0% found this document useful (0 votes)
39 views

Lan Design Implementation For Syntax Solutions

This document provides guidelines and instructions for students completing an assignment on networking for a BTEC Higher National Diploma in Computing course. It includes details on formatting the assignment, academic integrity policies, and a student declaration. The document aims to ensure students submit assignments that meet standards for this higher education course.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views

Lan Design Implementation For Syntax Solutions

This document provides guidelines and instructions for students completing an assignment on networking for a BTEC Higher National Diploma in Computing course. It includes details on formatting the assignment, academic integrity policies, and a student declaration. The document aims to ensure students submit assignments that meet standards for this higher education course.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 94

lOMoARcPSD|18614735

LAN Design Implementation for Syntax Solutions

Principles of Sales (Blue Mountain College)

StuDocu is not sponsored or endorsed by any college or university


Downloaded by Menuka Chanul ([email protected])
lOMoARcPSD|18614735

Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)
INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Programme title BTEC Higher National Diploma in Computing

Assessor Internal
Verifier
Unit 02: Networking
Unit(s)
LAN Design & Implementation for SYNTAX SOLUTIONS
Assignment title

Student’s name
List which assessment Pass Merit Distinction
criteria the Assessor has
awarded.
INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded match


those shown in the assignment brief? Y/N
Is the Pass/Merit/Distinction grade awarded
justified by the assessor’s comments on the Y/N
student work?

Has the work been assessed


Y/N
accurately?
Is the feedback to the student:
Give details:
• Constructive? Y/N
• Linked to relevant assessment Y/N
criteria? Y/N
• Identifying opportunities for
improved performance? Y/N
• Agreeing actions?
Does the assessment decision need
Y/N
amending?

Assessor signature Date

Internal Verifier signature Date


Programme Leader signature (if
required) Date

C.Thanushanth NETWORKING 1

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Confirm action completed


Remedial action taken
Give details:

Assessor signature Date


Internal
Verifier Date
signature
Programme Leader
signature (if Date
required)
Higher Nationals - Summative Assignment Feedback Form

C.Thanushanth NETWORKING 2

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Student Name/ID

Chandrasekar
Thaushanth / TRI/A-
004480
Unit Title Unit 02: Networking

Assignment Number 1 Assessor

Date
Received 1st
submission
Submission Date

Date Received 2nd


submission

Re-submission Date

Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction P1 P2 M1
Descripts

LO2 Explain networking devices and operations.


Pass, Merit & Distinction P3 P4 M2 D1
Descripts

LO3 Design efficient networked systems.


Pass, Merit & Distinction P5 P6 M3 D2
Descripts

C.Thanushanth NETWORKING 3

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

LO4 Implement and diagnose networked systems.


Pass, Merit & Distinction P7 P8 M4 D3
Descripts

Grade: Assessor Signature: Date:

Resubmission Feedback:

Grade: Assessor Signature: Date:

Internal Verifier’s Comments:

Signature & Date:


* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.

Assignment Feedback
Formative Feedback: Assessor to Student

Action Plan

Summative feedback

C.Thanushanth NETWORKING 4

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Feedback: Student to Assessor

Assessor Date
signature

Student Date
signature

Pearson Higher Nationals in


Computing
C.Thanushanth NETWORKING 5

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Unit 02: Networking


Assignment 01

General Guidelines

1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.

2. Attach this brief as the first section of your assignment.

3. All the assignments should be prepared using a word processing software.

4. All the assignments should be printed on A4 sized papers. Use single side printing.

5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.

Word Processing Rules

1. The font size should be 12 point, and should be in the style of Time New Roman.

2. Use 1.5 line spacing. Left justify all paragraphs.

C.Thanushanth NETWORKING 6

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

3. Ensure that all the headings are consistent in terms of the font size and font style.

4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.

5. Use word processing application spell check and grammar check function to help editing your
assignment.

Important Points:

1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body
except for the before mentioned compulsory information will result in rejection of your work.

2. Avoid using page borders in your assignment body.

3. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.

4. Ensure that you give yourself enough time to complete the assignment by the due date.

5. Excuses of any nature will not be accepted for failure to hand in the work on time.

6. You must take responsibility for managing your own time effectively.

7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.

8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .

9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.

10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and a
reference list.

11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course

C.Thanushanth NETWORKING 7

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct form. I further understand what it means to copy
another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of Pearson UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my
own, and where I have made use of another’s work, I will attribute the source in the correct way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Pearson, UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.

[email protected]
Student’s Signature: Date: 15.05.2021
(Provide E-mail ID) (Provide Submission Date)

C.Thanushanth NETWORKING 8

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Higher National Diploma in Computing


Assignment Brief

Student Name /ID Number Chandrasekar Thanushanth (TRI/A-028922)

Unit Number and Title Unit 2: Networking

Academic Year 2021/22

Unit Tutor

Assignment Title LAN Design & Implementation for SYNTAX SOLUTIONS

Issue Date

Submission Date

IV Name & Date

Submission format

The submission should be in the form of an individual report written in a concise, formal business
style using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using
Harvard referencing system. Please also provide an end list of references using the Harvard
referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures,
although you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:

LO1 Examine networking principles and their protocols.

C.Thanushanth NETWORKING 9

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

LO2 Explain networking devices and operations.

LO3 Design efficient networked systems.

LO4 Implement and diagnose networked systems.

Assignment Brief and Guidance:

C.Thanushanth NETWORKING 10

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Scenario

SYNTAX SOLUTIONS is a privately owned, well-known Software company located in Colombo. The
Management of SYNTAX SOLUTIONS has purchased a 3-story building in the heart of Matara. They
are planning to make it one of the state-of-the-art companies in Matara with the latest facilities.

It is expected to have nearly 150 employees in Matara branch.

Department Number of Users

Customer Care 10

Sales and Marketing 20

Finance 25

Legal 5

HR 10

Developers 55

Network Team 5

Server Room Servers +ISP connections

Following requirements are given by the Management.


 A ll the depa rt ment s must be separated w ith unique subnet and shou ld not
commu nicate with each ot her unless there is a s pecial requirement .

 19 2.168 .1 0.0/24 is given an d sh ou ld b e use d for all the de partm ent s exce pt the
server room . I Ps sh ou ld assign us ing DHCP .

 ERP and CRM Systems ne ed to be imp le mente d in Mata ra branc h in loca l


servers.

 Number of s er vers required for the Ser ver room ne ed to be decide d by the
Network de signe r and sh ou ld be assigne d w it h 10 .2 54.1 .0 /2 4 sub net. (U ses

C.Thanushanth NETWORKING 11

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

static IPs )

 High level of redundancy is ex pecte d in n etwork desig n to e liminate single point


of failu re s and traffic bottle necks.

 Sales and Marketing Tea m nee d to access Network re source s us ing W IFI
connec tivity.

 Proper methods for network ing monitoring and troubleshooting nee d to be


esta blishe d.

 A ll p ossible network security mecha nism s should be imp le mented.

Assu me you have be en app ointed as th e n ew network consultant of SYNTAX SOLU TIONS .
P repa re a n etwork arch itec tural de sign and imp lem ent it wit h your sug gestions an d
re com men dations to me et th e compa ny req uirem ent s.

(Note: Clear ly state your assumptions. You are allowed to design the networ k
accor ding to your assumptions, but main requirements should not be violated)

Activity 01
 D isc uss t he benefits an d const ra int s of different n etwork system type s that can be
imp le mente d in the Matara b ranc h an d the main IEEE Ethe rn et sta ndards that can
be u sed in above LAN an d WLA N design .

 D isc uss t he im portanc e an d im pact of network topologies an d n etwork protocol


suites wh ile comp arin g the main network topologies an d n etwork protocol suites
th at are used in n etwork desig n u sing exa mp le s. Recomme nd su itab le n etwork
topologies and n etwork protocol suites for above sce nario an d justif y your answe r
w ith va lid points.

C.Thanushanth NETWORKING 12

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Activity 02
 Discu ss t he op erating princ ip le s of network dev ice s (Ex : Rou ter, Switc h, Etc .) and
se rve r typ es that can be u sed for above scena rio wh ile exp lorin g different se rve rs
that are ava ilab le in today ’s market with th eir spec ification s. Recomme nd
se rve r/se r vers for the above sce nario and ju stif y you r selection with va lid point s.

 Discu ss t he inte r-de pen denc e of workstation hard wa re w ith networkin g softwa re
and provide examp le s for n etworking soft ware that can be use d in above n etwork
desig n.

Activity 03
 Prepare a written network design plan to meet the above mentioned user
requirements including a blueprint drawn using a modeling tool. (Ex:
Microsoft Visio, EdrawMax).

Support your answer by providing the VLAN and IP subnetting scheme for the
above scenario and the list of devices, network components and software
used to design the network for above scenario and while justif ying your
selections.

 Test and evaluate the proposed design to meet the requirements and analyse
user feedback by using a User feedback form.

 Insta ll and configu re Network ser vices, dev ice s and app lications (E x: VLAN,DHCP,
DNS ,Proxy, Web , Etc.) accord in g to the proposed de sign to accomplish the u ser
req uirem ent s and desig n a detaile d Mainte nance sch edu le for above Network.

* Note: - Screen s hots of Confi guration scripts s hould be pres ented.

C.Thanushanth NETWORKING 13

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Activity 04
 Imp le ment a networked syste m ba se d on your prep are d de sign w ith va lid ev id ence s
and re com men d potentia l fu ture enh ance ment s for th e networke d system wit h va lid
ju stification s to you r recomm endation s. Use c ritica l reflec tion to c ritically eva lu ate
the design , pla n, config uration , and te sting of you r net work while ju stif ying w it h
va lid conc lu sion s.

 Deve lop te st cases and conduc t verification (Ex: P in g , ex ten ded p in g , t race route ,
telnet, SSH, etc. ) to test th e above Network and ana lyse the test results aga inst the
exp ected re su lt s.

C.Thanushanth NETWORKING 14

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Grading Rubric

Grading Criteria Achieved Feedback

LO1 : Examine networking principles and their protocols.

P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Compare common networking principles and how protocols
enable the effectiveness of networked systems.
LO2 : Explain networking devices and operations

P3
Discuss the operating principles of networking devices and
server types.
P4

C.Thanushanth NETWORKING 15

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Discuss the inter-dependence of workstation hardware with


relevant networking software.

M2
Explore a range of server types and justify the selection of a
server, considering a given scenario regarding cost and
performance optimization.
LO 1 & LO2
D1 Critically evaluate the topology protocol selected for a given
scenario to demonstrate the efficient utilisation of a networking
system.
LO3 : Design efficient networked systems

P5
Design a networked system to meet a given specification.
P6
Test and evaluate the design to meet the requirements and
analyze user feedback.
M3
Install and configure network services and applications on your
choice.
D2

C.Thanushanth NETWORKING 16

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Design a maintenance schedule to support the networked


system.
LO4 : Implement and diagnose networked systems

P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D3
Use critical reflection to evaluate own work and justify valid
conclusions.

C.Thanushanth NETWORKING 17

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Table of Contents
Activity 01.....................................................................................................................................23

Network.........................................................................................................................................23

Benefits of network....................................................................................................................23

Types of Networks.........................................................................................................................24

Personal Area Network..............................................................................................................25

Local Area Network...................................................................................................................26

Metropolitan Area Network.......................................................................................................27

Ethernet IEEE 802.....................................................................................................................27

IEEE802Addresses................................................................................................................28

Network topology..........................................................................................................................29

Types of physical topologies......................................................................................................29

Point-to-Point Protocol (PPP)................................................................................................30

Bus Topology.........................................................................................................................31

Star Topology.........................................................................................................................32

Ring Topology.......................................................................................................................33

Mesh Networking..................................................................................................................35

Hybrid Topology....................................................................................................................36

Logical topologies.....................................................................................................................37

Ethernet..................................................................................................................................37

Local Talk..............................................................................................................................38

Token Ring Network..............................................................................................................39

Activity 02.....................................................................................................................................40

Networking Devices..................................................................................................................40

Network Interface Card (NIC)...............................................................................................40

Switch....................................................................................................................................41

Hub (Networking)..................................................................................................................42

C.Thanushanth NETWORKING 18

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Bridge....................................................................................................................................43

Router....................................................................................................................................44

Gateway.................................................................................................................................45

Firewall..................................................................................................................................46

Repeater.................................................................................................................................47

Network Server..........................................................................................................................48

Types of Server......................................................................................................................49

Suitable Protocol About Scenario..............................................................................................50

Internet Protocol....................................................................................................................50

Server Specification and cost analysis.......................................................................................51

Activity 03.....................................................................................................................................52

Network design..........................................................................................................................52

IP address allocation Table........................................................................................................54

Feedback Analysis.................................................................................................................55

Network Configurating..................................................................................................................59

VTP Creation.............................................................................................................................59

VLAN Creation.........................................................................................................................60

DHCP Server.............................................................................................................................63

Server Installation......................................................................................................................64

Network Maintain Schedule..........................................................................................................68

Activity 04.....................................................................................................................................69

Implemented Network...............................................................................................................70

Testing........................................................................................................................................79

Test Plan.....................................................................................................................................80

Test Case....................................................................................................................................81

Future recommendation.............................................................................................................87

Cloud Repatriation.................................................................................................................87

C.Thanushanth NETWORKING 19

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

5G Networking......................................................................................................................87

Edge Computing....................................................................................................................87

Referance.......................................................................................................................................88

C.Thanushanth NETWORKING 20

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Table of Figure
Figure 1 PAN.................................................................................................................................25
Figure 2 LOCAL Area Network....................................................................................................26
Figure 3Metropolitan area network...............................................................................................27
Figure 4 Point to point topology....................................................................................................30
Figure 5 BUS topology..................................................................................................................31
Figure 6 Star Topology..................................................................................................................32
Figure 7 Ring Topology.................................................................................................................34
Figure 8 Mesh Topology................................................................................................................35
Figure 9 Hybrid Topology.............................................................................................................36
Figure 10 Network inetraface card................................................................................................40
Figure 11Network Switch..............................................................................................................41
Figure 12 Hub...............................................................................................................................42
Figure 13 Network Bridge.............................................................................................................43
Figure 14 Router............................................................................................................................44
Figure 15 Network Gateway..........................................................................................................45
Figure 16 Network Firewall...........................................................................................................46
Figure 31 Network Diagram..........................................................................................................53
Figure 32 IP address allocation......................................................................................................54
Figure 33Feedback 1......................................................................................................................55
Figure 34 Feedback 2.....................................................................................................................56
Figure 35 Feedback 3.....................................................................................................................57
Figure 36 VTP Server configuration..............................................................................................59
Figure 37 VTP Client configuration..............................................................................................59
Figure 38VLAN Creation..............................................................................................................60
Figure 39 VLAN Creation.............................................................................................................60
Figure 40 Before assigned vlan.....................................................................................................61
Figure 41 Assigning to VLAN.......................................................................................................61
Figure 42 After Assigned VLAN...................................................................................................62
Figure 43 Assigned ip address to server........................................................................................63
Figure 44 Creating gateway...........................................................................................................63
Figure 45 DHCP Pool....................................................................................................................64
Figure 46 Sesver OS Insatllation...................................................................................................64

C.Thanushanth NETWORKING 21

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Figure 47 Sesver OS Insatllation..................................................................................................65


Figure 48 Sesver OS Insatllation...................................................................................................65
Figure 50 Sesver OS Insatllation..................................................................................................66
Figure 51 Sesver OS Insatllation...................................................................................................66
Figure 52 Sesver OS Insatllation...................................................................................................67
Figure 53 Implemented network....................................................................................................71
Figure 54 Learner Created network implementation.....................................................................72
Figure 55 Learner Created network implementation.....................................................................72
Figure 56 Learner Created network implementation.....................................................................73
Figure 57 Learner Created network implementation.....................................................................73
Figure 58 Learner Created network implementation.....................................................................74
Figure 59 Learner Created network implementation.....................................................................74
Figure 60 Learner Created network implementation.....................................................................75
Figure 61 Learner Created network implementation.....................................................................75
Figure 62 Learner Created network implementation.....................................................................76
Figure 63 Learner Created network implementation.....................................................................76
Figure 64 Learner Created network implementation.....................................................................77
Figure 65 Learner Created network implementation.....................................................................77
Figure 66 Learner Created network implementation.....................................................................78
Figure 67 Learner Created network implementation.....................................................................78

C.Thanushanth NETWORKING 22

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Table of Table
Table 2 Server specification and cost............................................................................................51
Table 3 Feed back..........................................................................................................................58
Table 4 maintanance schedule.......................................................................................................69
Table 5 Test Plan............................................................................................................................80
Table 6 Test Case 1........................................................................................................................81
Table 7 Test Case 2........................................................................................................................81
Table 8 Test Case 2........................................................................................................................83
Table 9 Test Case 3........................................................................................................................84
Table 10 Test case 4.......................................................................................................................84
Table 11 Test Case 5......................................................................................................................86

C.Thanushanth NETWORKING 23

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Activity 01
Discuss the benefits and constraints of different network system types that can be
implemented in the Matara branch and the main IEEE Ethernet standards that can be
used in above LAN and WLAN design.

Network
A computer network, also referred to as a data network, is a series of interconnected that can
transmit, receive and exchange data, voice and video traffic. Network devices use a variety
of protocols and algorithms to specify exactly how endpoints should transmit and receive
data. For example, the Ethernet standard establishes a common language for wired networks
to communicate, and the 802.11 standard does the same for wireless local area networks
(WLANs).
All packet switched networks use TCP/IP to establish a standard means of communication.
Each endpoint in a network has a unique identifier which is used to indicate the source or
destination of the transmission. Identifiers include the node's IP address or Media Access
Control (MAC) address. Endpoint nodes include switches and routers, servers, personal
computers, phones, networked printers and other peripheral computing devices, as well as
sensors and actuators. (Margaret Rouse 2006)

Benefits of network

1. Access flexibility

2. Securing valuable information

3. Utilize a Centralized Database

4. Improving storage efficiency and volume

5. File sharing

6. Resource sharing

7. Reduce errors and improve consistency

C.Thanushanth NETWORKING 24

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Types of Networks
There are several different types of computer networks. Computer networks can be
characterized by their size as well as their purpose. The size of a network can be expressed
by the geographic area they occupy and the number of computers that are part of the
network. Networks can cover anything from a handful of devices within a single room to
millions of devices spread across the entire globe. (Study 2003)

Some of the different networks based on size are:

1. Personal area network, or PAN

2. Local area network, or LAN

3. Metropolitan area network, or MAN

4. Wide area network, or WAN

In terms of purpose, many networks can be considered general purpose, which means they
are used for everything from sending files to a printer to accessing the Internet. Some types
of networks, however, serve a very particular purpose. Some of the different networks based
on their main purpose are:

1. Storage area network, or SAN

2. Enterprise private network, or EPN

3. Virtual private network, or VPN

Let's look at each of these in a bit more detail.

C.Thanushanth NETWORKING 25

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Personal Area Network


A personal area network, or PAN, is a computer network organized around an individual
person within a single building. This could be inside a small office or residence. A typical
PAN would include one or more computers, telephones, peripheral devices, video game
consoles and other personal entertainment devices.

If multiple individuals use the same network within a residence, the network is sometimes
referred to as a home area network, or HAN. In a very typical setup, a residence will have a
single wired Internet connection connected to a modem. This modem then provides both
wired and wireless connections for multiple devices. The network is typically managed from
a single computer but can be accessed from any device. (Study 2003)

This type of network provides great flexibility. For example, it allows you to:

1. Send a document to the printer in the office upstairs while you are sitting on the
couch with your laptop.
2. Upload a photo from your cell phone to your desktop computer.

3. Watch movies from an online streaming service to your TV.

If this sounds familiar to you, you likely have a PAN in your house without having called it
by its name.

Figure 1 PAN

C.Thanushanth NETWORKING 26

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Local Area Network

A local area network, or LAN, consists of a computer network at a single site, typically an
individual office building. A LAN is very useful for sharing resources, such as data storage
and printers. LANs can be built with relatively inexpensive hardware, such as hubs, network
adapters and Ethernet cables.

The smallest LAN may only use two computers, while larger LANs can accommodate
thousands of computers. A LAN typically relies mostly on wired connections for increased
speed and security, but wireless connections can also be part of a LAN. High speed and
relatively low cost are the defining characteristics of LANs.(Study 2003)

LANs are typically used for single sites where people need to share resources among
themselves but not with the rest of the outside world. Think of an office building where
everybody should be able to access files on a central server or be able to print a document to
one or more central printers. Those tasks should be easy for everybody working in the same
office, but you would not want somebody just walking outside to be able to send a document
to the printer from their cell phone! If a local area network, or LAN, is entirely wireless, it is
referred to as a wireless local area network, or WLAN.

Figure 2 LOCAL Area Network

C.Thanushanth NETWORKING 27

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Metropolitan Area Network

A metropolitan area network, or MAN, consists of a computer network across an entire city,
college campus or small region. A MAN is larger than a LAN, which is typically limited to a
single building or site. Depending on the configuration, this type of network can cover an
area from several miles to tens of miles. A MAN is often used to connect several LANs
together to form a bigger network. When this type of network is specifically designed for a
college campus, it is sometimes referred to as a campus area network, or CAN. (Study 2003)

Figure 3Metropolitan area network

Ethernet IEEE 802


Overview of IEEE802 Standard Institute of Electrical and Electronics Engineers Among
other activities, develop standards to aid development of EE-related industries
IEEE802LAN/MAN Committee Standards for Local – and Metropolitan Area Networks
Optimized for modest-sized geographical areas (e.g. campus)Firstmeeting:February1980(!)
Goal:singleLANstandard,speeds1-20MHz Divided logically into PHY,MA Cand "High-
level Interface" components By the end of 1980 there were 3LANMACs: CSMA/CD,
Token Bus, and Token Ring
IEEE802 Standards All 802 standards provide a common upper interface to Logical Link
Control (LLC)AMAC protocol may be specified for use with different physical media–
E.g.,802.3 support

C.Thanushanth NETWORKING 28

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

IEEE802Addresses
All802protocols use the same address format 48-bit, globally unique addresses Advantage :
any interface can be plugged into any LAN world wide without danger of collision First
24bits : Organizationally Unique Identifier(OUI) Address space administered by IEEE,
assigned to organizations .Typically manufacturers of equipment( interfaces). Togetan OUI
currently costs $1650
1. 802.1Interconnection (Bridging)

2. 802.2LogicalLinkControl

3. 802.3Ethernet (CSMA/CD) LAN

4. 802.4TokenBusLAN

5. 802.5TokenRingLAN

6. 802.6MetropolitanAreaNetworks (DQDB)

7. 802.7BroadbandTAG

8. 802.8FiberOpticTAG

9. 802.9IsochronousLAN

10. 802.10Security

11. 802.11WirelessLAN

12. 802.12DemandPriority

13. 802.14CableModem

14. 802.15WirelessPersonalAreaNetwork (PAN)

15. 802.16BroadbandWireless

16. 802.17ResilientPacketRing

17. 802.18RadioRegulatoryWG

18. 802.19CoexistenceTAG

19. 802.20MobileBroadbandWireless

20. 802.21MediaIndependentHandoff

21. 802.22WirelessRegionalAreaNetworks

C.Thanushanth NETWORKING 29

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

C.Thanushanth NETWORKING 30

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Network topology
A network topology is the arrangement of a network, including its nodes and connecting
lines. There are two ways of defining network geometry: the physical topology and the
logical (or signal) topology.The physical topology of a network is the actual geometric
layout of workstations. There are several common physical topologies, as described below
and as shown in the illustration.

Types of physical topologies


In the bus network topology, every workstation is connected to a main cable called the bus.
Therefore, in effect, each workstation is directly connected to every other workstation in the
network.In the star network topology, there is a central computer or server to which all the
workstations are directly connected. Every workstation is indirectly connected to every other
through the central computer. In the ring network topology, the workstations are connected
in a closed loop configuration. Adjacent pairs of workstations are directly connected. Other
pairs of workstations are indirectly connected, the data passing through one or more
intermediate nodes.

If a Token Ring protocol is used in a star or ring topology, the signal travels in only one
direction, carried by a so-called token from node to node. The mesh network topology
employs either of two schemes, called full mesh and partial mesh. In the full mesh topology,
each workstation is connected directly to each of the others. In the partial mesh topology,
some workstations are connected to all the others, and some are connected only to those
other nodes with which they exchange the most data. The tree network topology uses two or
more star networks connected together. The central computers of the star networks are
connected to a main bus. Thus, a tree network is a bus network of star networks.

1. Point to point

2. Bus

3. Star

4. Ring or circular

C.Thanushanth NETWORKING 31

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

5. Mesh

6. Tree

7. Hybrid

Point-to-Point Protocol (PPP)


Point-to-point protocol (PPP) is a computer network protocol used to transfer a datagram
between two directly connected (point-to-point) computers. This protocol is used for a very
basic level of connectivity providing data linkage between the computers. Point-to-point
protocol is widely used for the heavier and faster connections necessary for broadband
communications.Point-to-point protocol is also known as RFC 1661.There are many
physical mediums for point-to-point connectivity, such as simple serial cables, mobile
phones and telephone lines.For Ethernet networks, TCP and IP were introduced for data
communication purposes. Both of these protocols have specifications for Ethernet networks
only. Thus, TCP and IP do not support point-to-point connections. Therefore, PPP was
introduced for point-to-point connectivity without Ethernet.When two computers are being
connected directly, both ends send a request for configuration. Once the computers are
connected, PPP handles link control, data control and protocol encapsulation.

Figure 4 Point to point topology

C.Thanushanth NETWORKING 32

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

C.Thanushanth NETWORKING 33

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Bus Topology
Bus topology is a specific kind of network topology in which all of the various devices in
the network are connected to a single cable or line. In general, the term refers to how
various devices are set up in a network. One way to think about a bus topology is that the
line connected to all of the devices or nodes in the network is like an aisle along which a
signal travels in order to find the node to which it is to be delivered. Typically, the cable in
the bus topology has two end terminals that dampen the signal so that it does not keep
moving from one end of the network to the other. Different types of bus topology can be
referred to as linear or distributed bus topology. A linear bus topology implies that there is
just one line associated with two distinct endpoints. In a distributed bus topology, there may
be more than one linear pattern connected to the network.
Bus topologies are often valued for their simplicity and lower cost of implementation.
However, one drawback is that if the central line is compromised, the entire network will go
down.

Figure 5 BUS topology

Advantages of Bus Topology


1. Easy to connect a computer or peripheral to a linear bus.

2. Requires less cable length than a star topology.

Disadvantages of Bus Topology


1. Entire network shuts down if there is a break in the main cable.

2. Terminators are required at both ends of the backbone cable.

3. Difficult to identify the problem if the entire network shuts down.

Not meant to be used as a stand-alone solution.

C.Thanushanth NETWORKING 34

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Star Topology
Star topology is a network topology where each individual piece of a network is attached to
a central node (often called a hub or switch). The attachment of these network pieces to the
central component is visually represented in a form similar to a star. Star topology is also
known as a star network.Star topologies are either active or passive networks, depending on
the following:

1. If the central node performs processes, such as data amplification or regeneration

2. If the network actively controls data transit

3. If the network requires electrical power sources.

Star topologies also may be implemented with Ethernet/cabled structures, wireless routers
and/or other components. In many cases, the central hub is the server, and the additional
nodes are clients.Benefits of a star network topology include the following:

1. Has the ability to limit the impact of a single failure. In star networks, a single unit is
isolated by its relationship to the central hub, so that if a component goes down, it
only affects that unit's local reach.
2. Facilitates adding or removing individual components to and from a network, for the
same reasons.

Figure 6 Star Topology

C.Thanushanth NETWORKING 35

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Advantages of Star Topology


1. Easy to install and wire.

2. No disruptions to the network when connecting or removing devices.

3. Easy to detect faults and to remove parts.

Disadvantages of Star Topology


1. Requires more cable length than a linear bus topology.

2. If the connecting network device (network switch) fails, nodes attached are disabled
and cannot participate in network communication.
3. More expensive than linear bus topology because of the cost of the connecting
devices (network switches).

Ring Topology
Ring topology refers to a specific kind of network setup in which devices are connected in a
ring and pass information to or from each other according to their adjacent proximity in the
ring structure. This type of topology is highly efficient and handles heavier loads better than
bus topology. A ring topology may also be called an active topology because messages are
passed to each device in the ring. Various types of ring topology setups work differently
based on which specific devices are being linked together to form a network. The
advantages of a ring topology include its ability to handle heavy network communications
better than some other setups, and the fact that in a ring structure, networks do not need a
central hub in order to function. Installation and troubleshooting are also relatively easy with
this kind of network.

One of the disadvantages of a ring topology is that just one failure to transmit data can
impact the entire network. In order to mitigate this problem, some ring topology setups use
what's called a dual-ring structure, where information is passed in both a clockwise and
counter-clockwise direction. These systems could be called redundant ring structures, where
there is a backup means of transmission in case a single transmission should fail.

C.Thanushanth NETWORKING 36

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Advantages of Ring topology:


1. Reduced chances of data collision as each node release a data packet after receiving
the token.
2. Token passing makes ring topology perform better than bus topology under heavy
traffic

3. No need of server to control connectivity among the nodes

4. Equal access to the resources

Disadvantages of Ring topology:


1. In Unidirectional Ring, a data packet must pass through all the nodes.

2. Ex: Let’s say A, B, C, D, and E are a part of the ring network. The data flow is from
A towards B and henceforth. In this condition, if E wants to send a packet to D, the
packet must traverse the entire network to reach D.

3. Single point of failure, that means if a node goes down entire network goes down.

Figure 7 Ring Topology

C.Thanushanth NETWORKING 37

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Mesh Networking
Mesh networking is a type of network topology in which a device (node) transmits its own
data as well as serves as a relay for other nodes. Routers are used to provide the best and
most efficient data path for effective communication. In the event of a hardware failure,
many routes are available to continue the network communication process. There are two
types of mesh networking topologies:

Advantages of mesh topology:


1. Each connection can carry its own data load

2. It is robust

3. A fault is diagnosed easily

4. Provides security and privacy

Disadvantages of mesh topology:


1. Installation and configuration are difficult if the connectivity gets more

2. Cabling cost is more and the most in case of a fully connected mesh topology 3.
Bulk wiring is required

Figure 8 Mesh Topology

C.Thanushanth NETWORKING 38

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Hybrid Topology
A combination of two or more different topologies makes for a hybrid topology. When
different topologies are connected to one another, they do not display characteristics of any
one specific topology. This is when it becomes a hybrid topology. It is chosen when there are
more than two basic working topologies in place already, and these have to be connected to
one another. When there is a star topology connected to another star topology, it still remains
a star topology. However, when a star topology and bus topology are connected to one
another, it gives rise to the creation of a hybrid topology. Often when the topologies are
connected to one another, the layout of the resultant topology is difficult to comprehend,
however, the new topology works without any problems.

Advantages:
1. Very reliable and easy to detect the Faulty system.

2. Troubleshooting is easy.

3. It includes both wired and wireless network.

4. It is an expandable network.

Disadvantages:
1. Its design is difficult to understand.

2. The cost of this network design is high, because of the requirement of a lot of cables,
cooling systems, etc.
3. MAU (Multi-station Access Unit) is required.

Figure 9 Hybrid Topology

C.Thanushanth NETWORKING 39

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Logical topologies
Logical (or signal) topology refers to the nature of the paths the signals follow from node to
node. In many instances, the logical topology is the same as the physical topology, but this is
not always the case. For example, some networks are physically laid out in a star
configuration, but they operate logically as bus or ring networks. Every LAN has a topology,
or the way that the devices on a network are arranged and how they communicate with each
other. The way that the workstations are connected to the network through the actual cables
that transmit data (the physical structure of the network) is called the physical topology.
The logical topology, in contrast, is the way that the signals act on the network media, or the
way that the data passes through the network from one device to the next without regard to
the physical interconnection of the devices. Logical topologies are bound to the network
protocols that direct how the data moves across a network. The Ethernet protocol is a
common logical bus topology protocol. Local Talk is a common logical bus or star topology
protocol. IBM's Token Ring is a common logical ring topology protocol. A network's logical
topology is not necessarily the same as its physical topology. For example, twisted pair
Ethernet is a logical bus topology in a physical star topology layout. While IBM's Token
Ring is a logical ring topology, it is physically set up in a star topology.

Ethernet
Ethernet is the traditional technology for connecting wired local area networks (LANs),
enabling devices to communicate with each other via a protocol a set of rules or common
network language. As a data-link layer protocol in the TCP/IP stack, Ethernet describes how
network devices can format and transmit data packets so other devices on the same local or
campus area network segment can recognize, receive and process them. An Ethernet cable is
the physical, encased wiring over which the data travels. Any device accessing a
geographically localized network using a cable i.e., with a wired rather than wireless
connection likely uses Ethernet whether in a home, school or office setting. From businesses
to gamers, diverse end users depend on the benefits of Ethernet connectivity, including
reliability and security.
Compared to wireless LAN technology, Ethernet is typically less vulnerable to disruptions
whether from radio wave interference, physical barriers or bandwidth hogs. It can also offer
a greater degree of network security and control than wireless technology, as devices must
connect using physical cabling making it difficult for outsiders to access network data or

C.Thanushanth NETWORKING 40

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

hijack bandwidth for unsanctioned devices. The Institute of Electrical and Electronics
Engineers Inc. (IEEE) specifies in the family of standards called IEEE 802.3 that the
Ethernet protocol touches both Layer 1 the physical layer and Layer 2 the data link layer on
the OSI network protocol model. Ethernet defines two units of transmission: packet and
frame. The frame includes not just the payload of data being transmitted, but also. The
physical media access control (MAC) addresses of both the sender and receiver; VLAN
tagging and quality of service information; and error correction information to detect
transmission problems. Each frame is wrapped in a packet that contains several bytes of
information to establish the connection and mark where the frame starts.
Engineers at Xerox first developed Ethernet in the 1970s. Ethernet initially ran over coaxial
cables, while a typical Ethernet LAN today uses special grades of twisted pair cables or
fiber optic cabling. Early Ethernet connected multiple devices into network segments
through hubs Layer 1 devices responsible for transporting network data using either a daisy
chain or star topology.

Local Talk
Local Talk was Apple’s early 1980s implementation of a physical networking interface for
Apple II and Macintosh computers. Local Talk used a system of shielded twisted-pair cables
plugged into self-terminating transceivers. The maximum data rate was 230 Kbps. The
system uses either an older 3-pin mini-DIN or later 8-pin connectors. The Local Talk system
consisted of a built-in controller, with cables and expansion cards sometimes required. It
enabled daisychaining, which is connecting a sequence of devices to each other using the
Local Talk cables. A cheaper variation of Local Talk called Phone Net was introduced by
Farallon Computing. Phone Net rode on the existing standard telephone cables and
connectors using unshielded twisted-pair cabling. Local Talk used expensive twisted pairs of
cabling. Phone Net enabled users to split their home phone connections into two, one going
to the telephone jack and the other to their Apple or Macintosh computer. The introduction
of Ethernet in the early 1990s quickly made
Local Talk an obsolete networking medium. PCs produced by Apple’s competitors only
supported the now familiar Ethernet standard with its 10 Mbps transfer speed. Apple itself
ditched Local Talk with the release of the iMac in 1998. A few Local Talk-to-Ethernet
converters were made to allow older devices, mainly printers, to work on the newer
networks.

C.Thanushanth NETWORKING 41

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Token Ring Network


A token ring network is a local area network (LAN) topology where nodes/stations are
arranged in a ring topology. Data passes sequentially between nodes on the network until it
returns to the source station. To prevent congestion and collision, a token ring topology uses
a token to ensure that only one node/station on the line is used at a time, thereby easily
denoting media users of its activity. A token ring LAN is physically wired as a star topology
but configured as a ring topology. The token ring LAN system was standardized by the
Institute of Electrical and Electronics Engineers as IEEE 802.5. Initially, the token ring LAN
highlighted, debated advantages over the Ethernet. During the 1990s, token-ring LAN
pricing and usage gradually declined as switched Ethernet and faster variants hit the market.
In the mid-1980s, token ring LAN speeds were standardized between 4 and 16 Mbps. The
token ring LAN process is delineated by the following sequence of events:

1. A token continually circulates inside the token ring LAN

2. To transmit a message, a node inserts a message and destination address inside an


empty token.
3. The token is examined by each successive node.

4. The destination node copies the message data and returns the token to the source
with the source address and a data receipt message.
5. The source receives the returned token, verifies copied and received data and empties
the token.
6. The empty token now changes to circulation mode, and the process continues.

C.Thanushanth NETWORKING 42

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Activity 02

Networking Devices

Network Interface Card (NIC)


A network interface card (NIC) is a hardware component, typically a circuit board or chip,
which is installed on a computer so that it can connect to a network. Modern NICs provide
functionality to computers such as support for I/O interrupt, direct memory access (DMA)
interfaces, data transmission, network traffic engineering and partitioning. A NIC provides
a computer with a dedicated, full-time connection to a network by implementing the
physical layer circuitry necessary for communicating with a data link layer standard, such as
Ethernet or Wi-Fi. Each card represents a device and can prepare, transmit and control the
flow of data on the network. The NIC uses the OSI model to send signals at the physical
layer, transmit data packets at the network layer and operate as an interface at the TCP/IP
layer. The network card operates as a middleman between a computer and a data network.
For example, when a user requests a web page, the computer will pass the request to the
network card which converts it into electrical impulses. Those impulses are received by a
web server on the internet and responds by sending the web page back to the network card
as electrical signals. The card gets these signals and translates them into the data that the
computer displays.

Figure 10 Network inetraface card

C.Thanushanth NETWORKING 43

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Switch
In a network, a switch is a device that channels incoming data from any of multiple input
ports to the specific output port that will take it toward its intended destination. In a local
area network (LAN) using Ethernet, a network switch determines where to send each
incoming message frame by looking at the physical device address (also known as the
Media Access Control address or MAC address). Switches maintain tables that match each
MAC address to the port from which the MAC address has been received. If a frame is to be
forwarded to a MAC address that is unknown to the switch infrastructure, it is flooded to all
ports in the switching domain. Broadcast and multicast frames are also flooded. This is
known as BUM flooding -- broadcast, unknown unicast, and multicast flooding. This
capability makes a switch a Layer 2 or data-link layer device in the Open Systems
Interconnection (OSI) communications model.

Types of networking switches


There are several types of switches in networking in addition to physical devices:

1. Virtual switches are software-only switches instantiated inside virtual machine


(VM) hosting environments.

2. A routing switch connects LANs; in addition to doing MAC-based Layer 2


switching it can also perform routing functions at OSI Layer 3 (the network layer)
directing traffic based on the Internet Protocol (IP) address in each packet.

C.Thanushanth NETWORKING 44

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Figure 11Network Switch

Hub (Networking)
A network operates at a high level of exigency with multitudinous requirements for security
along with compliance. It’s a vast domain with divergent devices connected by an array of
exclusive tools and administrators. A hub is the most basic device in computer networking
that connects multiple computers or Ethernet-based devices together. Unlike a network
switch, a hub is less sophisticated because it has no routing tables or intelligence on where
to send information and broadcast all network data across each connection, hence it is
sometimes referred as “dumb switches”.
A network hub is a small rectangular box that receives its power from an ordinary wall
outlet. A hub is considered to be the least intelligent among switch and a router because it
transmits everything that comes in to the every one of its ports. An Ethernet hub is
categorized as layer 1 devices in the Open Systems Interconnection (OSI) reference model.
OSI reference models are basically a guide so that the digital communication product and
the software will interoperate to facilitate clear comparisons among communications tools.
A hub can be useful for temporarily replacing a broken network switch or when
performance is not a crucial factor on the network.
Most hubs detect typical problems such as collision because if two network devices on the
same network try to send packets at the same time can cause excessive jabbering on
individual ports. This is extenuated in terms of switches and routers, as each port represents
a separate collision domain. It also raises security concerns because it cannot filter traffic
and hence it cannot be protected and quarantined.

C.Thanushanth NETWORKING 45

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Figure 12 Hub

Bridge
A bridge is a type of computer network device that provides interconnection with other
bridge networks that use the same protocol. Bridge devices work at the data link layer of the
Open System Interconnect (OSI) model, connecting two different networks together and
providing communication between them. Bridges are similar to repeaters and hubs in that
they broadcast data to every node. However, bridges maintain the media access control
(MAC) address table as soon as they discover new segments, so subsequent transmissions
are sent to only to the desired recipient. Bridges are also known as Layer 2 switches.

A network bridge device is primarily used in local area networks because they can
potentially flood and clog a large network thanks to their ability to broadcast data to all the
nodes if they don’t know the destination node's MAC address.

A bridge uses a database to ascertain where to pass, transmit or discard the data frame.

1. If the frame received by the bridge is meant for a segment that resides on the same
host network, it will pass the frame to that node and the receiving bridge will then
discard it.
2. If the bridge receives a frame whose node MAC address is of the connected network,
it will forward the frame toward it.

Figure 13 Network Bridge

C.Thanushanth NETWORKING 46

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Router
A router is a device that analyzes the contents of data packets transmitted within a network
or to another network. Routers determine whether the source and destination are on the
same network or whether data must be transferred from one network type to another, which
requires encapsulating the data packet with routing protocol header information for the new
network type.
Based on designs developed in the 1960s, the Advanced Research Projects Agency Network
(ARPANET) was created in 1969 by the U.S. Department of Defense. This early network
design was based on circuit switching. The first device to function as a router was the
Interface Message Processors that made up ARPANET to form the first data packet
network.

The initial idea for a router, which was then called a gateway, came from a group of
computer networking researchers who formed an organization called the International
Network Working Group, which became a subcommittee of the International Federation for
Information Processing in1972. In 1974, the first true router was developed and by 1976,
three PDP-11-based routers were used to form a prototype experimental version of the
Internet. From the mid-1970s to the 1980s, mini-computers were used as routers. Today,
high-speed modern routers are actually very specialized computers with extra hardware for
rapid data packet forwarding and specialized security functions such as encryption.
When several routers are used in a collection of interconnected networks, they exchange and
analyze information, and then build a table of the preferred routes and the rules for
determining routes and destinations for that data. As a network interface, routers convert
computer signals from one standard protocol to another that's more appropriate for the
destination network.

Figure 14 Router

C.Thanushanth NETWORKING 47

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Gateway
A gateway is a data communication device that provides a remote network with connectivity
to a host network. A gateway device provides communication to a remote network or an
autonomous system that is out of bounds for the host network nodes. Gateways serve as the
entry and exit point of a network; all data routed inward or outward must first pass through
and communicate with the gateway in order to use routing paths. Generally, a router is
configured to work as a gateway device in computer networks.
Any network has a boundary or a limit, so all communication placed within that network is
conducted using the devices attached to it, including switches and routers. If a network node
wants to communicate with a node/network that resides outsides of that network or
autonomous system, the network will require the services of a gateway, which is familiar
with the routing path of other remote networks.
The gateway (or default gateway) is implemented at the boundary of a network to manage
all the data communication that is routed internally or externally from that network. Besides
routing packets, gateways also possess information about the host network's internal paths
and the learned path of different remote networks. If a network node wants to communicate
with a foreign network, it will pass the data packet to the gateway, which then routes it to
the destination using the best possible path.

Figure 15 Network Gateway

C.Thanushanth NETWORKING 48

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Firewall
In computing, a firewall is software or firmware that enforces a set of rules about what data
packets will be allowed to enter or leave a network. Firewalls are incorporated into a wide
variety of networked devices to filter traffic and lower the risk that malicious packets
traveling over the public internet can impact the security of a private network. Firewalls
may also be purchased as stand-alone software applications. The term firewall is a metaphor
that compares a type of physical barrier that's put in place to limit the damage a fire can
cause, with a virtual barrier that's put in place to limit damage from an external or internal
cyberattack. When located at the perimeter of a network, firewalls provide low-level
network protection, as well as important logging and auditing functions. While the two main
types of firewalls are host-based and network-based, there are many different types that can
be found in different places and controlling different activities. A host-based firewall is
installed on individual servers and
monitors incoming and outgoing signals

Figure 16 Network Firewall

C.Thanushanth NETWORKING 49

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Types of firewalls
Other types of firewalls include packet-filtering firewalls, stateful inspection firewalls, proxy
firewalls and next-generation firewalls (NGFWs).

1. A packet-filtering firewall examines packets in isolation and does not know the
packet's context.

2. A stateful inspection firewall examines network traffic to determine whether one


packet is related to another packet.

3. A proxy firewall inspects packets at the application layer of the Open Systems
Interconnection (OSI) reference model.

4. An NGFW uses a multilayered approach to integrate enterprise firewall capabilities


with an intrusion prevention system (IPS) and application control.

Repeater
A repeater is a network device that retransmits a received signal with more power and to an
extended geographical or topological network boundary than what would be capable with
the original signal. A repeater is implemented in computer networks to expand the coverage
area of the network, repropagate a weak or broken signal and or service remote nodes.
Repeaters amplify the received/input signal to a higher frequency domain so that it is
reusable, scalable and available. Repeaters were introduced in wired data communication
networks due to the limitation of a signal in propagating over a longer distance and now are
a common installation in wireless networks for expanding cell size. Repeaters are also
known as signal boosters. Every operational computer or data communications network has
a specific boundary in which it can service the connected and authorized hosts/nodes. It is a
planned network scope, but sometimes the network needs to extend its routing domain
further to accommodate a new/existing host, or to improve the service level in a specific
topological domain. In such scenarios, a network uses the service of a repeater, which
amplifies the received signal to an ideal or near-ideal strength so that destination/receiving
nodes can receive the data. The installation of repeaters is critical in those domains, where
attenuation and signal loss is very crucial. Repeaters are generally considered to be
nonlogical devices because they propagate every signal regardless of its size, type ,ect…

C.Thanushanth NETWORKING 50

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Network Server
A network server is a computer designed to act as central repository and help in providing
various resources like hardware access, disk space, printer access, etc. to other computers in
the network. A network server might not differ from a workstation in hardware, but the
functionality it performs clearly differentiates it from other workstations. Network servers
helps in simplifying the different tasks for system administrators including those centering
around management. Any configuration or security updates can be applied to a network
server instead of individually passing to different computers connected to the network.
Factors influencing the choice of utilizing a network server:

1. Number of users in network.

2. Classification of the network used.

3. Business growth plans, if any.

List of available type of servers

1. FTP Server

2. Proxy Server

3. Online Gaming Server

4. Web Server

5. Application Server

6. List Server

7. Chat Server

8. IRC Server

9. Fax Server

10. Groupware Server

11. Mail Server

12. Telnet Server

13. News Server

C.Thanushanth NETWORKING 51

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Features of network servers:

1. Computers are provided with more memory and storage capacity and also are
configured to do additional processing to handle the different client requests.

2. Machines are usually high performing personal computers with reliable and fast hard
disks, powerful processors and high amounts of available RAM.

3. Can also act as a central file storage unit. This can prevent data being stored in
different workstations in the network.

4. Authentication and user control can be set on another workstation using a network
server.

5. Security control measures can be more convenient to manage using a network server.

6. Network server is also capable of running an intranet.

7. Some of the common examples of network servers are FTP servers and web servers.

Types of Server

Web Server
A web server is a server that is part of larger package for intranet and internet. That enable
to host an internet website. There are main two types of web servers using through
Microsoft IIS, Apache an apache server is open source.it built by apache software
foundation.

File Server
A file server that provide to access files it can be access multiple systems because that
provide centralized disk storage can be shared for client computers through network.
Usually file server used for enterprise system’s that acts faster to access entire data and
managing storage capacity more than non-dedicated system.

Database Server
Database server is a computer system that provide other computer with services related to
accessing and retrieving data from a database. access to the database server may be though
an application via a front end running and displayed on a user‘s machine such as

C.Thanushanth NETWORKING 52

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

phpMyAdmin or back end running on the database server itself from the command prompt
using a command
such as MySQL (webopedia, 2017)

Application Server
The application server is framework, an environment where application can run no matter
what
they are function they perform. This serve can be used to develop and run web based
application. There are many number of different application servers, including java, PHP
and .NET frame work application servers

Suitable Protocol About Scenario

Internet Protocol
IP is the primary protocol in the Internet Layer of the Internet Protocol Suite, which is a set
of
communications protocols consisting of four abstraction layers: link layer (lowest), Internet
layer, transport layer and application layer (highest).
Addressing
In command to perform the work of carrying datagrams, IP need know where to bring them
to!
For this reason, IP contains a machine for host addressing. Additionally, since IP functions
over internetworks, its structure is designed to allow distinctive addressing of devices across
randomly huge networks
Data Encapsulation and Formatting/Packaging
In place of the TCP/IP network layer protocol, IP takes data as of the transport layer
protocols
UDP and TCP. It then summarizes this data into an IP datagram spending an exceptional
format previous to transmission.
Fragmentation and Reassembly
IP datagrams are handed downhearted to the data link layer for transmission on the local
network. Though, the extreme frame size of to each physical/data-link network using IP

C.Thanushanth NETWORKING 53

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

may
be changed. For this purpose, IP includes the capability to fragment IP datagrams into pieces
so they can each be accepted on the local network.
Routing / Indirect Delivery
When an IP datagram must be sent to a destination on the same local network, this can be
done
easily using the network's underlying LAN/WLAN/WAN protocol using what is sometimes
called direct delivery. datagram through intermediate devices (shockingly
called routers). IP accomplishes this in concert with support from the other protocols
including ICMP and the TCP/IP gateway/routing protocols such as RIP and BGP.
(tcpipguide,
2005)

Server Specification and cost analysis

Table 1 Server specification and cost

C.Thanushanth NETWORKING 54

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

C.Thanushanth NETWORKING 55

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Activity 03

Network design
When planning a network two things need to be considered namely designing and
Implementation. To build a good effective network we need to be identify network
requirements and select the best solutions to meet the needs of customer. There are some
steps to follow.
Step 1
Achieve business's requirements for performance, capacity and network ports. Meet with
co-workers from each area of Enclave film company to understand their application and
potential expansion requirements.
Step 2

Plan and design the cable layout. Cabling plays an important part of network design as it
provides the physical communication path for the Enclave film company.
Step 3
Analyze network performance in its current state. Use protocol analyzers and network
management software and perform the analysis at various times of a business day, such as at
the start of shifts, and during periods that typically result in increased traffic, such as
running deadlines Heavy work load or moving complex engineering data over the network.
Step 4
Collect information from existing physical and logical network diagrams to support the
current state design of the Enclave Film Company. Identify routers, switches, LAN uplink
bandwidth, network equipment and current standards for the wireless Access. For the
logical design, obtain current information for the IP address design for the LAN including
virtual LAN information and connectivity requirements, Is because of more building A and
B is present.
Step 5
Develop an IP address design that meets growth requirements and selects a routing protocol
for the network to support fast convergence with ease of management.

C.Thanushanth NETWORKING 56

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Figure 17 Network Diagram

C.Thanushanth NETWORKING 57

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

IP address allocation Table


When you define which IP addresses will be on which network, you are not only setting a
precedent that will be difficult to change, you are limiting the size of your network. This is
because IP networks/subnets have limited sizes. For example, a Class C network (like
192.168.1.0 /24) can have up to 254 usable computers. That may be enough for your
network today, but it may not be enough for your network next year.
Of course, the ideal time to properly size these IP networks is when you design the network.
Your design is only as good as the information you have at hand. Let's say that you expect
each network to have 125 computers and not grow beyond 254 computers. When you
configure your routers and design an IP address scheme, you will assign a Class C IP
address network to this network. If after six months the device count needs to go up to 400,
however, you will have to make a change in your design. You will have a couple of choices.
Num
Departmen
of VLAN ID Network ID Broadcast ID Gateway Subnet mask
t
Users
Customer 255.255.255.24
10 10 192.168.10.144 192.168.10.159 192.168.1.145
Care 0
Sales and 255.255.255.22
20 20 192.168.10.96 192.168.1.127 192.168.10.97
Marketing 4
255.255.255.22
Finance 25 30 192.168.10.64 192.168.1.95 192.168.10.65
4
192.168.10.16 255.255.255.24
Legal 5 40 192.168.10.160 192.168.10.167
1 8
192.168.10.12 255.255.255.24
HR 10 50 192.168.10.128 192.168.10.143
9 0
255.255.255.19
Developers 55 60 192.168.10.0 192.168.10.63 192.168.10.1
2
Network 192.168.10.16 255.255.255.24
5 70 192.168.10.168 192.168.10.175
Team 9 8
Server
Room 5 100 10.254.1.0 10.254.1.255 10.254.1.1 255.255.255.0
Figure 18 IP address allocation

C.Thanushanth NETWORKING 58

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Feedback Analysis
Feedback for the above Questionnaire was collect from 12 Users. In addition, presented
using
Percentage.

Figure 19Feedback 1

C.Thanushanth NETWORKING 59

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Figure 20 Feedback 2

C.Thanushanth NETWORKING 60

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Figure 21 Feedback 3

C.Thanushanth NETWORKING 61

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Question No Positive Response Negative Status


Response
01 82% 18% 

02 90% 10% 

03 100% 0% 

04 72% 28% 

05 94% 06% 

06 88% 12% 
07 78% 22% 

08 92% 08% 

09 94% 06% 

Table 2 Feed back

According to the feedbacks received, I understood that the users are highly satisfied with the
friendliness of the system. They were satisfied with the output. The security of the system is
moderate but a firewall is required to enhance the security of the system. A firewall. A
firewall
helps to protect the system from third party access. So, a firewall will be connected I the
near
future.

C.Thanushanth NETWORKING 62

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Network Configurating

VTP Creation

Figure 22 VTP Server configuration

Figure 23 VTP Client configuration

C.Thanushanth NETWORKING 63

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

VLAN Creation

Figure 24VLAN Creation

Figure 25 VLAN Creation

C.Thanushanth NETWORKING 64

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Figure 26 Before assigned vlan

Figure 27 Assigning to VLAN

C.Thanushanth NETWORKING 65

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Figure 28 After Assigned VLAN

C.Thanushanth NETWORKING 66

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

DHCP Server

Figure 29 Assigned ip address to server

Figure 30 Creating gateway

C.Thanushanth NETWORKING 67

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Figure 31 DHCP Pool

Server Installation

Figure 32 Sesver OS Insatllation

C.Thanushanth NETWORKING 68

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Figure 33 Sesver OS Insatllation

Figure 34 Sesver OS Insatllation

C.Thanushanth NETWORKING 69

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Figure 35 Sesver OS Insatllation

Figure 36 Sesver OS Insatllation

C.Thanushanth NETWORKING 70

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Figure 37 Sesver OS Insatllation

C.Thanushanth NETWORKING 71

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Network Maintain Schedule.


Network maintenance tasks are those tasks which network administrators perform on a day-
to-day basis, allowing for the upkeep of the network. Maintenance Scheduling backups and
restoring services or the network from backups. Ensuring compliance with legal regulations
and corporate policies

Services Occurrence Start Duration Impact to Business


Affected
Backup
Schedules
Active Directory Weekly 10:00am 4 hours No Impact to Business
Email Server Daily 1:00am 1 hours No Impact to Business
Database Server Daily 10:00am 5 hours No Impact to Business
File Server Daily 1:00am 4 hours No Impact to Business
Log Server View
Server Access Weekly 10:00am 2 hours No Impact to Business
Logs
Data Base Monthly 12:00am 1 hours No Impact to Business
Transaction Logs
Firewall Logs Weekly 11.00am 2 hours No Impact to Business
Update/Testing
Windows Server Weekly 10.00PM 2 hours All Windows servers
Updates will
need to be restart after
update. This means
servers
will be down
throughout
the night for 5-10
minutes
Windows Monthly 11.00PM 5 hour All Windows desktop
Desktop clients will need to be

C.Thanushanth NETWORKING 72

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

clients Updates restart after update.


This
means client
computers
be down throughout
the
night for 5-10 minutes
DNS Server Monthly 1:00AM 1 hour IP addresses will not
Updates be
mapper while the DNS
server is being
updated.
Virus Protection Nightly 1:00AM 2 hour Individual desktops
Software may
Updates run slower while virus
update is being
performed
on it.

Table 3 maintanance schedule

Activity 04
After all details are finalized and upgrade design strategy complete, the implementation of
the network upgrade will transpire with minimal or no downtime within SYNTAX. As part
of our implementation plan, an initial network test will occur. This will be done during off-
hours to minimize possible problems; however, the final test will be done during normal
business hours to completely evaluate the network upgrade performance. The following
items below will be completely under evaluation.
1. Verify the design upgrade meets key business and technical goals.

2. Validate LAN and WAN technology and device selections.

3. Verify the service provider provides the agreed-upon service.

4. Identify any bottlenecks or connectivity problems.

C.Thanushanth NETWORKING 73

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

5. Test the redundancy of the network.

6. Analyze the effects on performance during network link failures.

7. Determine the optimization techniques to meet performance and other technical goals.

8. Analyze the effects on performance while the upgrade of network links or devices is
under construction ("what-if analyses").

9. Identify any risks that can impede implementation and determine the plans for
contingencies.

The following are considerations to experience while a "live" test is under implementation:
1. Warn users in advance about the timing of tests so they can expect some performance
degradation, but ask the users to work as they typically do to avoid invalidating the
test by abnormal behavior. Moreover, have the users report any issues that arise
during the live test.

2. Warn network administrators and other designers in advance to avoid the possibility
that they could be running tests at the same time.

3. Warn network managers in advance, so they are not confused by unexpected alarms
on network-management consoles, and so they can account for test traffic when
documenting load and availability statistics.

4. If possible, we will run multiple, short (less than 2-minute) tests to minimize user
impact and lessen the effects on baseline measurements.

Implemented Network

C.Thanushanth NETWORKING 74

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Figure 38 Implemented network

C.Thanushanth NETWORKING 75

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Figure 39 Learner Created network implementation

Figure 40 Learner Created network implementation

C.Thanushanth NETWORKING 76

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Figure 41 Learner Created network implementation

Figure 42 Learner Created network implementation

C.Thanushanth NETWORKING 77

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Figure 43 Learner Created network implementation

Figure 44 Learner Created network implementation

C.Thanushanth NETWORKING 78

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Figure 45 Learner Created network implementation

Figure 46 Learner Created network implementation

C.Thanushanth NETWORKING 79

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Figure 47 Learner Created network implementation

Figure 48 Learner Created network implementation

C.Thanushanth NETWORKING 80

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Figure 49 Learner Created network implementation

Figure 50 Learner Created network implementation

C.Thanushanth NETWORKING 81

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Figure 51 Learner Created network implementation

Figure 52 Learner Created network implementation

C.Thanushanth NETWORKING 82

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Testing
Tech When testing
Description Tester Name Test Date Network, the
Case No
send ping from pc 11 tester has to
1 to DHCP server nishan 2021/05/10 know about
10.254.1.10 some code of
Ping test Form ping, ipconfig
2 customer vlan Thanushanth 2021/05/10 and send a
SYNATX Web server file through
Form customer vlan the network.
3 accessing SYNATX irshath 2021/05/10 To
Web server destination
Extented ping to web
4 Shan 2021/05/10 Computer. by
server from customer
5 Telnet access Pakeerathan 2021/05/10 the way the
network testing, the tester
needs a good knowledge of network concepts such as ping, send files, accessing the internet
and trace route
Scope
Enclave film company network is much different from other networks, because there lot of
features like they can share lot of data inside the park, they can upload the videos very
quickly
to the web site.
Test objectives
Checks the performance of the functions.
Most importantly finding some errors

Test Plan

C.Thanushanth NETWORKING 83

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Table 4 Test Plan

C.Thanushanth NETWORKING 84

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Test Case
Test case Pass
Input expected results actual results
No or fail
Ping test Form
Ping PASS
1 customer vlan Ping sucessfull
192.168.1.6
SYNATX Web server
Table 5 Test Case 1

Test case Pass


Input expected results actual results
No or fail
Ping test Form
Ping Request FAIL
2 customer vlan
192.168.1.6 timeout
SYNATX Web server

Table 6 Test Case 2

C.Thanushanth NETWORKING 85

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Reason of fail is web server did not assigned its VLAN

C.Thanushanth NETWORKING 86

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Test case Pass


Input expected results actual results
No or fail
Ping test Form
Ping PASS
2 customer vlan Ping successful
192.168.1.6
SYNATX Web server

Table 7 Test Case 2

This test placed after assigned web ser to the server vlan

C.Thanushanth NETWORKING 87

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Test case Pass


Input expected results actual results
No or fail
Ping test Form Access
Ping PASS
3 customer vlan SYNTAX
192.168.1.6
SYNATX Web server home page

Table 8 Test Case 3

Test case Pass


Input expected results actual results
No or fail
Tracer Tracing the rout of the PASS
4
10.254.1.11 web server

C.Thanushanth NETWORKING 88

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Table 9 Test case 4

C.Thanushanth NETWORKING 89

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Test case Pass


Input expected results actual results
No or fail
Ping -t Tracing the rout of the PASS
5 Successful ping
10.254.1.11 web server

Table 10 Test Case 5

C.Thanushanth NETWORKING 90

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

Future recommendation

Cloud Repatriation
Cloud repatriation or unclouding is a form of reverse-migration. It involves the transfer of
applications and certain workloads from the public cloud to on-premise infrastructure.
The technology is gaining popularity amongst businesses today and it’s not unsurprising,
giving its benefits. Not only does it offer more control to organizations, but private clouds
also enhances compliance, resources management, and help reduce the risks and frequency
of cyberthreats.
The cost-saving measures of this trend are an added perk.

5G Networking
5G is the latest in mobile internet connectivity. It not only allows for greater speed, and a
higher number of connected devices, but network slicing as well.
Network slicing is the creation of subnetworks – by separating multiple virtual networks
operating on the same network infrastructure – to fulfill specific needs required by different
applications. 5G is also designed to improve connectivity among devices and enhance data
transmission.
This has the potential to transform business models and the network industry as we know it.

Edge Computing
This is another networking technology that has the potential to improve operational
efficiency in businesses and organizations. Edge computing is a consumer-focused
technology that is used to optimize data collection and processing.
If utilized effectively, it can improve the performance of business platforms by reducing
traffic loads and eliminating latency for speedy data analysis and better security.
Once you leverage top networking technologies, we can guarantee that your company
continues to have access to the critical information you require to keep things running
smoothly and efficiently.

C.Thanushanth NETWORKING 91

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

References
 https://afteracademy.com/blog/what-is-network-topology-and-types-of-network-
topology
 https://afteracademy.com/blog/what-is-network-topology-and-types-of-network-
topology
 https://beginnersbook.com/2019/03/computer-network-topology-mesh-star-bus-
ring-and-hybrid/
 https://blog.netwrix.com/2019/01/08/network-devices-explained/
 https://purple.ai/blogs/whats-the-difference-between-a-lan-and-a-wan/
 https://www.elprocus.com/what-are-network-devices-and-their-types/
 https://www.geeksforgeeks.org/difference-between-lan-and-wan/
 https://www.ieee.org/about/
 https://www.omnisecu.com/basic-networking/lan-and-wan-local-area-network-and-
wide-area-network.php
 https://www.pcmag.com/encyclopedia/term/network-device
 https://www.tutorialspoint.com/communication_technologies/communication_tech
nologies_network_devices.htm

C.Thanushanth NETWORKING 92

Downloaded by Menuka Chanul ([email protected])


lOMoARcPSD|18614735

C.Thanushanth NETWORKING 93

Downloaded by Menuka Chanul ([email protected])

You might also like