logo

Networking Technologies: Benefits, Constraints, and Implementation

   

Added on  2024-05-21

38 Pages4525 Words350 Views
 | 
 | 
 | 
NETWORKING
TECHNOLOGIES
Networking Technologies: Benefits, Constraints, and Implementation_1

TABLE OF CONTENTS
Introduction......................................................................................................................................1
LO1..................................................................................................................................................2
P1 Discuss the benefits and constraints of different network types and standards.....................2
P2 Explain the impact of network topology, communication and bandwidth requirements.......7
M1 Compare common networking principles and how protocols enable the effectiveness of
networked systems.....................................................................................................................10
LO2................................................................................................................................................12
P3 Discuss the operating principles of networking devices and server types[M2]...................12
P4 Discuss the inter-dependence of workstation hardware with relevant networking software
...................................................................................................................................................14
LO3................................................................................................................................................15
P5 Design a networked system to meet a given specification...................................................15
P6 Test and evaluate the design to meet the requirements and analyze user feedback.............16
M3 Install and configure network services and applications on your choice............................18
D2 Design a maintenance schedule to support the networked system......................................19
LO4................................................................................................................................................20
P7 Implement a networked system based on a prepared design................................................20
P8 Document and analyze test results against expected results................................................27
M4 Recommend potential enhancements for the networked systems.......................................30
D3 Use critical reflection to evaluate own work a....................................................................31
Conclusion.....................................................................................................................................33
References......................................................................................................................................34
Networking Technologies: Benefits, Constraints, and Implementation_2

LIST OF TABLES
Table 1: Different network system..................................................................................................2
Table 2: Network types....................................................................................................................5
Table 3: Networking principles.....................................................................................................10
Table 4: Network servers in the network.......................................................................................12
Table 5: Questionnaires.................................................................................................................16
Table 6: Network maintenance schedule.......................................................................................19
Table 7: Network components.......................................................................................................20
Table 8: test result..........................................................................................................................27
Networking Technologies: Benefits, Constraints, and Implementation_3

LIST OF FIGURES
Figure 1: Different network types....................................................................................................5
Figure 2: Token ring structure.........................................................................................................7
Figure 3: Ethernet network..............................................................................................................8
Figure 4: Network models and protocols used................................................................................8
Figure 5: Network design..............................................................................................................15
Figure 6: user’s opinion on network design..................................................................................16
Figure 7: Configuring DSL for connection with external WAN service.......................................21
Figure 8: RIP configuration on router in Cisco packet tracer........................................................21
Figure 9: Ethernet address on router..............................................................................................22
Figure 10: VLAN database in main switch of the network...........................................................22
Figure 11: IP address of the printer shared in finance department................................................23
Figure 12: Static IP address on the computers...............................................................................23
Figure 13: IP addressing on server machine..................................................................................24
Figure 14: Managing HTTPS connections and files......................................................................24
Figure 15: Enabling and mapping DNS address for servers..........................................................25
Figure 16: Configuring email services..........................................................................................25
Figure 17: Managing FTP users and permissions..........................................................................26
Figure 18: Managing IP address permission through firewall.......................................................26
Figure 19: Ping successful for other computers in same department............................................28
Figure 20: Connection from finance department is successful to web server...............................29
Figure 21: PING command............................................................................................................31
Networking Technologies: Benefits, Constraints, and Implementation_4

Introduction
A computer network is referred to a digital telecommunication network that is used for sharing
resources and data among the network user. In this present report fundamentals of networking
will be studied along with various components such as network types, topologies, standards etc.
for knowing its benefits and constraints. For the given organization, a LAN network is designed
and implemented using the Cisco packet tracers. The present report will also study about the
various hardware and software components used in the network implementation. The report also
explains about different servers and protocols present in the network. The present network is
tested for its performance and recommendation for the potential enhancement of the network is
provided for the organization.
1
Networking Technologies: Benefits, Constraints, and Implementation_5

LO1
P1 Discuss the benefits and constraints of different network types and standards.
Network systems
Table 1: Different network system
Types
Network
systems
Description Constraints and
benefit
Representation
Client-
server
network
system
Here, the computers in the
network uses a server for
controlling and allocation
of resources and data.
Communication and
sessions with clients is
complete through server
(Peifferet al 2013.).
Benefit:
Security is high
Centralized
network
management
Constraints:
Performance is
low
Server
Dependency is
high
Peer-to-peer
network
system
In these network,
workstation is connected
with each other for
communication and flow
of data without a server for
controlling the operations
in the network
Benefit:
Cost effective
High
performance
Constraints:
Security is less
Complex
network
management
2
Networking Technologies: Benefits, Constraints, and Implementation_6

Network topologies
Types of
topology
Description Benefit and
Constraints
Representation
Star
topology
In this type of network
Workstation and devices
are linked with a
centralized device that can
be a hub and Switch.
Benefit:
Performance is
high
Maintenance is
easy
Constraints:
High cable
requirement
makes it costlier
Dependency on
the centralized
device
Ring
topology
Ring format is used for
connecting all the
computing devices in the
network.
Benefit
cost effective
implementation
is easy
Constraints
Scalability is
low
Failure in single
will fail the
entire network
communication
Mesh computing devices present benefits
3
Networking Technologies: Benefits, Constraints, and Implementation_7

topology in the network links with
various another computer.
Many devices
can be
connected
Cost effective
Constraints
High
maintenance
cost
Structuring is
complex
Bus
topology
All the devices in the
network establishes
communication with the
main serverusing a single
cable known as node.
Benefit
Simple
structuring
Cable required is
low therefore
cost of
implementation
is less
Constraints
High load on the
cable
Network
breakdownif
cable breaks
Network types
4
Networking Technologies: Benefits, Constraints, and Implementation_8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents