………….23
 Implement a network design topology infrastructure based on a prepared
design and list the different type of topologies…………………32
 Discuss the inter-dependence of workstation hardware with relevant
networking software. (P4)……33

LO3. Design efficient networked systems……34

 Design a networked system to meet a given specification. (P5)…………36


 Test and evaluate the design to meet the requirements and analyze user
feedback. (P6)………37

LO4. Implement and diagnose networked systems………38

 Implement a networked system based on a prepared design. (P7)………38


 Document and analyze test results against expected results. (P8)……….42

ASSIGNMENT

LO 1: Examine networking principles and their protocols:

1 .Discuss the benefits and constrains of different network types and standards
(P1):

 LAN (Local Area Network)


+Benefits:

_The basic LAN implementation does not cost too much. 


_It is easy to control and manage the entire LAN as it is available in one small region. 
_The LAN configuration is very easy due to availability of required protocols in the
Operating System (OS) itself. 
_The systems or devices connected on LAN communicates at very high speed
depending upon LAN type and Ethernet cables supported. The common speeds
supported are 10 Mbps, 100 Mbps and 1000 Mbps. Gigabit Ethernet versions are
evolving very fast. Cheaper versions will be available once the technology matures and
mass production has been carried out. 
_With the help of file servers connected on the LAN, sharing of files and folders among
peers will become very easy and efficient. 
_It is easy to setup security protocols to protect the LAN users from intruders or
hackers. 
_It is easy to share common resources such as printers and internet line among
multiple LAN users. 
_LAN users do not require their own hard-disk and CD-ROM drives. They can save
their work centrally on network file server. 
_Application soft-wares such as MS Office, Anti-Virus, Adobe reader are stored at one
system and are shared for all the LAN users. This helps them install application soft-
wares by click of a mouse.
+Constraints:

_LAN covers small geographical area. 


_Security issues are big concern as it is easy to have access to programs and data of
peers. _Special security measures are needed to stop unauthorized access. 

_It is difficult to setup and maintain LAN and requires skilled technicians and network
administrators. 

_In the server based LAN architecture, if server develops some fault, all the users are
affected. 

_Appearance of virus in one system can spread very fast to all the LAN users very
easily.

 MAN (Metropolitan Area Network):

+Benefits:
_It is less expensive to attach MAN with WAN. MAN gives the good efficiency of data.
In MAN data is easily managed in a centralized way.

_On MAN you can send local emails fast and free.

_MAN uses fiber optics so the speed of data can easily reach upon 1000 Mbps. Files
and databases can be transferred fast.

_In some installation of MANs, users can share their internet connection. So multiple
users can get the same high-speed internet.

_MAN is a faster way to connect two fast LANs together. This is due to the fast
configuration of links.

_MAN has a high-security level than WAN.

+Constraints:

_If MAN becomes bigger then it becomes difficult to manage it. This is due to a security
problem and other extra configuration.

_MAN cannot work on traditional phone copper wires. If MAN is installed on copper
wires then there will be very low speed. So it required the high cost to set up fiber optics
for the first time.

_In MAN there are high chances of attacking hackers on the network compared to LAN.
So data may be leaked. Data can be secured but it needs high trained staff and security
tools.

_To setup MAN it requires technical people that can correctly setup MAN. The
technical people are network administrators and troubleshooters.

_In MAN additional cables are required to connect two LAN which is another problem.

 WAN (Wide Area Network):


+Benefits:

_WAN covers a large geographical area of 1000 km or more. If your office is in different
cities or countries then you can connect your office branches through wan. ISP (Internet
service provider) can give you leased lines by which you can connect different branch
offices together.

_Your companies doesn’t need to buy email, files, and backup servers, they can all
reside on head office. All office branches can share the data through the head office
server. You can get back up, support, and other useful data from the head office and all
data are synchronized with all other office branches.

_Software companies work over the live server to exchange updated files. So all the
coders and office staff get updated version of files within seconds.

_With IOT (Internet of things) and new LAN technologies, messages are being
transmitted fast. A lot of web applications are available like Facebook messenger,
WhatsApp, Skype by which you can communicate with friends via text, voice and video
chat.

_Like LAN we can share software applications and other resources like a hard drive,
RAM with other users on the internet. In web hosting, we share computer resources
among many websites.
_Now everyone with computer skills can do business on the internet and expand his
business globally. There are many types of business like a shopping cart, sale, and
purchase of stocks etc.

_If you get leased lines for your company then it gives high bandwidth than normal
broadband connection. You can get a high data transfer rate that can increase your
company productivity.

_Another benefit of wide area network is that you can distribute your work to other
locations. For example, you have an office in the U.S then you can hire people from any
other country and communicate with them easily over WAN. It also reduces your travel
charges as you can monitor the activities of your team online.

+Constraints:

_WAN has more security problem as compare to MAN and LAN. WAN has many
technologies combined with each other which can create a security gap.

_As data transferred on the internet can be accessed and changed by hackers so
firewall needs to be enabled in the computer. Some people can also inject a virus into
the computer so antivirus software needs to be installed. Other security software also
needs to be installed on different points in WAN.

_Setting up WAN for the first time in office costs higher money. It may involve
purchasing routers, switches, and extra security software.

_As WAN covers a lot of areas so fixing the problem in it is difficult. Most of WAN wires
go into the sea and wires get broken sometimes. It involves a lot of resources to fix lines
under the sea. _In ISP (Internet service provider) head office many of internet
lines, routers are mixed up in rooms and fixing issues on the internet requires a full-time
staff.

_In some areas, ISP faces problems due to electricity supply or bad lines structure.
Customers often face connectivity issues or slow Internet speed issues. The solution to
this is to purchase a dedicated line from ISP.

 Inter Network (Internet):


_Inter Network or Internet is a combination of two or more networks. Inter network can
be formed by joining two or more individual networks by means of various devices such
as routers, gateways and bridges.

_Internet is a special varies of WAN, it gives different kind of worldwide service like
Mail, Wed, Chat… Internet is free for everybody.
 Wireless Network:
_Digital wireless communication is not a new idea. Earlier, Morse code was used to
implement wireless networks. Modern digital wireless systems have better performance,
but the basic idea is the same.
.Wireless Networks can be divided into three main categories:

1. System interconnection
2. Wireless LANs
3. Wireless WANs

1. System Interconnection
_System interconnection is all about interconnecting the components of a computer
using short-range radio. Some companies got together to design a short-range
wireless network called Bluetooth to connect various components such as monitor,
keyboard, mouse and printer, to the main unit, without wires. Bluetooth also allows
digital cameras, headsets, scanners and other devices to connect to a computer by
merely being brought within range.
_In simplest form, system interconnection networks use the master-slave concept. The
system unit is normally the master, talking to the mouse, keyboard, etc. as slaves.

2. Wireless LANs
_These are the systems in which every computer has a radio
modem and antenna with which it can communicate with other systems. Wireless
LANs are becoming increasingly common in small offices and homes, where
installing Ethernet is considered too much trouble. There is a standard for wireless
LANs called IEEE 802.11, which most systems implement and which is becoming very
widespread.

3. Wireless WANs
_The radio network used for cellular telephones is an example of a low-bandwidth
wireless WAN. This system has already gone through three generations.
 The first generation was analog and for voice only.
 The second generation was digital and for voice only.
 The third generation is digital and is for both voice and data.

2. Explain the impact of network topology, communication and bandwidth


requirements (P2):

 Network Topology

There are some types of Topology: Star Topology, Bus Topology, Ring Topology, etc.

 Star Topology:
_Star Topology includes a hub and node information. The information is the node
terminals, computers and other network devices. Network coordination center of all
activities in the network with the basic functions are:

_Determination of the address pairs allowed to send and receive information online
accounts and contacts together.

_Allows monitoring and process error during information exchange.

_Notify the state of the network.

The advantages of Star Topology:

 Operating under the principle of parallel connections, so if there is a certain


device at a node fails, the network information has been operating normally.
 Simple network structure and the stability control algorithm. Networks can
expand or narrow depending on the requirements of the user.

The disadvantages of Star Topology:

 The potential for extending the network entirely dependent on the potential for
the center. When center network incidents are all deactivated.
 Independent network requires separate connection each device in the
information center button. Distance from the machine to the center is very limited
(100 m).

_Overall, Star topology allows connected computers to a HUB with twisted, this
solution enables direct connection PC with HUB without through axle BUS, avoid
triggers network outage. Recently, with the development of switching hub, this model
has become increasingly popular and the majorities of new network installation.

 Bus Topology:

_The server (host) as well as all the other computer (workstation) or nodes are
connected to each other or a road main cable to transfer signal.
_All nodes use the same main cable line. Behind two cables are covered head by a
device called a terminator. Signals and data packets (packet) when moving up or
down in the cable carries the address of the destination.
_This type of network cables used at least, easy installation. Yet there are also
disadvantages that there will be a traffic jam when moving data with heavy traffic
and when there is a malfunction in certain stage, it is difficult to detect, a stop on the
line for repairs will shut down the entire system.
 Ring Topology:
_Networks of this type, arranged in the form of rotation, the cable is designed as a
closed loop, the signal runs in one direction surrounding area. The nodes transmit
signals to each other each time only one button only. Transmitted data must be
accompanied by specific address each receiving station.

_Ring topology has the advantage that it can be expanded away, total line needed less
than two styles. The downside is that the line must be closed, if disconnection in
somewhere, the entire system is stopped.

_Beside Ring, Star and Bus we also have more complex topology like Tree topology
and Mesh topology.

 Network Communication:

_Communication protocols or protocol networking, communication protocols, protocol


information exchange – in information technology referred to as the protocol – a set of
standard rules for the data representation, signaling, authentication and error detection
data. That is what is needed to send information through the media, so that the device
can connect and exchange information with each other.

_The protocol used for the transmission of information in the digital signal computer
network has many features to ensure the exchange of data received through the reliable
communication channel is not perfect.

_Protocol modes have theoretical, are information technology industry relatively


respects as the OSI model. There are also protocols be developed and widely used as
TCP, IP, HTTP, FTP, SMTP, POP3, etc.
 OSI model:

_The International Standards Committee ISO (International Standards Organization)


has launched a 7 layers model for network called open connection system type of OSI
model:

The function of a low layer including the preparation for the higher layer to fulfills its
function. A complete network with all its functions must ensure there are 7 layers of
structure from low to high.

Application (Layer 1)
_OSI Model, Layer 7, supports application and end-user processes. Communication
partners are identified, quality of service is identified, user authentication and privacy
are considered, and any constraints on data syntax are identified. Everything at this
layer is application-specific. _This layer provides application services for file
transfers, e-mail, and other network software services. Telnet and FTP are applications
that exist entirely in the application level. Tiered application architectures are part of this
layer.
Application examples include WWW browsers, NFS, SNMP, Telnet, HTTP, FTP.

Presentation (Layer 2)
_This layer provides independence from differences in data representation by
translating from application to network format, and vice versa. The presentation layer
works to transform data into the form that the application layer can accept. This layer
formats and encrypts data to be sent across a network, providing freedom from
compatibility problems. It is sometimes called the syntax layer.
 Presentation examples include encryption, ASCII, EBCDIC, TIFF, GIF, PICT, JPEG,
MPEG, MIDI.

Session (Layer 3)
_This layer establishes, manages and terminates connections between applications.
The session layer sets up, coordinates, and terminates conversations, exchanges, and
dialogues between the applications at each end. It deals with session and connection
coordination.
 Session examples include NFS, Net Bios names, RPC, SQL.

Transport (Layer 4)
_OSI Model, Layer 4, provides transparent transfer of data between end systems,
or hosts, and is responsible for end-to-end error recovery and flow control. It ensures
complete data transfer.
Transport examples include SPX, TCP, UDP.

Network (Layer 5)
_Layer 3 provides switching and routing technologies, creating logical paths, known
as virtual circuits, for transmitting data from node to node. Routing and forwarding are
functions of this layer, as well as addressing, internetworking, error
handling, congestion control and packet sequencing.
Network examples include AppleTalk DDP, IP, IPX.
Data Link (Layer 6)
_At OSI Model, Layer 2, data packets are encoded and decoded into bits. It
furnishes transmission protocol knowledge and management and handles errors in the
physical layer, flow control and frame synchronization. The data link layer is divided into
two sub layers: _The Media Access Control (MAC) layer and the Logical Link Control
(LLC) layer. The MAC sub layer controls how a computer on the network gains access
to the data and permission to transmit it. The LLC layer controls frame synchronization,
flow control and error checking.
Data Link examples include PPP, FDDI, ATM, IEEE 802.5/ 802.2, IEEE 802.3/802.2,
HDLC, Frame Relay. 

Physical (Layer 7)
_OSI Model, Layer 1 conveys the bit stream - electrical impulse, light or radio
signal — through the network at the electrical and mechanical level. It provides
the hardware means of sending and receiving data on a carrier, including defining
cables, cards and physical aspects. Fast Ethernet, RS232, and ATM are protocols with
physical layer components.
Physical examples include Ethernet, FDDI, B8ZS, V.35, V.24, RJ45.

 Bandwidth requirement:
_Find out how to calculate with the bandwidth is very important to make sure your
network is running smoothly and it’s best to get the correct formula right from the start.
The bandwidth requirements between different networks and how to calculate the
bandwidth correctly is vital to build and maintain a fast Internet.

 What is bandwidth?

_Bandwidth related to data rate supported by a network connection or the connection


to the network interface. It represents both the volume and time, represent the amount
of data that can be transmitted between two points within a certain time period. It’s
usually expressed as bits / second (bps) or bytes per second, sometimes by (bps).

_Express network bandwidth capacity of a network connection, however it is important


to understand the different between theory and flux actual results to find the right
formula bandwidth for your network. For example, a 1000BASE-T used twisted pair
have no protective shell, Gigabit Ethernet (Gbe) can support 1000 Mbps / sec, but in
fact never achieve this speed because the software and hardware system software.
_If you don’t have enough bandwidth, the network will run slower, but if too much
bandwidth will be costly. So, how to determine the correct formula will meet bandwidth
requirements? Some network managers only interested in the number of users on a
virtual LAN. However, what you should care about is the user would do on that network.
For example, a user network 2000 may be less than the network congestion caused 3
users using client-server applications or services such heavy bandwidth high resolution
video.

 Bandwidth calculation formulas:


1. Determine the amount of network bandwidth available.
2. Determine the average usage according to specific requirements.

_Both figures should be expressed in bytes per second. Consider the following formula.
A Gigabit Ethernet network available bandwidth 125,000,000 bps. This figure is
calculated by taking the number of bits – in a Gigabit network, could be 1 million and
divide by 8 to determine bytes.

_After determining the bandwidth of the network, you will have to see how much
bandwidth each application is using. Using a network analysis tool to detect the number
of bytes per second sent over the network application. To do this, first turn Cumulative
Bytes column of analysis tools on your network. Using Wireshark to analyze packets in
the network.

1. Get traffic from a workstation and run applications.


2. In the decoding window, highlight the package at the top of the file transfer.
3. Track time and then look at the cumulative bytes.

_If the application is determined at 200,000 bps data transfer, you have the information
to perform calculations: 125,000,000: 200,000 bps = 625 concurrent users. In this case,
the network will be fine even if there are hundreds of users simultaneously.

LO2. Explain networking devices and operations (P3)

1. Discuss the operating principles of networking devices and server types.

 The operating principles of networking devices:


1. Repeater:

_With the large space where the signal transmission between the hearing Machine will
usually decrease. The remote computer signal sources will be weaker than those
nearby devices. Therefore, you need equipment capable of signal amplification, so that
the signal can go further but better.
_Repeater is a device in layer 1 (Physic Layer) of the OSI model. When we use the
Repeater, the physical signal at the input will be amplified, thereby providing stable and
reliable signal than the output, to be able to get the position further. If you want to
ensure line rate with office area large work, or used in telegrams, transmission of
information through optical fibers,…. Then you should select Repeater.

2. HUB:

_HUB possesses multiple ports from 4 up to 24 ports and is regarded as a multiport


repeater. When information is transmitted to a gate signal of the HUB, the other port will
also receive information instantly.

Currently there are 2 kinds of popular Hub as Active Hub and Smart Hub:

 Active Hub: This Hub type often used far more common, need to be powered when
operating. Active Hub used to amplify signals to and divided the remaining ports to
ensure speed signals required when using.
 Smart Hub: Intelligent Hub also work function like Active Hub but be integrated chip
capable of automatically detecting errors on the network.
3. Bridge:

_If the Repeater is the second layer in the OSI model, the Bridge is the second layer in
the model (Data Link Layer). This tool is used for the connection between the two
networks from a large network, such as the bridge between two Ethernet networks. It
has a single input and single output port, thus making it a 2 port device.
Types of Bridges
 Transparent Bridges :
_These are the bridge in which the stations are completely unaware of the
bridge’s existence i.e. whether or not a bridge is added or deleted from the network,
reconfiguration of
the stations is unnecessary. These bridges makes use of two processes i.e. bridge
forwarding and bridge learning.

 Source Routing Bridges :


_In these bridges, routing operation is performed by source station and the frame
specifies which route to follow. The hot can discover frame by sending a special frame
called discovery frame, which spreads through the entire network using all possible
paths to destination.
4. Switch:

_A switch is a multiport bridge with a buffer and a design that can boost its efficiency
(large number of ports imply less traffic) and performance. Switch is data link layer
device. Switch can perform error checking before forwarding data, it makes it very
efficient as it does not forward packets that have errors and forward good packets
selectively to correct port only.  In other words, switch divides collision domain of hosts,
but broadcast domain remains same.

 About Switch:
 Switch is found in both forms of unmanaged and managed.
 Switch unmanaged no options and simply work immediately.
 Managed switch advanced options can be configured. Managed switch also
contains software, called firmware needs to be updated, because the
manufacturer switch released.
 Switch only connect with other network devices through network cables and
therefore do not require drivers to work in Windows or other operating systems.

_Switch connects various network devices together, like the computer, and allow the
devices that communicate with each other. Switch has some network port, can
sometimes be up to tens of ports to connect multiple devices together.

_The main tasks of switch: speed operation of the switch is much higher compared to
the Repeater, the ability to operate more activity and by providing more functions such
as creating a virtual LAN (VLAN).
5. Routers:

_Router is third layer of the OSI model (the Network Layer), is responsible for
connecting two or more IP networks together. Routers connect different network types,
from high-speed Ethernet local too long distance phone lines are slow. But the ability to
work over Bridge Router’s slow, so need to calculate in order to find the path for the
signal package, especially when connected to the network at the same speed, the more
need to work together.

– A router is a device like a switch that routes data packets based on their IP
addresses. Router is mainly a Network Layer device. Routers normally connect LANs
and WANs together and have a dynamically updating routing table based on which they
make decisions on routing the data packets. Router divide broadcast domains of hosts
connected through it.

6. Gateway:

_A gateway, as the name suggests, is a passage to connect two networks together


that may work upon different networking models. They basically works as the
messenger agents that take data from one system, interpret it, and transfer it to another
system. Gateways are also called protocol converters and can operate at any network
layer. Gateways are generally more complex than switch or router.
_Gateway can distinguish the protocols, applications when transferring mail from one
network to another, convert a remote session.

 Server Types:
1. Wed server:

_ A Web server is a program that uses HTTP (Hypertext Transfer Protocol) to serve the


files that form Web pages to users, in response to their requests, which are forwarded
by their computers' HTTP clients. Dedicated computers and appliances may be referred
to as Web servers as well.

_The process is an example of the client/server model. All computers that host Web
sites must have Web server programs. Leading Web servers include Apache (the most
widely-installed Web server), Microsoft's Internet Information Server (IIS) and NGNIX
(pronounced engine X) from NGNIX. Other Web servers include Novell's NetWare
server, Google Web Server (GWS) and IBM's family of Domino servers.

_ Web servers often come as part of a larger package of Internet- and intranet-related
programs for serving email, downloading requests for File Transfer Protocol (FTP) files,
and building and publishing Web pages. Considerations in choosing a Web server
include how well it works with the operating system and other servers, its ability to
handle server-side programming, security characteristics, and the particular publishing,
search engine and site building tools that come with it.

2. Applications Server:

_An application server is a type of server designed to install, operate and host
applications and associated services for end users, IT services and organizations. It
facilitates the hosting and delivery of high-end consumer or business applications,
which are used by multiple and simultaneously connected local or remote users.

_An application server consists of a server operating system (OS) and server hardware
that work together to provide computing-intensive operations and services to the
residing application. An application server executes and provides user and/or other app
access when utilizing the installed application's business/functional logic. Key required
features of an application server include data redundancy, high availability, load
balancing, user management, data/application security and a centralized management
interface. Moreover, an application server may be connected by enterprise systems,
networks or intranet and remotely accessed via the Internet.
Depending on the installed application, an application server may be classified in a
variety of ways, including as a Web server, database application server, general
purpose application server or enterprise application (EA) server.
3. Printer Server:
_A print server is a computer that can process print-related jobs on a network of
computers. Print servers are connected to a computer network in order to serve the
need for printing jobs in a network that may contain more than one printer. A print server
usually allows users in a computer network to perform a printing job without having to
move files to the computer connected directly to the printer. Also known as printer
server or network printer, (although the latter is actually one of the properties of the print
server).

4. Proxy Server:

_It’s a server that stands between a client application, such as awed browser, and a real
server. It blocks all requests to the real server if it is capable of fully answer the
requirements, otherwise it forwards the request to the real server. The server
credentials have two main purpose: It can increase flexibility for the activities of the
group of users, because it caches the results of all requests for a certain amount of
time. The authorization server also requires filters to block or not to allow a particular
connection request or the server.

5. Database Server:

_The Database server is the computer on which the installation software database
management system. We have a database management system such as: SQL, server,
MySQL, Oracle, etc.

_A database service is a basic application architecture model server / workstation. The


app is divided into two parts: Partly run on a workstation (where users accumulate and
display information database) and the rest run on the server, where the tasks such as
data connectivity and storage - carried out.

6. FTP Server:

_FTP: FTP (File Transfer Protocol stands for “file transfer protocol”) is commonly used
to exchange files via communication networks using the TCP/IP (such as the Internet -
the network external – or intranet). Operation of FTP should have two computers, a
server and a client. FTP server, users running software provides FTP service, called the
master, listen to requests for services from other computers on the network. Running
FTP client software for service users, known as clients, then start a linked server.

_An FTP service is a software application that runs the file transmission protocol,
protocol for exchanging file over the Internet. FTP works in the same way as HTTP for
transferring Wed pages from a server to a user’s browser and SMTP for sending email
over the Internet. Like these technologies, FTP uses TCP/IP to transmit internet data.
FTP is widely used to download a file from a server using the Internet or vice versa
(such as downloading a web page to your server).

7. SMTP Server:

_SMTP server: SMTP (Simple Mail Transfer Protocol – transmission protocol simple
correspondence) is a standard e-mail transmission across the Internet. SMTP server to
send mail to help your other email address on the internet.

_Most web services and hosting mail and mail transfer on overall network and provide
internet. Today most people think is the term mail service internet stands. However, the
mail service was first developed based on the general Internet (LANs and WANs).

8. DNS Servers:

_DNS server is the domain name resolution server. Every computer, network
equipment involved in the Internet are connected to each other by IP address (Internet
Protocol). To facilities the use and easy to remember we use the name (domain name)
to determine that device. Domain Name System DNS (Domain Name System) is used
to map domain names to IP address.

9. DHCP Server:

_HCP server: DHCP (Dynamic Host Configuration Protocol – Dynamic Configuration


Protocol server) is a protocol that automatically, thus reducing interference in the
network. DHCP server settings DHCP service, is has the function of managing the
allocation of IP addresses and the configuration data TCP/IP. There is also a duty
respond when DHCP Client requests for contract subscribers.

2. Implement a network design topology infrastructure based on a prepared design


and list the different type of topologies:

 It is a star topology with a Router, Switch, 1 PC and Printer.


 It is a bus topology combined with 2 star topology and there are: 2 Routers, 2
Switches, 2 PCs and 2 Printers.

3. Discuss the inter-dependence of workstation hardware with relevant


networking software. (P4)

_Hardware and software are related closely. Hardware will determine the performance
of the software. The better hardware the faster software will run and more stable. Some
software also hardware requirements must meet certain parameters one can operate.
All hardware has specs.

Some relevant between hardware and software:

 Software can’t be created without hardware.


 Software will run better with good hardware.
 Software protect hardware. EX: Avast antivirus, etc.

_Wed Server: the primary function of a web server is to store, process and deliver web
pages to clients. The communication between client and server takes place using
the Hypertext Transfer Protocol (HTTP). Pages delivered are most frequently HTML
documents, which may include images, style sheets and scripts in addition to the text
content.
Large Medium Small

Supports up to 7500 users. Supports up to 1000 users. Supports up to 400 users.

1 TB of disk space for cache 500 GB of disk space for cache 200 GB of disk space for ca

16 CPU cores 12 CPU cores 8 CPU cores

64 GB RAM 32 GB RAM 16 GB RAM

_Mail Server: mail servers receive emails sent to a user and store them until requested
by a client on behalf of said user. Having an email server allows for a single machine to
be properly configured and attached to the network at all times. It is then ready to send
and receive messages rather than requiring every client machine to have its own email
subsystem continuously running.

Access Node Size without Content Indexing


If you do not use content indexing, base the size of your access nodes on these
guidelines.

Number of messages received per day on


Up to 50,000 50,000 to 300,000 300,000 to 600,000
each access node*

CPU or vCPU, and RAM CPU or vCPU: 4 CPU or vCPU: 8 CPU or vCPU: 12
cores cores cores
RAM: 8 GB RAM: 16 GB RAM: 24 GB

Content Store Mailbox cache disk size** 100 GB 500 GB 1 TB

Content Store Mailbox disk IOPS Minimum: 200 Minimum: 300 Minimum: 600
IOPS IOPS IOPS

Streams per access node 2 5 5

* Based on an average message size of 100 KB.


** The cache should have enough space to hold two-week's worth of messages in case
the backup infrastructure becomes unavailable. Calculate this space based on the
amount of email that you expect to be received on the Exchange server.
Access Node Size with Content Indexing
If you use content indexing, base the size of your access nodes on these guidelines.

Number of messages received per day on


Up to 50,000 50,000 to 300,000 300,000 to 600,000
each access node*

CPU or vCPU, and RAM CPU or vCPU: 8 CPU or vCPU: 12 CPU or vCPU: 16
cores cores cores
RAM: 16 GB RAM: 24 GB RAM: 32 GB

Content Store Mailbox cache disk size** 100 GB 500 GB 1 TB

Content Store Mailbox disk IOPS Minimum: 200 Minimum: 300 Minimum: 600
IOPS IOPS IOPS

Streams per access node 2 5 5

* Based on an average message size of 100 KB.


** The cache should have enough space to hold two-week's worth of messages in case
the backup infrastructure becomes unavailable. Calculate this space based on the
amount of email that you expect to be received on the Exchange server.

_FTP Server: In order for the client to establish connection to the FTP server, the
username and password are sent over using USER and PASS commands. Once
accepted by the FTP server, an acknowledgement is sent across to the client and the
session can start. In the case of an FTP connection, it is possible to resume the
download if it was not successfully completed earlier. In other words, checkpoint restart
support is provided. The FTP server allows the downloading and uploading files. There
could be access restrictions as determined by the FTP server administrator for
downloading different files and from different folders residing in the FTP server. The
FTP server can provide connection to users without need of login credentials; however,
the FTP server can authorize these to have only limited access. Files residing in FTP
servers can be retrieved by common web browsers, but they may not be supporting
protocol extensions like FTPS.FTP servers can provide anonymous access. This
access allows users to download files from the servers anonymously, but prohibits
uploading files to FTP servers. All file transfer protocol site addresses begin with ftp: //.

Software Platform Requirements:


 Microsoft® Windows® 2000, Windows XP, Windows Vista, Windows 7,
Windows 2003 Server, Windows 2008 Server R1&2 (Standard, Enterprise, and
Datacenter editions) 32-bit and 64-bit(x64), Windows Server 2012, Windows
Server 2012 R2, Windows Server 2016.
 
Minimum Hardware Requirements:
 Intel Pentium® 4 processor or equivalent, 1 GHz or higher
 At least 512 MB RAM
 10 MB of available drive space
 TCP/IP enabled Network Interface Card (NIC)

LO3. Design efficient networked systems

Design a networked system to meet a given specification. (P5):

_Resources: 50 student lab computers, 35 staff computers, 3 printers

_Building: 3 floors, all computers and printers are on the ground floor apart from IT labs
– one lab located on the first floor and another located on the second floor.

_I used 3 routers, 1 each other floor and 1 intermediate router, 3 switches, 85PCs and
3 printers, copper cable and serial DTE cable.

Here I all use high cost product because I aim for high quality and high efficiency.

Floor 1: 28 student, staff computers and 1 printer.

Floor 2: 28 student, staff computers and 1 printer.

Floor 3: 29 student, staff computers and 1 printer.


Test and evaluate the design to meet the requirements and analyze user
feedback. (P6)

S. No Action Inputs Expected Actual Test Result Test


Output Output Comment
1 Test PC1- Sent=4, Sent=4, 25% loss Successful
Ping PC2 Received=4, Received= Average=13m
Lost=0; 3 ,Lost=0; s Pass
2 Test PC2- Sent=4, Sent=4, 50% loss Successful
Ping PC4 Received=4, Received= Average=5ms
Lost=0; 2 ,Lost=0; Pass
3 Test PC1- Sent=4, Sent=4, 0% loss Successful
Ping PC4 Received=4, Received= Average=11m
Lost=0; 4 ,Lost=0; s Pass
4 Test PC2- Sent=4, Sent=4, 25% loss Successful
Ping PC3 Received=4, Received= Average=4ms
Lost=0; 3 ,Lost=0; Pass

Feedback of networked system: my design was satisfactory with 3 floor all computers
and printers are on the ground floor apart from the IT labs – one lab located on the first
floor and another located on the second floor.

 Advantages:

_Test Ping is successful all of PC together.


_Test result are below 50% so it active working pass.

 Disadvantages:

_Expected output that I hope it will be activity but actual output is not.

_Test result still have a % loss.

_This is the physical design of the design networked system.

LO4.Implement and diagnose networked systems:

Implement a networked system based on a prepared design (P7):


First, I set IP and subnet for Routers and devices from each floor.
First router and then PC
I do the same to floor 2, 3.

Then I do static route


I do the same with the remaining routers.

Document and analyze test results against expected results. (P8)

No. S Action Inputs Expected Actual Test Result


Output Output
1 Test Ping PC1-Printer Sent=4, Sent=4, 0% loss
2 Received=4, Received=4 Average=10ms
Lost=0; ,Lost=0; Pass
2 Test Ping PC3-PC1 Sent=4, Sent=4, 0% loss
Received=4, Received=4 Average=4ms
Lost=0; ,Lost=0; Pass
3 Test Ping PC4-Printer Sent=4, Sent=4, 0% loss
3 Received=4, Received=4 Average=9ms
Lost=0; ,Lost=0; Pass
The ping was successful and packet routing is operated and well optimized. The next
step is try to connect to one of the switches and router through SSH.

The connection has established successfully, SSH worked as configured. In summary,


all of the test have results as expected.

Then I test ping by ping from PC floor 1 to PC floor 4.

And it activity successful.


I test ping PC 4.1 to Printer 3.2 as you can see the result of this test is working with
reply of Printer 3.2. So I did exactly the original requirements of networked system.

References:

https://padlet.com/

http://lit24h.edu.vn/

https://www.wikipedia.org/

http://voer.edu.vn/

https://phanphoithietbimangcisco.vn/

https://vnpro.vn/
https://khoahoc.vn

http://duyanhwed.com

http://www.southanna.com

https://khoavang.vn

https://www.ukessays.com

Potrebbero piacerti anche