0% found this document useful (0 votes)
45 views

Balalo Norbert Unit 9 Networking - Assignment

GBS Digital Technologies Unit 9 Networking - Assignment

Uploaded by

horsmanpaulina
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views

Balalo Norbert Unit 9 Networking - Assignment

GBS Digital Technologies Unit 9 Networking - Assignment

Uploaded by

horsmanpaulina
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 28

networking design and implementation for bio tek company

Unit 9: Networking
Table of Contents
Introduction...........................................................................................................................................3
Part 1: Networking Principles, Protocols and Operations for BioTek............................................3
LO1: Networking principles and their protocols..........................................................................3
Network Standards and Protocols..............................................................................................8
What are Network Standards?...........................................................................................................8
What are Network Protocols?..........................................................................................................10
Impact of different types of network topologies......................................................................11
What is network topology?..............................................................................................................12
Impact of Network Topologies............................................................................................................12
Communication and bandwidth requirements.....................................................................................13
Networking Principles........................................................................................................................14
Networking devices and Operating Principles Of Network Devices...................................................15
Network Switch...................................................................................................................................15
Operating Principle of a Network Switch........................................................................................15
Network Router...................................................................................................................................16
Operating Principle of a Network Router........................................................................................16
Network Hub.......................................................................................................................................16
Operating Principle of a Network Hub............................................................................................16
Repeater...........................................................................................................................................16
Operating Principle of a Network Repeater.....................................................................................16
Network Servers..................................................................................................................................16
DHCP Server.......................................................................................................................................17
Operating Principle of a DHCP Server............................................................................................17
HTTP Server.......................................................................................................................................17
Operating Principle of a HTTP Server.............................................................................................17
FTP Server...........................................................................................................................................17
Operating Principle of an FTP Server..............................................................................................17
Relationship between workstation hardware and network software....................................................17
Suitable Servers for the given scenario....................................................................................18
Recommendation of topology for BioTek Company Mesh Topology....................................18
Part 2: Design and Implementation of BioTek Network System...................................................18
LO3 Designing of efficient networked systems............................................................................18
Network Design Goal for Bio Tek............................................................................................18

1
Evaluation of network design...................................................................................................25
1. Purpose of Network...........................................................................................................25
2. Type of Network................................................................................................................25
3. Network Metric for performance Evaluation (bandwidth, latency, packet loss, and jitter)
25
Network system maintenance schedule....................................................................................25
LO4 Implementing and diagnosing networked systems.............................................................26
Implementation of network system..........................................................................................26
Conclusion and recommendations............................................................................................26
References..........................................................................................................................................26

2
"I confirm I have read and understood the above Student Declaration." (“lo1 unit
4.docx - • I confirm I have read and understood...”)

Student Name (print) Norbert Balalo

Signature Norbert Balalo

Date 26.12.2023

Introduction

This report offers a comprehensive analysis of the advantages and disadvantages associated
with various network types and protocols. Additionally, it highlights the significance of
network topology, communication, and bandwidth requirements. It also delves into the
operational principles of networking devices and server varieties, as well as the
interdependencies between workstation hardware and relevant networking applications.
Develop a networked system that satisfies specific requirements, followed by rigorous testing
and evaluation to ensure conformity with specifications. Analyze user feedback to improve
the design. Implement a networked system according to a predetermined design plan.
Document and compare actual test results with expected outcomes.

Part 1: Networking Principles, Protocols and Operations for BioTek

3
LO1: Networking principles and their protocols

There are several network types, including:


1. Area Network (LAN): A LAN is a network that connects devices within a
limited area, such as a home, office, or school. (“Data Communication Group
| PDF | Transmission Medium | Computer Network”) This type of network is
typically used to share resources, such as files, printers, and internet
connections.

Benefits of Local Area Network (LAN):

 Resource Sharing: One of the primary benefits of a LAN is the ability


to share resources, such as printers, scanners, and storage devices,
among multiple users. This can save time and money by reducing the
need for duplicate resources.

 File Sharing: LANs enable easy file sharing between devices


connected to the network, making it easier for users to collaborate on
projects and share information.

 Centralized Administration: LANs can be managed centrally,


simplifying administration tasks like software updates, security
patches, and user account management.

 Increased Efficiency: LANs can improve work efficiency by providing


faster access to shared resources and applications and reducing the
time and effort required to transfer files and data.

4
 Improved Communication: LANs can enhance communication among
users by allowing them to share data and collaborate in real time.

Constraints of Local Area Network (LAN):

 Limited Range: LANs are limited in their coverage area, which means
they are unsuitable for connecting devices located far apart.

 Security Risks: LANs are vulnerable to security threats, such as


viruses, malware, and hacking. Proper security measures, such as
firewalls, antivirus software, and regular updates, must be
implemented to mitigate these risks.

 Dependence on Cables: Most LANs require connecting devices,


limiting mobility and flexibility.

 Cost: Setting up a LAN can be expensive, especially for small


businesses or home users. The cost of hardware, software, and
maintenance must be considered.

 Complexity: LANs can be complex to set up and manage, especially


for users without technical expertise. Proper training and support are
required to ensure efficient use of the network.

2. "Wide Area Network (WAN): A WAN is a network that spans a large


geographic area, such as a city, country, or even the world." (“Networking
Technology – May Mall”) This type of network is typically used to connect
remote locations and allows for communication over long distances.

5
Benefits of Wide Area Network (WAN):

 Geographic Reach: WANs can connect devices over a wide


geographic area, such as between cities or countries, which makes
them ideal for businesses with multiple locations or remote workers.

 Resource Sharing: WANs allow for the sharing of resources, such as


servers, storage devices, and applications, across multiple locations,
which can improve efficiency and reduce costs.

 Improved Collaboration: WANs enable real-time collaboration and


communication between geographically dispersed teams, improving
productivity and decision-making.

 Scalability: WANs can be scaled up or down depending on the


changing needs of an organization, making them flexible and
adaptable to business growth or contraction.

 Increased Business Continuity: WANs can improve business


continuity by providing redundant connectivity and backup options in
case of network failures or disasters.

Constraints of Wide Area Network (WAN):

 Cost: WANs can be expensive to set up and maintain, especially for


businesses with multiple locations or complex network requirements.

6
 Security Risks: WANs are vulnerable to security threats, such as
hacking, data breaches, and unauthorized access, due to the
comprehensive area coverage and multiple connection points. Proper
security measures, such as firewalls, encryption, and access controls,
must be implemented to mitigate these risks.

 Dependence on Service Providers: WANs rely on service providers,


such as ISPs, telecom companies, and cloud providers, which can lead
to dependency issues, lack of control, and service disruptions.

 Network Performance: WANs can suffer from network latency,


congestion, and bandwidth limitations, which can affect application
performance and user experience.

 Complexity: WANs can be complex to manage, especially for non-


technical users. Proper training and support are required to ensure
efficient use of the network.


3. Metropolitan Area Network (MAN): A MAN is a network that covers a larger
area than a LAN but is smaller than a WAN. (“Advantages and Disadvantages
of Metropolitan Area Network (MAN)”) It typically connects multiple LANs
within a city or metropolitan area

Benefits of Metropolitan Area Network (MAN):

 Increased Bandwidth: MANs provide higher bandwidth than Local


Area Networks (LANs), allowing faster data transfer and access to
shared resources.

7
 Scalability: MANs can be scaled up or down depending on the
changing needs of an organization, making them flexible and
adaptable to business growth or contraction.

 Resource Sharing: MANs allow for the sharing of resources, such as


servers, storage devices, and applications, among multiple
organizations or departments, which can improve efficiency and
reduce costs.

 Improved Collaboration: MANs enable real-time collaboration and


communication between different organizations or departments within
a city or metropolitan area, improving productivity and decision-
making.

 Business Continuity: MANs can improve business continuity by


providing redundant connectivity and backup options in case of
network failures or disasters.

Constraints of Metropolitan Area Network (MAN):

 Cost: MANs can be expensive to set up and maintain, especially for


businesses with multiple locations or complex network requirements.

 Security Risks: MANs are vulnerable to security threats, such as


hacking, data breaches, and unauthorized access, due to the extensive
area coverage and multiple connection points. Proper security
measures, such as firewalls, encryption, and access controls, must be
implemented to mitigate these risks.

 Dependence on Service Providers: MANs rely on service providers,


such as ISPs, telecom companies, and cloud providers, which can lead
to dependency issues, lack of control, and service disruptions.

 Network Performance: MANs can suffer from network latency,


congestion, and bandwidth limitations, affecting application
performance and user experience.

 Complexity: MANs can be complex to manage, especially for non-


technical users. Proper training and support are required to ensure
efficient use of the network.

8
Network Standards and Protocols

What are Network Standards?

Network standards refer to guidelines, protocols, and specifications that define how computer
networks should operate and communicate with each other. These standards ensure
interoperability between different devices and applications from various vendors, allowing
them to work together seamlessly. Network standards cover multiple aspects of network
communication, such as physical layer connections, data transfer rates, network topology,
data formats, and error handling. Standardization bodies, such as the International
Organization for Standardization (ISO) and the Institute of Electrical and Electronics
Engineers (IEEE), develop and maintain these standards through a collaborative process that
involves industry experts and stakeholders. Adhering to network standards promotes
efficiency, reliability, and security in network communication and facilitates the development
of innovative and compatible technologies.
Some common examples include:

IEEE 802.11

 It is a set of wireless local area network (WLAN) standards developed by the Institute
of Electrical and Electronics Engineers (IEEE). These standards specify the protocols
and technologies for wireless communication between devices within a LAN, such as
laptops, smartphones, and wireless access points. The IEEE 802.11 family includes
various standards, such as 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, and
802.11ax, each with different data transfer rates, frequencies, and modulation
techniques.

Some key features of IEEE 802.11 standards include:

o Compatibility: All IEEE 802.11 standards are designed to be backwards


compatible, which means that newer devices can work with older access
points and vice versa. Security: IEEE 802.11 standards include security
protocols, such as Wired Equivalent Privacy (WEP), Wi-Fi Protected Access
(WPA), and WPA2, to ensure secure wireless communication and prevent
unauthorized access.

9
o Quality of Service (QoS): IEEE 802.11 standards support QoS features, such
as prioritization of traffic and bandwidth management, to ensure critical
applications receive adequate network resources.
o Range and Speed: IEEE 802.11 standards provide varying range and speed
capabilities, depending on the frequency and modulation techniques used. For
example, 802.11a offers higher speed but a shorter range than 802.11b.
o IEEE 802.11 standards have revolutionized wireless communication and
enabled the proliferation of wireless devices and applications. They continue
to evolve and improve to meet the growing demands of wireless
communication in various industries, such as healthcare, education,
transportation, and entertainment.

IEEE 802.1s - Multiple spanning tree

 IEEE 802.1s, also known as Multiple Spanning Tree Protocol (MSTP), is a


networking standard that enables the creation of multiple spanning trees on a network.
It is an extension of the original Spanning Tree Protocol (STP), which prevents
network loops by identifying and disabling redundant links between switches.
MSTP improves on STP by allowing the network administrator to divide the network
into multiple regions, each with its spanning tree. This allows for greater flexibility in
network design and better utilization of network resources.

Some key features of IEEE 802.1s include:

o Multiple Spanning Trees: MSTP enables the creation of numerous spanning


trees on a network, which can be customized based on the topology and traffic
flow of the network.
o Regions: MSTP divides the network into multiple areas, with each part having
its spanning tree. This allows for better scalability and flexibility in network
design.
o VLANs: MSTP can be used with VLANs (Virtual LANs) to further segment
and manage network traffic.
o Compatibility: MSTP is backwards compatible with STP, meaning it can work
with legacy switches and networks that use STP.

10
o Rapid Convergence: MSTP provides fast convergence times in the event of a
network failure or topology change, which reduces downtime and improves
network reliability.

IEEE 802.1s MSTP is widely used in enterprise networks, data centres, and service
provider networks to provide a scalable, flexible, and reliable network infrastructure.
Communication enabled the proliferation of wireless devices and applications. They
continue to evolve and improve to meet the growing demands of wireless
communication in various industries, such as healthcare, education, transportation,
and entertainment.

What are Network Protocols?

Network protocols are rules and standards that govern the communication between devices
on a computer network. They define the format and sequence of messages exchanged
between devices, as well as the procedures for error handling, authentication, and encryption.
Network protocols enable different devices, operating systems, and applications to
communicate with each other in a standardized and efficient manner. Some standard network
protocols include TCP/IP, HTTP, FTP, SMTP, DNS, and SNMP. Each protocol is designed
for a specific purpose and operates at a particular layer of the network stack. Adhering to
network protocols ensures that devices and applications can interoperate seamlessly and
communicate effectively on a network.
Common examples are:

 Telnet
o Telnet is a protocol used to establish a remote terminal session on a networked
device. It allows a user to connect to and control a remote device, such as a
server, Router, or switch as if they were sitting in front of it. Telnet works by
establishing a virtual terminal session between the local and remote devices,
which allows the user to send commands and receive responses in real time.
Telnet uses the Transmission Control Protocol (TCP) as its underlying
transport protocol, which ensures reliable and error-free communication.
Although Telnet is still used in some environments, it has largely been
replaced by more secure protocols such as SSH (Secure Shell), which provide
more robust encryption and authentication mechanisms.
 DNS: Domain Name System protocol

11
o The Domain Name System (DNS) protocol is a fundamental component of the
internet infrastructure that enables the translation of human-readable domain
names, such as www.example.com, into IP addresses, such as 192.0.2.1. DNS
operates as a distributed hierarchical system, with a global network of DNS
servers that work together to resolve domain name queries. DNS servers store
and distribute DNS records that contain information about domain names and
their associated IP addresses, as well as other details such as mail server
records and security policies. When a user enters a domain name in their web
browser or email client, the DNS protocol is used to locate and retrieve the
associated IP address. DNS is critical to the functioning of the internet, as it
allows users to access websites and services using easy-to-remember domain
names rather than complex IP addresses.

Impact of different types of network topologies

What is network topology?


Network topology refers to the physical or logical arrangement of devices, nodes (this could
include network switches, servers, routers and end-devices), and connections in a computer
network. It defines how nodes, devices, and cables are arranged and interconnected to form a
communication network.

Network topology can be described as the arrangement of nodes as well as other connections
in the network,

Impact of Network Topologies


 Bus Topology

Bus topology is a network topology where all devices are connected to a single
communication cable, called a bus or backbone. In this topology, data is transmitted
along the cable from one end to the other, and each device on the network listens to
the data transmitted on the bus and accepts only the intended data. Bus topology is
simple to set up and cost-effective for small networks, but it can suffer from
performance issues as more devices are added, and the entire network can fail if the
backbone cable fails.

12
Figure 1: Bus Topology

Advantages: Disadvantages:

Easy to install. This can lead to congestion which


slows down performance during a
busy period.

Requires fewer cabling. Not fault tolerant- a breakage in


the main cable can bring down the
entire network.

Employed in small office Reduced efficiency with increasing


and home (SOHO) endpoint devices.
networks.

Cost less than mesh


networks.

Easily expanded and


managed.

13
Communication and bandwidth requirements

For any topology, it is important the following is considered for good communication
performance:

 Estimation of traffic flow


o Estimating traffic flow involves analyzing the expected amount and types of
data traffic in a network topology to determine the required bandwidth and
resources. This helps ensure the network can handle the expected traffic and
achieve optimal performance.
 Create a visual map of traffic flow.
o Creating a visual map of traffic flow is important for any topology because it
helps identify potential bottlenecks and areas where network performance can
be improved. This map shows the path data takes as it travels through the
network, allowing administrators to optimize the network for better
performance, troubleshoot network issues, and identify the root cause of
network problems.
 Appropriate node placement to aid service coverage.
 Design for redundancy/backup

Other bandwidth requirements are:

 No of connected devices
 Network card
 Distance of end devices

Networking Principles

Principle 1: Understand the user's needs (Home Office, 2016).

Understand your basic network requirements.

Design networks for a roaming user base

Design services that can be accessed by a wider user base.

14
Design a network that is transparent, resilient and ubiquitous.

Consider primary or backup services.

Principle 2: Use services to protect your data, don't rely on the network. (“Final Doc.docx -
Contents Principle 2: Use services to protect your ...”)

Develop a clear strategy for your security.

Access control tools should be straightforward to review and change.

Principle 3: Design for interworking and flexibility

Use industry standards.

Migrate to IP-based technologies.

Publish DNS names.

Remove technical barriers that can limit access – i.e. use of NAT.

See the following link for more information:

https://www.gov.uk/government/publications/network-principles/network-principles

Networking devices and Operating Principles Of Network Devices

Network Switch
A switch is a networking device that segments the networks into subnetworks called subnets.
It filters and forwards packets based on a 12-digit hexadecimal number that is displayed with
a colon or hyphen. It operates in Layer 2 - Data Link Layer – in the OSI Model and transfers
the data only to the device that has been addressed (GeeksforGeeks, 2021)

Operating Principle of a Network Switch


A switch makes its forwarding decision based on the MAC address of the devices on the
network. It works in the Layer 2 of the OSI model. (“What is a Switch Vs a Router? -
Bwinners”) It can forward and drop packets based on the source MAC address. The source
PC sends a packet to the destination, the switch reads and makes a note of the source MAC
address, learns the header address of all end devices connected and constantly updates the

15
source and destination MAC addresses. This is called the MAC address table and contains the
list of all the MAC address the switch has gathered in the network. With the MAC address
table, if any traffic is destined for an interface, the switch knows where to send the packet
using the unique MAC associated with each device in the network.

Table 1: MAC Address Table

MAC Address Port/Interface


ABC1:CDE1:ACDF FA0/1
2345:AC23:2BCD GA0/2
ACDG:21FG:CB45 FA0/3

Network Router
A network router is a device that connects devices in a network and routes data packets
between them. It uses routing tables to determine the best path for data transmission and
provides security features to protect the network from cyber threats.
Operating Principle of a Network Router
The operating principles of a network router involve routing packets to their destination by
examining their headers and using routing tables. Routers also perform other important
functions, such as packet forwarding, network address translation, and access control, to
ensure efficient and secure data transfer between devices in a network.

Network Hub
A network hub broadcasts data to all connected devices, causing network congestion and
collisions. Hubs are limited in bandwidth and lack security features, so they have been largely
replaced by switches and routers.
Operating Principle of a Network Hub
A network hub broadcasts data to all connected devices, causing collisions and congestion. It
lacks advanced features and operates at the physical layer, making it inefficient and outdated
for modern networking.
Repeater
A repeater amplifies signals to extend data transmission distance in a network, reducing
interference and boosting weak signals. It's easy to install and requires no configuration.

16
Operating Principle of a Network Repeater
A network repeater amplifies incoming signals to extend their reach, improving signal quality
and reducing noise and loss. It requires no configuration and can be easily installed in a
network to extend its performance.

Network Servers
A network server provides services and resources to devices in a network, like a file sharing and web
hosting. They have more power and storage than client devices and are critical for efficient
collaboration and communication in modern networks.

DHCP Server
DHCP servers automatically assign IP addresses and network settings to devices, simplifying network
configuration and management. They use a set of rules to define the range of IP addresses and
settings they can assign. DHCP servers are critical for efficient network administration and scaling as
new devices are added.

Operating Principle of a DHCP Server


DHCP servers listen for requests and assign available IP addresses and network settings to devices.
They automate network configuration, simplifying administration and reducing errors and conflicts.

DHCP uses DORA

Discover

Offer

Request

Acknowledge

HTTP Server
HTTP servers respond to client requests for web pages and resources by retrieving and returning the
requested content. They are critical for accessing and displaying web pages and online content.

Operating Principle of an HTTP Server


HTTP servers process client requests for web pages and resources by retrieving and returning the
requested content.

FTP Server
An FTP server is a network server that enables the transfer of files between computers using the File
Transfer Protocol.

Operating Principle of an FTP Server


The operating principles of an FTP server involve listening for incoming client connections,
authenticating users, and facilitating the transfer of files between client and server over the File
Transfer Protocol.

17
Relationship between workstation hardware and network software
Workstation hardware, such as personal computers, relies on network software to access and utilize
network resources, including shared files and applications. The client-server model is a common
architecture for network software, where client software on the workstation requests resources
from server software running on a network server. The server software manages and provides access
to shared resources, while the client software handles user interaction and displays the requested
resources to the user. This interrelationship between workstation hardware and network software
enables users to work collaboratively and efficiently, accessing and sharing resources across the
network.

Client-Server Communication

Peer-to-peer communication

Load -balancers

Layer 3 Switches

Wireless LAN Controllers

Suitable Servers for the given scenario

A file server and email server could be useful for small to medium-sized businesses, with a
cost-effective option being a NAS device for the file server and Microsoft Exchange Server
for the email server. A web server using Apache HTTP Server could also be useful for
businesses that rely heavily on online transactions.
Recommendation of topology for BioTek Company Mesh Topology

A star topology would be the most appropriate network topology for BioTek Company as it
offers reliability, fault tolerance, and scalability, which are essential for the company's needs.

Part 2: Design and Implementation of BioTek Network System

LO3 Designing of efficient networked systems

18
Network Design Goal for Bio Tek

Step 1: Open Packet tracer and select the end devices (PCs, Printers, switches, LAN and
WLAN routers, Servers) and connections (Straight through, Crossover or Wireless) as shown
below in the workspace list.

Figure 2: Packet Tracer Workspace List

Step 2: Configure the Head-Office Server by assigning a Class C IPv4 address, the associated
subnet mask, DNS Server address. Go to the services tab and set the Router default gateway
and DHCP scope. Turn the Server Interface on.

19
Figure 10: Packet Tracer -Server

Step 2: Configure the the Router by assigning a Class C IPv4 default gateway, the associated
subnet mask, DNS Server address on the interface/port.

20
Figure 11: Packet Tracer - Router

Step 3: Configure DHCP for all end devices (for all PCs on the network)

21
Figure 12: Packet Tracer -PC Configuration

Step 4: Test network connectivity by sending a packet from PC in one subnet to PC on


another subnet

Figure 13: PDU Packet Status

22
Figure 3: Packet Tracer Network Configuration

23
Figure 4: Packet Tracer Network Configuration

Figure 11: Packet Tracer Network Configuration

Table 2: Network Requirements

NETWORK REQUIREMENTS
Assign DHCP for all PC Class C Assigned for all
subnets
Internet Access Default gateway and DNS
Assigned for Router and
HTTP Server
Network Availability Network availability
Staff access to subnets Access confirmed by ICMP
Ping

24
Figure 5: Physical View

Evaluation of network design


1. Purpose of Network
2. Type of Network
3. Network Metric for performance Evaluation (bandwidth, latency, packet loss, and
jitter)

Network system maintenance schedule

25
Tasks Maintenance Schedule Checking
Schedule

(day/week/month)

Fault
Management

Configuration
Management

Accounting
Management
Security
Management

LO4 Implementing and diagnosing networked systems

Conclusion and recommendations


To summarise, a network refers to a group of two or more computers that are interconnected
through a communication system for the purpose of sharing resources and information. In the
absence of a network, companies would encounter significant challenges in organising their existing
resources and enhancing their productivity. Regardless of whether they are wired or wireless,
networks are an essential component of technology.

References

Comparitech.com. (2023). 6 Best Network Topologies Explained - Pros & Cons [Including
Diagrams]. [online] Available at: https://www.comparitech.com/net-admin/network-
topologies-advantages-disadvantages/ [Accessed 20 Mar. 2023].

26
Office, C. (2016). Network principles. [online] GOV.UK. Available at:
https://www.gov.uk/government/publications/network-principles/network-principles
[Accessed 20 Mar. 2023].

GeeksforGeeks. (2021). What is a network switch and how does it work. (“What is a Network
Switch and How Does it Work? An In-Depth Explanation ...”) [online] Available at:
https://www.geeksforgeeks.org/what-is-a-network-switch-and-how-does-it-work/ [Accessed
20 Mar. 2023].

27

You might also like