Networking and Entrepreneurial Growth
VerifiedAdded on  2020/10/05
|27
|5649
|353
AI Summary
The provided document is an assignment that explores multiple networking concepts and technologies. It delves into the specifics of software-defined networking, content-centric networking, and named data networking. Additionally, it touches upon VANETs (Vehicular Ad-hoc Networks) and offers a thorough review of software-defined networking. The assignment likely involves theoretical or practical applications related to these networked systems.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Networking
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents
INTRODUCTION...........................................................................................................................1
P1 Discussion on constraints and benefits of network types and standards................................1
P2 Justify impact of network topology, communication and bandwidth requirements...............2
P3 Discuss operating principles of networking devices and server types...................................3
P4 Discuss interdependence of hardware workstation with networking software......................6
P5 Design of networked system to meet specifications of LUCMAT Ltd..................................7
P6 Test evaluate design so that requirements can be met and analyse feedback from user........8
P8 Documentation and analysis of test results against expected results......................................9
CONCLUSION..............................................................................................................................10
REFERENCES..............................................................................................................................11
INTRODUCTION...........................................................................................................................1
P1 Discussion on constraints and benefits of network types and standards................................1
P2 Justify impact of network topology, communication and bandwidth requirements...............2
P3 Discuss operating principles of networking devices and server types...................................3
P4 Discuss interdependence of hardware workstation with networking software......................6
P5 Design of networked system to meet specifications of LUCMAT Ltd..................................7
P6 Test evaluate design so that requirements can be met and analyse feedback from user........8
P8 Documentation and analysis of test results against expected results......................................9
CONCLUSION..............................................................................................................................10
REFERENCES..............................................................................................................................11
INTRODUCTION
In the present world, word networking define the accurate and easy exchange of ideas
and useful information between large number of people those share common profession and have
special interest basically in an informal social setting (Bernardos and et. al, 2014). In technical
word, computer networking is referred to the connection of number of devices in appropriate
manner that support to share the effective information and resources of software. This report is
based on LUCMAT Ltd which is an organisation which is opting to use LAN in their working
with IP address 192.168.10.0/24. This report consists of network types and standards, network
topology, their impact and operating principles. Furthermore, there interdependence is is
discussed and network design is provided with feedback from employees related to its working.
P1 Elaborate constraints and benefits of network types as well as standards.
Network refers to accumulation of two or more devices through which communication
can be carried out. These devices and systems are connected with each other by usage of wireless
or physical connections. Communication can occur by usage of emails, shared devices like
printers and shared storage devices. There are different network types but mostly LAN, MAN
and WAN are used for carrying out communication among organisations.
Local Area Network (LAN): It is restricted to specific areas like office, campus or
home. They are generally used as they are easy to implement and troubleshoot. It can be as
simple as connecting two computers for sharing files and storage space among them. They are
connected via Ethernet or Wi-Fi. There coverage area is small nearby 2500 metres or 2 miles
with speed which ranges from 10-1000 Mbps. The major constraint of LAN is its high setup cost,
data security threat, maintenance cost and limited area coverage.
Metropolitan Area Network (MAN): It is a large number which is used to organisations
which are present in same city. They are installed by usage of common carrier; they can be fiber
optic cable or twisted pair. They furnish fast communication by usage of high-speed carriers.
They cover up to 200 km or 100 miles and they have high speed of 100 Mbps. Its constraints are
that in case of wired network, lots of wire or cable is required and it is complex to secure system
from intruders due to graphical regions (De-Marcos and et. al, 2014).
Wide Area Network (WAN): It spans over large locality and connects with other
countries. They can be either private or public. Maintenance and designing of such systems is
1
In the present world, word networking define the accurate and easy exchange of ideas
and useful information between large number of people those share common profession and have
special interest basically in an informal social setting (Bernardos and et. al, 2014). In technical
word, computer networking is referred to the connection of number of devices in appropriate
manner that support to share the effective information and resources of software. This report is
based on LUCMAT Ltd which is an organisation which is opting to use LAN in their working
with IP address 192.168.10.0/24. This report consists of network types and standards, network
topology, their impact and operating principles. Furthermore, there interdependence is is
discussed and network design is provided with feedback from employees related to its working.
P1 Elaborate constraints and benefits of network types as well as standards.
Network refers to accumulation of two or more devices through which communication
can be carried out. These devices and systems are connected with each other by usage of wireless
or physical connections. Communication can occur by usage of emails, shared devices like
printers and shared storage devices. There are different network types but mostly LAN, MAN
and WAN are used for carrying out communication among organisations.
Local Area Network (LAN): It is restricted to specific areas like office, campus or
home. They are generally used as they are easy to implement and troubleshoot. It can be as
simple as connecting two computers for sharing files and storage space among them. They are
connected via Ethernet or Wi-Fi. There coverage area is small nearby 2500 metres or 2 miles
with speed which ranges from 10-1000 Mbps. The major constraint of LAN is its high setup cost,
data security threat, maintenance cost and limited area coverage.
Metropolitan Area Network (MAN): It is a large number which is used to organisations
which are present in same city. They are installed by usage of common carrier; they can be fiber
optic cable or twisted pair. They furnish fast communication by usage of high-speed carriers.
They cover up to 200 km or 100 miles and they have high speed of 100 Mbps. Its constraints are
that in case of wired network, lots of wire or cable is required and it is complex to secure system
from intruders due to graphical regions (De-Marcos and et. al, 2014).
Wide Area Network (WAN): It spans over large locality and connects with other
countries. They can be either private or public. Maintenance and designing of such systems is
1
complex. Data transmission is low as number of devices connected in this type of network is
more. They have unlimited range normally 1000 km but it can be further extended by making
use of repeaters, hubs or any other switching devices. Its speed is slow nearly around 1.5 Mbps
but can vary depending upon wireless technologies. Its constraints comprises of its setup is
complex, expensive and speed is slow. Apart from this its maintenance cost is also high and
security is major concern (Farhady, Lee and Nakao, 2015).
P2 Justify impact of network topology, communication and bandwidth requirements.
A pattern in which nodes (they can be routers, hubs, printers, computers or other devices)
are connected with network like LAN, MAN or WAN through links such as optical fiber, copper
wire or twisted pair. There are different types of network topology, they are explained below
with their impacts on communication and bandwidth:
Bus Topology: In this type every system and network is connected via use of single
cable, it can be either optical fibre or coaxial cable. When there are exact two endpoints then it is
referred to as linear bus topology. Its impact on communication is worst as if cable fails then
interaction will not occur. In terms of bandwidth if there is high traffic then collisions will be
maximised. For this it is mandatory to use protocols such as Slotted Aloha, Pure Aloha, etc.
Ring topology: In this every computer is connected with one another in such a way that
ring is formed. There are exact two neighbours for every device. It is highly expensive. It do not
have negative impact on communication. Reason behind this is that, in this repeaters are used so
that if 50 node sends data to 1st node then it has to go through 49 nodes, so to prevent it and have
effective communications they are being sued. In terms of bandwidth it’s high and can range to
large distances (Franck, Alcatel-Lucent, 2016).
Star topology: In this computers are connected with each other through single hub via a
cable. All the systems are connected via central node i.e. hub. It can have negative impact on
communication as if hub fails then entire network will be stopped. Its bandwidth is dependent on
performance of hub and its capacity to connect to different devices. There is inefficient use of
bandwidth, consider an example like if there is an hub with 8 ports and five devices are
connected with it, then it is ensured that data is sent to right port but rest 3 ports are not used.
Mesh topology: It is a point-to-point connection with other devices or nodes. In this all
nodes are linked with each other. In this communication which occurs is effective as each system
2
more. They have unlimited range normally 1000 km but it can be further extended by making
use of repeaters, hubs or any other switching devices. Its speed is slow nearly around 1.5 Mbps
but can vary depending upon wireless technologies. Its constraints comprises of its setup is
complex, expensive and speed is slow. Apart from this its maintenance cost is also high and
security is major concern (Farhady, Lee and Nakao, 2015).
P2 Justify impact of network topology, communication and bandwidth requirements.
A pattern in which nodes (they can be routers, hubs, printers, computers or other devices)
are connected with network like LAN, MAN or WAN through links such as optical fiber, copper
wire or twisted pair. There are different types of network topology, they are explained below
with their impacts on communication and bandwidth:
Bus Topology: In this type every system and network is connected via use of single
cable, it can be either optical fibre or coaxial cable. When there are exact two endpoints then it is
referred to as linear bus topology. Its impact on communication is worst as if cable fails then
interaction will not occur. In terms of bandwidth if there is high traffic then collisions will be
maximised. For this it is mandatory to use protocols such as Slotted Aloha, Pure Aloha, etc.
Ring topology: In this every computer is connected with one another in such a way that
ring is formed. There are exact two neighbours for every device. It is highly expensive. It do not
have negative impact on communication. Reason behind this is that, in this repeaters are used so
that if 50 node sends data to 1st node then it has to go through 49 nodes, so to prevent it and have
effective communications they are being sued. In terms of bandwidth it’s high and can range to
large distances (Franck, Alcatel-Lucent, 2016).
Star topology: In this computers are connected with each other through single hub via a
cable. All the systems are connected via central node i.e. hub. It can have negative impact on
communication as if hub fails then entire network will be stopped. Its bandwidth is dependent on
performance of hub and its capacity to connect to different devices. There is inefficient use of
bandwidth, consider an example like if there is an hub with 8 ports and five devices are
connected with it, then it is ensured that data is sent to right port but rest 3 ports are not used.
Mesh topology: It is a point-to-point connection with other devices or nodes. In this all
nodes are linked with each other. In this communication which occurs is effective as each system
2
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
is connected directly with each other. In this case bandwidth is improvised with respect to ring
topology as devices have dedicated links with each other (Grassi and et. al, 2014).
M1 Compare networking principles and how protocols enable effectiveness of networked
system.
Networking refers to practice of transaction of data among nodes over shared medium
within information system. In this computer systems are connected with each other so that
information can be exchanged. Network possesses different principles, they are mentioned
below:
Principle 1: Usage of services for protection of data
In this aspect individual needs to find out who is managing network and with whom network is
shared. This principle aims at development of strategy for a security. It must be clearly informed
to individual’s threat associated with that as well as risk management approach. Information
must be in encrypted form so that performance is not compromised.
Principle 2: Design for interworking and flexibility
It comprises of wide range of network traffic, they have their own proprietary approaches and
standards within network. These principles make it easy to accomplish altering needs in terms of
what is required and when it is needed. Publish DNS records; it will enable wide range of people
to make use of service without any kind of restriction which is based on knowledge of their
name.
Protocols refer to set of rules which enable communication among different systems.
Computer network is dependent on wide range of protocols so that they can work appropriately.
They make sure that different network are utilised appropriately. Like Layer 2 protocol of OSI
model assists in logical and physical connections to source packet to destination by making use
of NIC. Layer 3 IP (internetwork protocol) provides direct packets or datagrams from one
network to other and also routing.
3
topology as devices have dedicated links with each other (Grassi and et. al, 2014).
M1 Compare networking principles and how protocols enable effectiveness of networked
system.
Networking refers to practice of transaction of data among nodes over shared medium
within information system. In this computer systems are connected with each other so that
information can be exchanged. Network possesses different principles, they are mentioned
below:
Principle 1: Usage of services for protection of data
In this aspect individual needs to find out who is managing network and with whom network is
shared. This principle aims at development of strategy for a security. It must be clearly informed
to individual’s threat associated with that as well as risk management approach. Information
must be in encrypted form so that performance is not compromised.
Principle 2: Design for interworking and flexibility
It comprises of wide range of network traffic, they have their own proprietary approaches and
standards within network. These principles make it easy to accomplish altering needs in terms of
what is required and when it is needed. Publish DNS records; it will enable wide range of people
to make use of service without any kind of restriction which is based on knowledge of their
name.
Protocols refer to set of rules which enable communication among different systems.
Computer network is dependent on wide range of protocols so that they can work appropriately.
They make sure that different network are utilised appropriately. Like Layer 2 protocol of OSI
model assists in logical and physical connections to source packet to destination by making use
of NIC. Layer 3 IP (internetwork protocol) provides direct packets or datagrams from one
network to other and also routing.
3
D1 Identification of topology protocol in networking system.
LUCMAT Ltd. can make use of star topology to connect departmental LAN's for
establishing connection between switches while terminating routers and firewalls. Star topology
provides easy expansion which provides fast communication and is simple to implement.
Furthermore, by this they can establish effective connection with other departments. But the
major drawback is that a single point failure for central devices that means that if central device
either switch or hub will fail than entire network will fail.
(Source: What Is Star Topology? Advantages And Disadvantages Of A Star Topology, 2019)
P3 Discuss operating principles of networking devices and server types.
Network devices refer to components which are used for connecting electronic devices or
computers. They are also used for setting up LAN by making use of routers, hub and switches.
There are various network devices like modem, hubs, switches, repeaters and many more.
Operating principles of some network devices is provided below:
Hub: It refers to central connection point for devices within network. Basically they are
used for connecting segments of LAN. It works on half duplex communication mode. Its
operating principle with example is shown below:
4
Illustration 1: Star Topology
LUCMAT Ltd. can make use of star topology to connect departmental LAN's for
establishing connection between switches while terminating routers and firewalls. Star topology
provides easy expansion which provides fast communication and is simple to implement.
Furthermore, by this they can establish effective connection with other departments. But the
major drawback is that a single point failure for central devices that means that if central device
either switch or hub will fail than entire network will fail.
(Source: What Is Star Topology? Advantages And Disadvantages Of A Star Topology, 2019)
P3 Discuss operating principles of networking devices and server types.
Network devices refer to components which are used for connecting electronic devices or
computers. They are also used for setting up LAN by making use of routers, hub and switches.
There are various network devices like modem, hubs, switches, repeaters and many more.
Operating principles of some network devices is provided below:
Hub: It refers to central connection point for devices within network. Basically they are
used for connecting segments of LAN. It works on half duplex communication mode. Its
operating principle with example is shown below:
4
Illustration 1: Star Topology
(Source: Explain hub and its working principle,2018)
Step 1: PC-A sends data packet to PC-D by using hub.
Step 2: In electrical form data is received by Hub, various copies of data are created and they are
distributed to every system which is in network, PC-A is excluded. This means that same data is
broadcast to everyone except system who has sent data (Hwang, Ramakrishnan and Wood,
2015).
Step 3: Data is received from hub by PC-D, PC-C and PC-B. After this this, they compare their
IP address with destination's IP address (192.168.10.0/24) to find that IP packet is meant for
which system.
Step 4: After identification of packet PC-C and PC-B will reject it as it is not meant for them.
Step 5: By finding out that IP address is similar to that of destination than PC-D will respond to
sender through acknowledgement which is again sent by hub to PC-A.
Step 6: Again an electrical signal is sent hub via PC-D which is a acknowledgement and it is
broadcast to every system within network.
Step 7: PC-C, PC-B and PC-A receives data from Hub and IP address is again compared with
destination IP address of packet.
Step 8: PC-C and PC-B rejects the packet as their IP address do not match with IP address of
destination.
5
Illustration 2: Hub in star topology
Step 1: PC-A sends data packet to PC-D by using hub.
Step 2: In electrical form data is received by Hub, various copies of data are created and they are
distributed to every system which is in network, PC-A is excluded. This means that same data is
broadcast to everyone except system who has sent data (Hwang, Ramakrishnan and Wood,
2015).
Step 3: Data is received from hub by PC-D, PC-C and PC-B. After this this, they compare their
IP address with destination's IP address (192.168.10.0/24) to find that IP packet is meant for
which system.
Step 4: After identification of packet PC-C and PC-B will reject it as it is not meant for them.
Step 5: By finding out that IP address is similar to that of destination than PC-D will respond to
sender through acknowledgement which is again sent by hub to PC-A.
Step 6: Again an electrical signal is sent hub via PC-D which is a acknowledgement and it is
broadcast to every system within network.
Step 7: PC-C, PC-B and PC-A receives data from Hub and IP address is again compared with
destination IP address of packet.
Step 8: PC-C and PC-B rejects the packet as their IP address do not match with IP address of
destination.
5
Illustration 2: Hub in star topology
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Step 9: PC-A will find that their address is similar, then they will receive acknowledgement
packet.
Switch: It is a high speed networking device which receive data packet and redirects
them LAN (Johannisson, 2017). They possess capability of unicast (interaction between single
sender and receiver). Its operating principles are provided below with example:
(Source: Explain working principle of a LAN Switch, 2015)
Step 1: PC-D receives a packet sent by PC-A via a channel which is connected with switch.
Step 2: Data is received by switch in form of data frames; MAC address of source is checked in
MAC field which is present in data frame. This address will be stored in table with their port
number.
Step 3: Switch identifies MAC address within destinations field and further checks table to find
entry of specific address (Kreutz and. et. al., 2015).
Step 4: If this MAC address is present within table than switch will look for outgoing port and
will unicast data frame to that port.
Step 5: If step 4 do not exists then switch will broadcast this data frame to all the ports which are
connected.
Step 6: PC-D, PC-C and PC-B will receive packet (data frame in this case will in packets form).
Now they will analyse their IP address with destination's IP address.
6
Illustration 3: LAN Switch
packet.
Switch: It is a high speed networking device which receive data packet and redirects
them LAN (Johannisson, 2017). They possess capability of unicast (interaction between single
sender and receiver). Its operating principles are provided below with example:
(Source: Explain working principle of a LAN Switch, 2015)
Step 1: PC-D receives a packet sent by PC-A via a channel which is connected with switch.
Step 2: Data is received by switch in form of data frames; MAC address of source is checked in
MAC field which is present in data frame. This address will be stored in table with their port
number.
Step 3: Switch identifies MAC address within destinations field and further checks table to find
entry of specific address (Kreutz and. et. al., 2015).
Step 4: If this MAC address is present within table than switch will look for outgoing port and
will unicast data frame to that port.
Step 5: If step 4 do not exists then switch will broadcast this data frame to all the ports which are
connected.
Step 6: PC-D, PC-C and PC-B will receive packet (data frame in this case will in packets form).
Now they will analyse their IP address with destination's IP address.
6
Illustration 3: LAN Switch
Step 7: PC-C and PC-B will reject packet as their IP address will not match as it is not meant for
them.
Step 8: PC-A will receive a acknowledgement packet through switch which is sent by PC-D.
Step 9: Acknowledgement data frame from PC-D is received by switch, MAC address is checked
within data frames field and this address is stored in address table along with its port number.
Step 10: Switch identify MAC address of destination from data frame and it will verify it in
address table to ensure its entry. Switch has already stored MAC address of PC-A, now
acknowledgement packet will be unicast.
Step 11: Once switch knows MAC address of all nodes, then data frames will be unicast to nodes
for whom it is meant.
Server is a device or computer program which furnish functionality to other devices and
programs. Basically they provide information to other systems which are present within network.
There are different servers which are meant to perform specific activities like DNS, DHCP, mail
server and many more (Parker, Verizon Patent and Licensing Inc, 2016). E-mail server with their
operating principles along with example is described:
E-mail server, makes use of client server approach. Here client indicates mail
application/mailer/mail program and server is device which manages emails. An example is
illustrated which includes sending, receiving and knowing of operating principles of email
system:
Step 1: Consider that person A sends message to B via email.
Step 2: By making use of mail client or mailer program, A compose message and clicks on send.
Step 3: This message is dispatched to mail server of B by SMTP (simple mail transfer protocol).
Step 4: Mail server stores this message in disk space (mail spool) which has been assigned to B.
Step 5: Consider that person B is running on POP (post office protocol) client and knows ways in
which interaction with mail server of B will occur (Raleigh and et. al, 2016).
Step 6: POP server of poll will be periodically checked to identify that email has received by B.
As A has sent email to B, so it is forwarded over network of B. This will be stored on PC of B.
7
them.
Step 8: PC-A will receive a acknowledgement packet through switch which is sent by PC-D.
Step 9: Acknowledgement data frame from PC-D is received by switch, MAC address is checked
within data frames field and this address is stored in address table along with its port number.
Step 10: Switch identify MAC address of destination from data frame and it will verify it in
address table to ensure its entry. Switch has already stored MAC address of PC-A, now
acknowledgement packet will be unicast.
Step 11: Once switch knows MAC address of all nodes, then data frames will be unicast to nodes
for whom it is meant.
Server is a device or computer program which furnish functionality to other devices and
programs. Basically they provide information to other systems which are present within network.
There are different servers which are meant to perform specific activities like DNS, DHCP, mail
server and many more (Parker, Verizon Patent and Licensing Inc, 2016). E-mail server with their
operating principles along with example is described:
E-mail server, makes use of client server approach. Here client indicates mail
application/mailer/mail program and server is device which manages emails. An example is
illustrated which includes sending, receiving and knowing of operating principles of email
system:
Step 1: Consider that person A sends message to B via email.
Step 2: By making use of mail client or mailer program, A compose message and clicks on send.
Step 3: This message is dispatched to mail server of B by SMTP (simple mail transfer protocol).
Step 4: Mail server stores this message in disk space (mail spool) which has been assigned to B.
Step 5: Consider that person B is running on POP (post office protocol) client and knows ways in
which interaction with mail server of B will occur (Raleigh and et. al, 2016).
Step 6: POP server of poll will be periodically checked to identify that email has received by B.
As A has sent email to B, so it is forwarded over network of B. This will be stored on PC of B.
7
(Source: E-mail system, 2019)
P4 Discuss interdependence of hardware workstation with networking software.
Workstation refers to system which is intended for use of individuals which is more
capable when compared with personal computers. These workstations have their own
characteristics and their own storage space (Scherer and Sholtis, Mertek Industries LLC, 2015).
Interdependence of workstation hardware with networking software is shown below:
Network interface card (NIC) is a part of computer hardware which is combined with network
through LAN. Computers which are networked interact with other systems by using protocols for
exchanging data packets. It acts as translator machine for mutually sending and obtaining data on
LAN. These cards are used for setting up wired or wireless connection networks.
Network hardware: It is single component of network system which transfers data and assist
functions of computers.
File server: It is a network file server of computer system which is used for management of files,
handle network communication, network printers and other functions. It is utilised for
networking functions or DOS based system (Sharon and et. al, Facebook Inc, 2015).
8
Illustration 4: Working of E-mail
P4 Discuss interdependence of hardware workstation with networking software.
Workstation refers to system which is intended for use of individuals which is more
capable when compared with personal computers. These workstations have their own
characteristics and their own storage space (Scherer and Sholtis, Mertek Industries LLC, 2015).
Interdependence of workstation hardware with networking software is shown below:
Network interface card (NIC) is a part of computer hardware which is combined with network
through LAN. Computers which are networked interact with other systems by using protocols for
exchanging data packets. It acts as translator machine for mutually sending and obtaining data on
LAN. These cards are used for setting up wired or wireless connection networks.
Network hardware: It is single component of network system which transfers data and assist
functions of computers.
File server: It is a network file server of computer system which is used for management of files,
handle network communication, network printers and other functions. It is utilised for
networking functions or DOS based system (Sharon and et. al, Facebook Inc, 2015).
8
Illustration 4: Working of E-mail
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Networking operating system: It is loaded into hard disk of servers along with user utilities and
system management tools. NOS boots and other servers come in control when systems are
started.
Network cabling: When workstations, NIC and servers are placed then network cabling will be
used to network all components. These cables are: coaxial cable, twisted pair, fiber optics cable.
They are interdependent on one another for carrying out network functions appropriately.
M2 Exploration of range of servers and which server is used by LUCMAT Ltd with respect to
cost and performance optimisation.
There are different computer servers which can be used by organisation depending upon
their requirements. They have opted to make use of Web, email and DNS server for working in
suitable manner and also carry out their operations in enhanced way. Mail server will assist them
to have interaction with different departments present within organisation which will have
enhanced impact on their performance. Domain name server (DNS) is backbone of networking
communication. If DNS fails than IP address cannot be found and internet services cannot be
used. It assists in moving, adding and changing internet services by making its use. Furthermore,
web server can be used by them to store their web site files as well as broadcast them to visitor's
file. They are not cost effective but still they will provide LUCMAT Ltd the enhanced value to
carry out their services.
P5 Design of networked system to meet specifications of LUCMAT Ltd.
There network is designed by making use of Wi-Fi and Ethernet network technologies.
Apart from this star and bus topologies are used by LUCMAT Ltd. These components are
connected with each other through inexpensive and Ethernet technology. Their departments are
facilitated by usage of Wi-Fi technology as more efficient workstations are used and are
controlled by management of each department (HR, design,sales and R&D). Then these all
departments are connected with each other so that they can share resources as well as
information via internet and this information can be accessed by employees from anywhere (Xia
and et. Al, 2015).
9
system management tools. NOS boots and other servers come in control when systems are
started.
Network cabling: When workstations, NIC and servers are placed then network cabling will be
used to network all components. These cables are: coaxial cable, twisted pair, fiber optics cable.
They are interdependent on one another for carrying out network functions appropriately.
M2 Exploration of range of servers and which server is used by LUCMAT Ltd with respect to
cost and performance optimisation.
There are different computer servers which can be used by organisation depending upon
their requirements. They have opted to make use of Web, email and DNS server for working in
suitable manner and also carry out their operations in enhanced way. Mail server will assist them
to have interaction with different departments present within organisation which will have
enhanced impact on their performance. Domain name server (DNS) is backbone of networking
communication. If DNS fails than IP address cannot be found and internet services cannot be
used. It assists in moving, adding and changing internet services by making its use. Furthermore,
web server can be used by them to store their web site files as well as broadcast them to visitor's
file. They are not cost effective but still they will provide LUCMAT Ltd the enhanced value to
carry out their services.
P5 Design of networked system to meet specifications of LUCMAT Ltd.
There network is designed by making use of Wi-Fi and Ethernet network technologies.
Apart from this star and bus topologies are used by LUCMAT Ltd. These components are
connected with each other through inexpensive and Ethernet technology. Their departments are
facilitated by usage of Wi-Fi technology as more efficient workstations are used and are
controlled by management of each department (HR, design,sales and R&D). Then these all
departments are connected with each other so that they can share resources as well as
information via internet and this information can be accessed by employees from anywhere (Xia
and et. Al, 2015).
9
Illustration 5: Network diagram
§
The above shown network design of LUCMAT Ltd has different departments and these
are connected through main office. This office is equipped with server, printer, fax and VoIP
devices. These departments are connected with main department by usage of USP. But they need
to have effective strategies by which they can manage performance of network. Workstations are
secured from internet hackers and attackers by means of appropriate firewall (Xylomenos and et.
al., 2014).
P6 Test evaluate design so that requirements can be met and analyse feedback from user.
Design can be tested by sending packets among different networks, if they are not sent
then error will pop-up which means that network is not well established but if packet will get to
other department then this will ensure that successful network is developed among them.
Feedback from employees of LUCMAT Ltd is taken on basis of facility which is given to
them. These following fields will be contained in this:
1. Name of employee:
2. How will you rank the network design on basis of efficiency and speed of networking?
10
§
The above shown network design of LUCMAT Ltd has different departments and these
are connected through main office. This office is equipped with server, printer, fax and VoIP
devices. These departments are connected with main department by usage of USP. But they need
to have effective strategies by which they can manage performance of network. Workstations are
secured from internet hackers and attackers by means of appropriate firewall (Xylomenos and et.
al., 2014).
P6 Test evaluate design so that requirements can be met and analyse feedback from user.
Design can be tested by sending packets among different networks, if they are not sent
then error will pop-up which means that network is not well established but if packet will get to
other department then this will ensure that successful network is developed among them.
Feedback from employees of LUCMAT Ltd is taken on basis of facility which is given to
them. These following fields will be contained in this:
1. Name of employee:
2. How will you rank the network design on basis of efficiency and speed of networking?
10
a) Very good b) Good c) Satisfactory d) Not satisfactory
3. Do you get access to internet 24/7 hours?
a) Yes b) No c) Some what
4. Are you able to use resources like fax and printer in network whenever you need it?
a) Strong yes b) Yes c) No d) Strong no
5. Are you able access faxes and printers from other departments?
a) Strong yes b) Yes c) No d) Strong no
By usage of above questions, feedback can be taken from employees of organisation.
These details must be analysed so that performance of network within real time environment can
be improvised and making relevant changes to existing design.
M3 Installation and configuration of network services and their application.
They refer to capability which assists network operations. Basically, it is provided by
server depending on network protocols. LUCMAT Ltd has opted to make use of DNS. Steps
involved in installation and configuration of DNS server role are mentioned below:
Install
Step 1: Start server manager window and carry on to local server.
Step 2: Click on manage and select options add roles and features.
Step 3: When this wizard window opens then go through information before clicking on next.
Step 4: Choose radio button if feature based installation is considered.
Step 5: Determine server which LUCMAT Ltd has chosen to use for role. Option to install
remotely is present in this.
Step 6: Choose DNS server role.
Step 7: Window will ask for confirmation of dependencies which must be installed.
Step 8: Final confirmation of installation of server. Restart option will be given and server
manager window will be returned.
Configure
Step 1: Choose DNS option on server manager.
Step 2: Determine server which is to be managed, click on it and then on DNS Manager.
Step 3: Click action
Step 4: Click on option configure DNS Server.
11
3. Do you get access to internet 24/7 hours?
a) Yes b) No c) Some what
4. Are you able to use resources like fax and printer in network whenever you need it?
a) Strong yes b) Yes c) No d) Strong no
5. Are you able access faxes and printers from other departments?
a) Strong yes b) Yes c) No d) Strong no
By usage of above questions, feedback can be taken from employees of organisation.
These details must be analysed so that performance of network within real time environment can
be improvised and making relevant changes to existing design.
M3 Installation and configuration of network services and their application.
They refer to capability which assists network operations. Basically, it is provided by
server depending on network protocols. LUCMAT Ltd has opted to make use of DNS. Steps
involved in installation and configuration of DNS server role are mentioned below:
Install
Step 1: Start server manager window and carry on to local server.
Step 2: Click on manage and select options add roles and features.
Step 3: When this wizard window opens then go through information before clicking on next.
Step 4: Choose radio button if feature based installation is considered.
Step 5: Determine server which LUCMAT Ltd has chosen to use for role. Option to install
remotely is present in this.
Step 6: Choose DNS server role.
Step 7: Window will ask for confirmation of dependencies which must be installed.
Step 8: Final confirmation of installation of server. Restart option will be given and server
manager window will be returned.
Configure
Step 1: Choose DNS option on server manager.
Step 2: Determine server which is to be managed, click on it and then on DNS Manager.
Step 3: Click action
Step 4: Click on option configure DNS Server.
11
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Step 5: Prompt will pop up for configuration of DNS server wizard.
D2 Design a maintenance schedule for supporting networked system.
Network maintenance is necessary and it must be scheduled on regular basis by technical
team of LUCMAT Ltd. Some technologies like applications, security systems, network
resources, backup systems and data storage databases must be updated on regular basis. Each
maintenance task must be carried out with standard frequency, these tasks comprises of patch
management, security vulnerability testing, anti-virus and anti-spam management and many
others.
P7 Implementation of networked system on basis of prepared design.
Different steps are involved in this, they are mentioned below:
Step 1: Have a planned approach for implementation, connect the switches with servers.
Coordination with telecommunication vendors will facilitate network services.
12
Illustration 6: DNS Server configuration
D2 Design a maintenance schedule for supporting networked system.
Network maintenance is necessary and it must be scheduled on regular basis by technical
team of LUCMAT Ltd. Some technologies like applications, security systems, network
resources, backup systems and data storage databases must be updated on regular basis. Each
maintenance task must be carried out with standard frequency, these tasks comprises of patch
management, security vulnerability testing, anti-virus and anti-spam management and many
others.
P7 Implementation of networked system on basis of prepared design.
Different steps are involved in this, they are mentioned below:
Step 1: Have a planned approach for implementation, connect the switches with servers.
Coordination with telecommunication vendors will facilitate network services.
12
Illustration 6: DNS Server configuration
Step 2: Communicate with employee’s scope of every step. When new equipments will be
implemented than it will result in loss of data, therefore employees must plan their work
accordingly.
Step 3: Pre-configure network devices and test them after implementing.
Step 4: Schedule the support required from technical department and vendor for supporting
implementation.
Configuration of web server
In this case, LUCMAT Ltd. can make use of Apache which is a open-source and free
cross-platform web server software. It powers around 46% of websites at present scenario. The
steps involved in its configuration are illustrated below:
1. Within WHM (Web Host Manager) contains different server configuration pages, go to
the service configuration category.
2. Navigate to option Apache Configuration. Before any changes are made within settings,
it is essential that instructions as well as documentations must be read.
13
Illustration 7: WHM Accelerated
implemented than it will result in loss of data, therefore employees must plan their work
accordingly.
Step 3: Pre-configure network devices and test them after implementing.
Step 4: Schedule the support required from technical department and vendor for supporting
implementation.
Configuration of web server
In this case, LUCMAT Ltd. can make use of Apache which is a open-source and free
cross-platform web server software. It powers around 46% of websites at present scenario. The
steps involved in its configuration are illustrated below:
1. Within WHM (Web Host Manager) contains different server configuration pages, go to
the service configuration category.
2. Navigate to option Apache Configuration. Before any changes are made within settings,
it is essential that instructions as well as documentations must be read.
13
Illustration 7: WHM Accelerated
3. Begin from global configuration page as this allows user to make some adjustments
linked with ways Apache functions execute, in most of cases default settings will work in
appropriate manner.
14
Illustration 8: Server configuration
linked with ways Apache functions execute, in most of cases default settings will work in
appropriate manner.
14
Illustration 8: Server configuration
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4. After this, click save with respect to changes which have been made within settings. Most
of changes will need to restart the program.
15
Illustration 9: Global Configuration
of changes will need to restart the program.
15
Illustration 9: Global Configuration
5. Click to rebuild Apache's configuration files and restart program.
6. After this return to Apache's Configuration page.
16
Illustration 10: Save Changes
Illustration 11: Apache Global Configuration
6. After this return to Apache's Configuration page.
16
Illustration 10: Save Changes
Illustration 11: Apache Global Configuration
7. Now configure PHP and SuExec. This will allow user to make use of PHP versions that
are active on system. SuExec for Apache minimises security risks which are involved
while running SSI and CGI programs.
8. Now click save new configuration when ready. Settings will appear make changes as per
needs and generate php.conf file. DirectoryIndex Priority will allow changes in filename
which can be used within index page of directory and order of preferences.
17
Illustration 12: Apache Configuration
are active on system. SuExec for Apache minimises security risks which are involved
while running SSI and CGI programs.
8. Now click save new configuration when ready. Settings will appear make changes as per
needs and generate php.conf file. DirectoryIndex Priority will allow changes in filename
which can be used within index page of directory and order of preferences.
17
Illustration 12: Apache Configuration
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
9. Choose a filename.
10. Select option move up until filename has been reached in desired location.
18
Illustration 13: Alternate Configuration
Illustration 14: Choose Filename
10. Select option move up until filename has been reached in desired location.
18
Illustration 13: Alternate Configuration
Illustration 14: Choose Filename
11. Eliminate filename from list.
12. Click on save.
19
Illustration 15: Move Up
Illustration 16: Remove filename
12. Click on save.
19
Illustration 15: Move Up
Illustration 16: Remove filename
13. Rebuild configuration and restart Apache. Include Editor allows to enter into advanced
configuration directives which are not present within WHM.
14. Proceed to adjust memory and Apache configuration has been completed.
20
Illustration 17: Save
Illustration 18: Rebuild Configuration
configuration directives which are not present within WHM.
14. Proceed to adjust memory and Apache configuration has been completed.
20
Illustration 17: Save
Illustration 18: Rebuild Configuration
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
P8 Documentation and analysis of test results against expected results.
Design of network is presented below:
Illustration 20: Design of network
21
Illustration 19: Apache Memory Usage
Design of network is presented below:
Illustration 20: Design of network
21
Illustration 19: Apache Memory Usage
As per above network design, the core router has their interface which is linked with
Peer. Within Distribution layer 3 generic switch have been used along with 4 switches within
each department. VLAN has been utilised for connecting different departments. Along with this,
the connections i.e. (links) are fast Ethernet and ports have been utilised accordingly like within
packet tracer, there are options like FastEth 0/0, FastEth 0/4, FastEth 1/3 and many others
depending upon requirement of user it can be chosen. Apart from this, within connections are
established by making use of various cables. Furthermore, servers like web, DNS and email have
been used for getting information and assist departments to have access to information. Fibre
optic cables have been used for covering long distance. The green dots within diagram shows
that network is successful and messages can be transferred among different nodes.
The basic configuration of generic router has been shown in diagrams here. The IP
addresses are set within console terminal while configuration so that traffic can be maintaiend
and system of LUCMAT Ltd. do not get impacted due to congestion.
22
Illustration 21: Router Configuration
Peer. Within Distribution layer 3 generic switch have been used along with 4 switches within
each department. VLAN has been utilised for connecting different departments. Along with this,
the connections i.e. (links) are fast Ethernet and ports have been utilised accordingly like within
packet tracer, there are options like FastEth 0/0, FastEth 0/4, FastEth 1/3 and many others
depending upon requirement of user it can be chosen. Apart from this, within connections are
established by making use of various cables. Furthermore, servers like web, DNS and email have
been used for getting information and assist departments to have access to information. Fibre
optic cables have been used for covering long distance. The green dots within diagram shows
that network is successful and messages can be transferred among different nodes.
The basic configuration of generic router has been shown in diagrams here. The IP
addresses are set within console terminal while configuration so that traffic can be maintaiend
and system of LUCMAT Ltd. do not get impacted due to congestion.
22
Illustration 21: Router Configuration
Design which has been created by designer and network engineer of LUCMAT Ltd with
usage of Cisco packet tracer software by using it 6.0 version and result shows that 100%
efficiency as pointed by employees (Zhang and et. al., , 2014). This design is tested by making
use of simulation software before they have been executed so that time is not wasted and
expenditure of project has enhanced than it was planned. For this design was tested by making
use of Cisco packet tracer. After this network design is looked on and they are pinged to analyse
design to make sure that design will perform appropriately.
Last status Source Destination Time in Sec Periodic
Successful PC0 PC3 0.00 N
Successful PC3 PC1 0.00 N
Results of simulation have been shown above. In this ICMP ping request has been sent
from PC0 to PC3 and from other system to some other simultaneously. In this result cases deploy
23
Illustration 22: Console terminal
usage of Cisco packet tracer software by using it 6.0 version and result shows that 100%
efficiency as pointed by employees (Zhang and et. al., , 2014). This design is tested by making
use of simulation software before they have been executed so that time is not wasted and
expenditure of project has enhanced than it was planned. For this design was tested by making
use of Cisco packet tracer. After this network design is looked on and they are pinged to analyse
design to make sure that design will perform appropriately.
Last status Source Destination Time in Sec Periodic
Successful PC0 PC3 0.00 N
Successful PC3 PC1 0.00 N
Results of simulation have been shown above. In this ICMP ping request has been sent
from PC0 to PC3 and from other system to some other simultaneously. In this result cases deploy
23
Illustration 22: Console terminal
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
successful reply of ICMP requests within nanoseconds. This means that design requirements of
LUCMAT Ltd. Are fulfilled (Bernardos and et. Al, 2014).
M4 Recommendation of potential enhancements for networked systems.
It is necessary for technical team of LUCMAT Ltd. to understand their network in terms
of performance of network as well as quality of services and packet shaping. Auditing and
mapping must be carried out of complete infrastructure for configuration of routers, ports,
firewalls and wireless access points. Apart from this it must be acknowledged what kind of
servers are connected to them, printers or computers and their connectivity throughout the
network.
D3 Critical reflection for evaluation of own work and valid conclusion.
Networking refers to transmission of data among different people, organisations or within
the specific organisation. In this constraints and benefits of different network types have been
analysed. Each have their own set of advantages and disadvantage like LAN provides high speed
network but is limited to certain point only, WAN covers large area but speed is slow.
Furthermore, topologies are discussed like bus, ring, star and mesh, they are used for connecting
different systems or departments and for this networking devices are being used. Mail server is
used by LUCMAT Ltd to carry out communication among different departments; it will facilitate
their entire working process. Furthermore network design has been presented with usage of
Packet tracer 6.0. Apart from this, feedback is taken from employees for analysing impact of
network design.
CONCLUSION
From above it can be concluded that, network design plays sophisticated role in
improvement of abilities of organisation. For this careful analysis of data, employees and budget
is required. Design which has been prepared is checked with making use of Cisco packet tracer
6.0. By its implementation organisation can carry out their functionalities in appropriate manner
and effective communication can occur among them.
24
LUCMAT Ltd. Are fulfilled (Bernardos and et. Al, 2014).
M4 Recommendation of potential enhancements for networked systems.
It is necessary for technical team of LUCMAT Ltd. to understand their network in terms
of performance of network as well as quality of services and packet shaping. Auditing and
mapping must be carried out of complete infrastructure for configuration of routers, ports,
firewalls and wireless access points. Apart from this it must be acknowledged what kind of
servers are connected to them, printers or computers and their connectivity throughout the
network.
D3 Critical reflection for evaluation of own work and valid conclusion.
Networking refers to transmission of data among different people, organisations or within
the specific organisation. In this constraints and benefits of different network types have been
analysed. Each have their own set of advantages and disadvantage like LAN provides high speed
network but is limited to certain point only, WAN covers large area but speed is slow.
Furthermore, topologies are discussed like bus, ring, star and mesh, they are used for connecting
different systems or departments and for this networking devices are being used. Mail server is
used by LUCMAT Ltd to carry out communication among different departments; it will facilitate
their entire working process. Furthermore network design has been presented with usage of
Packet tracer 6.0. Apart from this, feedback is taken from employees for analysing impact of
network design.
CONCLUSION
From above it can be concluded that, network design plays sophisticated role in
improvement of abilities of organisation. For this careful analysis of data, employees and budget
is required. Design which has been prepared is checked with making use of Cisco packet tracer
6.0. By its implementation organisation can carry out their functionalities in appropriate manner
and effective communication can occur among them.
24
REFERENCES
Books & Journals
Bernardos, C. J., and et. al, 2014. An architecture for software defined wireless networking.
IEEE Wireless Communications Magazine. 21(3). pp.52-61.
De-Marcos, L., and et. al, 2014. An empirical study comparing gamification and social
networking on e-learning. Computers & Education. 75, pp.82-91.
Farhady, H., Lee, H. and Nakao, A., 2015. Software-defined networking: A survey. Computer
Networks. 81. pp.79-95.
Franck, F., Alcatel-Lucent SA, 2016. Content-centric networking. U.S. Patent 9,338,150.
Grassi, G. and et. al, 2014, April. VANET via named data networking. In 2014 IEEE conference
on computer communications workshops (INFOCOM WKSHPS) (pp. 410-415). IEEE.
Hwang, J., Ramakrishnan, K. K. and Wood, T., 2015. NetVM: High performance and flexible
networking using virtualization on commodity platforms. IEEE Transactions on
Network and Service Management. 12(1). pp.34-47.
Johannisson, B., 2017. Networking and entrepreneurial growth. The Blackwell handbook of
entrepreneurship, pp.368-386.
Kreutz and. et. al., 2015. Software-defined networking: A comprehensive survey. Proceedings
of the IEEE. 103(1). pp.14-76.
Parker, B. J., Verizon Patent and Licensing Inc, 2016. Elastic cloud networking. U.S. Patent
9,311,160.
Raleigh, G. G. and et. al, 2016. Intermediate networking devices. U.S. Patent 9,351,193.
Scherer, C. B. and Sholtis, J. K., Mertek Industries LLC, 2015. Networking cable tracer system.
U.S. Patent 9,196,975.
Sharon, E. M. and et. al, Facebook Inc, 2015. Sharing of location-based content item in social
networking service. U.S. Patent 9,119,027.
Xia, W. and et. al, 2015. A survey on software-defined networking. IEEE Communications
Surveys & Tutorials. 17(1), pp.27-51.
Xylomenos and et. al., 2014. A survey of information-centric networking research. IEEE
Communications Surveys & Tutorials. 16(2), pp.1024-1049.
Zhang and et. al., , 2014. Named data networking. ACM SIGCOMM Computer Communication
Review. 44(3). pp.66-73.
Online
What Is Star Topology? Advantages And Disadvantages Of A Star Topology. 2019. [Online].
Available through: <https://fossbytes.com/star-topology-advantages-disadvantages-star-
topology/>.
25
Books & Journals
Bernardos, C. J., and et. al, 2014. An architecture for software defined wireless networking.
IEEE Wireless Communications Magazine. 21(3). pp.52-61.
De-Marcos, L., and et. al, 2014. An empirical study comparing gamification and social
networking on e-learning. Computers & Education. 75, pp.82-91.
Farhady, H., Lee, H. and Nakao, A., 2015. Software-defined networking: A survey. Computer
Networks. 81. pp.79-95.
Franck, F., Alcatel-Lucent SA, 2016. Content-centric networking. U.S. Patent 9,338,150.
Grassi, G. and et. al, 2014, April. VANET via named data networking. In 2014 IEEE conference
on computer communications workshops (INFOCOM WKSHPS) (pp. 410-415). IEEE.
Hwang, J., Ramakrishnan, K. K. and Wood, T., 2015. NetVM: High performance and flexible
networking using virtualization on commodity platforms. IEEE Transactions on
Network and Service Management. 12(1). pp.34-47.
Johannisson, B., 2017. Networking and entrepreneurial growth. The Blackwell handbook of
entrepreneurship, pp.368-386.
Kreutz and. et. al., 2015. Software-defined networking: A comprehensive survey. Proceedings
of the IEEE. 103(1). pp.14-76.
Parker, B. J., Verizon Patent and Licensing Inc, 2016. Elastic cloud networking. U.S. Patent
9,311,160.
Raleigh, G. G. and et. al, 2016. Intermediate networking devices. U.S. Patent 9,351,193.
Scherer, C. B. and Sholtis, J. K., Mertek Industries LLC, 2015. Networking cable tracer system.
U.S. Patent 9,196,975.
Sharon, E. M. and et. al, Facebook Inc, 2015. Sharing of location-based content item in social
networking service. U.S. Patent 9,119,027.
Xia, W. and et. al, 2015. A survey on software-defined networking. IEEE Communications
Surveys & Tutorials. 17(1), pp.27-51.
Xylomenos and et. al., 2014. A survey of information-centric networking research. IEEE
Communications Surveys & Tutorials. 16(2), pp.1024-1049.
Zhang and et. al., , 2014. Named data networking. ACM SIGCOMM Computer Communication
Review. 44(3). pp.66-73.
Online
What Is Star Topology? Advantages And Disadvantages Of A Star Topology. 2019. [Online].
Available through: <https://fossbytes.com/star-topology-advantages-disadvantages-star-
topology/>.
25
1 out of 27
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.