1. Higher Nationals in Computing
Unit 2: Networking Assignment
Learner’s name:DANGANTHANH
ID: GCS190644
Class:GCS0805_PPT
Subject code: 1619
Assessor name:PHANMINH TAM
Assignment due: Assignment submitted:
2. ASSIGNMENT FRONT SHEET
Qualification BTEC Level 5 HND Diploma in Computing
Unit number and title Unit 2: Networking
Submission date 17/8/2020 Date Received 1st submission
Re-submission Date Date Received 2nd submission
Student Name Dang An Thanh Student ID GCS190644
Class GCS0805_PPT Assessorname Phan Minh Tam
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Student’s signature Thanh
Grading grid
P1 P2 P3 P4 P5 P6 P7 P8 M1 M2 M3 M4 D1 D2 D3
4. ASSIGNMENT BRIEF
Qualification BTEC Level 5 HND Diploma in Computing
Unit number Unit 2: Networking
Assignment title NetworkingInfrastructure
Academic Year
Unit Tutor TamPM
Issue date Submission date
IV name and date Khoa Canh Nguyen, Nhung, Michael Omar 9th/01/2020
Submission format
Part 1
The submission is in the form of an individual written report. This should be written in a concise,
formal business style using single spacing and font size 12. You are required to make use of headings,
paragraphs and subsections as appropriate, and all work must be supported with research and
referenced using the Harvard referencing system. Please also provide a bibliography using the Harvard
referencing system. The recommended word limit is 2,000–2,500 words, although you will not be
penalized for exceeding the total word limit.
Part 2
The submission is in the form of an individual evidence portfolio.
A LAN design plan and blueprint and justification document.
5. A fully completed test plan including an evaluation of results and recommendations for
improvements to LAN.
A proposed and justified maintenance schedule.
Part 3
Evidence of an implemented network.
You are required to make use of headings, paragraphs, subsections and illustrations as appropriate,
and all work must be supported with research and referenced using the Harvard referencing system.
Unit Learning Outcomes
LO1: Examine networking principles and their protocols.
LO 2: Explain networking devices and operations.
LO3: Design efficient networked systems.
LO4: Implement and diagnose networked systems.
Assignment Brief
You are employed as a Network Engineer by Nguyen Networking Limited, a high-tech networking
solution development company, which have branches in Ho Chi Min City, Hanoi, Da Nang and Can
Tho.
The company has been contracted to implement a networking project from a local educational
institute. The specification of the project is given below:
People: 200 students, 15 teachers, 12 marketing and administration staff, 5 higher managers
including the head of academics and the programme manager, 3 computer network
6. administrators.
Resources: 50 student lab computers, 35 staff computers, 3 printers
Building: 3 floors, all computers and printers are on the ground floor apart from the IT labs – one
lab located on the first floor and another located on the second floor
As a first task, the CEO of the company Mr. Nguyen has asked you to investigate and explain
networking principles, protocols and devices and submit a report.
Part 1
You will need to produce a report that includes the following:
1. An introduction to provide an overview of your report.
2. Benefits and constraints of different types of networks and networking standards.
3. The impact of network topology, speed of communication and bandwidth requirements.
4. Effectiveness of networking systems.
5. Discussion on operating principles of networking devices and server types and networking
software.
6. Discuss the relationship of workstation hardware with networking software.
7. Explore a range of server types and justify the selection of a server, considering a given
scenario regarding cost and performance optimization.
8. For the given specification, identify the topology protocol for the efficient utilization of a
networking system.
The CEO Mr. Nguyen is happy with your first report and now he has asked you to analyze the
specification from the institution, as given earlier.
You need to design and implement the networking project within a given timeframe:
Part 2 Design efficient networked systems
1. Prepare a written step-by-step plan of how you are going to design a Local Area Network
7. including a blueprint of your LAN.
2. Justify your choice of devices for your network design.
3. Produce a test plan to evaluate this design for the requirements of bandwidth and cost
constraints as per user specifications.
4. Justify the security requirements and quality of services needed for selection of accessories.
5. Suggest a maintenance schedule to support the networked system.
Part 3 Implement test and diagnose networked systems
1. Implement a networked systembased on your prepared design.
2. Conduct verification with e.g. Ping, extended ping, trace route, telnet, SSH, etc.
3. Record the test results and analyze these against expected results.
4. Investigate what functionalities would allow the systemto support device growth and the
addition of communication devices.
5. Discuss the significance of upgrades and security requirements in your recommendations.
8. ASSESMENT CRITERIA
Learning Outcomes and Assessment Criteria
Pass Merit Distinction
LO1 Examine networking principles and their protocols
LO1 & 2
D1 Considering a given
scenario, identify the
topology protocol selected
for the efficient utilization
of a networking system.
P1 Discuss the benefits and constraints
of different network types and
standards.
P2 Explain the impact of network
topology, communication and
bandwidth requirements.
M1 Compare common
networking principles and how
protocols enable the
effectiveness of networked
systems.
LO2 Explain networking devices and operations
P3 Discuss the operating principles of
networking devices and server types.
P4 Discuss the inter-dependence of
workstation hardware with relevant
networking software.
M2 Explore a range of server
types and justify the selection
of a server, considering a given
scenario regarding cost and
performance optimisation.
LO3 Design efficient networked systems
P5 Provide a logical/physical design of
the networked systemwith clear
explanation and addressing table.
P6 Evaluate the design to meet the
requirements.
M3 Install and configure
network services and
applications on your choice.
D2 Design a maintenance
schedule to support the
networked system.
LO4 Implement and diagnose networked systems
P7 Implement a networked system
based on a prepared design.
P8 Document and analyse test results
against expected results.
M4 Recommend potential
enhancements for the
networked systems.
D3 Use critical reflection
to evaluate own work and
justify valid conclusions.
9. Table of Contents
Unit 2: Networking Assignment..................................................................................................................... 1
INTRODUCTION TO NETWORKING................................................................................................................ 1
P1 Discuss the benefits and constraints of different network types and standards. ........................................ 1
1. What is the network?............................................................................................................................ 1
2. Network type ( LAN,MAN, INTERNET, ect….).......................................................................................... 2
2.1. LAN ( Local Area Network) ................................................................................................................. 2
2.2. MAN ( Metropolitan Area Network)................................................................................................... 3
2.3. INTERNET ( International Network).................................................................................................... 4
2.4. Benefit of networking............................................................................................................. 4
2.4.1. Advantages of LAN................................................................................................................. 4
2.4.2. Advantages of MAN ............................................................................................................... 5
2.4.3. Advantages of WAN ............................................................................................................... 5
2.5. Protocol and Standards...................................................................................................................... 6
2.5.1. Define Standards.................................................................................................................... 6
2.5.2. List some protocols................................................................................................................ 6
2.5.3. List some standard organizations and standards names .......................................................... 6
P2. Network topology & communication and Bandwidth requirements......................................................... 7
1. What is Network topology ?.................................................................................................................. 7
1.1. Network topology definition.............................................................................................................. 7
2. Denifition of Physical & Logical Topology............................................................................................... 8
2.1. Denifition of Physical Topology.......................................................................................................... 8
2.2. Denifition of Logical Topology............................................................................................................ 9
2.3. Examples of topology with diagrams ( Mesh, Star, Bus, Ring, Tree, Hyprib) ........................................10
2.3.1. Mesh Topology......................................................................................................................10
2.3.2. Star Topology........................................................................................................................11
2.3.3. Bus Topology ........................................................................................................................12
2.3.4. Ring Topology.......................................................................................................................13
2.3.5. Hibrib Topology.....................................................................................................................14
3. Comunication and Bandwidth..............................................................................................................15
3.1. Comunication...................................................................................................................................15
3.1.1. Define commutations in terms of networking .......................................................................15
10. 3.1.2. Rules of communication........................................................................................................15
3.2. Bandwidth........................................................................................................................................16
M1 Compare common networkingprinciplesand how protocols enable the effectivenessofnetworked
systems.......................................................................................................................................................16
1. What is the TCP / IP protocol ? .............................................................................................................16
1.1. The most popular TCP / Ip protocols..................................................................................................17
2. What is the OSI model?........................................................................................................................18
3. Compare OSI model with TCP / IP model ..............................................................................................19
P3 Discuss the operating principles of networking devices and server types..................................................20
1. Discuss 1 or 2 operating principles of a selected network device ...........................................................20
1.1. Repeater..........................................................................................................................................20
2.2. Hub ..................................................................................................................................................21
2. List network devices.............................................................................................................................22
3. List server types...................................................................................................................................22
P4 Discuss the inter-dependence of workstation hardware with relevant networking software.....................22
1. Define workstation hardware...............................................................................................................22
2. Define networking software.................................................................................................................23
3. Discuss and explainthe interdepenciesofworkstationhardware with networkingsoftware. Derive an
example form your discussion .....................................................................................................................23
M2 Explore a range of servertypes and justifythe selectionofa server,consideringa given scenario
regarding cost and performance optimization..............................................................................................24
1. Some types of server........................................................................................................................24
2. Determining Your Networking Requirements ....................................................................................26
D1 Consideringa givenscenario,identifythe topology protocol selectedforthe efficientutilizationofa
networking system......................................................................................................................................26
P5 Provide a logical/physical design of the networked system with clear explanation and addressing table ..26
1. Explain the difference between logical and physical design...................................................................26
1.1. What is logical of the networked systen?...........................................................................................26
1.2. What is physical design of the networked system? ...........................................................................27
2. Discuss and explain the USER Requirement for the design.....................................................................28
3. Provide a logical design of the network base on user reuirement ..........................................................29
P6 Evaluate the design to meet the requirements. ......................................................................................31
1. Design evaluation:...............................................................................................................................31
2. Evaluate the design of the network......................................................................................................31
3. What advice and solution would you provide to the network for efficiency and usage...........................32
11. 3.1. Determine that your network is at fault. ...........................................................................................32
3.2. Offer guests a different network. ......................................................................................................32
3.3. Educate personnel about user behavior.............................................................................................33
3.4. Use VLANs to segment low-priority traffic.........................................................................................33
3.5. Check for viruses or system defects...................................................................................................33
M3 Install and configure network services and applications on your choice..................................................34
1. What is the network server?................................................................................................................34
2. What is the network application?.........................................................................................................34
3. Select network services and network applications in your design..........................................................34
4. Applications can be added to the network............................................................................................35
D2 Design a maintenance schedule to support the networked system..........................................................35
1. Form and Time of Support....................................................................................................................35
1.1. Forms of support:.............................................................................................................................35
1.2. Time of Support................................................................................................................................35
P7 Implement a networked system based on a prepared design...................................................................36
1. Show evidence of a working network you’ve design .............................................................................36
2. Ping some device running the screen....................................................................................................37
3. Show me implemented system.............................................................................................................41
P8 Document and analyze test results against expected results....................................................................41
1. Provide a stepby step configurationof network devicesinthe network(Choose a device in the network
and provide all the steps for configuration)..................................................................................................41
2. Test results against test plans...............................................................................................................44
M4 Recommend potential enhancements for the networked systems..........................................................45
D3 Use critical reflection to evaluate own work and justify valid conclusions................................................47
REFERENCES................................................................................................................................................48
12. Table of Figures
Figure 1 Network.......................................................................................................................................... 2
Figure 2 Network type................................................................................................................................... 2
Figure 3 LAN ( Local Area Network)................................................................................................................ 3
Figure 4 MAN (Metropolitan Area Network)................................................................................................... 3
Figure 5 INTERNET ( Internetnational Network).............................................................................................. 4
Figure 6 Network Topology............................................................................................................................ 8
Figure 7 Physical Topologies.......................................................................................................................... 8
Figure 8 Logical Topology .............................................................................................................................. 9
Figure 9 Mesh Topology...............................................................................................................................10
Figure 10 Star Topology................................................................................................................................11
Figure 11 Bus Topology ................................................................................................................................12
Figure 12 Ring Topology...............................................................................................................................13
Figure 13 Hibrib Topology.............................................................................................................................14
Figure 14 TCP/IP Model................................................................................................................................17
Figure 15 the most popular TCP / Ip protocols...............................................................................................18
Figure 16 OSI Basic Reference Model ............................................................................................................19
Figure 17 Compare OSI & TCP/IP...................................................................................................................20
Figure 18 Repeater.......................................................................................................................................21
Figure 19 Hub ..............................................................................................................................................21
Figure 20 workstation ..................................................................................................................................23
Figure 21 Logical of networked system..........................................................................................................27
Figure 22 Physical of networked system........................................................................................................28
Figure 23 Result of the design.......................................................................................................................30
Figure 24 Server room..................................................................................................................................34
Figure 25 New server room ..........................................................................................................................35
Figure 26 Ping PC student 1 to PC student 2 ..................................................................................................38
Figure 27 Ping PC student 2 to PC student 5 ..................................................................................................38
Figure 28 Ping PC student 6 to PC DNS ..........................................................................................................39
Figure 29 Ping PC staff 1 to printer 1 ............................................................................................................39
Figure 30 Ping PC 13 to PC 10 .......................................................................................................................40
Figure 31 Ping PC staff 2 to PC staff 5............................................................................................................40
Figure 32 implemented system.....................................................................................................................41
Figure 33Choose the device..........................................................................................................................42
Figure 34 choose the connection ..................................................................................................................42
Figure 35 Result step 1.................................................................................................................................42
Figure 36 Result step 2.................................................................................................................................43
Figure 37 Result step 3.................................................................................................................................44
Figure 38 Test plan.......................................................................................................................................44
14. P a g e | 1
ASSIGNMENT 1 ANSWERS
INTRODUCTION TO NETWORKING
Networking is referred as connecting computers electronically for the purpose of sharing information
. Resources such as files , applications , printers and software are common information shared in a
networking . The advantage of networking can be seen clearly in terms of security , efficiency ,
manageability and cost effectiveness as it allows collaboration between users in a wide range .
Basically , network consists of hardware component such as computer , hubs , switches , routers and
other devices which form the network infrastructure . These are the devices that play an important
role in data transfer from one place to another using different technology such as radio waves and
wires . There are many types of network available in the networking industries and the most common
network are Local Area Network ( LAN ) and Wide Area Network ( WAN ) .LAN network is made up of
two or more computers connected together in a short distance usually at home , office buildings or
school . WAN is a network that covers wider area than LAN and usually covers cities , countries and
the whole world . Several major LAN can be connect together to form a WAN . As several devices are
connected to network , it is important to ensure data collision does not happened when this devices
attempt to use date channel simultaneously. A set of rules called Carrier Sense Multiple Access /
Collision detection are used to detect and prevent collision in networks.
P1 Discuss the benefits and constraints of different network types and standards.
1. What is the network?
- A computer network is a group of computers that use a set of common communication
protocols over digital interconnections for the purpose of sharing resources located on or
provided by the network nodes. The interconnections between nodes are formed from a
broad spectrum of telecommunication network technologies, based on physically wired,
optical, and wireless radio-frequency methods that may be arranged in a variety of network
topologies.
15. P a g e | 2
Figure 1 Network
2. Network type ( LAN,MAN, INTERNET, ect….)
- There are three types of computer networks.
Figure 2 Network type
2.1. LAN ( Local Area Network)
- Local area network is a group of computers connected with each other in a small places
such as school, hospital, apartment etc.
- LAN is secure because there is no outside connection with the local area network thus the
data which is shared is safe on the local area network and can’t be accessed outside.
- LAN due to their small size are considerably faster, their speed can range anywhere from
16. P a g e | 3
100 to 100Mbps.
- LANs are not limited to wire connection, there is a new evolution to the LANs that allows
local area network to work on a wireless connection.
Figure 3 LAN ( Local Area Network)
2.2. MAN ( Metropolitan Area Network)
- MAN network covers larger area by connections LANs to a larger network of computers. In
Metropolitan area network various Local area networks are connected with each other
through telephone lines. The size of the Metropolitan area network is larger than LANs and
smaller than WANs(wide area networks), a MANs covers the larger area of a city or town.
Figure 4 MAN (Metropolitan Area Network)
17. P a g e | 4
2.3. INTERNET ( International Network)
- The Internet is the global system of interconnected computer networks that uses
the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is
a network of networks that consists of private, public, academic, business, and government
networks of local to global scope, linked by a broad array of electronic, wireless, and optical
networking technologies. The Internet carries a vast range of information resources and
services, such as the inter-linked hypertext documents and applications of the World Wide
Web (WWW), electronic mail, telephony, and file sharing.
Figure 5 INTERNET ( Internetnational Network)
2.4. Benefit of networking
2.4.1. Advantages of LAN
Data Security : Data security is easy in LAN because all the computers are connected to the
server system and all the data is stored at one place in the server so easy to maintain secured
too.
18. P a g e | 5
Software Applications Sharing : As we know all computers are connected to the server so it
can also share application licensing software with them. It is not required to licensing each
computer individually. All worked on only one licensed system.
Internet Sharing : LANs also provided an advantage of cheaper cost on internet connection. As
the single interconnection is required for the server system and all the other computers are
worked with that connection.
Easy and Cheap Communication : All the data and files are shared easily in LAN because all the
data has stored in a server so it is shared easily, fast and secured. Hence, also save a lot of time
and money.
2.4.2. Advantages of MAN
Less expensive: It is less expensive to attach MAN with WAN. MAN gives the good efficiency of
data. In MAN data is easily managed in a centralized way.
Sending local emails: On MAN you can send local emails fast and free.
High speed than WAN: MAN uses fiber optics so the speed of data can easily reach upon 1000
Mbps. Files and databases can be transferred fast.
Sharing of the internet: In some installation of MANs, users can share their internet
connection. So multiple users can get the same high-speed internet.
Conversion from LAN to MAN is easy: MAN is a faster way to connect two fast LANs together.
This is due to the fast configuration of links.
High Security: MAN has a high-security level than WAN.
2.4.3. Advantages of WAN
Sharing devices such as printers saves money.
Site (software) licences are likely to be cheaper than buying several standalone licences.
Files can easily be shared between users.
Network users can communicate by email and instant messenger.
Security is good - users cannot see other users' files unlike on stand-alone machines.
19. P a g e | 6
Data is easy to backup as all the data is stored on the file server.
2.5. Protocol and Standards
2.5.1. Define Standards
- A standard is a set of specifications for hardware or software, agreed upon by academic
and industry contributors. A standard makes it possible for many manufacturers to create
products that are compatible with each other. Standards may be set by official
organizations, or unofficially set, established by common use. Common examples of
standards include multiple IEEE standards for electrical interfaces (computer cables), ANSI
for programming languages, and VESA for computer monitors and video adapters.
2.5.2. List some protocols
- There are various types of protocols that support a major and compassionate role in
communicating with different devices across the network. These are:
+ Transmission Control Protocol (TCP)
+ Internet Protocol (IP)
+ User DatagramProtocol (UDP)
+ Post office Protocol (POP)
+ Simple mail transport Protocol (SMTP)
+ File Transfer Protocol (FTP)
+ Hyper Text Transfer Protocol (HTTP)
+ Hyper Text Transfer Protocol Secure (HTTPS)
2.5.3. List some standard organizations and standards names
3GPP – 3rd Generation Partnership Project
3GPP2 – 3rd Generation Partnership Project 2
ABYC – The American Boat & Yacht Council (ABYC is an international organization, despite
its name)
20. P a g e | 7
Accellera – Accellera Organization
A4L – Access for Learning Community (formerly known as the Schools Interoperability
Framework)
AES – Audio Engineering Society
AHRI - Air-conditioning, Heating, and Refrigeration Institute
AIIM – Association for Information and Image Management
ASAM – Association for Automation and Measuring Systems
ASHRAE – American Society of Heating, Refrigerating and Air-Conditioning Engineers
(ASHRAE is an international organization, despite its name)
ASME – American Society of Mechanical Engineers
ASTM International
P2. Network topology & communication and Bandwidth requirements
1. What is Network topology ?
1.1. Network topology definition.
- Network topology is the arrangement of the elements (links, nodes, etc.) of a
communication network. Network topology can be used to define or describe the
arrangement of various types of telecommunication networks, including command and
control radio networks, industrial fieldbusses and computer networks.
- Network topology is the topological structure of a network and may be depicted
physically or logically. It is an application of graph theory wherein communicating devices
are modeled as nodes and the connections between the devices are modeled as links or
lines between the nodes.
21. P a g e | 8
Figure 6 Network Topology
2. Denifition of Physical & Logical Topology
2.1. Denifition of Physical Topology
- Physical topology is the placement of the various components of a network (e.g., device
location and cable installation), while logical topology illustrates how data flows within a
network. Distances between nodes, physical interconnections, transmission rates, or signal
types may differ between two different networks, yet their logical topologies may be identical.
A network’s physical topology is a particular concern of the physical layer of the OSI model.
Figure 7 Physical Topologies
22. P a g e | 9
2.2. Denifition of Logical Topology
- Logical topology is the arrangement of devices on a computer network and how they
communicate with one another.[1] Logical topologies describe how signals act on the network.
- In contrast, a physical topology defines how nodes in a network are physically linked and
includes aspects such as geographic location of nodes and physical distances between nodes.
The logical topology defines how nodes in a network communicate across its physical topology.
The logical topology can be considered isomorphic to the physical topology, as vice versa.
- Early twisted pair Ethernet with a single hub is a logical bus topology with a physical star
topology. While token ring is a logical ring topology with a physical star topology.
Figure 8 Logical Topology
23. P a g e | 10
2.3. Examples of topology with diagrams ( Mesh, Star, Bus, Ring, Tree, Hyprib)
2.3.1. Mesh Topology.
- In mesh topology each device is connected to every other device on the network through a
dedicated point-to-point link. When we say dedicated it means that the link only carries data
for the two connected devices only. Lets say we have n devices in the network then each
device must be connected with (n-1) devices of the network. Number of links in a mesh
topology of n devices would be n(n-1)/2.
Advantages of Mesh topology
- No data traffic issues as there is a dedicated link between two devices which means the link is
only available for those two devices.
- Mesh topology is reliable and robust as failure of one link doesn’t affect other links and the
communication between other devices on the network.
- Mesh topology is secure because there is a point to point link thus unauthorized access is not
possible.
Figure 9 Mesh Topology
24. P a g e | 11
- Fault detection is easy.
Disadvantages of Mesh topology
- Amount of wires required to connected each system is tedious and headache
- Since each device needs to be connected with other devices, number of I/O ports required must
be huge.
- Scalability issues because a device cannot be connected with large number of devices with a
dedicated point to point link.
2.3.2. Star Topology
- In star topology each device in the network is connected to a central device called hub. Unlike
Mesh topology, star topology doesn’t allow direct communication between devices, a device
must have to communicate through hub. If one device wants to send data to other device, it
has to first send the data to hub and then the hub transmit that data to the designated device.
Advantages of Star topology
- Less expensive because each device only need one I/O port and needs to be connected with
hub with one link.
Figure 10 Star Topology
25. P a g e | 12
- Easier to install
- Less amount of cables required because each device needs to be connected with the hub only.
- Robust, if one link fails, other links will work just fine.
- Easy fault detection because the link can be easily identified.
Disadvantages of Star topology
- If hub goes down everything goes down, none of the devices can work without hub.
- Hub requires more resources and regular maintenance because it is the central system
of star topology.
2.3.3. Bus Topology
- In bus topology there is a main cable and all the devices are connected to this main cable
through drop lines. There is a device called tap that connects the drop line to the main cable.
Since all the data is transmitted over the main cable, there is a limit of drop lines and the
distance a main cable can have.
Advantages of bus topology
- Easy installation, each cable needs to be connected with backbone cable.
- Less cables required than Mesh and star topology
Figure 11 Bus Topology
26. P a g e | 13
Disadvantagesof bustopology
- Difficultly in fault detection.
- Not scalable as there is a limit of how many nodes you can connect with backbone
cable.
2.3.4. Ring Topology
- In ring topology each device is connected with the two devices on either side of it. There
are two dedicated point to point links a device has with the devices on the either side of it.
This structure forms a ring thus it is known as ring topology. If a device wants to send data
to another device then it sends the data in one direction, each device in ring topology has a
repeater, if the received data is intended for other device then repeater forwards this data
until the intended device receives it.
Figure 12 Ring Topology
27. P a g e | 14
Advantages of Ring Topology
- Easy to install.
- Managing is easier as to add or remove a device from the topology only two links are required
to be changed.
Disadvantages of Ring Topology
- A link failure can fail the entire network as the signal will not travel forward due to failure.
- Data traffic issues, since all the data is circulating in a ring.
2.3.5. Hibrib Topology
- A combination of two or more topology is known as hybrid topology. For example a
combination of star and mesh topology is known as hybrid topology.
Figure 13 Hibrib Topology
Advantagesof Hybridtopology
- We can choose the topology based on the requirement for example, scalability is our
concern then we can use star topology instead of bus technology.
- Scalable as we can further connect other computer networks with the existing networks
with different topologies.
28. P a g e | 15
Disadvantagesof Hybridtopology
- Fault detection is difficult.Installation is difficult.
- Design is complex so maintenance is high thus expensive.
3. Comunication and Bandwidth
3.1. Comunication
3.1.1. Define commutations in terms of networking
- Communications is the exchange of information between two or more things, such
as people, devices, governments, organizations, or businesses. In digital
communication, data is exchanged between two or more computing devices. This
data communication (datacom) occurs over a communication medium, such as a
telephone line, fiber optic cable, or wireless radio signal. The collection of digital
devices and their connection media is a computer network and is what allows
devices to "talk" to each other.
The following are examples of digital communications:
Transferring data from one computer to another over a network. With this form of
communication, data transmits as a packet over a network connection from a
sender to a receiver using a protocol.
Sending text messages between mobile devices.
Sending and receiving an e-mail.
Collaborating on shared documents and spreadsheets.
Voice chat or calls with other people over the Internet, using VoIP software.
Video call or conferencing with other people over the Internet, using VoIP software.
3.1.2. Rules of communication
Access method
Allowed physical topologies
29. P a g e | 16
Types of cabling
Speed of data transfer.
3.2. Bandwidth
- Bandwidth is the maximum rate of data transfer across a given path. Bandwidth may be
characterized as network bandwidth, data bandwidth,] or digital bandwidth.
- This definition of bandwidth is in contrast to the field of signal processing, wireless
communications, modem data transmission, digital communications, and electronics, in
which bandwidth is used to refer to analog signal bandwidth measured in hertz, meaning the
frequency range between lowest and highest attainable frequency while meeting a well-
defined impairment level in signal power. The actual bit rate that can be achieved depends not
only on the signal bandwidth but also on the noise on the channel.
M1 Compare common networking principles and how protocols enable the effectiveness of
networked systems.
1. What is the TCP / IP protocol ?
- The TCP / IP protocol is divided into 4 network layers:
+ Application layer: The mission of this layer is to provide standardized data exchange and
applications. The application layer includes many specific protocols such as HTTP, FTP, POP3,
SMTP, and SNMP. Each of these protocols will have specific functions and tasks.
+ Network layer: This floor is also known as the internet layer. The task of the internet layer is to
process packets, then connect to independent networks to transport encrypted data packets
across network boundaries. The internet layer also includes many protocols such as IP and
ICMP.
+ Transport layer: The mission of the transport layer is to maintain end-to-end communication
throughout the network. The transport layer includes TCP and UDP protocols. In many cases
the UDP protocol will be replaced by TCP.
+ Physical layer: The protocols operating on this layer are Ethernet, ARP. For Ethernet often used
for LAN local area.
30. P a g e | 17
Figure 14 TCP/IP Model
1.1. The most popular TCP / Ip protocols
- Currently, TCP / IP has many protocols, but the three most commonly used are HTTP, HTTPS
and FTP.
+ HTTP protocol: this protocol is used to transfer unsafe data between a web client and a web
server. How this protocol works is very simple. First, a web client will send a request to the web
server to view a website or news. Upon receiving the request, the server sends the answer
back to the web client.
31. P a g e | 18
+ HTTPS protocol: this protocol is used to transfer data securely between a web client and a web
server. This transaction is usually used to send credit card transaction data or personal
information from the web client to the web server.
+ FTP protocol : This protocol does not limit the number of computers. That is, a computer can
send data to one or many different computers directly.
Figure 15 the most popular TCP / Ip protocols
2. What is the OSI model?
- The OSI model is also known as the reference model connecting open systems. This
model has been developed as part of the Open Systems Interconnection plan initiated
by ISO and IUT-T.
- This model divides network interface into 7 layers. Grades 1 through 4 are lower-level
classes and only perform data migration tasks. Grades 5 through 7 belong to the
advanced classes. Each class will perform a specific task that will then forward data to
the next layer.
32. P a g e | 19
Figure 16 OSI Basic Reference Model
3. Compare OSI model with TCP / IP model
- Compared to the OSI model, the TCP / IP protocol is more trusted and used. Because
according to the concept, the OSI model is only an old model, a tool for reference. The TCP
/ IP protocol, in contrast, allows loosening of rules and provides general rules.
- In terms of approach, TCP / IP approaches horizontally, while OSI approaches vertically.
- The biggest difference between these two protocols is probably the combination of
layers. For TCP / IP protocols, the session layer and the presentation layer are combined in
the application layer. As for the OSI model, each different tier will perform a different task.
- In terms of design, the protocols in TCP / IP were designed first and then developed. In
contrast, in OSI, the model is developed first and then the protocol developed.
33. P a g e | 20
Figure 17 Compare OSI & TCP/IP
P3 Discuss the operating principles of networking devices and server types.
1. Discuss 1 or 2 operating principles of a selected networkdevice
1.1. Repeater
– A repeater operates at the physical layer. Its job is to regenerate the signal over the same
network before the signal becomes too weak or corrupted so as to extend the length to which
the signal can be transmitted over the same network. An important point to be noted about
repeaters is that they do not amplify the signal. When the signal becomes weak, they copy the
signal bit by bit and regenerate it at the original strength. It is a 2 port device.
34. P a g e | 21
Figure 18 Repeater
2.2. Hub
–A hub is basically a multiport repeater. A hub connects multiple wires coming from different
branches, for example, the connector in star topology which connects different stations. Hubs
cannot filter data, so data packets are sent to all connected devices. In other words, collision
domain of all hosts connected through Hub remains one. Also, they do not have intelligence to
find out best path for data packets which leads to inefficiencies and wastage.
Figure 19 Hub
35. P a g e | 22
Types of Hub
Active Hub:- These are the hubs which have their own power supply and can clean,
boost and relay the signal along with the network. It serves both as a repeater as well as wiring
centre. These are used to extend the maximum distance between nodes.
Passive Hub :- These are the hubs which collect wiring from nodes and power supply
from active hub. These hubs relay signals onto the network without cleaning and boosting them
and can’t be used to extend the distance between nodes.
2. List network devices.
- Here is the common network device list:
Hub
Switch
Router
Bridge
Gateway
Modem
Repeater
Access Point
3. List server types
Application Servers
Client Servers
Collaboration Servers
FTP Servers
List Servers
Mail Servers
Open Source Servers
Proxy Servers
Real-Time Communication Servers
P4 Discuss the inter-dependence of workstation hardware with relevant networking software.
1. Define workstation hardware
36. P a g e | 23
A workstation is a special computer designed for technical or scientific applications. Intended
primarily to be used by one person at a time, they are commonly connected to a local area
network and run multi-user operating systems. The term workstation has also been used loosely to
refer to everything from a mainframe computer terminal to a PC connected to a network, but the
most common form refers to the class of hardware offered by several current and defunct companies
such as Sun Microsystems, Silicon Graphics, Apollo Computer, DEC, HP, NeXT and IBM which opened
the door for the 3D graphics animation revolution of the late 1990s.
-
2. Define networking software
- Networking software is a foundational element for any network. It helps administrators
deploy, manage and monitor a network. Traditional networks are made up of
specialized hardware, such as routers and switches, that bundle the networking
software into the solution. Software-defined networking (SDN) separates that software
from the hardware, making it easier to innovate and adapt the network to quickly meet
changing network demands. The separation of functions from hardware, such as
firewalls or load balancing, is called network functions virtualization (NFV).
3. Discuss and explain the interdepencies of workstation hardware with networking software.
Derive an example form your discussion
Figure 20 workstation
37. P a g e | 24
- Inter-dependence of workstation hardware with relevant networking software:
+ A network file server is a computer system used for the purpose of managing the file
system, the network printer, handling network communication, and other functions. A
server may be dedicated is such case all of its processing power is allocated to network
function, or it may be non- dedicated which means that a part of server functions
allocated as a work stations or DOS based system.
+ Network operating system: it is loaded into the servers’ hard disk along with the system
management tools and user utilities. When the system is started, NOS boots and other
server come under its control.
+ Workstations: workstations or nodes are attached to the server through the network
interfaces card and the cable; workstations are normally intelligence systems, such as
the IBM pc. But DUMV terminals are used in mainframe computers. The concept of
distributed process depends on the fact that personal computer are attached to the
network performed their own processing after loading programs and data from servers.
- Due to this a work station is called an active device on the network. After processing,
files are stored back on the server where they can be used by others workstation.
+ Network interface card-every device connected to a LAN needs network interface card
to plug into the LAN. For example, a PC needs to have an Ethernet card installed in it to
connect to an Ethernet LAN.
+ Network cabling: once the server, workstations, and network interface cards are in
place, network cabling is used to network everything together. The most popular type
of network cables: Twisted pair wiring, Co-axial cable, Fiber optics cable.
- That is some interdependence of the workstation hardware with the relevant network
software to properly implement the network.
M2 Explore a range of server types and justify the selection of a server, considering a given
scenario regarding cost and performance optimization
1. Some types of server
- Server: One of the most abundant types of servers in today’s market is a web server. A
webserver is a special kind of application server that hosts programs and data requested by
38. P a g e | 25
users across the Internet or an intranet. Web servers respond to requests from browsers
running on client computers for web pages, or other web-based services. Common web servers
include Apache web servers, Microsoft Internet Information Services (IIS) servers and Nginx
servers.
- File server: File servers store and distribute files. Multiple clients or users may share files
stored on a server. In addition, centrally storing files offers easier backup or fault tolerance
solutions than attempting to provide security and integrity for files on every device in an
organization. Fileserver hardware can be designed to maximize read and write speeds to
improve performance.
- Database server: The amount of data used by companies, users, and other services is
staggering. Much of that data is stored in databases. Databases need to be accessible to
multiple clients at any given time and can require extraordinary amounts of disk space. Both of
these needs lend themselves well to locating such databases on servers. Database servers run
database applications and respond to numerous requests from clients. Common database
server applications include Oracle, Microsoft SQL Server, DB2, and Informix.
- Combination server: Even before virtualization, servers were being extracted from the
standard model of a single server operating system installed on a hardware machine.
Technology, such as network-attached storage, removed the need for a server to have its own
storage. Other technologies, such as mirroring and clustering, enabled pieces of hardware to
be combined into larger, more powerful servers. Such a server might consist of several blades,
several attached storage devices, and an external power supply, and each piece could be
swapped out for another while the server was still running.
- Virtualization server: Virtual servers are taking the server world by storm. Unlike traditional
servers that are installed as an operating system on machine hardware, virtual servers exist
onlyas defined within specialized software called hypervisor. Each hypervisor can run
hundreds, or even thousands, of virtual servers all at once. The hypervisor presents virtual
hardware to the server as if it were real physical hardware. The virtual server uses the virtual
hardware as usual, and the hypervisor passes the actual computation and storage needs onto
39. P a g e | 26
the real hardware beneath, which is shared among all the other virtual servers.
2. Determining Your Networking Requirements
- Designing a network can be a challenging task. Your first step is to understand your networking
requirements. The rest of this chapter explains how to determine these requirements. After
you have identified these requirements, refer to Chapter 2 for information on selecting
network capability and reliability options that meet these requirements.
- Networking devices must reflect the goals, characteristics, and policies of the organizations in
which they operate. Two primary goals drive networking design and implementation:
+ Application availability—Networks carry application information between computers. If the
applications are not available to network users, the network is not doing its job.
+ Cost of ownership—Information system (IS) budgets today often run in the millions of dollars.
As large organizations increasingly rely on electronic data for managing business activities, the
associated costs of computing resources will continue to rise.
- A well-designed network can help balance these objectives. When properly implemented, the
network infrastructure can optimize application availability and allow the cost-effective use of
existing network resources.
D1 Considering a given scenario, identify the topology protocol selected for the efficient
utilization of a networking system.
- The topology protocol selected for the efficient utilization of a networking system is star
topology. The devices are connected via switches and the switches are interconnected
internally. they are connected through routers.
P5 Provide a logical/physicaldesign of the networked system with clear explanation and
addressing table
1. Explain the difference between logical and physical design
1.1. What is logical of the networked systen?
- Logical design is, “The part of the design phase of the SDLC in which all functional features of
the system chosen for development in analysis are described independently of any computer
40. P a g e | 27
platform.” A logical design for a network is an abstract functional specification for a
telecommunications solution. A logical design lacks specific details such as technologies and
standards and focuses on the needs at a general level. A logical network design can be a view of
any part of a network. An entire enterprise educational network can be a composition of many
logical designs. The lower level designs can be a university campus network that connects each
building to the Internet, or it could be a view of the standard office telecommunications setup. The
important quality of a logical design is that is communicates all needs in general terms
Figure 21 Logical of networked system
1.2. What is physical design of the networked system?
- Logical designs are often described using terms from the customer’s business vocabulary.
Locations, processes, roles from the business domain can show up in the logical design. An
important aspect of a logical network design is that it is part of the requirements set for a
solution to a customer problem.
- The basic idea of physical design is that it communicates “decisions about the hardware used
to deliver a system.” A physical network design is created from a logical network design. A
physical design will often expand elements found in a logical design. For instance, a WAN
connection on a logical design diagram can be shown as a line between two buildings. When
41. P a g e | 28
transformed into a physical design, that single line could expand into the connection, routers
and other equipment at each end of the connection. The actual connection media might be
shown on a physical design as well as manufacturers and other qualities of the network
implementation.
Figure 22 Physical of networked system
2. Discuss and explain the USER Requirement for the design
- User requirements are typically written when discussing the use cases for a project. The
requirements definition is done with the customer or product managers that know how the
embedded system will be used by the user.
- Many user requirements deal with how a user will interact with a system and what that user
expects. If there is a screen or human machine interface aspect to the system, a user
requirement may be based on what happens when the user selects an action on the screen.
42. P a g e | 29
Maybe with a button press not only does a process start, but it also switches to another screen
and provides an audible notification. When user requirements such as these are written down,
they can often break into multiple system requirements later due to switching of screens, the
maximum delays in starting the process, and finally what the next screen should look like. One
pitfall is starting to try to write the system requirements during a user requirement meeting.
This often detracts from gaining insight into the requirements of the user, and key functionality
pieces could be missed.
- In fact, as alluded to earlier, it is often better to keep user requirements and system
requirements separate in their tracking and reporting. The user requirements are often more
readable, understandable, and provide a better sense of how the system will operate. Even
though user requirements may lack specifics on what really needs to occur in the system, they
are still valuable in that they can provide the overarching system functionality expectations.
3. Provide a logical design of the network base on user reuirement
- At the request of users, they need 50 student lab computers, 35 staff computers, 3, printer,… ..
- Based on the requirements of the user, design 5 rooms in which 1 student lab computer, 1
staff lab computers, 1 server, 1 hingher managers, marketing and administration staff, and
network administor.
- Room differences are linked via switches and each room is connected via a router. The routers
are connected to form a circle.
- Equipment needed to equip 1 room: student lab computers requires 3 switches, 2 access
points PT, 1 router. Staff lab computer needs 3 switches, 1 access points PT, 1 router, Higher
lab mangers need 1 switch and 1 router and the marketing and administration lab staff,
network lab administor is like higher lab managers.
- Network systems are designed according to star topology.
44. P a g e | 31
P6 Evaluate the design to meet the requirements.
1. Design evaluation:
- The design has met the user's requirements.
- Basedon the design,itrequires93computers,11 switches,and6 routers,4 servers,3 accesspointpt,
6 laptops. 3 printers.
- Student computer room can connect up to 80 computers, because 3 switch can connect up to 60
computers and 2 access point PT can connect more 20 computers.
- Staff computer room can connect up to 70 computers, because 3 switch can connect up to 60
computers and 1 access point PT can connect more 10 computers. Thus in the future it may open 1
more room.
- Marketingand administrationstaff roomcanconnectup to 20 computers. Itcan solve the problemof
recruiting more employees.
- Higher managers and network administrators is similar to Marketing administration stafff.
- The remaining rooms can use the staff room printer. All rooms can connect to the server room.
- Inconclusionthe designhassolvedthe user's basicrequirements andprovide solutions to expand for
the future.
2. Evaluate the design of the network
- Any Network that is well designed should satisfy the characteristics listed below:
+ Network uptime: Any network should be designed to be up all the time, this means that you
have to understand your network and what failures may affect the network operation and
provide all means of redundancy to ensure virtually 100% uptime of your network. This is
usually a trade off between the criticality of the applications running over the network and the
budget.
+ Network reliability: Administrators have to make sure that at any given time the network is
capable of delivering packets to their destinations in a timely fashion with an acceptable delay
and jitter profile. The good designer must understand his traffic, its characteristics and the
acceptable performance to keep the network running smoothly.
+ Network security: The network should be as hard as possible for an attacker to disturb and the
administrators must have a plan to stop or mitigate different types of attacks real time.
45. P a g e | 32
+ Network management: network management is one of the most critical parts of any network
design. Network administrators must be able to reach and monitor all network devices all the
time specially in crisis times.
+ Network Troubleshooting: problems must be easy to troubleshoot and correct. The network
must be fully documented,standardized and follow the best practices as much as possible.
+ Network scalability: The network should be able to adapt to growth and business scalability
needs without having to make dramatic changes.
3. What advice and solution would you provide to the network for efficiency and usage.
- For many businesses, the hidden costs of dealing with a slow network can be like death by
a thousand paper cuts. Files take longer to send, cloud applications take longer to load,
calls are dropped, and everyone loses productivity waiting for tasks to finish.
- Because of the urgency of having a reliable network connection, many businesses are quick
to respond to the situation by throwing money at a network upgrade that may not work.
While the cost of fiber Internet is more affordable than ever, it’s still important to diagnose
alternative solutions to guarantee peak performance.
3.1. Determine that your network is at fault.
- Is your network actually slow, or do you just have slow computers? You can’t proscribe a cure
without knowing the disease, so it’s best not to leap to conclusions. Make sure that the
sluggish response time is more than just a localized issue before springing for an infrastructure
upgrade.
3.2. Offer guests a different network.
- Network slowdowns are sometimes the result of guest behavior. While it’s unlikely that a
single guest streaming a YouTube video in your lobby is the source of your troubles, you could
have problems if you frequently host a large number of guests who need Internet access.
Rather than risk them inadvertently slowing down your operations, offer them a login to a
46. P a g e | 33
guest network.
3.3. Educate personnel about user behavior.
- Employees need down time, and many choose to spend that time on their computers. If you
notice a slowdown during lunchtime every day, it could be because a couple coworkers have
taken the opportunity to boot up a video game or stream a show on Netflix. (Yes, it’s been
known to happen!) They probably aren’t even aware of the network resources they’re draining
during work hours, and are just trying to enjoy their lunch. Most will be happy to choose a
different lunch pastime if you take a moment to talk to them about network performance.
- Other personnel behavior that might be causing a slow down could involve poor file sharing
practices, such as emailing large PPT files to multiple contacts rather than editing them via a
shared cloud file. If you have employees frequently (and needlessly) sharing extra large files,
teaching them how to compress the files or how to use cloud drives can cut the strain they’re
placing on the network.
3.4. Use VLANs to segment low-priority traffic.
- VLANs (Virtual Local Area Networks) are an excellent way to partition your network resources
such that the most critical traffic receives the highest priority. Essentially, a VLAN offers the
benefits of a completely separate network, without having to rewire the entire office. You can
group VLANs based on computer use and function, even if they’re in separate parts of the
office.
- VLANs can also improve security by segmenting your systems from each other. That way, even
if one part of your network becomes compromised, the VLAN can act as a barrier, keeping
other parts of the network safe.
3.5. Check for viruses or system defects.
- Speaking of viruses, malware is known for slowing down networks and inhibiting workflows. If
you suspect your network slowdown might be the result of malicious network activity, you
should have an emergency IT specialist run a check on the situation right away.
47. P a g e | 34
- Slowdowns can also be the result of different network components growing old and defective.
It’s often relatively painless to replace these broken components, rather than upgrade the
entire network.
M3 Install and configure network services and applications on yourchoice.
1. What is the network server?
- A network server is a computer system, which is used as the central repository of data and various
programsthat are sharedby usersina network.If youhave a computerthat you're no longerusing due
to its slow speed, you can turn it into a network server for other computers in your household.
2. What is the network application?
- Computer network applications are network software applications that utilize the Internet or other
network hardware infrastructure to perform useful functions for example file transfers within a
network. They help us to transfer data from one point to another within the network.
3. Selectnetwork servicesand networkapplications inyour design.
- Networkservicesandnetworkapplications inthe designis server–PT web,server-PTSMTP,server-PT,
server-PTDNS,server-PTFPT.
Figure 24 Server room
48. P a g e | 35
4. Applicationscan be added to the network
- Some application thatcanbe addedto the network are Fax server,Game server,File server…..
Figure 25 New server room
D2 Design a maintenance schedule to support the networked system
1. Form and Time of Support
1.1.Forms of support:
- Online support:Use managementtools,accessandremote control tocheck and handle assoon as
problemsarise.
- Supportonsite:Come inplace tocheck andhandle casesthat cannotbe handledonline.
1.2.Time ofSupport
Service vomit Time of assistance Response time one site
1 Basic
- 08 hours / day, 05 days / week
from Monday to Friday.
- Not including holidays, New Year
- Inner Ho Chi Minh City: 2 working
hours
- Suburbs, neighborhoods: from 2
up to 4 working hours
49. P a g e | 36
2 Vip
- 12 hours / day, 06 days / week
from Monday to Saturday.
- Not including holidays, New Year
- Inner Ho Chi Minh City: 1 working hour
- Suburbs, neighborhoods: from 2
up to 4 working hours
P7 Implement a networked system based on a prepared design.
1. Show evidence of a working network you’ve design
Divice Interface IP address Subnet Mask Defaulgate way
PC student 1 Fa0 192.168.0.2 255.255.255.0 192.168.0.1
PC student 2 Fa0 192.168.0.3 255.255.255.0 192.168.0.1
PC student 3 Fa0 192.168.0.4 255.255.255.0 192.168.0.1
PC student 4 Fa0 192.168.0.5 255.255.255.0 192.168.0.1
PC student 5 Fa0 192.168.0.6 255.255.255.0 192.168.0.1
PC student 6 Fa0 192.168.0.7 255.255.255.0 192.168.0.1
… … … … …
PC student 50 Fa0 192.168.0.51 255.255.255.0 192.168.0.1
DNS Fa0 10.0.0.2 255.0.0.0 192.168.10.1
WEB Faa0 10.0.0.3 255.0.0.0 192.168.10.1
FPT Fa0 10.0.0.4 255.0.0.0 192.168.10.1
SMTP Fa0 10.0.0.5 255.0.0.0 192.168.10.1
Printer1 Fa0 10.0.0.8 255.0.0.0 10.0.0.1
Printer2 Fa0 10.0.0.9 255.0.0.0 10.0.0.1
Printer3 Fa0 10.0.0.10 255.0.0.0 10.0.0.1
Router 0
Se 2/0 128.128.0.1 255.255.0.0 N/A
Se3/0 172.172.0.2 255.255.0.0 N/A
Fa0/0 192.168.0.1 255.255.255.0 N/A
Router 1 Se2/0 10.0.0.2 255.0.0.0 N/A
51. P a g e | 38
- Ping PC student 1 to PC student 2
Figure 26 Ping PC student 1 to PC student 2
- PingPC student2 to PCstudent5
Figure 27 Ping PC student 2 to PC student 5
52. P a g e | 39
- PingPC student6 to PCDNS
Figure 28 Ping PC student 6 to PC DNS
- PingPC staff 1 to printer1
Figure 29 Ping PC staff 1 to printer 1
53. P a g e | 40
- PingPC 13 to PC10
Figure 30 Ping PC 13 to PC 10
- PingPC staff 2 to PC staff 5
Figure 31 Ping PC staff 2 to PC staff 5
54. P a g e | 41
3. Show me implemented system
- Run from PC student 2 to PC student 1
Figure 32 implemented system
P8 Document and analyze test results against expected results.
1. Provide a step by step configuration of network devices in the network(Choose a device in
the network and provide all the steps for configuration)
Step 1: Open your Network Topology. Once you've opened your Network Topology on Cisco
Packet Tracer, access your network and identify the components of your network, for example;
Servers, Routers, End Devices, etc.
55. P a g e | 42
+ Choose the device
Figure 33Choose the device
+ Connection all of device
Figure 34 choose the connection
That is result :
Figure 35 Result step 1
Step 2: Complete the cabling. Access the cables section and connect completely and
correctly the cables between the network in order to ensure connectivity between the
devices in the network using the connections table given.
56. P a g e | 43
+ Click on “ PC-PT PC0”
+ Click on “ desktop”
+ Click on “ IP configuration”
Note: Default Gateway is IP configuration of step 3
Figure 36 Result step 2
Step 3: choose the device such as router, sever,……
+ Click on “ Router 1”
+ Click on “ CLI”
57. P a g e | 44
+ Click on “ Fastethernet 0/0” and completely
Figure 37 Result step 3
2. Test results against test plans
Figure 38 Test plan
58. P a g e | 45
- Reliesonatest that can transferdata backand forthbetweencomputers inaroom. In addition,you
can connectcomputersbetween2roomsand can connectto the serverroom.
M4 Recommend potential enhancements for the networked systems.
- 5G technology gives us tremendous technical capabilities in many industries as well as many
fields. The world has not seen a boom in the deployment of 5G infrastructure and services on a
national scale. This shows that there are still prudences in providing commercial 5G services as
they have with previous mobile technologies. Moreover, 5G applications and services are
tailor-made to each industry and country depending on the market or country's strategy.
Figure 39 Network 5G
The benefits of 5G come from "endless" connectivity.
- The 5G network brings wireless transmission speeds dozens of times higher than the cellular
networks we use today, and the network capacity is also expanded, super-fast connectivity
with almost the same latency. 0, thereby bringing huge benefits when applied in practice,
especially in the era of industrial revolution 4.0 today.
59. P a g e | 46
- Verizon CEO Hans Vestberg shared this issue at CES 2019. According to Hans, there will be 8
issues that the 5G network can solve, these are:
Mobility, Connected Devices, and the Internet of Things: 5G networks can transfer data up to
10TB per square kilometer in a unit of time, which in theory could allow 1 million IoT devices.
Working together on 1 square km, can maintain a connection on moving objects at a speed of
500km / h, thereby opening the future for the field of self-driving cars, smart cities, ...
Energy, Efficiency, and Deployment: 5G networks promise to consume up to 90% less energy
than 4G networks, combined with fast connectivity, which helps to deploy 5G networks on a
large scale as well. will be significantly easier.
Latency, Reliability: 5G network latency is reduced to just 1/1000 second, data travel time is in
less than a blink, thus increasing the reliability of the connection and the Deployment service
on 5G network.
Figure 40 Benefits of 5G
60. P a g e | 47
D3 Use critical reflection to evaluate own work and justify valid conclusions.
- The design solved the fundamental problem. The design rooms are student computer room,
staff computer room, marketing and administration staff, higher managers and network
administor. The rooms are expandable due to the network connection for the room like
student computer room and staff computer room. The remaining rooms can connect up to 20
computers. The rooms are connected each other, so higher manager room can manage the
remaining rooms. When the room has a problem, another room is not affected.
- Student computer room can connect more 30 computers and staff computer room can
connect more 40 computers. The remanining rooms can connect 15 computers, 1 access point
PT and 2 printers.
- The design has met the given requiremets and gave methods for expansion. It has limited in
the future risks and optimize the network design. The network is not secure and safe. in the
future, there will be measures to secure the system
61. P a g e | 48
REFERENCES
1. Wikipedia.Computer network.[ online] Available at: https://en.wikipedia.org/wiki/Computer_network
[Accessed20 July.2020]
2. BeginnersBook.Types of Computer Network: Lan, Man and Wan.[Online] Available at:
https://beginnersbook.com/2019/03/types-of-computer-network-lan-man-and-wan/ [Accessed20
July.2020]
3. WIKIPEDIA.Internet.[Online] Available at: https://en.wikipedia.org/wiki/Internet [Accessed20
July.2020]
4. NABAY.What isLocal AreaNetwork(LAN),AdvantagesandDisadcantages.[Online] Availableat:
https://snabaynetworking.com/what-is-local-area-network/ [Accessed20July.2020]
5. IT Release.Advantages and disadvantages of metropolitan area network(MAN).[Online] Available at:
https://www.itrelease.com/2018/09/advantages-and-disadvantages-of-metropolitan-area-network-man/
[Accessed20 July.2020]
6. CompTIA. What Is a Network Protocol, and How Does It work?.[Online] Available at:
https://www.comptia.org/content/guides/what-is-a-network-
protocol#:~:text=A%20network%20protocol%20is%20an,internal%20processes%2C%20structure%20or%20
design. [Accessed22July.2020]
7. Computer Hope.Standard.[Online] Available at:
https://www.computerhope.com/jargon/s/standard.htm#:~:text=A%20standard%20is%20a%20set,by%20a
cademic%20and%20industry%20contributors.&text=Common%20examples%20of%20standards%20include
,computer%20monitors%20and%20video%20adapters. [Accessed22July.2020]
8. Wikipedia.Listof technical standardorganizations.[online]Available at:
https://en.wikipedia.org/wiki/List_of_technical_standard_organizations [Accessed22July.2020]
9. Wschools. Types of Network Protocols and Their Uses.[Online] Available at:
62. P a g e | 49
https://www.w3schools.in/types-of-network-protocols-and-their-uses/ [Accessed22July.2020]
10. Wikipedia.Networktopoplogy.[Online] Available at: https://en.wikipedia.org/wiki/Network_topology
[Accessed22 July.2020]
11. BeginnersBook.ComputerNetworkTopology –Mesh,Star,Bus, Ringand Hybrid.[Online] Availableat:
https://beginnersbook.com/2019/03/computer-network-topology-mesh-star-bus-ring-and-hybrid/
[Accessed22 July.2020]
12. ComputerHope.Communications.[Online] Availableat:
https://www.computerhope.com/jargon/c/communic.htm#:~:text=Communications%20is%20the%20exch
ange%20of,two%20or%20more%20computing%20devices. [Accessed22July.2020]
13. Wikipedia.Bandwidth(computing).[Online] Available at:
https://en.wikipedia.org/wiki/Bandwidth_(computing) [Accessed22July.2020]
14. Circuit.Whatare the bandwidthrequirementsonmynetwork?.[Online] Availableat:
https://www.circuit.com/unifyportalfaqdetail?articleId=36901[Accessed22 July.2020]
15. Netwirx Bolg.NetworkDevicesExplained.[Online] Available at:
https://blog.netwrix.com/2019/01/08/network-devices-explained/[Accessed22July.2020]
16. NewHorizons.NETWORKSERVERTYPES EXPLAINED.[Online] Availableat:
https://www.nhgeorgia.com/blog/network-server-types-explained-6 [Accessed22 July.2020]
17. Wikipedia.Workstation.[Online]Available at:
https://en.wikipedia.org/wiki/Workstation#:~:text=A%20workstation%20is%20a%20special%20computer%
20designed%20for%20technical%20or%20scientific%20applications.&text=Typical%20workstations%20pre
viously%20employed%20proprietary,during%20the%201990s%20and%202000s. [Accessed22 July.2020]
18. Sdxcentral.What’s Networking Software?[Online] Available at:
https://www.sdxcentral.com/networking/sdn/definitions/networking-software/ [Accessed22 July.2020]
19. GeeksforGeeks.NetworkDevices( Hub,Repeater,Bridge,Switch,Router,GatewaysandBrouter).[Online]
Available at:https://www.geeksforgeeks.org/network-devices-hub-repeater-bridge-switch-router-
gateways/ [Accessed22July.2020]
20. JIMTHARIO: SOFTWAREENGINEER.EXPLAIN THE DIFFERENCEBETWEEN LOGICAL DESIGN ANDPHYSICAL
63. P a g e | 50
DESIGN OFA NETWORK.[Online] Availableat: https://www.thario.net/post/explain-the-difference-
between-logical-design-and-physical-design-of-anetwork/ [Accessed28 July.2020]
21. ScienDirect.UserRequierment.[Online]Available at:
https://www.sciencedirect.com/topics/engineering/user-
requirement#:~:text=User%20requirements%20are%20typically%20written,and%20what%20that%20user
%20expects. [Accessed28 July.2020]
22. TOTOLINK.Whatisthe TCP / IP protocol?Compare OSImodel withTCP/IP model.[Online].Availableat:
https://www.totolink.vn/article/32-giao-thuc-tcp-ip-la-gi-so-sanh-mo-hinh-osi-voi-mo-hinh-tcp-ip.html
[Accessed3August.2020]
23. Networkers-Online.NetworkDesignEvaluation.[Online] Availableat: https://www.networkers-
online.com/blog/2008/08/network-design-evaluation/ [Accessed3August.2020]
24. BrightlineIT.8Tips to Improve NetworkPerformanceInyourOfffice.[Online] Available at:
https://brightlineit.com/8-tips-to-improve-network-performance-in-your-office/ [Accessed3August.2020]
25. CISCO.IntroductiontoCiscoNetworkDesign.[Online] Available at:
https://www.ciscopress.com/articles/article.asp?p=25259&seqNum=6 [Accessed4August.2020]
26. Howstuffwork.Whatisthe networkserver? .[Online] Availableat:
https://computer.howstuffworks.com/what-is-network-
server.htm#:~:text=A%20network%20server%20is%20a,other%20computers%20in%20your%20household.
[Accessed21 August.2020]