0% found this document useful (0 votes)
1K views

Higher Nationals in Computing: Unit 2: Networking Assignment

The document is an assignment brief for a networking course. It provides details for three parts to the assignment. Part 1 involves writing a report examining networking principles, protocols, devices, and topologies. Part 2 involves designing a local area network for a client. Part 3 involves implementing the designed network. The brief outlines the learning outcomes, assessment criteria, and requirements for each part of the assignment.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views

Higher Nationals in Computing: Unit 2: Networking Assignment

The document is an assignment brief for a networking course. It provides details for three parts to the assignment. Part 1 involves writing a report examining networking principles, protocols, devices, and topologies. Part 2 involves designing a local area network for a client. Part 3 involves implementing the designed network. The brief outlines the learning outcomes, assessment criteria, and requirements for each part of the assignment.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 50

Higher Nationals in Computing

Unit 2: Networking Assignment

Learner’s name: Nguyen Hoang Long


ID:GCS190780
Class: GCS0805A
Subject code: 1619
Assessor name: PHAN MINH TAM

Assignment due: Assignment submitted:


ASSIGNMENT 1 FRONT SHEET

Qualification BTEC Level 5 HND Diploma in Computing

Unit number and title Unit 2: Networking

Submission date Date Received 1st submission

Re-submission Date Date Received 2nd submission

Student Name Nguyen Hoang Long Student ID GCS190780

Class GCS0805A Assessor name Phan Minh Tam

Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.

Student’s signature

Grading grid

P1 P2 P3 P4 P5 P6 P7 P8 M1 M2 M3 M4 D1 D2 D3
 Summative Feedback:  Resubmission Feedback:

Grade: Assessor Signature: Date:

Signature & Date:


ASSIGNMENT BRIEF

Qualification BTEC Level 5 HND Diploma in Computing

Unit number Unit 2: Networking

Assignment title Networking Infrastructure

Academic Year

Unit Tutor TamPM

Issue date Submission date

IV name and date Khoa Canh Nguyen, Nhung, Michael Omar 9th/01/2020

Submission format

Part 1

The submission is in the form of an individual written report. This should be written in a concise,
formal business style using single spacing and font size 12. You are required to make use of headings,
paragraphs and subsections as appropriate, and all work must be supported with research and
referenced using the Harvard referencing system. Please also provide a bibliography using the Harvard
referencing system. The recommended word limit is 2,000–2,500 words, although you will not be
penalized for exceeding the total word limit.

Part 2

The submission is in the form of an individual evidence portfolio.

Page |1
 A LAN design plan and blueprint and justification document.
 A fully completed test plan including an evaluation of results and recommendations for
improvements to LAN.
 A proposed and justified maintenance schedule.

Part 3
 Evidence of an implemented network.

You are required to make use of headings, paragraphs, subsections and illustrations as appropriate,
and all work must be supported with research and referenced using the Harvard referencing system.

Unit Learning Outcomes

LO1: Examine networking principles and their protocols.

LO 2: Explain networking devices and operations.

LO3: Design efficient networked systems.

LO4: Implement and diagnose networked systems.

Assignment Brief

You are employed as a Network Engineer by Nguyen Networking Limited, a high-tech networking
solution development company, which have branches in Ho Chi Min City, Hanoi, Da Nang and Can
Tho.

The company has been contracted to implement a networking project from a local educational
institute. The specification of the project is given below:

People: 200 students, 15 teachers, 12 marketing and administration staff, 5 higher managers

Page |2
including the head of academics and the programme manager, 3 computer network
administrators.

Resources: 50 student lab computers, 35 staff computers, 3 printers

Building: 3 floors, all computers and printers are on the ground floor apart from the IT labs – one
lab located on the first floor and another located on the second floor

As a first task, the CEO of the company Mr. Nguyen has asked you to investigate and explain
networking principles, protocols and devices and submit a report.

Part 1

You will need to produce a report that includes the following:

1. An introduction to provide an overview of your report.

2. Benefits and constraints of different types of networks and networking standards.

3. The impact of network topology, speed of communication and bandwidth requirements.

4. Effectiveness of networking systems.

5. Discussion on operating principles of networking devices and server types and networking
software.

6. Discuss the relationship of workstation hardware with networking software.

7. Explore a range of server types and justify the selection of a server, considering a given
scenario regarding cost and performance optimization.

8. For the given specification, identify the topology protocol for the efficient utilization of a
networking system.

The CEO Mr. Nguyen is happy with your first report and now he has asked you to analyze the
specification from the institution, as given earlier.

You need to design and implement the networking project within a given timeframe:

Page |3
Part 2 Design efficient networked systems

1. Prepare a written step-by-step plan of how you are going to design a Local Area Network
including a blueprint of your LAN.

2. Justify your choice of devices for your network design.

3. Produce a test plan to evaluate this design for the requirements of bandwidth and cost
constraints as per user specifications.

4. Justify the security requirements and quality of services needed for selection of accessories.

5. Suggest a maintenance schedule to support the networked system.

Part 3 Implement test and diagnose networked systems

1. Implement a networked system based on your prepared design.

2. Conduct verification with e.g. Ping, extended ping, trace route, telnet, SSH, etc.

3. Record the test results and analyze these against expected results.

4. Investigate what functionalities would allow the system to support device growth and the
addition of communication devices.

5. Discuss the significance of upgrades and security requirements in your recommendations.

Page |4
ASSESMENT CRITERIA

Learning Outcomes and Assessment Criteria

Pass Merit Distinction

LO1 Examine networking principles and their protocols

P1 Discuss the benefits and constraints M1 Compare common


of different network types and networking principles and how LO1 & 2
standards. protocols enable the
D1 Considering a given
effectiveness of networked
systems. scenario, identify the
P2 Explain the impact of network
topology protocol selected
topology, communication and
for the efficient utilization
bandwidth requirements.
of a networking system.
LO2 Explain networking devices and operations

P3 Discuss the operating principles of M2 Explore a range of server


networking devices and server types. types and justify the selection
of a server, considering a given
P4 Discuss the inter-dependence of scenario regarding cost and
workstation hardware with relevant performance optimisation.
networking software.

LO3 Design efficient networked systems

P5 Provide a logical/physical design of M3 Install and configure D2 Design a maintenance


the networked system with clear network services and schedule to support the
explanation and addressing table. applications on your choice. networked system.

P6 Evaluate the design to meet the


requirements.

LO4 Implement and diagnose networked systems

P7 Implement a networked system M4 Recommend potential D3 Use critical reflection


based on a prepared design. enhancements for the to evaluate own work and
networked systems. justify valid conclusions.
P8 Document and analyse test results
against expected results.

Page |5
Table of Contents
P1.Discuss the benefits and constraints of different network types and
standards………………………..…………………………………………….…..……………………9

P2.Explain the impact of network topology, communication and bandwidth


requirements………………………………………………………………….………………………13

P3.Discuss the operating principles of networking devices and server


types……………………………………………………………………………………………………28

P4.Discuss the inter-dependence of workstation hardware with relevant networking


software……………………………………………………………………………………………….40

P5.Provide a logical/physical design of the networked system with clear explanation


and addressing table…………………………………………………………...………………..…41
P6.Evaluate the design to meet the
requirements………………………………………………..…………………..……………….…...43

P7.Implement a networked system based on a prepared design……………...……...……43

P8.Document and analyse test results against expected results……………………....…..47

Page |6
ASSIGNMENT 1 ANSWERS

P1 Discuss the benefits and constraints of different network types and standards.

Computer Network
A computer network is a combination of computers together through networked devices and
media (network protocol, transmission environment) in a structured manner and these
computers communicate to communicate with each other. This report will explanation of
networking principles, protocols and devices, including benefits and constraints of networked
solutions, the impact of network topology, communication and bandwidth requirements, the
effectiveness of networking systems, operating principles of networking devices and server
types and networking software.

Network Standards

Network standards are also ground rules that are set by commissions so that hardware is
compatible among similar computers and assures interoperability. This is done to ensure that
backwards compatibility and compatibility from vendor to vendor. It is necessary to have
standards because if each company had its own protocol standards and didn't allow it to talk
with other protocols there would be a lack of communication from different machines and
would result in one company being hugely successful and the other running out of business
due to lack of being able to communicate with other machines. So this is why its necessary to
have network standards and protocols because they are what allow different computers from
different companies running different software to communicate with each-other making
networking possible.

Page |7
Advantages of networking:

File sharing – you can easily share data between different users, or access it remotely if you
keep it on other connected devices.

Resource sharing – using network-connected peripheral devices like printers, scanners and
copiers, or sharing software between multiple users, saves money.

Sharing a single internet connection – it is cost-efficient and can help protect your systems if
you properly secure the network.

Increasing storage capacity – you can access files and multimedia, such as images and
music, which you store remotely on other machines or network-attached storage devices.

Different types of networking are:


LAN - Local Area Network.

A local-area network (LAN) is a computer network that spans a relatively small area. Most
often, a LAN is confined to a single room, building or group of buildings, however, one LAN
can be connected to other LANs over any distance via telephone lines and radio waves.

WAN - Wide Area Network.

A wide area network (WAN) is a telecommunications network that extends over a large
geographical area for the primary purpose of computer networking. Wide area networks are
often established with leased telecommunication circuits.

Page |8
WLAN - Wireless Local Area Network.

Stands for "Wireless Local Area Network." A WLAN, or wireless LAN, is a network that allows
devices to connect and communicate wirelessly. Unlike a traditional wired LAN, in which
devices communicate over Ethernet cables, devices on a WLAN communicate via Wi-Fi.

MAN - Metropolitan Area Network.

A metropolitan area network (MAN) is a computer network that interconnects users with
computer resources in a geographic region of the size of a metropolitan area. The term MAN
is applied to the interconnection of local area networks (LANs) in a city into a single larger
network which may then also offer efficient connection to a wide area network. The term is
also used to describe the interconnection of several local area networks in a metropolitan area

Page |9
through the use of point-to-point connections between them.

P2.Explain the impact of network topology, communication and bandwidth


requirements.

Network topology:

It is the arrangement of the elements (links, nodes, etc.) of a communication network. Network
topology can be used to define or describe the arrangement of various types of

telecommunication networks, including command and control radio networks, industrial field
busses and computer networks. It Is the topological structure of a network and may be

depicted physically or logically. It is an application of graph theory wherein communicating


devices are modeled as nodes and the connections between the devices are modeled as links

or lines between the nodes.

P a g e | 10
Client Server:

P a g e | 11
This type of relationship is between two systems. One is the client (user), and the other is a
server. The client will make a service request to the other system (Server) which will send back

information to the client. Within this type of relationship, the client requires the information
given from the server for it to function correctly; therefore, it must be managed correctly.

Furthermore, the server controls the security of the network which can be beneficial as this
means that the user does not need to have security measures on their side. With this type of

topology, the bandwidth between the client and the server is limited by the hardware that is
used either by the server or the client. (BBC, n.d.) For example, a server may have hardware

supporting 1000 mb/s transfer speed but is limited to 30 mb/s due to the bandwidth allocated
by the ISP (Internet Server Provider). This scenario can also be applied to the client as their

hardware configuration may support higher bandwidth than their ISP (Internet Service
Provider) has allocated for them.

P a g e | 12
Cloud:

The cloud network topology refers to a collection of servers and data centers which are used
to create a collection of resources that could be accessed from anywhere in the world as long

as the user has an Internet connection. Cloud networks can be beneficial for small or large
organisations as they can accompany expansion which only requires an adjustment to their

current contract with the provider (Microsoft, n.d.). As a result of cloud technology, this has led
to the popularisation of cloud software. Cloud software is a type of software that can be

accessed through browsers. For example, Google cloud suite allows users to use a variety of
software such as Docs, Slides, Sheets or Drive. These will enable users to create and edit
documents, upload files and also share these documents with other users through email. This
can be advantageous for organisations as this can be used to improve communication and

also allows employees to continue working on documents outside of business hours.

P a g e | 13
Virtualised:

Virtualised networks can be presented in a variety of different forms that work in a variety of
ways and for a different purpose. VLAN stands for Virtual Local Area Network. Cisco (URL, n.d.)

summarises a VLAN as a “group of devices on one or more LANs that are configured to
communicate as if they were attached to the same wire”. Within an organisation this can be

beneficial as the connecting LANs could allow for increased communication between
departments or branches, therefore. Another type of Virtual network is a VPN. This stands for a

virtual private network which according to Cisco (n.d. 2) is defined as “an encrypted
connection over the Internet from a device to a network”. This can also be known as remote

access. Within an organisation that allows employees to connect to the network securely. This
can be beneficial as it can enable the work from home approach which could prevent

demotivation.

P a g e | 14
Logical Topology:
Ethernet:

The Ethernet typology is the most typical type of logical topology used. This topology can use

two physical topologies that are the bus and the star topology. The bus topology connects all
devices on the network through the same medium, also known as a physical channel. Some

examples of this physical channel are coaxial Cables, twisted pair or fibre optic. When using
this topology, any communication that occurs can be heard by all other devices connected

(Blackbox, n.d.). Ethernet also utilises CSMA/CD which stands for Carrier Sense Multiple Access
with Collision Detection. Carrier Sense refers to the prevention of transmission from other

devices if one is already transmitting (Blackbox, n.d.). Multiple Access refers to the ability for

multiple devices to communicate using the same medium (Blackbox, n.d.). Collision Detection
refers to a check that occurs to detect if more than one transmission signal is occurring,
jamming the signal and then waiting for a random interval before retransmission. (Blackbox,
n.d.)
P a g e | 15
Physical Topology:
Star:

BBC (n.d. 3) defines the star network topology as “each device on the network has its own
cable that connects to a switch or hub”. This means that visually the switch/hub is located at

the centre of and the computers are connected to the hub/switch rather than being connected
to two different computers. This can be essential for network management as all the traffic will

be directed through the switch/hub which it can be easily managed. Similar to other types of
topologies it is also easy to add devices to the network as it will only require a cable

connected to the switch/hub. If a device other than the hub/switch fails, then the rest of the
network will still be accessible. However, if the hub/switch fails, then the entire network will not
be accessible by the other devices. This also has additional cost due to the requirement of a
networking device to be used. (BBC, n.d. 3).
P a g e | 16
Ring:

According to ComputerHope (2018), the ring topology is defined as “A ring topology is a


network configuration in which device connections create a circular data path. Each networked

device is connected to two others, like points on a circle”. From this, it can be assumed that in
the event of an error occurring at one part of the ring this will cause the chain to break and

the network to fail. The ring topology also only allows transmission in a certain direction at a
certain time within the circle while other topologies such as the star allows the data to flow in

either direction. Unlike the star topology, it does not require a networking device for it to
function correctly as each device will connect to two other devices. This also allows the

network to be flexible. It can expand the ring as long as the new device can connect to two
other devices to continue the ring. Furthermore, as the data is travelling in one direction, this

can reduce collisions that occur when transmissions are sent. However, this topology can be
slow. For example, if a device has to transmit data to a device that is “behind” it on the ring, it

will have to go to every other device before it reaches its destination. (Computerhope, 2018).

P a g e | 17
IPv4

IPv4 stands for Internet Protocol Version 4 which is a 32-bit IP address that is formatted as

four three-digit numbers separated by a dot. For example, 111.111.111.111. This can allow any
number from 0 to 255 which roughly provides 4 billion unique addresses. As computing

devices have become more affordable, it had led to it becoming more common in everyday

houses and organisations. As IPv4 has a set limitation on the number of unique addresses it
can allocate, it will mean that at in the future we will run out of unique addresses. To solve this

major issue, a new type of unique address will be used as a replacement to the IPv4 system.
This is called IPv6. (PC, 2009)

IPv6

IPv6 is the 6th version of the Internet Protocol which is an increasingly complex version from

P a g e | 18
an earlier version. This is because it uses a 128-bit address which is four hexadecimal (0-9 and
A-F) numbers laid out in the following pattern ‘aaaa:bbbb:cccc:dddd:eeee:ffff:gggg:hhhh’. As

this follows hexadecimal, this can be easily perceived as being more secure as attempting to
guess the IP would take significantly more time than what it would for an IPv4 address. This

type of Internet Protocol has not been fully adopted yet. This is due to a wide range of
systems using IPv4, and the immediate switch could be financially expensive. However, as of

the 22d November 2018, there is a 22.77% IPv6 adoption with 21.85% of the amount being in
the United Kingdom. (Google, n.d.)

FTP

FTP stands for File Transfer Protocol and it is used for transferring files between a client and a
server. This type of protocol utilises the client-server network topology when communicating

between the server and the client. FTP also uses two ports, one for sending data (port 20) and
another port for the server to listen for incoming clients (port 21) (Gibson Research

Corporation, 2008). FTP can also be handy for a user as this allows them to easily upload and
download files remotely through the connection which further eliminates the requirements for

the user to use a removable media to merely update the files on their server. Depending on
the configuration this also means that it can also be remotely accessed from different
geolocations. FTP is commonly used when using a company as a server hosting provider as
most times the servers are not physically accessible the user. (BBC, n.d. 2)
P a g e | 19
HTTP

HTTP stands for HyperText Transfer Protocol which is used for transmitting digital media for

example HTML. This protocol is used when sending requests from a browser to a web server.
This type of protocol is stateless which is defined as not recording any data. This type of

transmission protocol has been superseded by HTTPS which is a secure version of the HTTP
protocol. HTTPS is a secure version of HTTP which utilises encryption methods to ensure any

data transmitted or received by the user cannot be intercepted. (BBC, n.d. 2)

P a g e | 20
OSI Model

OSI stands for Open Systems Interconnection. According to (CloudFlare, n.d.) the OSI provides
“Standardization which enables diverse communication systems to communicate using

standard protocols.”

Layer 7
Layer 7 also known as the Application layer. This layer interacts with the user and is used to

establish the communication. This layer gains this communication from software applications
which rely on protocols for communicating data and also receiving data (Cloudflare, n.d.). A

common example of this is the HTTP protocol as the user requests a web page from a browser
which in turn attempts to establish communication with the server. Another typical example is

the usage of FTP. As the software relies on communicating with the server for the purpose of
sending and receiving files.

P a g e | 21
Layer 6
Layer 6 also known as the Presentation layer. This layer specialises in translation of data so that

the different layers can use it. This means that any information passed from the application
layer will need to be translated so it can be readable by another device. This also works in the

opposite direction as data from another device will not be readable by the application layer.
Therefore, it will need to be translated into a format that can be used by the application layer.

Furthermore, encryption, decryption, and compression are also done during this stage if
required. (Cloudflare, n.d.)

Layer 5

Layer 5 also known as the Session layer. This layer has the primary focus of managing the
communication between the two devices that are used for the transmission and receiving of

data. This layer also has the ability to establish and terminate the communication. This layer is

essential as it ensures that communication between the two devices is established long
enough for the data to be fully transmitted without any errors. To further ensure that the data

is fully transmitted, checks are conducted periodically to identify the recipient or sender has
disconnected. If this occurs, the layer will save the last point that data was transmitted or

received so that it only sends the missing packets rather than all of them. (Cloudflare, n.d.)

Layer 4
Layer 4 also known as the Transport layer. This focuses on taking data gained from the session

layer then breaking it into segments which will then be given to the network layer (layer 3).
This layer is also responsible for the data communication for the two devices. This contains

flow and error control which will identify the transmission speed required so that it does not
cause issues for the recipient if they have a lower speed than the sender. Error control ensures

that all data is sent correctly and if it is not correctly sent it will retransmit the missing data.
(Cloudflare, n.d.)

Layer 3

Layer 3, also known as the Network layer. This layer is designed to transfer the data from one
P a g e | 22
network to another. This layer is only applicable if the two devices are not contained on the
same network as this layer will be skipped and sent to layer 2. During the network layer, the

segments gained from the previous layer are then further split into packets. These contain the
data and information such as the receiver’s IP address to allow it to get to the correct location.

Layer 2

Layer 2, also known as the Data Link layer, refers to the section which specialises in the
transmitting and receiving of data between two devices that are connected within the same

network. This takes the packets received from layer three that do not contain information in
relation to which local machine requested the data. This then adds the MAC address to the

packet so it can be correctly forwarded to the right system. As with the network layer, this also
contains flow control and error control functionality to ensure the data is received correctly.

(Cloudflare, n.d.)

Layer 1

Layer1, also known as the physical layer, refers to the use of physical equipment that is
required for data to be transferred successfully. This is typically done through mediums such

as an Ethernet cable. During this layer, the data gets converted into bits which consist of 1s
and 0s. When communicating between devices, these must be correctly synchronised to

understand the data conversion. (Cloudflare, n.d.)

IEEE 802.3
10Base-T

10Base-T is an Ethernet standard established by the IEEE. Sopto (n.d.) defines 10Base-T as
“10BASE-T is the IEEE standard that defines the requirement for sending information at 10

Mbps on unshielded twisted-pair cabling”. This means that when using a 10Base-T wire for
connecting devices together will only allow a transmission speed of 10 Mbps.

100Base-TX
According to Pcmag (n.d.), 100Base-TX is a modified version of 100Base-T which supports

transmission speeds of 100 Mbps between devices using two pairs of category 5 cables while
P a g e | 23
the 100Base-TX utilizes the Category 6 cables.

1000Base-T
1000Base-T is an updated standard by the IEE which is defined by Sopto (n.d.) as “sending

information at 1000 Mbps on unshielded twisted-pair cabling”. This type of Ethernet is an


updated version of 10Base-T but allows for significantly faster transmission speeds of 1

gigabit. This also utilizes Category 5 cables within which will enable it to have the 1 gigabit
transmission speed. (Sopto n.d.)

10GBase-T
According to an article published by Cablinginstall (2006), 10GBase-T refers to a standard for

ethernet that supports the ability to have 10 gigabits per second transmission speeds up to
100 meters. This is further expanded by the usage of Category 6 Augmented cables (Cat 6a)

which allow these speeds to be used for distances over 100 meters. This type of Even though
this was first established in 2006 it is still uncommon for the standard household. This is

because a lot of ISPs and consumer level hardware do not support those types of speeds.
However, this is used by large organisations that conduct large-scale file transfers and

receiving. This is also common within data centers as they are reliant on maintaining high
transmissions speeds.

IEEE 802.11

IEEE 802.11 refers to the working standards set for Wireless Local Area Networks created by

the Institute of Electrical and Electronics Engineers (IEEE). This also sets specifications for the
Media Access Control (MAC) and the Physical Layer (PHY). The first version of these standards

was released in 1997 and has been amended and updated as wireless technology advances.
Below contains some of the examples of the various protocols that are set by the IEEE.

(Mitchell, 2018)

802.11a

This iteration of the 802.11a wireless standard sough to improve upon the original networking
P a g e | 24
speed of 1-2Mbps transmission. This was upgraded to 54Mbps and also utilized the 5GHz
band, standard 802.11 utilised 2.4GHz. This also made sure it would be compatible with other

iterations of the wireless standard such as the 802.11b and 802.11g. (Mitchell, 2018)

802.11b
This standard also is adapted from the original 802.11 standard but focuses on improvements

within the 2.4GHz range which increased the transmission speeds to 11 Mbps. This further
allowed wireless to be more viable as an alternative to ethernet. (Mitchell, 2018)

802.11g
This type of wireless standard is the most commonly used one today. This further expands on

the 802.11b wireless standard by allowing transmission speeds up to 54Mbps and distances up
to 150 feet (45.72 Meters). It also still uses the 2.4GHz range which allows it to be compatible

with the 802.11b wireless standard. (Mitchell, 2018)

802.11n
This wireless standard was designed to be an improvement over the 802.11g wireless

standard. This utilises MIMO technology, which stands for Multiple Input, Multiple Output. This
allows the access point to use more than one antenna which can improve speed, range, and

overall efficiency. (Mitchell, 2018)

802.11ac
802.11ac was created as an overall improvement to the 802.11 standard but more specifically
the 802.11n wireless standard. This wireless standard provides significantly increased

transmission speeds (from 433 Mbps). This also runs on the 5GHz range to ensure speed is
maintained as most other devices run on the 2.4GHz range. This also incorporates the MIMO

technology and also uses a new technology called beamforming. Which according to Lendino
(2016) “sends signal directly to client devices”.

P3 Discuss the operating principles of networking devices and server types.

P a g e | 25
1. Networking device:

Hardware devices that are used to connect computers, printers, fax machines and
other electronic devices to a network are called network devices. These devices
transfer data in a fast, secure and correct way over same or different networks.
Network devices may be inter-network or intra-network. Some devices are installed on
the device, like NIC card or RJ45 connector, whereas some are part of the network,
like router, switch, etc. Let us explore some of these devices in greater details.

Different networking devices like:

Network Hub:

Network Hub is a networking device which is used to connect multiple network hosts. A
network hub is also used to do data transfer. The data is transferred in terms of
packets on a computer network. So when a host sends a data packet to a network hub,
the hub copies the data packet to all of its ports connected to. Like this, all the ports
know about the data and the port for whom the packet is intended, claims the packet.

However, because of its working mechanism, a hub is not so secure and safe.
Moreover, copying the data packets on all the interfaces or ports makes it slower and
more congested which led to the use of network switch.

Network Switch:
P a g e | 26
Like a hub, a switch also works at the layer of LAN (Local Area Network) but you can
say that a switch is more intelligent than a hub. While hub just does the work of data
forwarding, a switch does 'filter and forwarding' which is a more intelligent way of
dealing with the data packets.

So, when a packet is received at one of the interfaces of the switch, it filters the packet
and sends only to the interface of the intended receiver. For this purpose, a switch also
maintains a CAM (Content Addressable Memory) table and has its own system
configuration and memory. CAM table is also called as forwarding table or forwarding
information base (FIB).

Modem:

P a g e | 27
A Modem is somewhat a more interesting network device in our daily life. So if you
have noticed around, you get an internet connection through a wire (there are different
types of wires) to your house. This wire is used to carry our internet data outside to the
internet world.

However, our computer generates binary data or digital data in forms of 1s and 0s and
on the other hand, a wire carries an analog signal and that's where a modem comes in.

A modem stands for (Modulator+Demodulator). That means it modulates and


demodulates the signal between the digital data of a computer and the analog signal of
a telephone line.

Network Router:

P a g e | 28
A router is a network device which is responsible for routing traffic from one to another
network. These two networks could be a private company network to a public network.
You can think of a router as a traffic police who directs different network traffic to
different directions.

Bridge:

P a g e | 29
If a router connects two different types of networks, then a bridge connects two
subnetworks as a part of the same network. You can think of two different labs or two
different floors connected by a bridge.

Repeater:

A repeater is an electronic device that amplifies the signal it receives. In other terms,
you can think of repeater as a device which receives a signal and retransmits it at a

P a g e | 30
higher level or higher power so that the signal can cover longer distances.

For example: Inside a college campus, the hostels might be far away from the main
college where the ISP line comes in. If the college authority wants to pull a wire in
between the hostels and main campus, they will have to use repeaters if the distance
is much because different types of cables have limitations in terms of the distances
they can carry the data for.

2. Server Types:

Network servers became common in the early 1990s, as businesses increasingly


began using PCs to provide services formerly hosted on
larger mainframes or minicomputers.
A network server, today, is a powerful computer that provides various shared
resources to workstations and other servers on a network. The shared resources can
include disk space, hardware access and email services. Any computer can be a
“network server,” but what separates a server from a workstation is not the hardware,
but rather the function performed by the computer.

There are 11 servers type used today:

1. Application Servers
Sometimes referred to as a type of middleware, application servers occupy a large
chunk of computing territory between database servers and the end user, and they
often connect the two.

P a g e | 31
2. Client Servers
In the client/server programming model, a server is a program that awaits and fulfills
requests from client programs in the same or other computers. A given application in a
computer may function as a client with requests for services from other programs and
also as a server of requests from other programs.

3. Collaboration Servers
In many ways, collaboration software, once called ‘groupware,’ demonstrates the
original power of the Web. Collaboration software designed to enable users to
collaborate, regardless of location, via the Internet or a corporate intranet and to work
together in a virtual atmosphere.

P a g e | 32
4. FTP Servers
One of the oldest of the Internet services, File Transfer Protocol, makes it possible to
move one or more files securely between computers while providing file security and
organization as well as transfer control.

5. Mail Servers
Almost as ubiquitous and crucial as Web servers, mail servers move and store mail
over corporate networks (via LANs and WANs) and across the Internet.

P a g e | 33
6. Open Source Servers
From your underlying open source server operating system to the server software that
help you get your job done, open source software is a critical part of many IT
infrastructures.

7. Proxy Servers
Proxy servers sit between a client program (typically a Web browser) and an external
server (typically another server on the Web) to filter requests, improve performance,
and share connections.

P a g e | 34
8. Real-Time Communication Servers
Real-time communication servers, formerly known as chat servers or IRC Servers, and
still sometimes referred to as instant messaging (IM) servers, enable large numbers
users to exchange information near instantaneously.

9. Telnet Servers
A Telnet server enables users to log on to a host computer and perform tasks as if
they’re working on the remote computer itself.

P a g e | 35
10. Virtual Servers
In 2009, the number of virtual servers deployed exceeded the number of physical
servers. Today, server virtualization has become near ubiquitous in the data center.
From hypervisors to hybrid clouds, ServerWatch looks at the latest virtualization
technology trends.

11. Web Servers


At its core, a Web server serves static content to a Web browser by loading a file from
a disk and serving it across the network to a user’s Web browser. This entire exchange
is mediated by the browser and server talking to each other using HTTP.

P a g e | 36
P4 Discuss the inter-dependence of workstation hardware with relevant networking
software.

A work station is a computer designed for individual use that is more capable than a personal
computer. As they are PCs, they can be used independently of the mainframe assuming that
they have their own apps installed and their own hard disk storage. Network interface card is a
computer hardware part that allows computers to be clubbed together in a network usually a
local area network.

P a g e | 37
A network is formed, when more than one computer is connected among each other, for the
purpose of communication among them. There are servers also present in a network, which
provides many data storage places. Servers in order to manage so many computers need an
operating system.

When a request is received from computer, over the internet to the server, there are some
scheduling algorithms, which determines what or resource is to be given to which request. In
this way a software interacts, with the workstation hardware.

Networking software is a foundational element for any network. It helps administrators deploy,
manage and monitor a network. Traditional networks are made up of specialized hardware,
such as routers and switches, that bundle the networking software into the solution.

P a g e | 38
P5 Provide a logical/physical design of the networked system with clear explanation
and addressing table.

Network design:

P a g e | 39
Explain:

- I use 3 router for each room : 1 router for Student lab A , 1 router for Student Lab B, 1 router
for Staff room.
-Student Lab A has 6 computer , 1 server , 3 switch. The reason why student Lab A has 3
switch is because one switch contains 24 port so that I can connect more computer to fulfill
that assignment brief.
-Student Lab B has 6 computer, 1 server, 1 switch. Switch connected 6 computer is enough
for 50 computer.
-Staff room has 6 computer , 1 server , 2 switch , 2 printer , 1 Smart Phone , 1 Laptop and 1
Wireless router .
-Smart Phone and Laptop connected to wireless router , each switch has 3 computer and 1
printer connected. For Staff room works.

P a g e | 40
P6 Evaluate the design to meet the requirements.
-For my design, It is enough to meet the requirements. I have spent a lot of time to configure
IP for each computer and try to test every computer. I tried first time to see if the computer can
send an email and it didn’t work. I tried second time and it was successful. The IP of the PC
hasn’t recognized by router yet so I have to test it twice to work. I have to say that 1 switch
should need expand more port to connect more computer. For me I have to use like 4 switch
to connect 50 computers. Also wireless router should be more intelligent so that other device
should connect to that router to be identify as device for room 1 or 2.
P7 Implement a networked system based on a prepared design.
IP Address table:

Device Interface IP Address Subnet Mask Default


Gateway

PC0 Fa0/1 126.168.1.3 255.0.0.0 126.168.1.1

PC1 Fa0/2 126.168.1.2 255.0.0.0 126.168.1.1

PC2 Fa0/1 126.168.1.4 255.0.0.0 126.168.1.1

PC3 Fa0/2 126.168.1.5 255.0.0.0 126.168.1.1

PC4 Fa0/2 126.168.1.6 255.0.0.0 126.168.1.1

PC5 Fa0/3 126.168.1.7 255.0.0.0 126.168.1.1

PC6 Fa0/2 136.168.1.2 255.0.0.0 136.168.1.1

PC7 Fa0/1 136.168.1.3 255.0.0.0 136.168.1.1

PC8 Fa0/3 136.168.1.4 255.0.0.0 136.168.1.1

PC9 Fa0/4 136.168.1.5 255.0.0.0 136.168.1.1

P a g e | 41
PC10 Fa0/6 136.168.1.6 255.0.0.0 136.168.1.1

PC11 Fa0/7 136.168.1.7 255.0.0.0 136.168.1.1

PC12 Fa0/1 146.168.1.2 255.255.0.0 146.168.1.1

PC13 Fa0/2 146.168.1.3 255.255.0.0 146.168.1.1

PC14 Fa0/3 146.168.1.4 255.255.0.0 146.168.1.1

PC15 Fa0/3 146.168.1.5 255.255.0.0 146.168.1.1

PC16 Fa0/4 146.168.1.6 255.255.0.0 146.168.1.1

PC17 Fa0/5 146.168.1.7 255.255.0.0 146.168.1.1

… … … … …

Server0 Fa0/8 136.168.1.8 255.255.0.0 136.168.1.1

Server1 Fa0/6 126.168.1.8 255.0.0.0 126.168.1.1

Server2 Fa0/5 146.168.1.8 255.255.0.0 146.168.1.1

Ping of some device tested:

P a g e | 42
P a g e | 43
P a g e | 44
P8 Document and analyse test results against expected results.

Document:

-Student Lab A has 3 switch to connect around 35 computer and 1 server.

-Student Lab B has 1 switch to connect the remaning computer to enough 50 computer.

-Staff room has 3 switch to connect 35 computers and 3 printer,

P a g e | 45
- The test has been analyzed that the result is exactly as my expectation

- The PC5 from Lab A couldn’t send an email to PC6 from Lab B is because first time didn’t
work. First time it didn’t recognize the IP Address. So second time will success.

-Same thing as PC11 from Lab B to Staff room.

P a g e | 46
REFERENCE

1. Brainly.in[2018], What are the different types of networking. What are its advantages?.
Available at : https://brainly.in/question/3440750#readmore
2. Brainly.in[2018], Discuss the inter-dependence of workstation hardware with relevant
networking software. Available at: https://brainly.in/question/9614893#readmore

3. Fossbytes.com[2019],Discuss the operating principles of networking devices and server types.


Available at: https://fossbytes.com/networking-devices-and-hardware-types/

4. ukessays.com[2003] Explain the impact of network topology, communication and bandwidth


requirements. Available at: https://www.ukessays.com/essays/information-systems/explain-the-
impact-of-network-topology-communication-and-bandwidth-requirements.php

5. Ciscopress.com[2014], Implement a networked system based on a prepared design. Available


at: https://www.ciscopress.com/articles/article.asp?p=2189637&seqNum=4

6. Techopedia.com[2013],What is a logical network. Available at:


https://www.techopedia.com/definition/14760/logical-network

7. Conceptdraw.com[2016], What is a physical network. Available at:


https://www.conceptdraw.com/How-To-Guide/physical-network

8. Geeksforgeeks.org[2015], What is a networking device. Available at:


https://www.geeksforgeeks.org/network-devices-hub-repeater-bridge-switch-router-gateways/

9. Nhgeogrgia.com[2019], Explanation of Network Servers. Available at:


https://www.nhgeorgia.com/blog/network-server-types-explained-6

10.Wikipedia.org[2020], definition of Computer network. Available at:


https://en.wikipedia.org/wiki/Computer_network#:~:text=A%20computer%20network%20is%2
0a,provided%20by%20the%20network%20nodes.

P a g e | 47

You might also like