0% found this document useful (0 votes)
398 views

Assiment Networking

This document provides instructions for an assignment on networking infrastructure. Students are asked to complete two parts: 1) Design an efficient networked system for an educational institution based on user specifications, including a network design plan, justification of device choices, and a maintenance schedule. 2) Implement the designed system, conducting tests to analyze performance and functionality. Recommendations should consider future growth and security. The assignment aims to demonstrate understanding of networking principles, protocols, devices, design, implementation, and diagnosis. A report and implementation are required to be submitted by the given due date.

Uploaded by

nhan le
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
398 views

Assiment Networking

This document provides instructions for an assignment on networking infrastructure. Students are asked to complete two parts: 1) Design an efficient networked system for an educational institution based on user specifications, including a network design plan, justification of device choices, and a maintenance schedule. 2) Implement the designed system, conducting tests to analyze performance and functionality. Recommendations should consider future growth and security. The assignment aims to demonstrate understanding of networking principles, protocols, devices, design, implementation, and diagnosis. A report and implementation are required to be submitted by the given due date.

Uploaded by

nhan le
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 91

ASSIGNMENT FRONT SHEET

QUALIFICATION

BTEC HN Diploma in Computing and Unit 43: Networking Infrastructure


system Development

UNIT CODE A/601/1964

QCF LEVEL 5 BTEC HIGHER NATIONAL DIPLOMA

CREDIT VALUE 15

Issue Date:6/8/2000 Completion Date: Submitted:

Assignment Title: Understanding of networking infrastructures management

GRADING GRID

P1 P2 P3 P4 P5 P6 P7 P8 M1 M2 M3 M4 D1 D2 D3

LO Learning Outcome (LO) AC In this assessment you will have the opportunity Task
to present evidence that shows you are able to: No.

LO Examine networking P1 Discuss the benefits and constraints of different


1 principles and their network types and standards.
protocols
P2 Explain the impact of network topology,
communication and bandwidth requirements.

LO Explain networking P3 Discuss the operating principles of networking


2 devices and operations devices and server types.

Implement a network design topology


infrastructure based on a prepared design and list
the different type of topologies.

P4 Discuss the inter-dependence of workstation

Page 1
hardware with relevant networking software.

LO3 Design efficient P5 Design a networked system to meet a given


networked systems specification.

P6 Test and evaluate the design to meet the


requirements and analyse user feedback.

LO4 Implement and diagnose P7 Implement a networked system based on a


networked systems prepared design.

P8 Document and analyse test results against


expected results.

Learners declaration

I certify that the work submitted for this assignment is my own and research sources are fully
acknowledged.

Student signature: Date:

ASSESMENT CRITERIA

Higher Grade Achievement (Where applicable)

Grade Descriptor Comment’s /tick Grade Descriptor Comment’s /tick

M1: Compare common D1: Considering a given


networking principles scenario, identify the
and how protocols topology protocol
enable the effectiveness selected for the efficient
of networked systems. utilisation of a
networking system.

M2: Explore a range of D2: Design a


server types and justify maintenance schedule to

Page 2
the selection of a server, support the networked
considering a given system
scenario regarding cost
and performance
optimisation.

M3: Install and D3: Use critical


configure network reflection to evaluate
services and applications own work and justify
on your choice valid conclusions

M4: Recommend
potential enhancements
for the networked
systems.

Assignment Feedback

Formative Feedback: Assessor to Student

Action Plan

Summative feedback

Assessor Signature Date

Student Signature Le Trong Nhan Date 14/9/2019

Page 3
ASSIGNMENT BRIEF SHEET

QUALIFICATION BTEC HN Diploma in Computing and system Development

UNIT Unit 43: Networking Infrastructure

UNIT CODE A/601/1964

QCF LEVEL 5 BTEC HIGHER NATIONAL DIPLOMA

CREDIT VALUE 15

Assignment Issue Date: Assignment Due: Submitted:

Assessor Name:

Assignment Title: Networking Infrastructure

Aim of the assignment To enable learners to understand computer networking concepts, how they
work, how they operate and the protocols, standards and the models associated
with networking technology.

Unit Learning Outcomes LO1: Examine networking principles and their protocols.
LO 2: Explain networking devices and operations.
You are employed as a Network Engineer by an SME [insert here either a
Assignment Brief &
named SME or enable students to choose an SME and use the following
Guidance
insertion ‘an SME of your choice’. Students should be encouraged to use their
(see Appendix for own place of work, if appropriate] and have been asked to investigate and
assessment criteria and explain networking principles, protocols and devices.
grade descriptors)
You will need to produce a report for the CEO that includes the following:

1. An introduction to provide an overview of your report.

2. An explanation of networking principles, protocols and devices,


including benefits and constraints of networked solutions, the impact of
network topology, communication and bandwidth requirements,
effectiveness of networking systems, operating principles of
networking devices and server types and networking software.
Unit Learning Outcomes LO3 Design efficient networked systems.
LO4 Implement and diagnose networked systems.

Page 4
Assignment Brief and You are employed as a network engineer by a high-tech networking solution
Guidance development organisation and are working on a project for a local educational
institution. You will need to analyse the specification from the institution
below for completion of this project within a given timeframe:

People: 200 students, 15 teachers, 12 marketing and administration staff, 5


higher managers including the head of academics and the programme
manager, 3 computer network administrators

Resources: 50 student lab computers, 35 staff computers, 3 printers

Building: 3 floors, all computers and printers are on the ground floor apart
from the IT labs – one lab located on the first floor and another located on the
second floor.

Part 1 Design efficient networked systems

1. Prepare a written step-by-step plan of how you are going to design


a Local Area Network including a blueprint of your LAN.
2. Justify your choice of devices for your network design.
3. Produce a test plan to evaluate this design for the requirements of
bandwidth and cost constraints as per user specifications.
4. Justify the security requirements and quality of services needed for
selection of accessories.
5. Suggest a maintenance schedule to support the networked system.

Part 2 Implement test and diagnose networked systems

1. Implement a networked system based on your prepared design.


2. Conduct verification with e.g. Ping, extended ping, trace route,
telnet, SSH, etc.
3. Record the test results and analyse these against expected results.
4. Investigate what functionalities would allow the system to support
device growth and the addition of communication devices.
5. Discuss the significance of upgrades and security requirements in
your recommendations.
Student guidelines The objective for this task is to address and exhibit understand networking
principals.
You are required to carry out research by using supportive materials like books,
websites, etc., and give a feedback of the findings on all assessment criteria
1. The answers need to be reflected to the given case study.

Page 5
Assignment Format Fonts

• Use a clear, readable font such as Verdana, Calibri, Tahoma or Arial,


and be consistent and use the same font throughout
• Use black text on a white background. Avoid coloured backgrounds or
text in a colour other than black unless you have special permission to
use them (for example, if you’re dyslexic)
• Use 12 point for the body of your assignment

Spacing

• Use 1.5 or double spacing and fairly wide margins:

Word Count

• The (approx.) word limit for this assignment 4000 to 4500 words
• Any specified word limit in the assignment brief is for guidance purpose
only. It is there to give an indication of the level of depth that may be
needed to provide sufficient evidence.

Reference List

• You must ensure that all external sources used to provide evidence in
your work must be referenced accordingly to avoid plagiarism and
collusion
• You must use correct and consistent Harvard referencing style
• A full reference list should be at the end of the assignment, and should
start on a new page labelled ‘References’ or ‘Reference List’

Submission Format The submission is in the form of an individual written report. This should be
written in a concise, formal business style using single spacing and font size
12. You are required to make use of headings, paragraphs and subsections as
appropriate, and all work must be supported with research and referenced
using the Harvard referencing system. Please also provide a bibliography using
the Harvard referencing system. The recommended word limit is 2,000–2,500
words, although you will not be penalised for exceeding the total word limit.

Page 6
Learners declaration

I certify that the work submitted for this assignment is my own and research sources are fully
acknowledged.

Student signature: Le Trong Nhan Date: 14/9/2019

Criteria Reference

LO Learning Outcome (LO) AC In this assessment you will have the opportunity Task
to present evidence that shows you are able to: No.

LO Examine networking P1 Discuss the benefits and constraints of different


1 principles and their network types and standards.
protocols
P2 Explain the impact of network topology,
communication and bandwidth requirements.

LO Explain networking P3 Discuss the operating principles of networking


2 devices and operations devices and server types.

Implement a network design topology


infrastructure based on a prepared design and list
the different type of topologies.

P4 Discuss the inter-dependence of workstation


hardware with relevant networking software.

LO3 Design efficient P5 Design a networked system to meet a given


networked systems specification.

P6 Test and evaluate the design to meet the


requirements and analyse user feedback.

LO4 Implement and diagnose P7 Implement a networked system based on a


networked systems prepared design.
P8 Document and analyse test results against
expected results.

Page 7
Higher Grade Achievement (Where applicable)

Grade Descriptor Comment’s /tick Grade Descriptor Comment’s /tick

M1: Compare common D1: Considering a given


networking principles scenario, identify the
and how protocols topology protocol
enable the effectiveness selected for the efficient
of networked systems. utilisation of a
networking system.

M2: Explore a range of D2: Design a


server types and justify maintenance schedule to
the selection of a server, support the networked
considering a given system
scenario regarding cost
and performance
optimisation.

M3: Install and D3: Use critical


configure network reflection to evaluate
services and applications own work and justify
on your choice valid conclusions

M4: Recommend
potential enhancements
for the networked
systems.

Assignment Feedback

Formative Feedback: Assessor to Student

Action Plan

Page 8
Summative feedback

Assessor Signature Date

Student Signature Le Trong Nhan Date 14/9/2019

Page 9
Page 10
P1. Discuss the benefits and constraints of different network types and standards.

A1. Definition of network

• A net work is a collection of computers, servers, mainframes, network devices, peripherals, or other
devices connected to one anther to allow the sharing of data. (Emberton, 1998)

A2. History of network

• In 1961.One of the first networks appeared, called ARPANET. This is the idea of Leonard Kleinrock
and in his article titled “Information Flow in Large Communication Nets”.

• In 1965, to describe data sent between computers Donald Davies coined the term "pack".

• In 1969, the first two nodes, UCLA and SRI (Stanford Research Institute), were connected,
officially starting ARPANET, In April, a document to identify and provide information about
computer communication, the network protocol for the first time, was called RFC. August 29, the first
network adapter and IMP (Interface Message Processor) were sent to UCLA. It is used to send the first
data transfer on ARPANET. With the first data transmission sent between UCLA and SRI, the Internet
was officially launched on October 29, 1969 at 10:30 pm.

• In 1970, Steve Crocker and a group at UCLA has released NPC (NetWare Core Protocol) is the file
sharing protocol that is used for use with Netware (a network operating system).

• In 1971, Ray Tomlinson has deployed email system. The Wi-Fi platform was born, which is the
UHF wireless packet network, used in Hawaii to connect islands.

• In 1973, Robert Metcalfe developed Ethernet (LAN protocol) when he was working at Xerox PARC.
ARPA deploy SATNET (The first international network connection). A VoIP (IP telephone or Internet
phone) test call has been made and officially introduced the technology and capabilities it however,
until 1975 new software was used.

• In 1974, the Router (Hardware device) was not officially created and used at Xerox.

• In 1976, The first real IP Router, originally called a Gateway (networked device) developed by
Ginny Strasser.

• In 1978, the TCP / IP protocol was developed by Bob Kahn and Vinit Cerf.

Page 11
• In 1981, the first major version of the Internet protocol is IPv4 (Internet protocol version 4) defined
in RFC 791.in the United States BITNET is developed.

• In 1983, the first DNS was made by Paul Mockapetris and Jon Pastel. Finished the transition to using
TCP/IP.

• In 1986, bandwidth problems are solved thanks to the release of BITNET II. The National Science
Foundation (NSFNET) network is online, this is an essential part of ARPANET development in the
early 1990s.

• In 1988, a leased data communications line (T1) was added to ARPANET. AT&T, Lucent, and NCR
introduced to the market Waveland network technology, the official precursor to Wi-Fi. Network
firewall technology was first published.

• In 1990, The US network hardware company, Kalpana, developed and introduced Switch.

• In 1996, IPv6 was introduced, including a wider range of IP addresses, improved routing and
encryption compared to IPv4.

• In June 1997, Wi-Fi created and introduced (802.11 standard )provides transfer speeds of up to 2
mb/s.

• In 1999, the transfer rate was up to 25 Mb / s and the 5 GHz band was used for Wi-Fi thanks (
802.11a standard ).The WEP encryption protocol for Wi-Fi is introduced in September, for use with
802.11standard , providing transmission speeds up to 11 Mbps).

• In 2003, 02.11g devices were available to the public starting in January 2003, providing transmission
speeds up to 20 Mbps. The WPA encryption protocol for Wi-Fi is introduced in 2003, for use with
802.11g.

• In 2004, the WPA2 encryption protocol was introduced, improving and replacing WPA.

• .In 2006, All Wi-Fi devices must achieve WPA2 certification

• In 2009, The 802.11n standard for Wi-Fi was officially released in 2009. It provides higher transfer
speeds than 802.11a and 802.11g and it can operate on 2.4 GHz and 5 GHz bandwidths.

Page 12
• In January 2018, WPA3 encryption was introduced including security improvements compared to
WPA2. (Emberton, 1998)

A3. Benefits and constraints of network

• Benefits:
➢ It allows for frequent collaboration.
➢ People can share information freely.
➢ The cost of joining a computer network is going down.
➢ Computer networking data can be stored off-line.
➢ Anyone can connect to a computer network.
➢ Computer connections can be personalized.
• Constraints
➢ It requires a certain wealth to join a computer network.
➢ Disruptions can occur frequently.
➢ Computer networking can be addictive.
➢ Information availability isn’t always a good thing.
There is little policing on a computer network. (Ayres, n.d.)

B. Network types: (For each network type, you need to provide the structure, benefits and constraints...).

• B1. By geographic location


A personal area network (PAN) is a computer network for interconnecting devices centered on an
individual person's workspace. A PAN provides data transmission among devices such
as computers, smartphones, tablets and personal digital assistants. PANs can be used for
communication among the personal devices themselves, or for connecting to a higher level network and
the Internet where one master device takes up the role as gateway. A PAN may be wireless or carried
over wired interfaces such as USB. LAN- local area network: This network implement connection from
router to switch and into computer inside your company or in your home. (Wekipedia, n.d.)

• A metropolitan area network (MAN) is a computer network that interconnects users with computer
resources in a geographic region of the size of a metropolitan area. The term MAN is applied to the
interconnection of local area networks (LANs) in a city into a single larger network which may then
also offer efficient connection to a wide area network. The term is also used to describe the
interconnection of several local area networks in a metropolitan area through the use of point-to-point
connections between them (Wekipedia, n.d.)

Page 13
• A wide area network (WAN) is a telecommunications network that extends over a large geographical
area for the primary purpose of computer networking. Wide area networks are often established
with leased telecommunication circuits. (Wikipedia, n.d.)

• A wireless LAN (WLAN) is a wireless computer network that links two or more devices
using wireless communication to form a local area network (LAN) within a limited area such as a
home, school, computer laboratory, campus, office building etc. This gives users the ability to move
around within the area and yet still be connected to the network. Through a gateway, a WLAN can also
provide a connection to the wider Internet. (Wekipedia, n.d.)

• A storage area network (SAN) or the storage network is a computer network that provides access to
merge, block-level data storage. SAN is used primarily to enhance the accessibility of the storage
devices, such as disk arrays and tape libraries to servers to the devices appear on the operating system
in the form of the device to be mounted locally. SAN is usually a dedicated network of storage devices
cannot access via local area network (LAN) by other equipment, thus preventing the intervention of the
LAN traffic of data transmission. (Wikipedia, n.d.)

• Virtual private network or VPN (Virtual Private Network) is a private network to connect the
computers of companies, corporations, or organizations with each other through the Internet.
(Wekipedia, n.d.)

B2. Role capabilities.

• Client-server model: is a famous model in computer networking, is applied very broadly and is the
model of all existing sites. The idea of this model is the air con (played role is client) sends a
request (request) to the server (the role of the provision of services), the server will process and
return the results back to the client.

Page 14
Figure 1:Client server model

• Computer network or peer to peer (P2P) is a distributed application architecture, partitioning tasks
or workloads between colleagues. Colleagues are equally privileged, those involved in the
application. They are said to form a network of peer nodes. (Wekipedia, n.d.)

Page 15
Figure 2:Peer-TO-Peer
B3. Other types.

• Cloud networking: is a type of infrastructure where network capabilities and resources are
available on demand through a third-party service provider that hosts them on a cloud platform. The
network resources can include virtual routers, firewalls, and bandwidth and network management
software, with other tools and functions becoming available as required. Companies can either use
cloud networking resources to manage an in-house network or use the resources completely in the
cloud. (Vmware, n.d.)

• Cluster is a high-performance computer cluster is a form of a computer are connected via a


LAN (local area network) so that they can operate as a single machine. Cluster also includes many
of the individual server was available and can link the integrated operations in the same system, the
small retail server will communicate with the outside through the information was required from the
user. (Ictnetworking, n.d.)
Page 16
• Centralized (focused) as it means the power is concentrated in one place. The Form of Client-
Server. A typical example for you easy to visualize on Google that is Centralized and model FB
though dispersed server around the world (Distributed), hosted on the Cloud (cloud computing), but
if two companies have problems and ceased operation, the user data will take off. (Kipalog, n.d.)

• In computing, virtualization refers to the act of creating a virtual (rather than actual) version of
something, including virtual computer hardware platforms, storage devices, and computer
network resources. (Wekipedia, n.d.)

C. Networking standards

C1. Networking model (discuss clearly about each model, provide diagram,)

a) What is a networking model?


• A model is a way to organize a system’s functions and features to define its structural design. A
design can help us understand how a communication system accomplishes tasks to form a protocol
suite. To help us wrap our heads around models, communication systems are often compared to the
postal system (Dictionary, n.d.)

b) Why uses a model?


• Models have a range of uses –from offering a way to explain complicated information to
hypothesizing it. Scientists may propose more than one model to clarify or predict what might occur
in specific conditions.

c) Common types of networking model.

• OSI model: The reference model is the OSI model. This implies that this specific model offers a
technique for comparing norms and protocols to help in connectivity and consistency. Using a
reference model, developers can comprehend how transmissions are framed and generate techniques
for translating between systems. (Dictionary, n.d.)

Part 1—The Basic Model

Part 2—Security Architecture

Part 3—Naming and Addressing

Page 17
Part 4—Management Framework

• TCP/IP model: The Internet protocol suite is the conceptual model and set of communications
protocols used in the Internet and similar computer networks. It is commonly known
as TCP/IP because the foundational protocols in the suite are the Transmission Control
Protocol (TCP) and the Internet Protocol (IP). It is occasionally known as the Department of
Defense (DoD) model because the development of the networking method was funded by the United
States Department of Defense through DARPA. (Wekipedia, n.d.)

C2. Common Network Standards:

1. IEEE 802.1 (LAN/MAN)


• IEEE 802.1 is a working group of the IEEE 802 project of the IEEE Standards Association.
• It is concerned with:
• 802 LAN/MAN architecture
• internetworking among 802 LANs, MANs and wide area networks
• 802 Link Security
• 802 overall network management
• protocol layers above the MAC and LLC layers
• LAN/MAN bridging and management. Covers management and the lower sub-layers of OSI Layer 2

(Wekipedia, n.d.)

2. IEEE 802.3 (Ethernet)


• The IEEE 802.3 is a working group and is a set of the Institute of Electrical and Electronics
Engineers (IEEE) standards created by the Working Group that defines the physical layer and the
media access control Data Link layer of the wired Ethernet . This is generally a local area network
(LAN) technology with some wide area network (WAN) applications. Physical connections are
made between nodules and/or infrastructure devices ( hubs, switches, routers) by a variety of
copper or optical fiber.
• 802.3 is a technology that supports the IEEE 802.1network infrastructure.
• 802.3 also defines the LAN access method using CSMA/CD.
(Wekipedia, n.d.)

Page 18
3. IEEE 802.5 (Token Ring)
• Token Ring local area network (LAN) technology is a communications protocol for local area
networks. It uses a special three-byte frame called a "token" that travels around a logical "ring" of
workstations or servers. This token passing is a channel access method providing fair access for all
stations, and eliminating the collisions of contention-based access methods.
• Introduced by IBM in 1984, it was then standardized with protocol IEEE 802.5 and was fairly
successful, particularly in corporate environments, but gradually eclipsed by the later versions
of Ethernet. (Wekipedia, n.d.)

4. IEEE 802.11 (Wireless LAN)

• IEEE 802.11 is part of the IEEE 802 set of LAN protocols, and specifies the set of media access
control (MAC) and physical layer (PHY) protocols for implementing wireless local area network
(WLAN) Wi-Fi computer communication in various frequencies, including but not limited to 2.4, 5,
and 60 GHz frequency bands. They are the world's most widely used wireless computer networking
standards, used in most home and office networks to allow laptops, printers, and smartphones to talk
to each other and access the Internet without connecting wires. (Wekipedia, n.d.)

P2: Explain the impact of network topology, communication and bandwidth requirements

A. Network topology

A1. What is "network topology"


• Network topology is the arrangement of the elements (links, nodes, etc.) of a communication
network. Network topology can be used to define or describe the arrangement of various types of
telecommunication networks, including command and control radio
networks,[3] industrial fieldbusses and computer networks.
• Network topology is the topological structure of a network and may be depicted physically or
logically. It is an application of graph theory[3] wherein communicating devices are modeled as
nodes and the connections between the devices are modeled as links or lines between the
nodes. Physical topology is the placement of the various components of a network (e.g., device
location and cable installation), while logical topology illustrates how data flows within a network.
Distances between nodes, physical interconnections, transmission rates, or signal types may differ
Page 19
between two different networks, yet their topologies may be identical. A network’s physical
topology is a particular concern of the physical layer of the OSI model. (Wekipedia, n.d.)

A2. Types of topology

• Bus Topology : Bus topology is a type of network where every device is connected to a single
cable which runs from one end of the network to the other. This type of type of topology is often
referred to as line topology. In a bus topology, data is transmitted in one direction only. If the bus
topology has two endpoints then it is referred to as a linear bus topology. Smaller networks with
this type of topology will generally use an RJ45 cable to link devices together. (KEARY, n.d.)

➢ Advantages: There are a number of reasons why in smaller networks, bus topologies are used. One
of the primary factors is the simplicity of the design. All devices are linked to a single cable to
prevent you from managing a complicated topological configuration. The design also helps to
create cost-effective bus topologies because they can be operated with a single cable. If you need
to add more equipment then you.
➢ Disadvantages: Network disruption when computers are added or removed. A break in the cable
will prevent all systems from accessing the network. Difficult to troubleshoot

Figure 3: BUS Topology

• Star Topology: A star topology is a topology where every node in the network is connected to one
central node. Every device in the network is directly connected to the central node and indirectly
connected to every other node. The relationship between these elements is that the central network
device is a server and other devices are treated as clients. The central node has the responsibility of

Page 20
managing data transmissions across the network. The central node or hub also acts as a repeater. In
star topologies, computers are connected with a coaxial cable, twisted pair, or optical fiber cable.
(KEARY, n.d.)

➢ Advantages: Star topologies are most frequently used because from one place you can
handle the whole network: the main hub. As a result, if a node that is not the main node
goes down, the network will stay up. This provides star topologies with a layer of defect
security that is not always present with other topology setups. You can also add fresh pcs
without taking the-
➢ Disadvantages: Requires more cable, a central connecting device allows for a single point
of failure and more difficult to implement

Figure 4: Star Topology

• Ring Topology : A ring topology is a network configuration in which device connections create a
circular data path. Each networked device is connected to two others, like points on a circle.
Together, devices in a ring topology are referred to as a ring network. (KEARY, n.d.)

➢ Advantages : Cable faults are easily located, making troubleshooting easier and ring
networks are moderately easy to install
➢ Disadvantages : Expansion to the network can cause network disruption and a single
break in the cable can disrupt the entire network
Page 21
Figure 5: Ring Topology

➢ Mesh Topology: A mesh topology is a point-to-point connection where nodes are interconnected. In
this form of topology, data is transmitted via two methods: routing and flooding. Routing is where
nodes use routing logic to work out the shortest distance to the packet’s destination. In contrast
flooding, data is sent to all nodes within the network. Flooding doesn’t require any form of routing
logic to work. There are two forms of mesh topology: partial mesh topology and full mesh topology.
With partial mesh topology, most nodes are interconnected but there are a few which are only
connected to two or three other nodes. A full mesh topology is where every node is interconnected.

(KEARY, n.d.)

➢ Advantages : First and foremost, mesh topologies are used because they are reliable. The
node interconnectivity makes them highly resistant to failure. No single machine failure
could bring the whole network down. One of the reasons why this is a common topology
option is the lack of a single point of failure. Also, this setup is safe from compromising.
Second, provides redundant paths between devices and the network can be expanded without
disruption to current uses
➢ Disadvantages: requires more cable than the other LAN topologies and omplicated
implementation

Page 22
Figure 6: Mesh Topology

➢ Tree Topology: a tree topology is a network structure that is shaped like a tree with its many branches.
Tree topologies have a root node which is connected to other node hierarchy. The hierarchy is parent-
child where there is only one mutual connection between two connected nodes. As a general rule, a tree
topology needs to have three levels to the hierarchy in order to be classified this way. This form of
topology is used within Wide Area Networks to sustain lots of spread-out devices. (KEARY, n.d.)

➢ Advantages; The main reason why tree topologies are used is to extend bus and star
topologies. Under this hierarchical format, it is easy to add more nodes to the network when
your organization grows in size. This format also lends itself well to finding errors and
troubleshooting because you can check for performance issues systematically through the tree
view.
➢ Disadvantages: The root node is the most important weakness of tree topology. If the root
node fails, it will partition all of its subtrees. There will still be partial connectivity within the
network amongst other devices such as the failed node's parent. Maintaining the network is
not simple either because the more nodes you add, the more difficult it becomes to manage the
network. Another disadvantage

Page 23
Figure 7: Tree Topology

➢ Hybrid Topology: When a topology is comprised of two or more different topologies it is referred to as
a hybrid topology. Hybrid topologies are most-commonly encountered in larger enterprises where
individual departments have network topologies that different from another topology in the organization.
Connecting these topologies together will result in a hybrid topology. As a consequence, the capabilities
and vulnerabilities depend on the types of topology that are tied together. (KEARY, n.d.)

➢ Advantages: hybrid topologies are very scalable. Their scalability makes them well-suited to
larger networks.
➢ Disadvantages: Depending on the topologies you decide to use, hybrid topologies may be quite
complex. Every topology that forms part of your hybrid topology must be managed according
to its distinctive demands. This makes it harder for administrators to work because they will
have to try to handle various topologies instead of one. Furthermore, a hybrid topology can be
set up

B. Network communication
B1. What is “communication”

Page 24
➢ Communication (from Latin communicate, meaning "to share")[1] is the act of
conveying meanings from one entity or group to another through the use of mutually
understood signs, symbols, and semiotic rules. (Wekipedia, n.d.)

Figure 8:Communication Vectors, Photos and PSD files

B2. What is “protocol”:

➢ The Internet Protocol (IP) is the principal communications protocol in the Internet protocol
suite for relaying datagrams across network boundaries. Its routing function
enables internetworking, and essentially establishes the Internet. (Wekipedia, n.d.)

B3. Types of common communication protocols

1. ARP:

➢ The Address Resolution Protocol (ARP) is a communication protocol used for discovering
the link layer address, such as a MAC address, associated with a given internet layer address,

Page 25
typically an IPv4 address. This mapping is a critical function in the Internet protocol suite. ARP
was defined in 1982 by RFC 826,[1]which is Internet Standard STD 37.
➢ ARP has been implemented with many combinations of network and data link layer
technologies, such as IPv4, Chaosnet, DECnet and Xerox PARC Universal Packet (PUP)
using IEEE 802 standards, FDDI, X.25, Frame Relay and Asynchronous Transfer Mode (ATM).
IPv4 over IEEE 802.3 and IEEE 802.11 is the most common usage. (Wekipedia, n.d.)

2. RARP:
➢ The Reverse Address Resolution Protocol (RARP) is an obsolete computer networking protocol
used by a client computer to request its Internet Protocol (IPv4) address from a computer
network, when all it has available is its link layer or hardware address, such as a MAC address.
The client broadcasts the request and does not need prior knowledge of the network topology or
the identities of servers capable of fulfilling its request. (Wekipedia, n.d.)

Figure 9: RARP – Reverse Address Resolution Protocol

3. IP:

➢ The Internet Protocol (IP) is the principal communications protocol in the Internet protocol
suite for relaying datagrams across network boundaries. Its routingfunction
enables internetworking, and essentially establishes the Internet.

Page 26
➢ IP has the task of delivering packets from the source host to the destination host solely based on
the IP addresses in the packet headers. For this purpose, IP defines packet structures
that encapsulate the data to be delivered. It also defines addressing methods that are used to
label the datagram with source and destination information. (Wekipedia, n.d.)

4. TCP:
➢ The Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol
suite. It originated in the initial network implementation in which it complemented the Internet
Protocol (IP). Therefore, the entire suite is commonly referred to as TCP/IP. TCP
provides reliable, ordered, and error-checked delivery of a stream of octets (bytes) between
applications running on hosts communicating via an IP network. Major internet applications
such as the World Wide Web, email, remote administration, and file transfer rely on TCP.
Applications that do not require reliable data stream service may use the User Datagram
Protocol (UDP), which provides a connectionless datagram service that emphasizes
reduced latency over reliability. (Wekipedia, n.d.)

Figure 10: Transmission control protocol (TCP)

5. UDP:

➢ In computer networking, the User Datagram Protocol (UDP) is one of the core members of
the Internet protocol suite. The protocol was designed by David P. Reed in 1980 and formally defined
in RFC 768. With UDP, computer applications can send messages, in this case referred to
Page 27
as datagrams, to other hosts on an Internet Protocol (IP) network. Prior communications are not
required in order to set up communication channels or data paths.
➢ UDP uses a simple connectionless communication model with a minimum of protocol mechanisms.
UDP provides checksums for data integrity, and port numbersfor addressing different functions at the
source and destination of the datagram. It has no handshaking dialogues, and thus exposes the user's
program to any unreliability of the underlying network; there is no guarantee of delivery, ordering,
or duplicate protection. If error-correction facilities are needed at the network interface level, an
application may use Transmission Control Protocol (TCP) or Stream Control Transmission
Protocol (SCTP) which are designed for this purpose.
➢ UDP is suitable for purposes where error checking and correction are either not necessary or are
performed in the application; UDP avoids the overhead of such processing in the protocol stack.
Time-sensitive applications often use UDP because dropping packets is preferable to waiting for
packets delayed due to retransmission, which may not be an option in a real-time system.
(Wekipedia, n.d.)

Figure 11: The User Datagram Protocol (UDP)

6. DNS
➢ The Domain Name System (DNS) is a hierarchical and decentralized naming system for
computers, services, or other resources connected to the Internet or a private network. It
associates various information with domain names assigned to each of the participating entities.
Most prominently, it translates more readily memorized domain names to the numerical IP

Page 28
addresses needed for locating and identifying computer services and devices with the
underlying network protocols
➢ An often-used analogy to explain the Domain Name System is that it serves as the phone
book for the Internet by translating human-friendly computer hostnames into IP addresses. For
example, the domain name www.example.com translates to the addresses 93.184.216.34 (IPv4)
and 2606:2800:220:1:248:1893:25c8:1946 (IPv6). The DNS can be quickly and transparently
updated, allowing a service's location on the network to change without affecting the end users,
who continue to use the same hostname. Users take advantage of this when they use meaningful
Uniform Resource Locators (URLs) and e-mail addresses without having to know how the
computer actually locates the services. (Wekipedia, n.d.)

Figure 12: Domain Name System


7. HTTP
➢ The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed,
collaborative, hypermedia information systems.[1] HTTP is the foundation of data
communication for the World Wide Web, where hypertext documents include hyperlinks to
other resources that the user can easily access, for example by a mouse click or by tapping the
screen in a web browser.
➢ HTTP is an application layer protocol designed within the framework of the Internet protocol
suite. Its definition presumes an underlying and reliable transport layer
protocol, and Transmission Control Protocol (TCP) is commonly used. However, HTTP can be
adapted to use unreliable protocols such as the User Datagram Protocol (UDP), for example
in HTTPU and Simple Service Discovery Protocol (SSDP). (Wekipedia, n.d.)
Page 29
Figure 13: Hypertext Transfer Protocol (HTTP)

8. FTP
➢ FTP is built on a client-server model architecture using separate control and data connections
between the client and the server.[1] FTP users may authenticate themselves with a clear-
text sign-in protocol, normally in the form of a username and password, but can connect
anonymously if the server is configured to allow it. For secure transmission that protects the
username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS)
or replaced with SSH File Transfer Protocol (SFTP).
➢ Most common web browsers can retrieve files hosted on FTP servers, although they may not
support protocol extensions such as FTPS.[3][12] When an FTP—rather than an HTTP—URL is
supplied, the accessible contents on the remote server are presented in a manner that is similar
to that used for other web content. A full-featured FTP client can be run within Firefox in the
form of an extension called Fire FTP. (Wekipedia, n.d.)

Page 30
Figure 14: File Transfer Protocol (FTP)

9. SMTP

➢ The Simple Mail Transfer Protocol (SMTP) is a communication protocol for electronic
mail transmission. As an Internet standard, SMTP was first defined in 1982 by RFC 821, and
updated in 2008 by RFC 5321 to Extended SMTP additions, which is the protocol variety in
widespread use today. Mail servers and other message transfer agents use SMTP to send and
receive mail messages. Proprietary systems such as Microsoft Exchange and IBM
Notes and webmail systems such as Outlook.com, Gmail and Yahoo! Mail may use non-standard
protocols internally, but all use SMTP when sending to or receiving email from outside their own
systems. SMTP servers commonly use the Transmission Control Protocol on port number 25.
➢ User-level email clients typically use SMTP only for sending messages to a mail server for
relaying, typically submit outgoing email to the mail server on port 587 or 465 as per RFC 8314.
For retrieving messages, IMAP and POP3 are standard, but proprietary servers also often
implement proprietary protocols, e.g.
➢ A typical example of sending a message via SMTP to two mailboxes (alice and theboss) located in
the same mail domain (example.com or localhost.com) is reproduced in the following session
exchange. (In this example, the conversation parts are prefixed with S: and C:, for server and client,
respectively; these labels are not part of the exchange.)
➢ After the message sender (SMTP client) establishes a reliable communications channel to the
message receiver (SMTP server), the session is opened with a greeting by the server, usually
containing its fully qualified domain name (FQDN), in this case smtp.example.com. The client
initiates its dialog by responding with a HELO command identifying itself in the command's
parameter with its FQDN (or an address literal if none is available) (Wekipedia, n.d.)

Page 31
Figure 15: Simple Mail Transfer Protocol (SMTP)

10. POP3

➢ In computing, the Post Office Protocol (POP) is an application-layer Internet standard protocol used
by e-mail clients to retrieve e-mail from a mail server.[1]
➢ POP version 3 (POP3) is the version in common use.
➢ POP3 clients also have an option to leave mail on the server after download. By contrast,
the Internet Message Access Protocol (IMAP) was designed to normally leave all messages on the
server to permit management with multiple client applications, and to support both connected
(online) and disconnected (offline) modes of operation.
➢ A POP3 server listens on well-known port number 110 for service requests. Encrypted
communication for POP3 is either requested after protocol initiation, using the STLS command, if
supported, or by POP3S, which connects to the server using Transport Layer Security (TLS)
or Secure Sockets Layer (SSL) on well-known TCP port number 995.
➢ Messages available to the client are determined when a POP3 session opens the maildrop, and are
identified by message-number local to that session or, optionally, by a unique identifier assigned to
the message by the POP server. This unique identifier is permanent and unique to the maildrop and
allows a client to access the same message in different POP sessions. Mail is retrieved and marked
for deletion by the message-number. When the client exits the session, mail marked for deletion is
removed from the maildrop. (Wekipedia, n.d.)

Page 32
Figure 16: POP3 (Post Office Protocol 3)

11. IMAP

➢ In computing, the Internet Message Access Protocol (IMAP) is an Internet standard protocol used
by email clients to retrieve email messages from a mail serverover a TCP/IP connection.[1] IMAP is
defined by RFC 3501.
➢ IMAP was designed with the goal of permitting complete management of an email box by multiple
email clients, therefore clients generally leave messages on the server until the user explicitly
deletes them. An IMAP server typically listens on port number 143. IMAP over SSL (IMAPS) is
assigned the port number 993.
➢ Virtually all modern e-mail clients and servers support IMAP, which along with the
earlier POP3 (Post Office Protocol) are the two most prevalent standard protocols for email
retrieval.[2] Many webmail service providers such as Gmail, Outlook.com and Yahoo! Mail also
provide support for both IMAP and POP3. (Wekipedia, n.d.)

Page 33
Figure 17: IMAP (Internet Message Access Protocol)

C. Bandwidth

C1. What is bandwidth

➢ The international name bandwidth is bandwidth, which refers to the traffic of the electrical signal
transmitted by the transmission device for a certain period of time. In the field of website hosting,
the term "bandwidth" is often used to describe the maximum amount of data, which you are allowed
to exchange (including upload and download) between the website (or server) and the user in a unit
of time (usually seconds). In short, bandwidth is the maximum amount of information that your
website is saved back and forward every second. The width of a band of electromagnetic frequencies
(translates to a range of electromagnetic frequencies), which represents the data transfer speed of a
line, or a bit of specialization, is the width (width) of a frequency range that the electrical signals
Death of a transmission medium. In general, bandwidth is synonymous with the amount of data
transmitted per unit of time. Returning to the bandwidth of the Web site, we will understand that if
the bandwidth is large...
➢ Practical Example: If someone visits your website to see an ABC article, your ABC page has a
capacity of 200 KB, the user needs to spend up to 200 KB to download the ABC page about , on
average a 5-page viewer, you have to spend 1000 KB (~ 1MB) in bandwidth, so if your hosting has a
10 GB (~ 10,000 MB) bandwidth per month, the maximum number of visits your website can serve
per month is 10,000 MB/1MB = 10,000 turns.

C2. Measuring bandwidth

Page 34
➢ Bandwidth is the amount of data that passes through a network connection over time as measured
in bits per second (bps). Numerous tools exist for administrators to measure the bandwidth of
network connections. On LANs (local area networks), these tools include Netperf and Test TCP. On
the Internet, numerous bandwidth and speed test programs exist, and most are free for you to
use.Even with these tools at your disposal, bandwidth utilization is difficult to measure precisely as
it varies over time depending on the configuration of hardware plus characteristics of software
applications, including how they are being used
➢ About Broadband Speeds: Usually, the word "high bandwidth" separates quicker Internet broadband
connections from traditional dial-up or cellular network speeds. Definitions of "high" versus "low"
bandwidth vary, and as network technology improved, they have altered over the years. The United
States in 2015 The Federal Communications Commission (FCC) has updated its broadband
definition to at least 25 Mbps (Wekipedia, n.d.)

D.Discuss about the impact of network topology, communication and bandwidth requirements

➢ A communication link's bandwidth, or in particular any scheme, has been loosely described as the
frequency interval width so that sinusoidal input frequencies within this interval will appear at the
output without important amplitude or phase change. Bandwidth is linked to the maximum speed
of transmission of pulses and therefore data transmission rate for the link and is obviously an
significant characteristic
➢ Topology and Media Recommendation: Topology that is highly recommended is a topology of
stars because star topology is no problem producing settings, ease of use. It has a number of
points of concentration. These provide simple access to network service or reconfiguration. Good
performance and reliability. Robust as one connection failure does not impact the entire system.

P3- Discuss the operating principles of networking devices and server types.

A. Network devices (For each network device, you will provide information about: when we use this
device, device image, working layer in the OSI model, operating procedures/operating principles,
working mechanism, features, benefits and constraints, types, cables and connectors, ports...

1. NIC

• A network interface controller (NIC, also known as a network interface card, network
adapter, LAN adapter or physical network interface, and by similar terms) is a computer
hardware component that connects a computer to a computer network. Early network interface
controllers were commonly implemented on expansion cards that plugged into a computer bus.
The low cost and ubiquity of the Ethernetstandard means that most newer computers have a
network interface built into the motherboard.
• Modern network interface controllers offer advanced features such
as interrupt and DMA interfaces to the host processors, support for multiple receive and
transmit queues, partitioning into multiple logical interfaces, and on-controller network traffic
processing such as the TCP offload engine.

Page 35
• The network controller implements the electronic circuitry required to communicate using a
specific physical layer and data link layer standard such as Ethernet or Wi-Fi. This provides a
base for a full network protocol stack, allowing communication among computers on the
same local area network (LAN) and large-scale network communications through routable
protocols, such as Internet Protocol (IP).
• The NIC allows computers to communicate over a computer network, either by using cables or
wirelessly. The NIC is both a physical layer and data link layer device, as it provides physical
access to a networking medium and, for IEEE 802 and similar networks, provides a low-level
addressing system through the use of MAC addresses that are uniquely assigned to network
interfaces.
• Integrated, PCI Connector’ ISA Connector, PCI-E, FireWire, USB, Thunderbolt

(Wekipedia, n.d.)

Figure 18: Network Interface Card:

Page 36
2. Hub

➢ An Ethernet hub, active hub, network hub, repeater hub, multiport repeater, or simply hub is
a network hardware device for connecting multiple Ethernet devices together and making them
act as a single network segment. It has multiple input/output (I/O) ports, in which
a signal introduced at the input of any port appears at the output of every port except the
original incoming.[1] A hub works at the physical layer (layer 1) of the OSI model.[2] A repeater
hub also participates in collision detection, forwarding a jam signal to all ports if it detects
a collision. In addition to standard 8P8C ("RJ45") ports, some hubs may also come with
a BNC or an Attachment Unit Interface (AUI) connector to allow connection to
legacy 10BASE2 or 10BASE5 network segments.
➢ Hubs are now largely obsolete, having been replaced by network switches except in very old
installations or specialized applications. As of 2011, connecting network segments by repeaters
or hubs is deprecated by IEEE 802.3
➢ Each device acts as a Hub connection for all of your network devices and handles a type of data
known as frames. The frame carries your data. When a frame is received, it is amplified and
then transmitted to the destination computer's port.
➢ The big difference between these two devices is the method in which the frame is distributed. In
a hub, a frame is transmitted or "broadcast" to all its ports. It does not matter that the frame is
destined only for one port. The Hub has no way to distinguish which ports will be sent.
Transferring it to all ports ensures that it will reach its intended destination. This puts a lot of
traffic on the network and can lead to poor network response times. Also, a 10/100Mbps hub
must share its bandwidth with each and all of its ports. So when only one PC airs, it will have

Figure 19: Ethernet hub

Page 37
➢ access to the maximum available bandwidth. However, if multiple computers are airing then
that bandwidth will need to be divided by all... (Wekipedia, n.d.)

3. Routers
➢ A router is a networking device that forwards data packets between computer networks.
Routers perform the traffic directing functions on the Internet. Data sent through the internet,
such as a web page or email, is in the form of data packets. A packet is
typically forwarded from one router to another router through the networks that constitute
an internetwork (e.g. the Internet) until it reaches its destination node.[2]A router is connected
to two or more data lines from different IP networks. When a data packet comes in on one of
the lines, the router reads the network addressinformation in the packet header to determine the
ultimate destination. Then, using information in its routing table or routing policy, it directs the
packet to the next network on its journey. (Wekipedia, n.d.)

➢ Using a routing protocol, routers can exchange data about destination addresses when various
routers are used in interconnected networks. Each router creates a routing table listing
preferred paths on the interconnected networks between any two computer systems.[3] A
router has two kinds of network element parts arranged on distinct processing planes:
• Control plane: A router has a routing table that lists which route to use to forward a
data packet and which physical interface link to do so. This is done using pre-
configured inner directives, called static routes, or by dynamically studying routes
using a routing protocol. In the routing table, static and dynamic paths are stored
• Forwarding plane: The router transmits data packets between incoming and outgoing
interface links. It transmits them to the right sort of network using information that the
packet header contains matched to the control plane FIB entries.
➢ Advantages of the Router: in terms of physical, the Router can connect to other types of
networks together, from the local Ethernet high-speed to the long-line telephone line at a slow
speed.
➢ Disadvantages of routers: routers are slower than bridges because they require more
calculations to figure out how to guide packets, especially when networks connect to each
other at the same speed. A fast operating network can play packets much faster than a slow
network and may cause network congestion. Therefore, the Router may require the computer
to send packets to slower. Another problem is that the Router has a protocol specialized
according to the protocol-IE, the way a computer connected to the network with an IP router
will be different from the way it interfaces to a router Novell or DECnet. This issue is now
solved by a network that knows the path of every known network type. All commercial
routers can handle multiple protocol types, often with extra overhead for each protocol.

Page 38
Figure 20:Router

4. Switches

➢ A network switch (also called switching hub, bridging hub, officially MAC bridge[1]) is
a computer networking device that connects devices on a computer network by using packet
switching to receive, process, and forward data to the destination device. A network switch is a
multiport network bridge that uses hardware addresses to process and forward data at the data
link layer (layer 2) of the OSI model. Some switches can also process data at the network
layer (layer 3) by additionally incorporating routing functionality. Such switches are commonly
known as layer-3 switches or multilayer switches.
➢ Switches for Ethernet are the most common form of network switch. The first Ethernet switch
was introduced by Kalpana in 1990.[3] Switches also exist for other types of networks
including Fibre Channel, Asynchronous Transfer Mode, and InfiniBand.

Page 39
➢ Nowadays, in data communication, the Switch usually has two main functions that transfer the
data frames from the source to the destination, and construct the Switch panels. The Switch
works at a much higher speed than the Repeater and can provide more functionality such as the
ability to create a virtual LAN (VLAN).
(Wekipedia, n.d.)

Figure 21:Switch

5. Multilayer switch

➢ A multilayer switch (MLS) is a computer networking device that switches on OSI layer 2 like an
ordinary network switch and provides extra functions on higher OSI layers.
➢ Switching technologies are crucial to network design, as they allow traffic to be sent only where it
is needed in most cases, using fast, hardware-based methods. Switching uses different kinds
of network switches. A standard switch is known as a layer 2 switch and is commonly found in
nearly any LAN. Layer 3 or layer 4 switches require advanced technology (see managed switch)
and are more expensive, and thus are usually only found in larger LANs or in special network
environments.
(Wekipedia, n.d.)
➢ The operation of the Multilayer Switch consists of 2 types:

• Route caching: This is the first generation, also known as MLS, Netflow LAN switching,
flow-based or demand-based switching
• Topology-based: This is the second generation, also known as Cisco Express Forwarding
(CEF)
Page 40
➢ Easy to use–Multilayer switches are configured automatically and the Layer 3 flow cache is set
up independently. And you don't need to learn new IP switching technologies for your "plug-
and-play" design.
➢ Faster connectivity–With multilayer switches, you benefit from both switching and routing on
the same platform. It can therefore meet the higher-performance needs of the conn.
➢ Enable routing with the IP routing command on the switch. (Note: some multilayer switches may
support protocols such as RIP and OSPF.)
➢ Log into a multilayer switch management interface.
➢ Create VLANs on a multi-layer switch and assign ports to each VLAN.

Figure 22: Multilayer Switching


6. Fire wall
➢ In compute, firewall or firewall is a network security system that monitors and controls incoming
and outgoing network traffic based on predefined security rules. [1] A firewall typically
establishes a barrier between a trusted internal network and an untrusted external network, such as
the Internet.
➢ Firewall is often classified as a network firewall or server-based firewall. Network firewall to
filter traffic between two or more networks and running on network hardware. Host-based
firewall running on your computer and control network traffic into and out of the machine. They
are also classified into firewall protection to protect security for personal computers or local area
networks, avoid the penetration, attack from the outside and firewalls often block due to the
Internet service provider is responsible to establish and prevent not for your computer to access a
number of web sites or servers, typically used for the purpose of Internet censorship.
(Wekipedia, n.d.)

Page 41
➢ The main firewall function is controlling the flow of information between the intranet and the
Internet environments. Set up the information flow control mechanism between the internal
network and the Internet.

• Allow or prohibit access to outbound services.


• Allow or prohibit services from external access.
• Track data streams keep intranet and internet environments.
• Control access address, prohibit or allow addresses to be accessed.
• Control users and users ' access.
• Control the content of information, packets stored on the network.
• Filter packets based on the source address, destination address, and port number (port),
the protocol can use to record all network access and report attempts to the
administrator

Figure 23:Firewall

7. Host-based intrusion detection system (HIDS)


➢ A host-based intrusion detection system (HIDS) is an intrusion detection system that is capable of
monitoring and analyzing the internals of a computing system as well as the network packets on
its network interfaces, similar to the way a network-based intrusion detection system (NIDS)
operates.[1] This was the first type of intrusion detection software to have been designed, with the
original target system being the mainframe computer where outside interaction was infrequent.
➢ HIDS analyzes traffic from and to the particular computer on which the intrusion detection
software is mounted. The host-based system also has the capacity to monitor key system files and
any attempt to overwrite those files.
Page 42
➢ However, depending on the size of the network, HIDS or NIDS are implemented. For example, if
the size of the network is small, then NIDS is usually cheaper to implement and requires less
administration and training than HIDS. In general, however, HIDS is more flexible than NIDS.
(Wekipedia, n.d.)

Figure 24: Host based Intrusion detection system

8. Repeaters.

➢ a repeater is an electronic device that receives a signal and retransmits it. Repeaters are used to
extend transmissions so that the signal can cover longer distances or be received on the other
side of an obstruction. Some types of repeaters broadcast an identical signal, but alter its
method of transmission, for example, on another frequency or baud rate.
(Wekipedia, n.d.)
➢ There are several different types of repeaters; a telephone repeater is an amplifier in
a telephone line, an optical repeater is an optoelectronic circuit that amplifies the light beam in
an optical fiber cable; and a radio repeater is a radio receiver and transmitter that retransmits a
radio signal.
➢ A broadcast relay station is a repeater used in broadcast radio and television.

➢ Types

• Land line repeater


• Submarine cable repeater

Page 43
• Radio repeater
➢ The digipeater is used in channels that transmit data by binary digital signals, in which the
data is in the form of pulses with only two possible values, representing the binary digits 1
and 0. A digital repeater amplifies the signal, and it also may retime, resynchronize, and
reshape the pulses. A repeater that performs the retiming or resynchronizing functions may be
called a regenerator.
➢ For some cases in families, the office installs low-capacity, residential Wi-Fi equipment,
which leads to uncovering Wi-Fi coverage or some areas, a weak Wi-Fi signal working room,
a flickering , the speed of access is very slow that conditions cannot add or replace the Wi-Fi
device, then we can use the Repeater device to amplify the Wi-Fi coverage area

Figure 25:Repeater

9. Bridges
➢ A network bridge is a computer networking device that creates a single aggregate network from
multiple communication networks or network segments. This function is called network
bridging.[1] Bridging is distinct from routing. Routing allows multiple networks to communicate
independently and yet remain separate, whereas bridging connects two separate networks as if
they were a single network.[2]In the OSI model, bridging is performed in the data link
layer (layer 2).[3] If one or more segments of the bridged network are wireless, the device is
known as a wireless bridge.
➢ There are three main types of network bridging technologies: simple bridging, multiport
bridging, learning or transparent bridging.
(Wekipedia, n.d.)
Page 44
Figure 26:Bride

10. Wireless devices


➢ Wireless communication is the transfer of information or power between two or more points
that are not connected by an electrical conductor. The most common wireless technologies
use radio waves. With radio waves distances can be short, such as a few meters
for Bluetooth or as far as millions of kilometers for deep-space radio communications. It
encompasses various types of fixed, mobile, and portable applications, including two-way
radios, cellular telephones, personal digital assistants (PDAs), and wireless networking. Other
examples of applications of radio wireless technology include GPS units, garage door
openers, wireless computer mouse, keyboards and headsets, headphones, radio
receivers, satellite television, broadcast television and cordless telephones. Somewhat less
common methods of achieving wireless communications include the use of
other electromagnetic wireless technologies, such as light, magnetic, or electric fields or the
use of sound.
(Wekipedia, n.d.)

Page 45
Figure 27:Wireless devices

11. Access point (wireless/wired)


➢ In computer networking, a wireless access point (WAP), or more generally just access
point (AP), is a networking hardware device that allows other Wi-Fi devices to connect to a
wired network. The AP usually connects to a router (via a wired network) as a standalone
device, but it can also be an integral component of the router itself. An AP is differentiated
from a hotspot, which is the physical location where Wi-Fi access to a WLAN is available
(Wekipedia, n.d.)

Page 46
Figure 28: Wireless access point vs. wireless router

12. Content filter


➢ In the most general sense, content filtering includes the use of a program to avoid access to
certain products that may be dangerous if opened or accessed. The most popular filter
products are executables, emails or websites. Content filters can be introduced either as
software or through a hardware-based solution.
➢ Content filtering works by combining character strings. The contents are not permitted to pass
when the strings match. Filters of content are often component of Internet firewalls. In such
use, content filtering serves a safety objective, but content filtering is also used to enforce
business policies linked to the use of the information system.
➢ For instance, websites containing pornographic materials or social networking sites that are
unrelated to job are commonly filtered.

Page 47
Figure 29: Content filter
13. Load balancer:

➢ In computing, load balancing improves the distribution of workloads across multiple computing
resources, such as computers, a computer cluster, network links, central processing units, or disk
drives.[1] Load balancing aims to optimize resource use, maximize throughput, minimize response
time, and avoid overload of any single resource. Using multiple components with load balancing
instead of a single component may increase reliability and availability through redundancy. Load
balancing usually involves dedicated software or hardware, such as a multilayer switch or
a Domain Name System server process.
➢ Load balancing differs from channel bonding in that load balancing divides traffic between
network interfaces on a network socket (OSI model layer 4) basis, while channel bonding implies
a division of traffic between physical interfaces at a lower level, either per packet (OSI model
Layer 3) or on a data link (OSI model Layer 2) basis with a protocol like shortest path bridging.
• Maximize Uptime
• Flexible datacenter help in expanding
• Increased security for Datacenter
(Wekipedia, n.d.)

Page 48
Figure 30: Load Balancer

14. Modem

➢ A modem (portmanteau of modulator-demodulator) is a hardware device that converts data


into a format suitable for a transmission medium so that it can be transmitted from computer to
computer (historically over telephone wires). A modem modulates one or more carrier
wave signals to encode digital information for transmission and demodulates signals to decode
the transmitted information. The goal is to produce a signal that can be transmitted easily and
decoded reliably to reproduce the original digital data. Modems can be used with almost any
means of transmitting analog signals from light-emitting diodes to radio. A common type of
modem is one that turns the digital data of a computer into modulated electrical signal for
transmission over telephone lines and demodulated by another modem at the receiver side to
recover the digital data.
(Anon., n.d.)
➢ Modems are generally classified by the maximum amount of data they can send in a given unit
of time, usually expressed in bits per second (symbol bit(s), sometimes abbreviated "bps") or
rarely in bytes per second (symbol B(s)). Modems can also be classified by their symbol rate,
measured in baud
➢ A digital signal from a computer to the Modem, is transformed by a Modem to a similar signal
to be able to pass through the Voice network. This signal to the Modem at point B is changed
backwards to the digital signal inserted into the computer at B
➢ Basic mechanism techniques:

Page 49
• Amplitude modification Modulation (Amplitude Modulation)
• Phase Modulation
• Frequency Modulation
➢ There are so many modern modems from Low: 300, 600, 1200, 2400bit/s to type 9600,
14400, 28800, 56600 bits/s. With a relatively high transfer speed on a narrow edge should
require complex mechanisms
➢ A fundamental feature of the modem is that it can be prepared and solved to deliver signals
that carry confidence in line signals that can be transmitted further into the WAN connection.
The process of processing may be numeric or similar, so the Router can not do otherwise
insert the dedicated card. The Modem does not have a high-end routing function, not
configure the routing protocol, as well as many other features of the router, only connect to
the ISP and make gateway for your network connected out.

Figure 31: Modem


15. Packet shaper

➢ Shape Pack, also known as network traffic QoS (service quality), is a key factor for managing and
optimizing your network bandwidth and application performance.

➢ Among network optimizers, Packet Shaper offers a unique set of possibilities that differ from the
rest of the package:
• Identify all company, cloud and application traffic clearly.

Page 50
• Simple and easy-to-deploy QoS policies for managing network and application traffic.
• Ensure bandwidth and priorities for important applications.

• Limit interruptions to traffic to minimize impact on critical applications.

• Application performance management with patented TCP Rate Control Technology.

➢ For all your WAN and Internet performance optimization requirements, the Packet Shaper
provides highly scalable platforms. It provides the scalability and efficiency you need from a
bandwidth shaper in today's challenging business network environment with a capability varying
from 10Mbps to 10Gbps.

Figure 32: Packet Shaper and Flow Directions

16. Gateway:

➢ Gateway allows you to concatenate two types of protocols together. For example, your network
uses an IP protocol and someone's network uses the IPX, Novell, DECnet, SNA protocols... Or a
protocol, Gateway will convert from one protocol to another.
➢ Through Gateway, computers in networks that use different protocols can easily "talk" to each
other. Gateway not only differentiate protocols but also can distinguish applications as you move
email from one network to another, convert a remote session...

➢ Function of Gateway in the IP network [01/06/2015]

• The function connects the call control protocols.


• Signal end functionality from the channel switches: coordinates work with the signaling
functions of the Voice channel control Gateway.
Page 51
• Signaling function: Signal switching between an IP network with the non-coordinated
channel switching network signal that works with the Gateway voice Transmission control.
• Function network Interface Switching packets: The last network switching packet Switches.
• Management function: Communication with network management system.
• Write functionality use newsletters: Identify or record information about events (access,
warnings) and resources.

• The reporting newsletter function uses: reports the newsletters that have been used to
peripheral devices.

17. VPN concentrator bridges:


➢ A virtual private network (VPN) extends a private network across a public network, and enables
users to send and receive data across shared or public networks as if their computing devices
were directly connected to the private network. Applications running on a computing device,
e.g. a laptop, desktop, smartphone, across a VPN may therefore benefit from the functionality,
security, and management of the private network. Encryption is a common though not an
inherent part of a VPN connection
➢ VPN technology was developed to allow remote users and branch offices to access corporate
applications and resources. To ensure security, the private network connection is established

Figure 33: Gateway

Figure 34:Virtual Private Networks (VPN)


using an encrypted layered tunneling protocol and VPN users use authentication methods,
including passwords or certificates, to gain access to the VPN. In other applications, Internet
users may secure their connections with a VPN, to circumvent geo-restrictions and censorship,
or to connect to proxy servers to protect personal identity and location to stay anonymous on the
Internet. However, some websites block access to known VPN technology to prevent the
circumvention of their geo-restrictions, and many VPN providers have been developing
strategies to get around these roadblocks.
Page 52
B. Server types

➢ What is a server?

• In computing, a server is a computer program or a device that provides functionality for other
programs or devices, called "clients". This architecture is called the client–server model, and a
single overall computation is distributed across multiple processes or devices. Servers can
provide various functionalities, often called "services", such as sharing data
or resources among multiple clients, or performing computation for a client. A single server
can serve multiple clients, and a single client can use multiple servers. A client process may
run on the same device or may connect over a network to a server on a different
device. Typical servers are database servers, file servers, mail servers, print servers, web
servers, game servers, and application servers. (Wekipedia, n.d.)

• Client–server systems are today most frequently implemented by (and often identified with)
the request–response model: a client sends a request to the server, which performs some
action and sends a response back to the client, typically with a result or acknowledgement.
Designating a computer as "server-class hardware" implies that it is specialized for running
servers on it. This often implies that it is more powerful and reliable than standard personal
computers, but alternatively, large computing clusters may be composed of many relatively
simple, replaceable server components.

Figure 35: Server

➢ Types of servers?
Page 53
1. Web: WEBSITE (translated as "website"), also called website, is a collection of subsites,
including text, images, video, Flash etc. The WEBSITE is only in a domain or subdomain
hosted on the Internet's World Wide streaming servers. The Website was invented and put
into use around 1990, 1991 by British Academy's academician Tim Berners-Lee and Robert
Caillou (Belgium) at CERN, Geneva, Switzerland.

2. File: The file in Vietnamese means file, the file is a set of types of data generated by the user
from the computer. Files that make it easy and simple for PC users to store data.

➢ Files are named and stored on a lot of different media such as hard disks, floppy disks, CDs,
DVDs, USB sticks...

3. Database: A database is a set of data arranged to access, manage and update it readily.
Computer databases typically comprise aggregations of data records or files that contain sales
transaction information or customer-specific interactions

➢ The database manager typically allows users to control read / write access, specify report generation,
and evaluate usage. Some databases provide compliance with ACID (atomicity, consistency,
isolation, and durability) to ensure continuous information and full transactions.

4. Combination: The combination network is one of the coding theory's easiest and most
insightful networks. For this network, the vector network coding solutions and some of its sub-
networks are reviewed. An upper limit of the number of nodes in the network is obtained for a
fixed alphabet size of a vector network coding solution. This bound is an MDS bound over a
finite field for subspaces. A combination network sub-network family is described

5. Virtualization: Virtualization is the method of operating a virtual example of a computer


system in a layer abstracted from the hardware. Most frequently, this relates to running various
operating systems on a computer system concurrently. Apps running on the top of the
virtualized machine may appear as if they are on their own dedicated machine, where the
operating system, libraries, and other programs are unique to the host virtualized system and
unconnected to the host operating system that is located below it.

6. Terminal services servers: The terminal server is a server or network device that allows links
to various client devices to be connected to a LAN network without using a modem or a
network interface. Microsoft has implemented this idea by releasing terminal services as part
of the Windows Server operating system. Terminal services have been an integral part of
Windows Server OS editions, starting with Windows NT 4.0. With the release of Windows
Server 2008 R2, terminal services have been renamed Remote Desktop Services (RDS). It is
essential to understand what a terminal server is and why you should use one before applying
this technology.

P4. Discuss the inter-dependence of workstation hardware with relevant networking software

A. Workstation hardware

Page 54
➢ What is workstation?

• Workstation (WS) is a computer devoted to a user or group of users involved in company or


professional activities. It involves one or more high-resolution displays and a quicker processor
than a personal computer (PC). Workstations also have a higher multitasking capability due to
extra random access memory (RAM), drive and drive ability. Workstations may also have
higher-speed graphics adapters and more linked peripherals. (Wekipedia, n.d.)

➢ The minimum hardware specification: NIC, mainboard, CPU, Memory, storage devices. You might
talk about other devices

1. NIC:
• Definition: A network interface controller (NIC, also known as a network interface
card, network adapter, LAN adapter or physical network interface, and by similar terms) is
a computer hardware component that connects a computer to a computer network. Early
network interface controllers were commonly implemented on expansion cards that plugged
into a computer bus. The low cost and ubiquity of the Ethernetstandard means that most
newer computers have a network interface built into the motherboard.
• Purpose: helping a communication among computers or laptops on the same local area
network (LAN) and large-scale network communications through routable protocols.
• Types/Categories: Ethernet and wireless
• Features/functions: The computer utilizes a network interface card (NIC) to link to the
network. The NIC regulates the wired and wireless connection of a laptop to exchange
data with other pcs and the Internet.
• Some manufacturers: Intel, etc,
• Criteria to select a device: Depending on the intended use of people, they may choose the
appropriate equipment: Ethernet and wireless

Page 55
• Images:

Figure 36 Network Interface Cards:

2. CPU:
• Definition: Abbreviated CPU of Central processing Unit (English), the translation is the central
processor, which is the electronic circuit in a computer, performs the command of the computer
program by performing the numerology calculations, logic, comparison, and basic input/output
data (I/O) activities that are specified by the script. The term has been used in the computing
industry since the early 1960. [1] Traditionally, the term "CPU" indicates a processor, namely
its Control Unit, which is distinguished from other core elements of an external computer such
as memory and export/data import control circuits.

• Purpose: To control commands and information flow to and from other components of the
computer, the CPU depends strongly on a chipset, a group of microchips situated on the
motherboard.

• Types/ Categories: arithmetic logic unit and control unit.

• Features/ Functions: CPU is considered the brain of both computer truss, which handles all
information and data entered on the computer. Help your computer to operate and process and
handle all required tasks

• Some manufacturers: CPU of intel, CPU of AMD, IBM, Fujitsu.

Page 56
• Criteria to select a device:

- Choice of source computer with large fan.

- Ensure a large 12v transmission line.

- Select a loose or wired power cable.

- Choice of power supply brand.

• Images:

Figure 37:Central Processing Unit (CPU)


3. Memory:

• Definition: Any physical device capable of storing data momentarily, such as RAM
(random access memory) or permanently, such as ROM (read-only memory). Memory
devices use embedded circuits and are used by operating systems, software and
hardware.

• Purpose: making a computer a place to quickly access data.

• Types/ Categories: RAM and ROM

• Features/ Functions: to store data


• Some manufacturers: AMAX Information Technologies, , APEVIA, etc.

4. Mainboard:

Page 57
• Definition: Mainboard (abbreviated as Main), also known as the motherboard, is a division
that has a power distribution effect and creates a link between the components of the device
together. Mainboard is often called with common names such as MB, motherboard, MOBD,
backplane board, Base board, main circuit board, planar board, System board or most recently
in Apple devices called Logic board.
• Purpose: Help distribute power supply to the components in the computer system Works in
the Most efficient way.
• Types/ Categories: North Bridge và South Bridge, North Bridge
• Features/ Functions: The main circuit is to link all components and peripherals into a unified
computer. Control the speed and path of the data stream between devices. Voltage control
provides for dead or removable plug-in components on the Mainboard.
• Some manufacturers: MSI, ASUS, Gigabyte
• Criteria to select a device: Choose Mainboard by performance criteria and pricing.
• Images.

Page 58
Figure 38:Mainboard MSI X299 SLI

B. Networking software

➢ Functions of Network Software

• Helps set up and install computer networks

• Allows users to seamlessly access network resources

• Allow administrations to add or remove users from the network.

• Helps identify data storage sites and enables users to access that information.

• Helps administrators and safety systems to safeguard the network from data breach,
unauthorized access and network assaults.

➢ The minimum networking software you mention: OS (including desktop version and server
version), drivers, applications:
1. OS (including desktop version and server version):

Page 59
• Definition: The operating system is a software, running on multiple hardware platforms:
PC, laptop, smart watch. The original computer will not have the operating system, users
will have to select and install an operating system to use the computer. The operating
system is in the hard drive (HDD or SSD) of the computer.
• Purpose: Every general-purpose computer must have an operating system to run other
programs and applications.
• Characteristic: Operating systems differ according to the three primary characteristics
of licensing, software compatibility and complexity.
- Licensing
- Software Compatibility
- Complexity
• Categories/Types:
- Windows applications (also called 'Desktop applications')
- Web Applications
- Web Services
- Console applications
• Function:
- Management process (process Management).
- Memory management (memory management).
- HDD management (storage Management).
- External memory management (such as USB, external HDD) for users quick
and convenient approach.
2. Drivers:
• Definition: Computer Driver is a software support (application) to hardware the
computer's interaction is with the operating system. Means that the driver is an
environment that helps the operating system interact with the computer's hardware.
• Purpose: to provide abstraction by acting as a translator between a hardware device and
the applications or operating systems that use it.
• + Categories/Types:
- Hardware drivers
- Virtual Device drivers
• Characteristic: Computer driver makes translator to pass between operating system
and hardware. If you do not install the driver or install the driver but it is not true to the
device you are using, your operating system is not contacted, do not recognize the
devices from the hardware, so that the hardware is not usable.
• Function: Allows the operating system of your computer to run a particular piece of
hardware

3. Applications:
• Definition: Software intended to conduct a set of coordinated functions, duties or
operations for the advantage of the user.

Page 60
• Purpose: It can be used for a multitude of duties.

• Categories/Types:
- Web Applications
- Web Services
- Console applications
• Characteristic:

- Highly interactive and has many functions such as: Upload file, post information,
export report....
- -Web app is created by HTML and code at back end: PHP, C#, Java, ...
- The Web application is used to perform a task or a function of a particular
application.
- Web app requires great governance and high difficulty.
- Must build a unique database and system analysis.
• Function:
- Managing information
- Manipulating data
C. Discuss the inter-dependence of workstation hardware with relevant networking software

➢ Hardware: So, hardware is the physical and tangible elements of a computer. I.e. we can
describe hardware as parts that can be viewed and touched. Thus, peripherals are equipment that
surround the system unit. The keyboard, mouse, speakers, printers, monitors, etc. are, for
instance, peripherals.
➢ Software: Computer software is collection of well-written instructions or programs written in
distinct programming languages such as JAVA, C++, Python, etc.
➢ These primary hardware parts of the computer work alongside the software system to make
calculations, to organize information and, in addition, to connect to different computers. The
hardware parts of the computer are therefore operated and regulated with the assistance of the
software. This is the fundamental link between hardware and software.

➢ The "inter-dependence" among HW & SW:


• Both hardware and software are interdependent. Each of them should work together to
make a computer that produces a useful output.
• The software can not be used if no hardware unit is supported.
• If no proper instructions are given, the hardware can not be used and is ineffective.
• In order for the chosen work to be performed on the PC, the appropriate software
package must be loaded into the hardware.
• Hardware could have been a former cost.
• Software development is extremely expensive and could be a ongoing cost.
• You can load a distinct software package on your hardware to run completely distinct
employment.
Page 61
• The software functions as an associated interface between the user and therefore the
hardware.
• We can tell that hardware and software are the core and soul of a digital computer.

P5. Design a networked system to meet a given specification:

• Introduction:
A. Analysis
➢ According to the given data, I have analyzed the following:
1. Number of people:
200 students.
15 teachers.
2 marketing and administration staff.
5 higher managers including the head of academics and the program manager
3 computer network administrators
2. Resources have given:
50 student lab computers.
35 staff computers.
3 printers
3. Building: 3 floors, all computers, and printers are on the ground floor apart from the IT
labs – one lab located on the first floor and another located on the second floor.
➢ Amount and price of additional equipment needed.
B. Option 1:
1) Quantity and product name:
a. 1 Server (HP Micro Server Gen10 Tower Server for Business, AMD Opteron X3421 up
to 3.4GHz, 16GB RAM, 4TB SATA, RAID, 3 Years Warranty)

Figure 39: Server

Page 62
b. 2 Switch IT Lab: NETGEAR 48-Port Gigabit Ethernet Unmanaged Switch (GS348) -
Desktop/Rackmount, Fan less Housing for Quiet Operation

Figure 40: Switch IT Lab

c. 8 access point (Ubiquiti UAP-AC-M-PRO-US Uni Fi AC MESH Pro 802.11AC


Wireless Access Point (3-Pack)

Figure 41: Access Point

d. Ethernet cable: depending on the size of the design room

e. 1 Multilayer Switch: Switch Cisco 24-port SG350X-24P-K9

Page 63
Figure 42:Multilayer Switch

f. 6 Switch: NETGEAR 16-Port Gigabit Ethernet Unmanaged Switch (GS316) - Desktop,


Fan less Housing for Quiet Operation

Figure 43: Switch

Page 64
g. 3 Router: NETGEAR Nighthawk Smart Wi-Fi Router (R6900P) - AC1900 Wireless
Speed (up to 1900 Mbps) | Up to 1800 ft Coverage & 30 Devices | 4 x 1G Ethernet and 1
x 3.0 USB Ports | Armor Security

Figure 44: Router

2) Price
• Server: $625*1=$625
• Switch IT Lap: $110*2= $220
• access point: $237*8= $1896
• Multilayer Switch: $1200*1= $1200
• Router: $158*3= $474

Total: $4.415

C. Option 2:
➢ Similar to option 1, however, we can choose cheaper devices
• Server: $425*1=$425
• Switch IT Lap: $80*2= 160$

Page 65
• access point: $169*8= $1352
• Multilayer Switch: $900*1= $900
• Router: $92*3= $276
Total: $3113
3) Place of purchase:
• https://www.amazon.com/HP-MicroServer-Business-Opteron-
Warranty/dp/B07T7KY9QS/ref=sr_1_3?keywords=server&qid=1568219774&s=gat
eway&sr=8-3
• https://www.amazon.com/Ubiquiti-UAP-AC-M-PRO-US-802-11AC-Wireless-
Access/dp/B07RPNP4JC/ref=sr_1_21?keywords=access%2Bpoint&qid=156821995
8&s=gateway&sr=8-21&th=1
• https://www.amazon.com/dp/B071KWTT8N?aaxitk=osPYDnNgAO-
gaAz1F138pw&pd_rd_i=B07PFYM5MZ&pf_rd_p=44fc3e0f-4b9e-4ed8-b33b-
363a7257163d&hsa_cr_id=4389511700601&sb-ci-n=asinImage&sb-ci-
v=https%3A%2F%2Fround-lake.dustinice.workers.dev%3A443%2Fhttps%2Fm.media-
amazon.com%2Fimages%2FI%2F71LaM9tIWFL.jpg&sb-ci-
a=B07PFYM5MZ&th=1
• https://www.amazon.com/NETGEAR-Unmanaged-Rackmount-Lifetime-
Protection/dp/B07DNT7JCT?ref_=ast_sto_dp&th=1
• https://www.amazon.com/NETGEAR-Nighthawk-MU-MIMO-Parental-
Controls/dp/B0192911RA/ref=sxin_0_ac_d_pm?ac_md=4-2-
QWJvdmUgJDEwMA%3D%3D-
ac_d_pm&keywords=Router&pd_rd_i=B07C65K9H9&pd_rd_r=3380021c-3700-
49cd-ac8b-
d31724d73387&pd_rd_w=eLzYl&pd_rd_wg=wvKs8&pf_rd_p=eeff02d5-070a-
45ea-a79e-
d591974b877e&pf_rd_r=S60SC7X7XJ5DKZPQCH09&qid=1568220819&s=gatew
ay&th=1
➢ AS DESIGN, WE HAVE 3 FLOOR AND 14 ROOMS:

Page 66
- FLOOR 1 INCLUDES: Network room, Teacher room, Higher management room, Staff room

Figure 45:Floor 1

- FLOOR 2 INCLUDES: IT-Lab Room, 3 class room.

Figure 46: Floor 2

- FLOOR 3 INCLUDES: IT-Lab Room, 3 class room.

Page 67
Figure 47: Floor 3

P6: Test and evaluate the design to meet the requirements and analyses user feedback

➢ The requirements and analysis user feedback


• At the user's discretion the high price devices will be less costly maintenance, fast transmission
network fast connection, reasonable cost stable transmission
• Set a password to the router, Multilayer Switch to boost safety, or you can add a firewall system
to prevent some malware from affecting your computer and system.
• You can add 1 or more additional servers to prevent the primary server issue. This will, however,
incur an extra fee.
• Installation of extra wireless router for rooms on the ground floor;
• You can add 1 or several extra servers to avoid the main server problem. However, this
• will incur an additional fee.
• Can replace the first and second-floor routers with Switch to reduce costs
User Feedback Low Medium Good
Security level security X
LAN connection speed X
Installation costs X

➢ Hardware and software equipment maintenance schedule:


• For software equipment, it is recommended to check regularly to ensure the system is stable.
Check security level to avoid information leakage.
• For hardware equipment, it is recommended to clean and check the cable wear and tear to avoid
damage to the connection wires caused by environmental and animal agents
➢ Result:

Page 68
• Using option 1 is better than option2 because it helps you to have better network connection and
faster network speed. Besides low maintenance costs and good quality. You can choose options
depending on the price, however option 1 will be the best

P7: Implement a networked system based on a prepared design.

A. Dividing and installing equipment:


➢ Ground floor:
• Network Room:
- 1 Multilayer Switch.
- 1 Server.
- 1 Router.
- 1 Switch
- 3 computers for computer network administrators

Figure 48: Ground Floor

• Staff Room:
- 12 computers for Staff.
- 1 printer
- 1 Switch

Page 69
Figure 49: Staff Room

• Higher manager Room:


- 5 computers for Higher manager
- 1 Switch.
- 1 printer.

Figure 50: Higher manager Room

Page 70
• Teacher Room:
- 15 computers for Teacher.
- 1 Switch.
- 1 printer.

Figure 51: Teacher Room


➢ 1st Floor:
• IT lad:
- 25 computers
- 1 switch
- 1 router
• Class room
- divide equally among three classrooms (25 computers for Students in the
IT lab)
- 4 Access point
➢ 2 Floor
nd

• Similar to the rooms on the first floor:


- 25 computers in the IT lab
- 1 router
- 1 switch
• Class room
▪ 4 Access point
B. Connect devices and configure Lan
➢ Connect devices:
1. Ground floor:
▪ Step one: Connect Server, Router and Switch to multilayer switch.
▪ Step two: Connect Network administrator 6 PC to Network Switch.
Page 71
• Teachers room:
▪ Connect 15 Teachers-PC and Printer to Switch.
▪ Connect switch to router
• Higher manager room:
▪ Connect 5 PC with Switch.
▪ Connect Higher manager Switch to Router
• Staff room:
▪ Connect 12 Staff-PC and Printer to Switch.
▪ Connect Staffroom-Switch to Router.

Figure 52: Ground Floor

2. 1st Floor:
▪ Connect 25 PC for IT Lab to Switch for IT lad.
▪ Connect Switch IT lad- and 2 Access point to Switch.
▪ Connect Switch 1st Floor to Router 1st Floor
▪ Connect Router 1st Floor to multilayer switch (The Multilayer Switch is located
in the Network room).

Page 72
Figure 53:1st Floor
3. 2nd Floor
▪ Connect 25 Students-PC for IT Lab to Switch IT lad.
▪ Connect Switch IT lad-F02 and 4 Access point to Switch 2nd Floor.
▪ Connect Switch 2nd Floor to Multilayer Switch (The Multilayer Switch is located
in the Network room).

➢ configure Lan
• VlAN simulation for each object

LAN IP Address Default DNS Server Subnet Mask User object


Gateway

Vlan10 192.168.10.0 192.168.1.1 192.168.1.10 255.255.255.0 computer


network
administrators
Vlan20 192.168.20.0 192.168.2.1 192.168.1.10 255.255.255.0 Teacher

Page 73
Vlan30 192.168.30.0 192.168.3.1 192.168.1.10 255.255.255.0 Higher
managers

Vlan40 192.168.40.0 192.168.4.1 192.168.1.10 255.255.255.0 Staff

Vlan50 192.168.50.0 192.168.5.1 192.168.1.10 255.255.255.0 Student

Vlan60 192.168.60.0 192.168.6.1 192.168.1.10 255.255.255.0 Student

➢ Set the IP configuration and DHCP for Server

• Set the IP configuration :

Figure 54:Set the configuration

Page 74
• Configure settings for Lan:
▪ Set “Sever Pool” in services for Server.

Figure 55: Set Server Pool

• Add VLAN in Multilayer Switch.

Page 75
Figure 56: Add VLAN in multilayer

➢ Set the IP interface for each VLAN on the Multilayer Switch and router:
• Click on Multilayer Switch, Router => click select CLI.
• Enter the command Enable=> configure terminal => Vlad interface ... => IP address \
=> IP helper-address
• Set from VLAN 10 to VLAN
• 50.

Page 76
• The rest do the same with the Router.

Figure 57: Set Interface VLAN

➢ Set the IP VLAN on the Switch:


• Do the same with the Multilayer Switch. After
▪ Higher managers room: VLAN 20
▪ Teacher room: VLAN 30
▪ Staff room: VLAN 40
▪ Network room: VLAN 10
▪ IT lad room 1st: VLAN 50
▪ IT lad room 2nd: VLAN 60
P8: Document and analyses test results against expected results.
▪ Provide a document showing configuration. For example: you provide all information about a PC: IP
address, netmask, gateway …..
▪ Setting on server about each Vlan with default gateway for PCs in its Vlan.
Page 77
LAN IP Address Default DNS Server Subnet Mask User object
Gateway

Vlan10 192.168.10.0 192.168.1.1 192.168.1.10 255.255.255.0 computer


network
administrators
Vlan20 192.168.20.0 192.168.2.1 192.168.1.10 255.255.255.0 Teacher

Vlan30 192.168.30.0 192.168.3.1 192.168.1.10 255.255.255.0 Higher


managers

Vlan40 192.168.40.0 192.168.4.1 192.168.1.10 255.255.255.0 Staff

Vlan50 192.168.50.0 192.168.5.1 192.168.1.10 255.255.255.0 Student

Vlan60 192.168.60.0 192.168.6.1 192.168.1.10 255.255.255.0 Student

Page 78
Figure 59:DHCP of Server
▪ Setting for Multiplayer Switch for each Vlan in network.

Figure 58:Multilayer Switch0

Page 79
1. Document and analysis test results.
• Click on PC, click Desktop = > click Prompt.
• Use the command "ipconfig" to verify the machine data.
• Use the command "ping" to test the machine link on the same LAN and server.

Figure 60: Check the result


2. Service setup steps.
➢ DNS Server and Email.
• DNS Server:
▪ Click on Servers => click select DNS
▪ Then enter The Name and Address of the servers of threes
▪ Then ADD it
Page 80
Figure 61: Add Resource Records

• Check Web Brower

Figure 62:Check Web Brower

Page 81
• Email.
▪ Click on Server0, click Services= > click Email.
▪ Enter Domain Name after Set
▪ Come User Setup => input User and Password

Figure 63: Add Email

• Add User Information

Page 82
▪ After click on PC => click Desktop=> click Email=> Configure mail and Add
information in computer.

Figure 64: Add User Information


➢ Check Email Server

Figure 65: Check Email Servers

Page 83
➢ FTP
• Click Server=>click Desktop => Click Services=> Click FTP.
• Input User Name and Password.

Figure 66: FTP

➢ Check FTP in PC

Page 84
• Maximum number of users allowed to access:
The only people who are allowed to access the system are Addmin

Contents
ASSIGNMENT FRONT SHEET ...........................................................................................................................1

ASSIGNMENT BRIEF SHEET.............................................................................................................................4


• BUS TOPOLOGY : BUS TOPOLOGY IS A TYPE OF NETWORK WHERE EVERY DEVICE IS CONNECTED TO A SINGLE CABLE WHICH RUNS FROM
ONE END OF THE NETWORK TO THE OTHER. THIS TYPE OF TYPE OF TOPOLOGY IS OFTEN REFERRED TO AS LINE TOPOLOGY. IN A BUS
TOPOLOGY, DATA IS TRANSMITTED IN ONE DIRECTION ONLY. IF THE BUS TOPOLOGY HAS TWO ENDPOINTS THEN IT IS REFERRED TO AS
A LINEAR BUS TOPOLOGY. SMALLER NETWORKS WITH THIS TYPE OF TOPOLOGY WILL GENERALLY USE AN RJ45 CABLE TO LINK DEVICES
TOGETHER. (KEARY, N.D.) .......................................................................................................................................... 20
➢ ADVANTAGES: THERE ARE A NUMBER OF REASONS WHY IN SMALLER NETWORKS, BUS TOPOLOGIES ARE USED. ONE
OF THE PRIMARY FACTORS IS THE SIMPLICITY OF THE DESIGN. ALL DEVICES ARE LINKED TO A SINGLE CABLE TO
PREVENT YOU FROM MANAGING A COMPLICATED TOPOLOGICAL CONFIGURATION. THE DESIGN ALSO HELPS TO CREATE
COST-EFFECTIVE BUS TOPOLOGIES BECAUSE THEY CAN BE OPERATED WITH A SINGLE CABLE. IF YOU NEED TO ADD
MORE EQUIPMENT THEN YOU. ............................................................................................................................................ 20
Figure 67: Check FTP in PC
• RING TOPOLOGY : A RING TOPOLOGY IS A NETWORK CONFIGURATION IN WHICH DEVICE CONNECTIONS CREATE A
CIRCULAR DATA PATH. EACH NETWORKED DEVICE IS CONNECTED TO TWO OTHERS, LIKE POINTS ON A CIRCLE. TOGETHER, DEVICES IN A
RING TOPOLOGY ARE REFERRED TO AS A RING NETWORK. (KEARY, N.D.) ................................................................................ 21
➢ ADVANTAGES : CABLE FAULTS ARE EASILY LOCATED, MAKING TROUBLESHOOTING EASIER AND RING NETWORKS ARE MODERATELY
EASY TO INSTALL ....................................................................................................................................................... 21

Page 85
➢ DISADVANTAGES : EXPANSION TO THE NETWORK CAN CAUSE NETWORK DISRUPTION AND A SINGLE BREAK IN THE CABLE CAN DISRUPT
THE ENTIRE NETWORK ................................................................................................................................................ 21
............................................................................................................................................................................. 22
➢ MESH TOPOLOGY: A MESH TOPOLOGY IS A POINT-TO-POINT CONNECTION WHERE NODES ARE INTERCONNECTED. IN THIS FORM OF
TOPOLOGY, DATA IS TRANSMITTED VIA TWO METHODS: ROUTING AND FLOODING. ROUTING IS WHERE NODES USE ROUTING LOGIC TO
WORK OUT THE SHORTEST DISTANCE TO THE PACKET’S DESTINATION. IN CONTRAST FLOODING, DATA IS SENT TO ALL NODES WITHIN THE
NETWORK. FLOODING DOESN’T REQUIRE ANY FORM OF ROUTING LOGIC TO WORK. THERE ARE TWO FORMS OF MESH TOPOLOGY: PARTIAL
MESH TOPOLOGY AND FULL MESH TOPOLOGY. WITH PARTIAL MESH TOPOLOGY, MOST NODES ARE INTERCONNECTED BUT THERE ARE A
FEW WHICH ARE ONLY CONNECTED TO TWO OR THREE OTHER NODES. A FULL MESH TOPOLOGY IS WHERE EVERY NODE IS
INTERCONNECTED. ..................................................................................................................................................... 22
(KEARY, N.D.) ......................................................................................................................................................... 22
➢ ADVANTAGES : FIRST AND FOREMOST, MESH TOPOLOGIES ARE USED BECAUSE THEY ARE RELIABLE. THE NODE INTERCONNECTIVITY
MAKES THEM HIGHLY RESISTANT TO FAILURE. NO SINGLE MACHINE FAILURE COULD BRING THE WHOLE NETWORK DOWN. ONE OF THE
REASONS WHY THIS IS A COMMON TOPOLOGY OPTION IS THE LACK OF A SINGLE POINT OF FAILURE. ALSO, THIS SETUP IS SAFE FROM
COMPROMISING. SECOND, PROVIDES REDUNDANT PATHS BETWEEN DEVICES AND THE NETWORK CAN BE EXPANDED WITHOUT DISRUPTION
TO CURRENT USES...................................................................................................................................................... 22
➢ DISADVANTAGES: REQUIRES MORE CABLE THAN THE OTHER LAN TOPOLOGIES AND OMPLICATED IMPLEMENTATION ................... 22
............................................................................................................................................................................. 23
➢ TREE TOPOLOGY: A TREE TOPOLOGY IS A NETWORK STRUCTURE THAT IS SHAPED LIKE A TREE WITH ITS MANY BRANCHES. TREE
TOPOLOGIES HAVE A ROOT NODE WHICH IS CONNECTED TO OTHER NODE HIERARCHY. THE HIERARCHY IS PARENT-CHILD WHERE THERE IS
ONLY ONE MUTUAL CONNECTION BETWEEN TWO CONNECTED NODES. AS A GENERAL RULE, A TREE TOPOLOGY NEEDS TO HAVE THREE
LEVELS TO THE HIERARCHY IN ORDER TO BE CLASSIFIED THIS WAY. THIS FORM OF TOPOLOGY IS USED WITHIN WIDE AREA NETWORKS TO
SUSTAIN LOTS OF SPREAD-OUT DEVICES. (KEARY, N.D.) ..................................................................................................... 23
➢ ADVANTAGES; THE MAIN REASON WHY TREE TOPOLOGIES ARE USED IS TO EXTEND BUS AND STAR TOPOLOGIES. UNDER THIS
HIERARCHICAL FORMAT, IT IS EASY TO ADD MORE NODES TO THE NETWORK WHEN YOUR ORGANIZATION GROWS IN SIZE. THIS FORMAT
ALSO LENDS ITSELF WELL TO FINDING ERRORS AND TROUBLESHOOTING BECAUSE YOU CAN CHECK FOR PERFORMANCE ISSUES
SYSTEMATICALLY THROUGH THE TREE VIEW. ..................................................................................................................... 23
➢ DISADVANTAGES: THE ROOT NODE IS THE MOST IMPORTANT WEAKNESS OF TREE TOPOLOGY. IF THE ROOT NODE FAILS, IT WILL
PARTITION ALL OF ITS SUBTREES. THERE WILL STILL BE PARTIAL CONNECTIVITY WITHIN THE NETWORK AMONGST OTHER DEVICES SUCH AS
THE FAILED NODE'S PARENT. MAINTAINING THE NETWORK IS NOT SIMPLE EITHER BECAUSE THE MORE NODES YOU ADD, THE MORE
DIFFICULT IT BECOMES TO MANAGE THE NETWORK. ANOTHER DISADVANTAGE ......................................................................... 23
............................................................................................................................................................................. 24
➢ ABOUT BROADBAND SPEEDS: USUALLY, THE WORD "HIGH BANDWIDTH" SEPARATES QUICKER INTERNET
BROADBAND CONNECTIONS FROM TRADITIONAL DIAL-UP OR CELLULAR NETWORK SPEEDS. DEFINITIONS OF "HIGH"
VERSUS "LOW" BANDWIDTH VARY, AND AS NETWORK TECHNOLOGY IMPROVED, THEY HAVE ALTERED OVER THE YEARS.
THE UNITED STATES IN 2015 THE FEDERAL COMMUNICATIONS COMMISSION (FCC) HAS UPDATED ITS BROADBAND
DEFINITION TO AT LEAST 25 MBPS (WEKIPEDIA, N.D.) ...................................................................................................... 35
➢ TYPES .............................................................................................................................................................. 43
• RADIO REPEATER ......................................................................................................................................................... 44

A. 1 SERVER (HP MICRO SERVER GEN10 TOWER SERVER FOR BUSINESS, AMD OPTERON X3421
UP TO 3.4GHZ, 16GB RAM, 4TB SATA, RAID, 3 YEARS WARRANTY) ........................................................ 62

Page 86
B. 2 SWITCH IT LAB: NETGEAR 48-PORT GIGABIT ETHERNET UNMANAGED SWITCH (GS348) -
DESKTOP/RACKMOUNT, FAN LESS HOUSING FOR QUIET OPERATION ............................................... 63

C. 8 ACCESS POINT (UBIQUITI UAP-AC-M-PRO-US UNI FI AC MESH PRO 802.11AC WIRELESS


ACCESS POINT (3-PACK) ................................................................................................................................. 63

E. 1 MULTILAYER SWITCH: SWITCH CISCO 24-PORT SG350X-24P-K9 ................................................. 63

F. 6 SWITCH: NETGEAR 16-PORT GIGABIT ETHERNET UNMANAGED SWITCH (GS316) - DESKTOP,


FAN LESS HOUSING FOR QUIET OPERATION ............................................................................................ 64

G. 3 ROUTER: NETGEAR NIGHTHAWK SMART WI-FI ROUTER (R6900P) - AC1900 WIRELESS


SPEED (UP TO 1900 MBPS) | UP TO 1800 FT COVERAGE & 30 DEVICES | 4 X 1G ETHERNET AND 1 X 3.0
USB PORTS | ARMOR SECURITY ................................................................................................................... 65

Anon., n.d. Wekipedia. [Online]


Available at: https://en.wikipedia.org/wiki/Network_interface_controller
[Accessed 4 9 2019].

Anon., n.d. Wekipedia. [Online]


Available at: https://en.wikipedia.org/wiki/Modem
[Accessed 1 9 2019].

Ayres, C., n.d. vittana. [Online]


Available at: https://vittana.org/11-advantages-and-disadvantages-of-computer-networking
[Accessed 25 8 2019].

Dictionary, T. M.-W., n.d. Oreilly. [Online]


Available at: https://www.oreilly.com/library/view/packet-guide-to/9781449308094/ch01.html
[Accessed 10 9 2019].

Emberton, N., 1998. Computer Hope. [Online]


Available at: https://www.computerhope.com/jargon/n/network.htm
[Accessed 2019 8 27].

Ictnetworking, n.d. Ictnetworking. [Online]


Available at: http://ictnetworking.vn/cluster-la-
gi.html?fbclid=IwAR1r88eATwK1INilfQRdLSfGadVbh0Q_I3_CupyXqJ2yLLNFJ2mqOZLMIP8
[Accessed 10 9 2019].

KEARY, T., n.d. comparitech. [Online]


Available at: https://www.comparitech.com/net-admin/network-topologies-advantages-disadvantages/
[Accessed 10 9 2019].
Page 87
Kipalog, n.d. Kipalog. [Online]
Available at: https://kipalog.com/posts/Tim-hieu-Centralized-la-gi--Decentralized-la-gi--va-So-sanh-Centralized-va-
Decentralized-Blockchain
[Accessed 10 9 2019].

Vmware, n.d. Vmware. [Online]


Available at: https://www.vmware.com/topics/glossary/content/cloud-
networking?fbclid=IwAR1MLOIPBBcWRhO9rigU38_xHHMlx0cpL5MxPuoTQZtpE6zsdKe5Ull6ggY
[Accessed 10 9 2019].

Wekipedia, n.d. https://en.wikipedia.org/wiki/Server_(computing). [Online]


Available at: https://en.wikipedia.org/wiki/Server_(computing)
[Accessed 1 9 2019].

Wekipedia, n.d. Wekidpedia. [Online]


Available at: https://en.wikipedia.org/wiki/Ethernet_hub
[Accessed 2019 5 9].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://en.wikipedia.org/wiki/Personal_area_network
[Accessed 10 9 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://en.wikipedia.org/wiki/Metropolitan_area_network
[Accessed 9 10 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://en.wikipedia.org/wiki/Wireless_LAN
[Accessed 10 9 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://en.wikipedia.org/wiki/Personal_area_network
[Accessed 10 9 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://vi.wikipedia.org/wiki/M%E1%BA%A1ng_ngang_h%C3%A0ng
[Accessed 10 9 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://en.wikipedia.org/wiki/Communication
[Accessed 10 9 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://en.wikipedia.org/wiki/Virtualization
[Accessed 10 9 2019].

Page 88
Wekipedia, n.d. Wekipedia. [Online]
Available at: https://en.wikipedia.org/wiki/Internet_protocol_suite
[Accessed 10 9 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://en.wikipedia.org/wiki/IEEE_802.1
[Accessed 10 9 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://vi.wikipedia.org/wiki/IEEE_802.3
[Accessed 10 9 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://en.wikipedia.org/wiki/Token_ring
[Accessed 10 9 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://en.wikipedia.org/wiki/IEEE_802.11
[Accessed 10 9 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://en.wikipedia.org/wiki/Network_topology
[Accessed 10 9 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://en.wikipedia.org/wiki/Communication
[Accessed 10 9 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://en.wikipedia.org/wiki/Address_Resolution_Protocol
[Accessed 10 9 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://en.wikipedia.org/wiki/Reverse_Address_Resolution_Protocol
[Accessed 10 9 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://en.wikipedia.org/wiki/Internet_Protocol
[Accessed 9 10 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://en.wikipedia.org/wiki/Transmission_Control_Protocol
[Accessed 10 9 2019].

Page 89
Wekipedia, n.d. Wekipedia. [Online]
Available at: https://en.wikipedia.org/wiki/User_Datagram_Protocol
[Accessed 10 9 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://en.wikipedia.org/wiki/Domain_Name_System
[Accessed 10 9 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol
[Accessed 10 9 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://en.wikipedia.org/wiki/File_Transfer_Protocol
[Accessed 10 9 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://en.wikipedia.org/wiki/Simple_Mail_Transfer_Protocol
[Accessed 10 9 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://en.wikipedia.org/wiki/Post_Office_Protocol
[Accessed 10 9 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://en.wikipedia.org/wiki/Internet_Message_Access_Protocol
[Accessed 9 9 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://vi.wikipedia.org/wiki/B%C4%83ng_th%C3%B4ng
[Accessed 8 9 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://en.wikipedia.org/wiki/Network_interface_controller
[Accessed 7 9 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://en.wikipedia.org/wiki/Router_(computing)
[Accessed 4 9 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://en.wikipedia.org/wiki/Network_switch
[Accessed 1 9 2019].

Page 90
Wekipedia, n.d. Wekipedia. [Online]
Available at: https://en.wikipedia.org/wiki/Multilayer_switch
[Accessed 2 9 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://vi.wikipedia.org/wiki/T%C6%B0%E1%BB%9Dng_l%E1%BB%ADa
[Accessed 1 9 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://vi.wikipedia.org/wiki/T%C6%B0%E1%BB%9Dng_l%E1%BB%ADa
[Accessed 3 9 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://en.wikipedia.org/wiki/Repeater
[Accessed 10 9 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://en.wikipedia.org/wiki/Bridging_(networking)
[Accessed 29 8 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://en.wikipedia.org/wiki/Wireless
[Accessed 1 9 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://en.wikipedia.org/wiki/Wireless_access_point
[Accessed 1 9 2019].

Wekipedia, n.d. Wekipedia. [Online]


Available at: https://en.wikipedia.org/wiki/Load_balancing_(computing)
[Accessed 1 9 2019].

Wekipedia, n.d. Wikipedia. [Online]


Available at: https://en.wikipedia.org/wiki/Workstation
[Accessed 1 9 2019].

Wikipedia, n.d. Wekipedia. [Online]


Available at: https://vi.wikipedia.org/wiki/Wide_area_network
[Accessed 10 9 2019].

Wikipedia, n.d. Wekipedia. [Online]


[Accessed 10 9 2019].

Page 91

You might also like