Lan Design Implementation For Syntax Solutions
Lan Design Implementation For Syntax Solutions
Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)
INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Programme title BTEC Higher National Diploma in Computing
Assessor Internal
Verifier
Unit 02: Networking
Unit(s)
LAN Design & Implementation for SYNTAX SOLUTIONS
Assignment title
Student’s name
List which assessment Pass Merit Distinction
criteria the Assessor has
awarded.
INTERNAL VERIFIER CHECKLIST
C.Thanushanth NETWORKING 1
C.Thanushanth NETWORKING 2
Student Name/ID
Chandrasekar
Thaushanth / TRI/A-
004480
Unit Title Unit 02: Networking
Date
Received 1st
submission
Submission Date
Re-submission Date
Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction P1 P2 M1
Descripts
C.Thanushanth NETWORKING 3
Resubmission Feedback:
Assignment Feedback
Formative Feedback: Assessor to Student
Action Plan
Summative feedback
C.Thanushanth NETWORKING 4
Assessor Date
signature
Student Date
signature
General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point, and should be in the style of Time New Roman.
C.Thanushanth NETWORKING 6
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body
except for the before mentioned compulsory information will result in rejection of your work.
3. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and a
reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course
C.Thanushanth NETWORKING 7
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct form. I further understand what it means to copy
another’s work.
[email protected]
Student’s Signature: Date: 15.05.2021
(Provide E-mail ID) (Provide Submission Date)
C.Thanushanth NETWORKING 8
Unit Tutor
Issue Date
Submission Date
Submission format
The submission should be in the form of an individual report written in a concise, formal business
style using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using
Harvard referencing system. Please also provide an end list of references using the Harvard
referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures,
although you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:
C.Thanushanth NETWORKING 9
C.Thanushanth NETWORKING 10
Scenario
SYNTAX SOLUTIONS is a privately owned, well-known Software company located in Colombo. The
Management of SYNTAX SOLUTIONS has purchased a 3-story building in the heart of Matara. They
are planning to make it one of the state-of-the-art companies in Matara with the latest facilities.
Customer Care 10
Finance 25
Legal 5
HR 10
Developers 55
Network Team 5
19 2.168 .1 0.0/24 is given an d sh ou ld b e use d for all the de partm ent s exce pt the
server room . I Ps sh ou ld assign us ing DHCP .
Number of s er vers required for the Ser ver room ne ed to be decide d by the
Network de signe r and sh ou ld be assigne d w it h 10 .2 54.1 .0 /2 4 sub net. (U ses
C.Thanushanth NETWORKING 11
static IPs )
Sales and Marketing Tea m nee d to access Network re source s us ing W IFI
connec tivity.
Assu me you have be en app ointed as th e n ew network consultant of SYNTAX SOLU TIONS .
P repa re a n etwork arch itec tural de sign and imp lem ent it wit h your sug gestions an d
re com men dations to me et th e compa ny req uirem ent s.
(Note: Clear ly state your assumptions. You are allowed to design the networ k
accor ding to your assumptions, but main requirements should not be violated)
Activity 01
D isc uss t he benefits an d const ra int s of different n etwork system type s that can be
imp le mente d in the Matara b ranc h an d the main IEEE Ethe rn et sta ndards that can
be u sed in above LAN an d WLA N design .
C.Thanushanth NETWORKING 12
Activity 02
Discu ss t he op erating princ ip le s of network dev ice s (Ex : Rou ter, Switc h, Etc .) and
se rve r typ es that can be u sed for above scena rio wh ile exp lorin g different se rve rs
that are ava ilab le in today ’s market with th eir spec ification s. Recomme nd
se rve r/se r vers for the above sce nario and ju stif y you r selection with va lid point s.
Discu ss t he inte r-de pen denc e of workstation hard wa re w ith networkin g softwa re
and provide examp le s for n etworking soft ware that can be use d in above n etwork
desig n.
Activity 03
Prepare a written network design plan to meet the above mentioned user
requirements including a blueprint drawn using a modeling tool. (Ex:
Microsoft Visio, EdrawMax).
Support your answer by providing the VLAN and IP subnetting scheme for the
above scenario and the list of devices, network components and software
used to design the network for above scenario and while justif ying your
selections.
Test and evaluate the proposed design to meet the requirements and analyse
user feedback by using a User feedback form.
Insta ll and configu re Network ser vices, dev ice s and app lications (E x: VLAN,DHCP,
DNS ,Proxy, Web , Etc.) accord in g to the proposed de sign to accomplish the u ser
req uirem ent s and desig n a detaile d Mainte nance sch edu le for above Network.
C.Thanushanth NETWORKING 13
Activity 04
Imp le ment a networked syste m ba se d on your prep are d de sign w ith va lid ev id ence s
and re com men d potentia l fu ture enh ance ment s for th e networke d system wit h va lid
ju stification s to you r recomm endation s. Use c ritica l reflec tion to c ritically eva lu ate
the design , pla n, config uration , and te sting of you r net work while ju stif ying w it h
va lid conc lu sion s.
Deve lop te st cases and conduc t verification (Ex: P in g , ex ten ded p in g , t race route ,
telnet, SSH, etc. ) to test th e above Network and ana lyse the test results aga inst the
exp ected re su lt s.
C.Thanushanth NETWORKING 14
Grading Rubric
P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Compare common networking principles and how protocols
enable the effectiveness of networked systems.
LO2 : Explain networking devices and operations
P3
Discuss the operating principles of networking devices and
server types.
P4
C.Thanushanth NETWORKING 15
M2
Explore a range of server types and justify the selection of a
server, considering a given scenario regarding cost and
performance optimization.
LO 1 & LO2
D1 Critically evaluate the topology protocol selected for a given
scenario to demonstrate the efficient utilisation of a networking
system.
LO3 : Design efficient networked systems
P5
Design a networked system to meet a given specification.
P6
Test and evaluate the design to meet the requirements and
analyze user feedback.
M3
Install and configure network services and applications on your
choice.
D2
C.Thanushanth NETWORKING 16
P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D3
Use critical reflection to evaluate own work and justify valid
conclusions.
C.Thanushanth NETWORKING 17
Table of Contents
Activity 01.....................................................................................................................................23
Network.........................................................................................................................................23
Benefits of network....................................................................................................................23
Types of Networks.........................................................................................................................24
IEEE802Addresses................................................................................................................28
Network topology..........................................................................................................................29
Bus Topology.........................................................................................................................31
Star Topology.........................................................................................................................32
Ring Topology.......................................................................................................................33
Mesh Networking..................................................................................................................35
Hybrid Topology....................................................................................................................36
Logical topologies.....................................................................................................................37
Ethernet..................................................................................................................................37
Local Talk..............................................................................................................................38
Activity 02.....................................................................................................................................40
Networking Devices..................................................................................................................40
Switch....................................................................................................................................41
Hub (Networking)..................................................................................................................42
C.Thanushanth NETWORKING 18
Bridge....................................................................................................................................43
Router....................................................................................................................................44
Gateway.................................................................................................................................45
Firewall..................................................................................................................................46
Repeater.................................................................................................................................47
Network Server..........................................................................................................................48
Types of Server......................................................................................................................49
Internet Protocol....................................................................................................................50
Activity 03.....................................................................................................................................52
Network design..........................................................................................................................52
Feedback Analysis.................................................................................................................55
Network Configurating..................................................................................................................59
VTP Creation.............................................................................................................................59
VLAN Creation.........................................................................................................................60
DHCP Server.............................................................................................................................63
Server Installation......................................................................................................................64
Activity 04.....................................................................................................................................69
Implemented Network...............................................................................................................70
Testing........................................................................................................................................79
Test Plan.....................................................................................................................................80
Test Case....................................................................................................................................81
Future recommendation.............................................................................................................87
Cloud Repatriation.................................................................................................................87
C.Thanushanth NETWORKING 19
5G Networking......................................................................................................................87
Edge Computing....................................................................................................................87
Referance.......................................................................................................................................88
C.Thanushanth NETWORKING 20
Table of Figure
Figure 1 PAN.................................................................................................................................25
Figure 2 LOCAL Area Network....................................................................................................26
Figure 3Metropolitan area network...............................................................................................27
Figure 4 Point to point topology....................................................................................................30
Figure 5 BUS topology..................................................................................................................31
Figure 6 Star Topology..................................................................................................................32
Figure 7 Ring Topology.................................................................................................................34
Figure 8 Mesh Topology................................................................................................................35
Figure 9 Hybrid Topology.............................................................................................................36
Figure 10 Network inetraface card................................................................................................40
Figure 11Network Switch..............................................................................................................41
Figure 12 Hub...............................................................................................................................42
Figure 13 Network Bridge.............................................................................................................43
Figure 14 Router............................................................................................................................44
Figure 15 Network Gateway..........................................................................................................45
Figure 16 Network Firewall...........................................................................................................46
Figure 31 Network Diagram..........................................................................................................53
Figure 32 IP address allocation......................................................................................................54
Figure 33Feedback 1......................................................................................................................55
Figure 34 Feedback 2.....................................................................................................................56
Figure 35 Feedback 3.....................................................................................................................57
Figure 36 VTP Server configuration..............................................................................................59
Figure 37 VTP Client configuration..............................................................................................59
Figure 38VLAN Creation..............................................................................................................60
Figure 39 VLAN Creation.............................................................................................................60
Figure 40 Before assigned vlan.....................................................................................................61
Figure 41 Assigning to VLAN.......................................................................................................61
Figure 42 After Assigned VLAN...................................................................................................62
Figure 43 Assigned ip address to server........................................................................................63
Figure 44 Creating gateway...........................................................................................................63
Figure 45 DHCP Pool....................................................................................................................64
Figure 46 Sesver OS Insatllation...................................................................................................64
C.Thanushanth NETWORKING 21
C.Thanushanth NETWORKING 22
Table of Table
Table 2 Server specification and cost............................................................................................51
Table 3 Feed back..........................................................................................................................58
Table 4 maintanance schedule.......................................................................................................69
Table 5 Test Plan............................................................................................................................80
Table 6 Test Case 1........................................................................................................................81
Table 7 Test Case 2........................................................................................................................81
Table 8 Test Case 2........................................................................................................................83
Table 9 Test Case 3........................................................................................................................84
Table 10 Test case 4.......................................................................................................................84
Table 11 Test Case 5......................................................................................................................86
C.Thanushanth NETWORKING 23
Activity 01
Discuss the benefits and constraints of different network system types that can be
implemented in the Matara branch and the main IEEE Ethernet standards that can be
used in above LAN and WLAN design.
Network
A computer network, also referred to as a data network, is a series of interconnected that can
transmit, receive and exchange data, voice and video traffic. Network devices use a variety
of protocols and algorithms to specify exactly how endpoints should transmit and receive
data. For example, the Ethernet standard establishes a common language for wired networks
to communicate, and the 802.11 standard does the same for wireless local area networks
(WLANs).
All packet switched networks use TCP/IP to establish a standard means of communication.
Each endpoint in a network has a unique identifier which is used to indicate the source or
destination of the transmission. Identifiers include the node's IP address or Media Access
Control (MAC) address. Endpoint nodes include switches and routers, servers, personal
computers, phones, networked printers and other peripheral computing devices, as well as
sensors and actuators. (Margaret Rouse 2006)
Benefits of network
1. Access flexibility
5. File sharing
6. Resource sharing
C.Thanushanth NETWORKING 24
Types of Networks
There are several different types of computer networks. Computer networks can be
characterized by their size as well as their purpose. The size of a network can be expressed
by the geographic area they occupy and the number of computers that are part of the
network. Networks can cover anything from a handful of devices within a single room to
millions of devices spread across the entire globe. (Study 2003)
In terms of purpose, many networks can be considered general purpose, which means they
are used for everything from sending files to a printer to accessing the Internet. Some types
of networks, however, serve a very particular purpose. Some of the different networks based
on their main purpose are:
C.Thanushanth NETWORKING 25
If multiple individuals use the same network within a residence, the network is sometimes
referred to as a home area network, or HAN. In a very typical setup, a residence will have a
single wired Internet connection connected to a modem. This modem then provides both
wired and wireless connections for multiple devices. The network is typically managed from
a single computer but can be accessed from any device. (Study 2003)
This type of network provides great flexibility. For example, it allows you to:
1. Send a document to the printer in the office upstairs while you are sitting on the
couch with your laptop.
2. Upload a photo from your cell phone to your desktop computer.
If this sounds familiar to you, you likely have a PAN in your house without having called it
by its name.
Figure 1 PAN
C.Thanushanth NETWORKING 26
A local area network, or LAN, consists of a computer network at a single site, typically an
individual office building. A LAN is very useful for sharing resources, such as data storage
and printers. LANs can be built with relatively inexpensive hardware, such as hubs, network
adapters and Ethernet cables.
The smallest LAN may only use two computers, while larger LANs can accommodate
thousands of computers. A LAN typically relies mostly on wired connections for increased
speed and security, but wireless connections can also be part of a LAN. High speed and
relatively low cost are the defining characteristics of LANs.(Study 2003)
LANs are typically used for single sites where people need to share resources among
themselves but not with the rest of the outside world. Think of an office building where
everybody should be able to access files on a central server or be able to print a document to
one or more central printers. Those tasks should be easy for everybody working in the same
office, but you would not want somebody just walking outside to be able to send a document
to the printer from their cell phone! If a local area network, or LAN, is entirely wireless, it is
referred to as a wireless local area network, or WLAN.
C.Thanushanth NETWORKING 27
A metropolitan area network, or MAN, consists of a computer network across an entire city,
college campus or small region. A MAN is larger than a LAN, which is typically limited to a
single building or site. Depending on the configuration, this type of network can cover an
area from several miles to tens of miles. A MAN is often used to connect several LANs
together to form a bigger network. When this type of network is specifically designed for a
college campus, it is sometimes referred to as a campus area network, or CAN. (Study 2003)
C.Thanushanth NETWORKING 28
IEEE802Addresses
All802protocols use the same address format 48-bit, globally unique addresses Advantage :
any interface can be plugged into any LAN world wide without danger of collision First
24bits : Organizationally Unique Identifier(OUI) Address space administered by IEEE,
assigned to organizations .Typically manufacturers of equipment( interfaces). Togetan OUI
currently costs $1650
1. 802.1Interconnection (Bridging)
2. 802.2LogicalLinkControl
4. 802.4TokenBusLAN
5. 802.5TokenRingLAN
6. 802.6MetropolitanAreaNetworks (DQDB)
7. 802.7BroadbandTAG
8. 802.8FiberOpticTAG
9. 802.9IsochronousLAN
10. 802.10Security
11. 802.11WirelessLAN
12. 802.12DemandPriority
13. 802.14CableModem
15. 802.16BroadbandWireless
16. 802.17ResilientPacketRing
17. 802.18RadioRegulatoryWG
18. 802.19CoexistenceTAG
19. 802.20MobileBroadbandWireless
20. 802.21MediaIndependentHandoff
21. 802.22WirelessRegionalAreaNetworks
C.Thanushanth NETWORKING 29
C.Thanushanth NETWORKING 30
Network topology
A network topology is the arrangement of a network, including its nodes and connecting
lines. There are two ways of defining network geometry: the physical topology and the
logical (or signal) topology.The physical topology of a network is the actual geometric
layout of workstations. There are several common physical topologies, as described below
and as shown in the illustration.
If a Token Ring protocol is used in a star or ring topology, the signal travels in only one
direction, carried by a so-called token from node to node. The mesh network topology
employs either of two schemes, called full mesh and partial mesh. In the full mesh topology,
each workstation is connected directly to each of the others. In the partial mesh topology,
some workstations are connected to all the others, and some are connected only to those
other nodes with which they exchange the most data. The tree network topology uses two or
more star networks connected together. The central computers of the star networks are
connected to a main bus. Thus, a tree network is a bus network of star networks.
1. Point to point
2. Bus
3. Star
4. Ring or circular
C.Thanushanth NETWORKING 31
5. Mesh
6. Tree
7. Hybrid
C.Thanushanth NETWORKING 32
C.Thanushanth NETWORKING 33
Bus Topology
Bus topology is a specific kind of network topology in which all of the various devices in
the network are connected to a single cable or line. In general, the term refers to how
various devices are set up in a network. One way to think about a bus topology is that the
line connected to all of the devices or nodes in the network is like an aisle along which a
signal travels in order to find the node to which it is to be delivered. Typically, the cable in
the bus topology has two end terminals that dampen the signal so that it does not keep
moving from one end of the network to the other. Different types of bus topology can be
referred to as linear or distributed bus topology. A linear bus topology implies that there is
just one line associated with two distinct endpoints. In a distributed bus topology, there may
be more than one linear pattern connected to the network.
Bus topologies are often valued for their simplicity and lower cost of implementation.
However, one drawback is that if the central line is compromised, the entire network will go
down.
C.Thanushanth NETWORKING 34
Star Topology
Star topology is a network topology where each individual piece of a network is attached to
a central node (often called a hub or switch). The attachment of these network pieces to the
central component is visually represented in a form similar to a star. Star topology is also
known as a star network.Star topologies are either active or passive networks, depending on
the following:
Star topologies also may be implemented with Ethernet/cabled structures, wireless routers
and/or other components. In many cases, the central hub is the server, and the additional
nodes are clients.Benefits of a star network topology include the following:
1. Has the ability to limit the impact of a single failure. In star networks, a single unit is
isolated by its relationship to the central hub, so that if a component goes down, it
only affects that unit's local reach.
2. Facilitates adding or removing individual components to and from a network, for the
same reasons.
C.Thanushanth NETWORKING 35
2. If the connecting network device (network switch) fails, nodes attached are disabled
and cannot participate in network communication.
3. More expensive than linear bus topology because of the cost of the connecting
devices (network switches).
Ring Topology
Ring topology refers to a specific kind of network setup in which devices are connected in a
ring and pass information to or from each other according to their adjacent proximity in the
ring structure. This type of topology is highly efficient and handles heavier loads better than
bus topology. A ring topology may also be called an active topology because messages are
passed to each device in the ring. Various types of ring topology setups work differently
based on which specific devices are being linked together to form a network. The
advantages of a ring topology include its ability to handle heavy network communications
better than some other setups, and the fact that in a ring structure, networks do not need a
central hub in order to function. Installation and troubleshooting are also relatively easy with
this kind of network.
One of the disadvantages of a ring topology is that just one failure to transmit data can
impact the entire network. In order to mitigate this problem, some ring topology setups use
what's called a dual-ring structure, where information is passed in both a clockwise and
counter-clockwise direction. These systems could be called redundant ring structures, where
there is a backup means of transmission in case a single transmission should fail.
C.Thanushanth NETWORKING 36
2. Ex: Let’s say A, B, C, D, and E are a part of the ring network. The data flow is from
A towards B and henceforth. In this condition, if E wants to send a packet to D, the
packet must traverse the entire network to reach D.
3. Single point of failure, that means if a node goes down entire network goes down.
C.Thanushanth NETWORKING 37
Mesh Networking
Mesh networking is a type of network topology in which a device (node) transmits its own
data as well as serves as a relay for other nodes. Routers are used to provide the best and
most efficient data path for effective communication. In the event of a hardware failure,
many routes are available to continue the network communication process. There are two
types of mesh networking topologies:
2. It is robust
2. Cabling cost is more and the most in case of a fully connected mesh topology 3.
Bulk wiring is required
C.Thanushanth NETWORKING 38
Hybrid Topology
A combination of two or more different topologies makes for a hybrid topology. When
different topologies are connected to one another, they do not display characteristics of any
one specific topology. This is when it becomes a hybrid topology. It is chosen when there are
more than two basic working topologies in place already, and these have to be connected to
one another. When there is a star topology connected to another star topology, it still remains
a star topology. However, when a star topology and bus topology are connected to one
another, it gives rise to the creation of a hybrid topology. Often when the topologies are
connected to one another, the layout of the resultant topology is difficult to comprehend,
however, the new topology works without any problems.
Advantages:
1. Very reliable and easy to detect the Faulty system.
2. Troubleshooting is easy.
4. It is an expandable network.
Disadvantages:
1. Its design is difficult to understand.
2. The cost of this network design is high, because of the requirement of a lot of cables,
cooling systems, etc.
3. MAU (Multi-station Access Unit) is required.
C.Thanushanth NETWORKING 39
Logical topologies
Logical (or signal) topology refers to the nature of the paths the signals follow from node to
node. In many instances, the logical topology is the same as the physical topology, but this is
not always the case. For example, some networks are physically laid out in a star
configuration, but they operate logically as bus or ring networks. Every LAN has a topology,
or the way that the devices on a network are arranged and how they communicate with each
other. The way that the workstations are connected to the network through the actual cables
that transmit data (the physical structure of the network) is called the physical topology.
The logical topology, in contrast, is the way that the signals act on the network media, or the
way that the data passes through the network from one device to the next without regard to
the physical interconnection of the devices. Logical topologies are bound to the network
protocols that direct how the data moves across a network. The Ethernet protocol is a
common logical bus topology protocol. Local Talk is a common logical bus or star topology
protocol. IBM's Token Ring is a common logical ring topology protocol. A network's logical
topology is not necessarily the same as its physical topology. For example, twisted pair
Ethernet is a logical bus topology in a physical star topology layout. While IBM's Token
Ring is a logical ring topology, it is physically set up in a star topology.
Ethernet
Ethernet is the traditional technology for connecting wired local area networks (LANs),
enabling devices to communicate with each other via a protocol a set of rules or common
network language. As a data-link layer protocol in the TCP/IP stack, Ethernet describes how
network devices can format and transmit data packets so other devices on the same local or
campus area network segment can recognize, receive and process them. An Ethernet cable is
the physical, encased wiring over which the data travels. Any device accessing a
geographically localized network using a cable i.e., with a wired rather than wireless
connection likely uses Ethernet whether in a home, school or office setting. From businesses
to gamers, diverse end users depend on the benefits of Ethernet connectivity, including
reliability and security.
Compared to wireless LAN technology, Ethernet is typically less vulnerable to disruptions
whether from radio wave interference, physical barriers or bandwidth hogs. It can also offer
a greater degree of network security and control than wireless technology, as devices must
connect using physical cabling making it difficult for outsiders to access network data or
C.Thanushanth NETWORKING 40
hijack bandwidth for unsanctioned devices. The Institute of Electrical and Electronics
Engineers Inc. (IEEE) specifies in the family of standards called IEEE 802.3 that the
Ethernet protocol touches both Layer 1 the physical layer and Layer 2 the data link layer on
the OSI network protocol model. Ethernet defines two units of transmission: packet and
frame. The frame includes not just the payload of data being transmitted, but also. The
physical media access control (MAC) addresses of both the sender and receiver; VLAN
tagging and quality of service information; and error correction information to detect
transmission problems. Each frame is wrapped in a packet that contains several bytes of
information to establish the connection and mark where the frame starts.
Engineers at Xerox first developed Ethernet in the 1970s. Ethernet initially ran over coaxial
cables, while a typical Ethernet LAN today uses special grades of twisted pair cables or
fiber optic cabling. Early Ethernet connected multiple devices into network segments
through hubs Layer 1 devices responsible for transporting network data using either a daisy
chain or star topology.
Local Talk
Local Talk was Apple’s early 1980s implementation of a physical networking interface for
Apple II and Macintosh computers. Local Talk used a system of shielded twisted-pair cables
plugged into self-terminating transceivers. The maximum data rate was 230 Kbps. The
system uses either an older 3-pin mini-DIN or later 8-pin connectors. The Local Talk system
consisted of a built-in controller, with cables and expansion cards sometimes required. It
enabled daisychaining, which is connecting a sequence of devices to each other using the
Local Talk cables. A cheaper variation of Local Talk called Phone Net was introduced by
Farallon Computing. Phone Net rode on the existing standard telephone cables and
connectors using unshielded twisted-pair cabling. Local Talk used expensive twisted pairs of
cabling. Phone Net enabled users to split their home phone connections into two, one going
to the telephone jack and the other to their Apple or Macintosh computer. The introduction
of Ethernet in the early 1990s quickly made
Local Talk an obsolete networking medium. PCs produced by Apple’s competitors only
supported the now familiar Ethernet standard with its 10 Mbps transfer speed. Apple itself
ditched Local Talk with the release of the iMac in 1998. A few Local Talk-to-Ethernet
converters were made to allow older devices, mainly printers, to work on the newer
networks.
C.Thanushanth NETWORKING 41
4. The destination node copies the message data and returns the token to the source
with the source address and a data receipt message.
5. The source receives the returned token, verifies copied and received data and empties
the token.
6. The empty token now changes to circulation mode, and the process continues.
C.Thanushanth NETWORKING 42
Activity 02
Networking Devices
C.Thanushanth NETWORKING 43
Switch
In a network, a switch is a device that channels incoming data from any of multiple input
ports to the specific output port that will take it toward its intended destination. In a local
area network (LAN) using Ethernet, a network switch determines where to send each
incoming message frame by looking at the physical device address (also known as the
Media Access Control address or MAC address). Switches maintain tables that match each
MAC address to the port from which the MAC address has been received. If a frame is to be
forwarded to a MAC address that is unknown to the switch infrastructure, it is flooded to all
ports in the switching domain. Broadcast and multicast frames are also flooded. This is
known as BUM flooding -- broadcast, unknown unicast, and multicast flooding. This
capability makes a switch a Layer 2 or data-link layer device in the Open Systems
Interconnection (OSI) communications model.
C.Thanushanth NETWORKING 44
Hub (Networking)
A network operates at a high level of exigency with multitudinous requirements for security
along with compliance. It’s a vast domain with divergent devices connected by an array of
exclusive tools and administrators. A hub is the most basic device in computer networking
that connects multiple computers or Ethernet-based devices together. Unlike a network
switch, a hub is less sophisticated because it has no routing tables or intelligence on where
to send information and broadcast all network data across each connection, hence it is
sometimes referred as “dumb switches”.
A network hub is a small rectangular box that receives its power from an ordinary wall
outlet. A hub is considered to be the least intelligent among switch and a router because it
transmits everything that comes in to the every one of its ports. An Ethernet hub is
categorized as layer 1 devices in the Open Systems Interconnection (OSI) reference model.
OSI reference models are basically a guide so that the digital communication product and
the software will interoperate to facilitate clear comparisons among communications tools.
A hub can be useful for temporarily replacing a broken network switch or when
performance is not a crucial factor on the network.
Most hubs detect typical problems such as collision because if two network devices on the
same network try to send packets at the same time can cause excessive jabbering on
individual ports. This is extenuated in terms of switches and routers, as each port represents
a separate collision domain. It also raises security concerns because it cannot filter traffic
and hence it cannot be protected and quarantined.
C.Thanushanth NETWORKING 45
Figure 12 Hub
Bridge
A bridge is a type of computer network device that provides interconnection with other
bridge networks that use the same protocol. Bridge devices work at the data link layer of the
Open System Interconnect (OSI) model, connecting two different networks together and
providing communication between them. Bridges are similar to repeaters and hubs in that
they broadcast data to every node. However, bridges maintain the media access control
(MAC) address table as soon as they discover new segments, so subsequent transmissions
are sent to only to the desired recipient. Bridges are also known as Layer 2 switches.
A network bridge device is primarily used in local area networks because they can
potentially flood and clog a large network thanks to their ability to broadcast data to all the
nodes if they don’t know the destination node's MAC address.
A bridge uses a database to ascertain where to pass, transmit or discard the data frame.
1. If the frame received by the bridge is meant for a segment that resides on the same
host network, it will pass the frame to that node and the receiving bridge will then
discard it.
2. If the bridge receives a frame whose node MAC address is of the connected network,
it will forward the frame toward it.
C.Thanushanth NETWORKING 46
Router
A router is a device that analyzes the contents of data packets transmitted within a network
or to another network. Routers determine whether the source and destination are on the
same network or whether data must be transferred from one network type to another, which
requires encapsulating the data packet with routing protocol header information for the new
network type.
Based on designs developed in the 1960s, the Advanced Research Projects Agency Network
(ARPANET) was created in 1969 by the U.S. Department of Defense. This early network
design was based on circuit switching. The first device to function as a router was the
Interface Message Processors that made up ARPANET to form the first data packet
network.
The initial idea for a router, which was then called a gateway, came from a group of
computer networking researchers who formed an organization called the International
Network Working Group, which became a subcommittee of the International Federation for
Information Processing in1972. In 1974, the first true router was developed and by 1976,
three PDP-11-based routers were used to form a prototype experimental version of the
Internet. From the mid-1970s to the 1980s, mini-computers were used as routers. Today,
high-speed modern routers are actually very specialized computers with extra hardware for
rapid data packet forwarding and specialized security functions such as encryption.
When several routers are used in a collection of interconnected networks, they exchange and
analyze information, and then build a table of the preferred routes and the rules for
determining routes and destinations for that data. As a network interface, routers convert
computer signals from one standard protocol to another that's more appropriate for the
destination network.
Figure 14 Router
C.Thanushanth NETWORKING 47
Gateway
A gateway is a data communication device that provides a remote network with connectivity
to a host network. A gateway device provides communication to a remote network or an
autonomous system that is out of bounds for the host network nodes. Gateways serve as the
entry and exit point of a network; all data routed inward or outward must first pass through
and communicate with the gateway in order to use routing paths. Generally, a router is
configured to work as a gateway device in computer networks.
Any network has a boundary or a limit, so all communication placed within that network is
conducted using the devices attached to it, including switches and routers. If a network node
wants to communicate with a node/network that resides outsides of that network or
autonomous system, the network will require the services of a gateway, which is familiar
with the routing path of other remote networks.
The gateway (or default gateway) is implemented at the boundary of a network to manage
all the data communication that is routed internally or externally from that network. Besides
routing packets, gateways also possess information about the host network's internal paths
and the learned path of different remote networks. If a network node wants to communicate
with a foreign network, it will pass the data packet to the gateway, which then routes it to
the destination using the best possible path.
C.Thanushanth NETWORKING 48
Firewall
In computing, a firewall is software or firmware that enforces a set of rules about what data
packets will be allowed to enter or leave a network. Firewalls are incorporated into a wide
variety of networked devices to filter traffic and lower the risk that malicious packets
traveling over the public internet can impact the security of a private network. Firewalls
may also be purchased as stand-alone software applications. The term firewall is a metaphor
that compares a type of physical barrier that's put in place to limit the damage a fire can
cause, with a virtual barrier that's put in place to limit damage from an external or internal
cyberattack. When located at the perimeter of a network, firewalls provide low-level
network protection, as well as important logging and auditing functions. While the two main
types of firewalls are host-based and network-based, there are many different types that can
be found in different places and controlling different activities. A host-based firewall is
installed on individual servers and
monitors incoming and outgoing signals
C.Thanushanth NETWORKING 49
Types of firewalls
Other types of firewalls include packet-filtering firewalls, stateful inspection firewalls, proxy
firewalls and next-generation firewalls (NGFWs).
1. A packet-filtering firewall examines packets in isolation and does not know the
packet's context.
3. A proxy firewall inspects packets at the application layer of the Open Systems
Interconnection (OSI) reference model.
Repeater
A repeater is a network device that retransmits a received signal with more power and to an
extended geographical or topological network boundary than what would be capable with
the original signal. A repeater is implemented in computer networks to expand the coverage
area of the network, repropagate a weak or broken signal and or service remote nodes.
Repeaters amplify the received/input signal to a higher frequency domain so that it is
reusable, scalable and available. Repeaters were introduced in wired data communication
networks due to the limitation of a signal in propagating over a longer distance and now are
a common installation in wireless networks for expanding cell size. Repeaters are also
known as signal boosters. Every operational computer or data communications network has
a specific boundary in which it can service the connected and authorized hosts/nodes. It is a
planned network scope, but sometimes the network needs to extend its routing domain
further to accommodate a new/existing host, or to improve the service level in a specific
topological domain. In such scenarios, a network uses the service of a repeater, which
amplifies the received signal to an ideal or near-ideal strength so that destination/receiving
nodes can receive the data. The installation of repeaters is critical in those domains, where
attenuation and signal loss is very crucial. Repeaters are generally considered to be
nonlogical devices because they propagate every signal regardless of its size, type ,ect…
C.Thanushanth NETWORKING 50
Network Server
A network server is a computer designed to act as central repository and help in providing
various resources like hardware access, disk space, printer access, etc. to other computers in
the network. A network server might not differ from a workstation in hardware, but the
functionality it performs clearly differentiates it from other workstations. Network servers
helps in simplifying the different tasks for system administrators including those centering
around management. Any configuration or security updates can be applied to a network
server instead of individually passing to different computers connected to the network.
Factors influencing the choice of utilizing a network server:
1. FTP Server
2. Proxy Server
4. Web Server
5. Application Server
6. List Server
7. Chat Server
8. IRC Server
9. Fax Server
C.Thanushanth NETWORKING 51
1. Computers are provided with more memory and storage capacity and also are
configured to do additional processing to handle the different client requests.
2. Machines are usually high performing personal computers with reliable and fast hard
disks, powerful processors and high amounts of available RAM.
3. Can also act as a central file storage unit. This can prevent data being stored in
different workstations in the network.
4. Authentication and user control can be set on another workstation using a network
server.
5. Security control measures can be more convenient to manage using a network server.
7. Some of the common examples of network servers are FTP servers and web servers.
Types of Server
Web Server
A web server is a server that is part of larger package for intranet and internet. That enable
to host an internet website. There are main two types of web servers using through
Microsoft IIS, Apache an apache server is open source.it built by apache software
foundation.
File Server
A file server that provide to access files it can be access multiple systems because that
provide centralized disk storage can be shared for client computers through network.
Usually file server used for enterprise system’s that acts faster to access entire data and
managing storage capacity more than non-dedicated system.
Database Server
Database server is a computer system that provide other computer with services related to
accessing and retrieving data from a database. access to the database server may be though
an application via a front end running and displayed on a user‘s machine such as
C.Thanushanth NETWORKING 52
phpMyAdmin or back end running on the database server itself from the command prompt
using a command
such as MySQL (webopedia, 2017)
Application Server
The application server is framework, an environment where application can run no matter
what
they are function they perform. This serve can be used to develop and run web based
application. There are many number of different application servers, including java, PHP
and .NET frame work application servers
Internet Protocol
IP is the primary protocol in the Internet Layer of the Internet Protocol Suite, which is a set
of
communications protocols consisting of four abstraction layers: link layer (lowest), Internet
layer, transport layer and application layer (highest).
Addressing
In command to perform the work of carrying datagrams, IP need know where to bring them
to!
For this reason, IP contains a machine for host addressing. Additionally, since IP functions
over internetworks, its structure is designed to allow distinctive addressing of devices across
randomly huge networks
Data Encapsulation and Formatting/Packaging
In place of the TCP/IP network layer protocol, IP takes data as of the transport layer
protocols
UDP and TCP. It then summarizes this data into an IP datagram spending an exceptional
format previous to transmission.
Fragmentation and Reassembly
IP datagrams are handed downhearted to the data link layer for transmission on the local
network. Though, the extreme frame size of to each physical/data-link network using IP
C.Thanushanth NETWORKING 53
may
be changed. For this purpose, IP includes the capability to fragment IP datagrams into pieces
so they can each be accepted on the local network.
Routing / Indirect Delivery
When an IP datagram must be sent to a destination on the same local network, this can be
done
easily using the network's underlying LAN/WLAN/WAN protocol using what is sometimes
called direct delivery. datagram through intermediate devices (shockingly
called routers). IP accomplishes this in concert with support from the other protocols
including ICMP and the TCP/IP gateway/routing protocols such as RIP and BGP.
(tcpipguide,
2005)
C.Thanushanth NETWORKING 54
C.Thanushanth NETWORKING 55
Activity 03
Network design
When planning a network two things need to be considered namely designing and
Implementation. To build a good effective network we need to be identify network
requirements and select the best solutions to meet the needs of customer. There are some
steps to follow.
Step 1
Achieve business's requirements for performance, capacity and network ports. Meet with
co-workers from each area of Enclave film company to understand their application and
potential expansion requirements.
Step 2
Plan and design the cable layout. Cabling plays an important part of network design as it
provides the physical communication path for the Enclave film company.
Step 3
Analyze network performance in its current state. Use protocol analyzers and network
management software and perform the analysis at various times of a business day, such as at
the start of shifts, and during periods that typically result in increased traffic, such as
running deadlines Heavy work load or moving complex engineering data over the network.
Step 4
Collect information from existing physical and logical network diagrams to support the
current state design of the Enclave Film Company. Identify routers, switches, LAN uplink
bandwidth, network equipment and current standards for the wireless Access. For the
logical design, obtain current information for the IP address design for the LAN including
virtual LAN information and connectivity requirements, Is because of more building A and
B is present.
Step 5
Develop an IP address design that meets growth requirements and selects a routing protocol
for the network to support fast convergence with ease of management.
C.Thanushanth NETWORKING 56
C.Thanushanth NETWORKING 57
C.Thanushanth NETWORKING 58
Feedback Analysis
Feedback for the above Questionnaire was collect from 12 Users. In addition, presented
using
Percentage.
Figure 19Feedback 1
C.Thanushanth NETWORKING 59
Figure 20 Feedback 2
C.Thanushanth NETWORKING 60
Figure 21 Feedback 3
C.Thanushanth NETWORKING 61
According to the feedbacks received, I understood that the users are highly satisfied with the
friendliness of the system. They were satisfied with the output. The security of the system is
moderate but a firewall is required to enhance the security of the system. A firewall. A
firewall
helps to protect the system from third party access. So, a firewall will be connected I the
near
future.
C.Thanushanth NETWORKING 62
Network Configurating
VTP Creation
C.Thanushanth NETWORKING 63
VLAN Creation
C.Thanushanth NETWORKING 64
C.Thanushanth NETWORKING 65
C.Thanushanth NETWORKING 66
DHCP Server
C.Thanushanth NETWORKING 67
Server Installation
C.Thanushanth NETWORKING 68
C.Thanushanth NETWORKING 69
C.Thanushanth NETWORKING 70
C.Thanushanth NETWORKING 71
C.Thanushanth NETWORKING 72
Activity 04
After all details are finalized and upgrade design strategy complete, the implementation of
the network upgrade will transpire with minimal or no downtime within SYNTAX. As part
of our implementation plan, an initial network test will occur. This will be done during off-
hours to minimize possible problems; however, the final test will be done during normal
business hours to completely evaluate the network upgrade performance. The following
items below will be completely under evaluation.
1. Verify the design upgrade meets key business and technical goals.
C.Thanushanth NETWORKING 73
7. Determine the optimization techniques to meet performance and other technical goals.
8. Analyze the effects on performance while the upgrade of network links or devices is
under construction ("what-if analyses").
9. Identify any risks that can impede implementation and determine the plans for
contingencies.
The following are considerations to experience while a "live" test is under implementation:
1. Warn users in advance about the timing of tests so they can expect some performance
degradation, but ask the users to work as they typically do to avoid invalidating the
test by abnormal behavior. Moreover, have the users report any issues that arise
during the live test.
2. Warn network administrators and other designers in advance to avoid the possibility
that they could be running tests at the same time.
3. Warn network managers in advance, so they are not confused by unexpected alarms
on network-management consoles, and so they can account for test traffic when
documenting load and availability statistics.
4. If possible, we will run multiple, short (less than 2-minute) tests to minimize user
impact and lessen the effects on baseline measurements.
Implemented Network
C.Thanushanth NETWORKING 74
C.Thanushanth NETWORKING 75
C.Thanushanth NETWORKING 76
C.Thanushanth NETWORKING 77
C.Thanushanth NETWORKING 78
C.Thanushanth NETWORKING 79
C.Thanushanth NETWORKING 80
C.Thanushanth NETWORKING 81
C.Thanushanth NETWORKING 82
Testing
Tech When testing
Description Tester Name Test Date Network, the
Case No
send ping from pc 11 tester has to
1 to DHCP server nishan 2021/05/10 know about
10.254.1.10 some code of
Ping test Form ping, ipconfig
2 customer vlan Thanushanth 2021/05/10 and send a
SYNATX Web server file through
Form customer vlan the network.
3 accessing SYNATX irshath 2021/05/10 To
Web server destination
Extented ping to web
4 Shan 2021/05/10 Computer. by
server from customer
5 Telnet access Pakeerathan 2021/05/10 the way the
network testing, the tester
needs a good knowledge of network concepts such as ping, send files, accessing the internet
and trace route
Scope
Enclave film company network is much different from other networks, because there lot of
features like they can share lot of data inside the park, they can upload the videos very
quickly
to the web site.
Test objectives
Checks the performance of the functions.
Most importantly finding some errors
Test Plan
C.Thanushanth NETWORKING 83
C.Thanushanth NETWORKING 84
Test Case
Test case Pass
Input expected results actual results
No or fail
Ping test Form
Ping PASS
1 customer vlan Ping sucessfull
192.168.1.6
SYNATX Web server
Table 5 Test Case 1
C.Thanushanth NETWORKING 85
C.Thanushanth NETWORKING 86
This test placed after assigned web ser to the server vlan
C.Thanushanth NETWORKING 87
C.Thanushanth NETWORKING 88
C.Thanushanth NETWORKING 89
C.Thanushanth NETWORKING 90
Future recommendation
Cloud Repatriation
Cloud repatriation or unclouding is a form of reverse-migration. It involves the transfer of
applications and certain workloads from the public cloud to on-premise infrastructure.
The technology is gaining popularity amongst businesses today and it’s not unsurprising,
giving its benefits. Not only does it offer more control to organizations, but private clouds
also enhances compliance, resources management, and help reduce the risks and frequency
of cyberthreats.
The cost-saving measures of this trend are an added perk.
5G Networking
5G is the latest in mobile internet connectivity. It not only allows for greater speed, and a
higher number of connected devices, but network slicing as well.
Network slicing is the creation of subnetworks – by separating multiple virtual networks
operating on the same network infrastructure – to fulfill specific needs required by different
applications. 5G is also designed to improve connectivity among devices and enhance data
transmission.
This has the potential to transform business models and the network industry as we know it.
Edge Computing
This is another networking technology that has the potential to improve operational
efficiency in businesses and organizations. Edge computing is a consumer-focused
technology that is used to optimize data collection and processing.
If utilized effectively, it can improve the performance of business platforms by reducing
traffic loads and eliminating latency for speedy data analysis and better security.
Once you leverage top networking technologies, we can guarantee that your company
continues to have access to the critical information you require to keep things running
smoothly and efficiently.
C.Thanushanth NETWORKING 91
References
https://afteracademy.com/blog/what-is-network-topology-and-types-of-network-
topology
https://afteracademy.com/blog/what-is-network-topology-and-types-of-network-
topology
https://beginnersbook.com/2019/03/computer-network-topology-mesh-star-bus-
ring-and-hybrid/
https://blog.netwrix.com/2019/01/08/network-devices-explained/
https://purple.ai/blogs/whats-the-difference-between-a-lan-and-a-wan/
https://www.elprocus.com/what-are-network-devices-and-their-types/
https://www.geeksforgeeks.org/difference-between-lan-and-wan/
https://www.ieee.org/about/
https://www.omnisecu.com/basic-networking/lan-and-wan-local-area-network-and-
wide-area-network.php
https://www.pcmag.com/encyclopedia/term/network-device
https://www.tutorialspoint.com/communication_technologies/communication_tech
nologies_network_devices.htm
C.Thanushanth NETWORKING 92
C.Thanushanth NETWORKING 93