Ask a question from expert

Ask now

Network Design and Implement PDF

37 Pages3518 Words274 Views
   

Added on  2022-01-22

Network Design and Implement PDF

   Added on 2022-01-22

BookmarkShareRelated Documents
NETWORKING
PROGRAM TITLE: NETWORK INFORMATION
UNIT TITLE: NETWORKING
ASSIGNMENT NUMBER: 2
ASSIGNMENT NAME: Network Design and Implement
SUBMISSION DATE:
DATE RECEIVED:
TUTORIAL LECTURER: TRAN HOANG BACH
WORD COUNT: 3211
STUDENT NAME: NGO VAN HUY
STUDENT ID: BKD18400
MOBILE NUMBER: 0383930441
ASSIGNMENT 1
Network Design and Implement PDF_1
NETWORKING
Summative Feedback:
Internal verification:
ASSIGNMENT 2
Network Design and Implement PDF_2
NETWORKING
Contents
A. Introduction....................................................................................................................................4
B. Content...........................................................................................................................................4
I. Identify the topology protocol selected for the efficient utilization of a networking system
(D1) 4
II. Written step by step plan on how you are going to design a Local Area Network(P5)...............5
III. Install and configure network services and applications (M3)................................................9
IV. Implement a networked system based on your prepared design(P7)..................................15
V. Design a maintenance schedule to support the networked system(D2)..................................31
VI. Recommend potential enhancements for the networked systems (M4).............................33
VII. Discuss significance upgrades and security requirements in your network design(D3)........34
VIII. References............................................................................................................................35
ASSIGNMENT 3
Network Design and Implement PDF_3
NETWORKING
A. Introduction
After more than 25 years of establishment and continuous development, the Internet has
outstanding features that no one can deny, from the ability to connect strongly to abundant
information sources as well as a matter of time. and information processing speed. But in
parallel with those advantages, the Internet has contained in it immeasurable dangers.
Therefore, as a person in the network training industry, consulting and designing network
systems for partners. We want to build a completely new, effective and secure network
based on partner requests.
We believe that, with this project, we can help your company manage, use and secure
information well so that the company makes good use of technology and is suitable for the
financial resources of a medium company. and small is on the rise.
B. Content
I. Identify the topology protocol selected for the efficient
utilization of a networking system (D1)
A protocol is a set of rules and procedures for communicating data. Rules are defined for
each step and process during communication between two or more computers. Networks
have to follow these rules to successfully transmit data.
The Ethernet is a local area network (LAN) set of protocols which serves the physical and
data link layers. Ethernet utilizes a linear bus or star topology. Ethernet served as the basis
for the IEEE 802.3 standard.
The Ethernet deals with the low level Physical and Data Link Layers.
The Data Link Layer is divided into two sublayers:
Logical Link Control (LLC). This sublayer establishes the transmission paths between
computers or devices on a network.
Media Access Control (MAC). On a network, the network interface card (NIC) has a unique
hardware address which identifies a computer or peripheral device. The hardware address is
used for the MAC sublayer addressing. Ethernet uses the MAC hardware addresses for the
source and destination for each packet transmitted.
ASSIGNMENT 4
Network Design and Implement PDF_4
NETWORKING
Ethernet uses CSMA/CD when transmitting packets. The Carrier Sense Multiple Access with
Collision Detection (CSMA/CD) is an algorithm, for transmitting and receiving packets over a
common network hardware medium, by aiding in avoiding transmission collisions. The
network is checked for other transmissions, when the way is clear, the computer
transmissions can begin. If a collision is detected the packet is retransmitted later.
The topology that I will use in the scenario will be bus topology.
II. Written step by step plan on how you are going to design a
Local Area Network(P5)
LAN-
LAN stands for “Local Area Network” Designing a Local Area Network also known as a LAN is
a complex process with a variety of factors to consider. A well-designed LAN will provide
consistent, high quality service to every device attached to the network, no matter its size.
Likewise, the network must be able to provide continuous access to functions such as
printing and file sharing. To make sure the network is fast, efficient and secure, all these
aspects should be planned in advance.
A Local Area Network provides connectivity to a relatively small group of users in a single
building, office or campus. It also typically connects to the global Internet through a gateway
server, which acts as the main defence against unauthorized access to network resources.
With all this in mind, the main consideration in the early stages of LAN planning is what size
it will be and what services it will provide. While a LAN featuring ten nodes can be set up in
as little as one day, a larger network is a bigger undertaking.
Justification of the topology the topology that is used for the network is bus topology.
It is easy to connect a device to the network.
If the computer or peripheral has the appropriate connection device, then it can be easily
added to the network. The new device connects to the linear bus topology and becomes part
of the network immediately. For those who need a temporary network that can be setup
quickly, there isn’t a better option that is available right now. If several users need mutual
access to a printer, adding the printer to the network meets that need immediately.
The failure of one station does not affect the rest of the network.
If one computer or peripheral should fail when using bus topology, the rest of the network is
not affected by this change in performance. The linear nature of the network means that
each unit transmits to the backbone and that data is then available to the other units that
ASSIGNMENT 5
Network Design and Implement PDF_5
NETWORKING
remain connected. This makes it an effective way to share uninterrupted communication.
Extensions can be made to the network.
The size and scope of bus topology is naturally incomplete. It can, however, be extended
quite easily. Joining cable with a repeater or connector allows for additional peripherals or
computers to be added to the network. Although this can increase the number of packet
collisions that may occur, it is a simplified solution that can get people up and working
quickly and for a minimal overall cost.
Multiple peripherals can be supported through bus topology.
Routers, printers, and other data devices can be connected to this network in addition to
computers or terminals. This can increase the speed of productivity because instead of
sending commands to a centralized network, a command can be sent directly to the needed
peripheral. Since it’s a for a college multiple peripheral devices will be used therefore bus
topology would work best.
Blueprint of the network system
ASSIGNMENT 6
Network Design and Implement PDF_6
NETWORKING
Logical design of the network
Justification of devices used for the network
1. PC
This a machine or device that does processes, calculations and operations based on
instructions provided by a software or hardware program. It is intended to perform
applications and provides a variety of solutions by combining integrated hardware and
software components.
ASSIGNMENT 7
Network Design and Implement PDF_7
NETWORKING
2. Router
This a device that examines the contents of data packets transmitted within a network or to
another network. Routers control whether the source and destination are on the same
network or whether data must be transferred from one network type to another, which
requires summarizing the data packet with routing protocol header information for the new
network type.
3. Cloud
This is a type service where cloud computing resources and substructure are used to return
and manage data and services which is done over the internet.
4. Server
A server is a computer, a device or a program that is dedicated to managing network
resources. Servers are often referred to as dedicated because they carry out hardly any
other tasks apart from their server tasks.
5. Switch
In the context of networking a switch is a highspeed device that receives incoming data
packets and redirects them to their destination on a local area network (LAN).
6. iPhone
An IP telephone system uses packet switched Voice over IP (VoIP), or Internet telephony, to
transmit telephone calls over the Internet as opposed to the circuit switched telephony used
by the traditional Public Switched Telephone Network (PSTN).
7. Firewall
A firewall is a network security device that monitors incoming and outgoing network traffic
and decides whether to allow or block specific traffic based on a defined set of security rules.
8. Printer
A printer is an external hardware output device that takes the electronic data stored on a
computer or other device and generates a hard copy of it Internal connections.
The devices used in the network use dissimilar types of connection from the wired to the
wireless which include the following cables: Fiber optic cable.
An optical fiber cable is a type of cable that has a number of optical fibers bundled together,
which are usually covered in their individual protective plastic covers. Optical cables are used
to transfer digital data signals in the form of light up to distances of hundreds of miles with
higher throughput rates than those achievable via electrical communication cables.
ASSIGNMENT 8
Network Design and Implement PDF_8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Local Area Networking Technologies PDF
|8
|2286
|116

Troubleshooting Network Issues: Upgrading and Optimizing Company Network Infrastructure
|9
|1428
|448

Chronological Development and Future of Computer Networks and Networking Technologies
|9
|2099
|53

Networking Models and IP Address Allocation Report 2022
|28
|2091
|12

Data Link Layer, Transport Layer and Cloud Computing
|5
|1493
|336

Networking Foundation Networks Solutions
|6
|1096
|348