Networking Technologies: Benefits, Constraints, and Implementation
VerifiedAdded on 2024/05/21
|38
|4525
|350
AI Summary
This report delves into the fundamentals of networking technologies, exploring various network types, topologies, and standards. It examines the benefits and constraints of different network systems, including client-server, peer-to-peer, star, ring, mesh, and bus topologies. The report also discusses the impact of network topology, communication, and bandwidth requirements on network performance. It further analyzes common networking principles and how protocols like HTTP, SMTP, IP, DHCP, and DNS enable the effectiveness of networked systems. The report then focuses on the operating principles of networking devices and server types, including web servers, database servers, mail servers, and file servers. It explores the interdependency of workstation hardware with relevant networking software, highlighting the role of NICs, routers, and switches in network communication. The report culminates in the design, implementation, and evaluation of a LAN network for an organization using Cisco Packet Tracer. It includes a detailed analysis of test results against expected outcomes, along with recommendations for potential enhancements to improve network performance and security.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
NETWORKING
TECHNOLOGIES
TECHNOLOGIES
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
TABLE OF CONTENTS
Introduction......................................................................................................................................1
LO1..................................................................................................................................................2
P1 Discuss the benefits and constraints of different network types and standards.....................2
P2 Explain the impact of network topology, communication and bandwidth requirements.......7
M1 Compare common networking principles and how protocols enable the effectiveness of
networked systems.....................................................................................................................10
LO2................................................................................................................................................12
P3 Discuss the operating principles of networking devices and server types[M2]...................12
P4 Discuss the inter-dependence of workstation hardware with relevant networking software
...................................................................................................................................................14
LO3................................................................................................................................................15
P5 Design a networked system to meet a given specification...................................................15
P6 Test and evaluate the design to meet the requirements and analyze user feedback.............16
M3 Install and configure network services and applications on your choice............................18
D2 Design a maintenance schedule to support the networked system......................................19
LO4................................................................................................................................................20
P7 Implement a networked system based on a prepared design................................................20
P8 Document and analyze test results against expected results................................................27
M4 Recommend potential enhancements for the networked systems.......................................30
D3 Use critical reflection to evaluate own work a....................................................................31
Conclusion.....................................................................................................................................33
References......................................................................................................................................34
Introduction......................................................................................................................................1
LO1..................................................................................................................................................2
P1 Discuss the benefits and constraints of different network types and standards.....................2
P2 Explain the impact of network topology, communication and bandwidth requirements.......7
M1 Compare common networking principles and how protocols enable the effectiveness of
networked systems.....................................................................................................................10
LO2................................................................................................................................................12
P3 Discuss the operating principles of networking devices and server types[M2]...................12
P4 Discuss the inter-dependence of workstation hardware with relevant networking software
...................................................................................................................................................14
LO3................................................................................................................................................15
P5 Design a networked system to meet a given specification...................................................15
P6 Test and evaluate the design to meet the requirements and analyze user feedback.............16
M3 Install and configure network services and applications on your choice............................18
D2 Design a maintenance schedule to support the networked system......................................19
LO4................................................................................................................................................20
P7 Implement a networked system based on a prepared design................................................20
P8 Document and analyze test results against expected results................................................27
M4 Recommend potential enhancements for the networked systems.......................................30
D3 Use critical reflection to evaluate own work a....................................................................31
Conclusion.....................................................................................................................................33
References......................................................................................................................................34
LIST OF TABLES
Table 1: Different network system..................................................................................................2
Table 2: Network types....................................................................................................................5
Table 3: Networking principles.....................................................................................................10
Table 4: Network servers in the network.......................................................................................12
Table 5: Questionnaires.................................................................................................................16
Table 6: Network maintenance schedule.......................................................................................19
Table 7: Network components.......................................................................................................20
Table 8: test result..........................................................................................................................27
Table 1: Different network system..................................................................................................2
Table 2: Network types....................................................................................................................5
Table 3: Networking principles.....................................................................................................10
Table 4: Network servers in the network.......................................................................................12
Table 5: Questionnaires.................................................................................................................16
Table 6: Network maintenance schedule.......................................................................................19
Table 7: Network components.......................................................................................................20
Table 8: test result..........................................................................................................................27
LIST OF FIGURES
Figure 1: Different network types....................................................................................................5
Figure 2: Token ring structure.........................................................................................................7
Figure 3: Ethernet network..............................................................................................................8
Figure 4: Network models and protocols used................................................................................8
Figure 5: Network design..............................................................................................................15
Figure 6: user’s opinion on network design..................................................................................16
Figure 7: Configuring DSL for connection with external WAN service.......................................21
Figure 8: RIP configuration on router in Cisco packet tracer........................................................21
Figure 9: Ethernet address on router..............................................................................................22
Figure 10: VLAN database in main switch of the network...........................................................22
Figure 11: IP address of the printer shared in finance department................................................23
Figure 12: Static IP address on the computers...............................................................................23
Figure 13: IP addressing on server machine..................................................................................24
Figure 14: Managing HTTPS connections and files......................................................................24
Figure 15: Enabling and mapping DNS address for servers..........................................................25
Figure 16: Configuring email services..........................................................................................25
Figure 17: Managing FTP users and permissions..........................................................................26
Figure 18: Managing IP address permission through firewall.......................................................26
Figure 19: Ping successful for other computers in same department............................................28
Figure 20: Connection from finance department is successful to web server...............................29
Figure 21: PING command............................................................................................................31
Figure 1: Different network types....................................................................................................5
Figure 2: Token ring structure.........................................................................................................7
Figure 3: Ethernet network..............................................................................................................8
Figure 4: Network models and protocols used................................................................................8
Figure 5: Network design..............................................................................................................15
Figure 6: user’s opinion on network design..................................................................................16
Figure 7: Configuring DSL for connection with external WAN service.......................................21
Figure 8: RIP configuration on router in Cisco packet tracer........................................................21
Figure 9: Ethernet address on router..............................................................................................22
Figure 10: VLAN database in main switch of the network...........................................................22
Figure 11: IP address of the printer shared in finance department................................................23
Figure 12: Static IP address on the computers...............................................................................23
Figure 13: IP addressing on server machine..................................................................................24
Figure 14: Managing HTTPS connections and files......................................................................24
Figure 15: Enabling and mapping DNS address for servers..........................................................25
Figure 16: Configuring email services..........................................................................................25
Figure 17: Managing FTP users and permissions..........................................................................26
Figure 18: Managing IP address permission through firewall.......................................................26
Figure 19: Ping successful for other computers in same department............................................28
Figure 20: Connection from finance department is successful to web server...............................29
Figure 21: PING command............................................................................................................31
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Introduction
A computer network is referred to a digital telecommunication network that is used for sharing
resources and data among the network user. In this present report fundamentals of networking
will be studied along with various components such as network types, topologies, standards etc.
for knowing its benefits and constraints. For the given organization, a LAN network is designed
and implemented using the Cisco packet tracers. The present report will also study about the
various hardware and software components used in the network implementation. The report also
explains about different servers and protocols present in the network. The present network is
tested for its performance and recommendation for the potential enhancement of the network is
provided for the organization.
1
A computer network is referred to a digital telecommunication network that is used for sharing
resources and data among the network user. In this present report fundamentals of networking
will be studied along with various components such as network types, topologies, standards etc.
for knowing its benefits and constraints. For the given organization, a LAN network is designed
and implemented using the Cisco packet tracers. The present report will also study about the
various hardware and software components used in the network implementation. The report also
explains about different servers and protocols present in the network. The present network is
tested for its performance and recommendation for the potential enhancement of the network is
provided for the organization.
1
LO1
P1 Discuss the benefits and constraints of different network types and standards.
Network systems
Table 1: Different network system
Types
Network
systems
Description Constraints and
benefit
Representation
Client-
server
network
system
Here, the computers in the
network uses a server for
controlling and allocation
of resources and data.
Communication and
sessions with clients is
complete through server
(Peifferet al 2013.).
Benefit:
Security is high
Centralized
network
management
Constraints:
Performance is
low
Server
Dependency is
high
Peer-to-peer
network
system
In these network,
workstation is connected
with each other for
communication and flow
of data without a server for
controlling the operations
in the network
Benefit:
Cost effective
High
performance
Constraints:
Security is less
Complex
network
management
2
P1 Discuss the benefits and constraints of different network types and standards.
Network systems
Table 1: Different network system
Types
Network
systems
Description Constraints and
benefit
Representation
Client-
server
network
system
Here, the computers in the
network uses a server for
controlling and allocation
of resources and data.
Communication and
sessions with clients is
complete through server
(Peifferet al 2013.).
Benefit:
Security is high
Centralized
network
management
Constraints:
Performance is
low
Server
Dependency is
high
Peer-to-peer
network
system
In these network,
workstation is connected
with each other for
communication and flow
of data without a server for
controlling the operations
in the network
Benefit:
Cost effective
High
performance
Constraints:
Security is less
Complex
network
management
2
Network topologies
Types of
topology
Description Benefit and
Constraints
Representation
Star
topology
In this type of network
Workstation and devices
are linked with a
centralized device that can
be a hub and Switch.
Benefit:
Performance is
high
Maintenance is
easy
Constraints:
High cable
requirement
makes it costlier
Dependency on
the centralized
device
Ring
topology
Ring format is used for
connecting all the
computing devices in the
network.
Benefit
cost effective
implementation
is easy
Constraints
Scalability is
low
Failure in single
will fail the
entire network
communication
Mesh computing devices present benefits
3
Types of
topology
Description Benefit and
Constraints
Representation
Star
topology
In this type of network
Workstation and devices
are linked with a
centralized device that can
be a hub and Switch.
Benefit:
Performance is
high
Maintenance is
easy
Constraints:
High cable
requirement
makes it costlier
Dependency on
the centralized
device
Ring
topology
Ring format is used for
connecting all the
computing devices in the
network.
Benefit
cost effective
implementation
is easy
Constraints
Scalability is
low
Failure in single
will fail the
entire network
communication
Mesh computing devices present benefits
3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
topology in the network links with
various another computer.
Many devices
can be
connected
Cost effective
Constraints
High
maintenance
cost
Structuring is
complex
Bus
topology
All the devices in the
network establishes
communication with the
main serverusing a single
cable known as node.
Benefit
Simple
structuring
Cable required is
low therefore
cost of
implementation
is less
Constraints
High load on the
cable
Network
breakdownif
cable breaks
Network types
4
various another computer.
Many devices
can be
connected
Cost effective
Constraints
High
maintenance
cost
Structuring is
complex
Bus
topology
All the devices in the
network establishes
communication with the
main serverusing a single
cable known as node.
Benefit
Simple
structuring
Cable required is
low therefore
cost of
implementation
is less
Constraints
High load on the
cable
Network
breakdownif
cable breaks
Network types
4
Figure 1: Different network types
Table 2: Network types
Network type Description Benefits and constraints
Personal area network All the personal devices when are
linked with each other
Benefit
Structuring is simple
Instant data sharing
cost effective network
Constraints
Bandwidth limitations
Security control
Local Area Network All the devices in the network of a
small organization are connected in
LAN network using switches and
hubs.
Benefit
Easy to establish
High data transfer
network management is
easy.
Constraints
Size is limited
For managing the network,
5
Table 2: Network types
Network type Description Benefits and constraints
Personal area network All the personal devices when are
linked with each other
Benefit
Structuring is simple
Instant data sharing
cost effective network
Constraints
Bandwidth limitations
Security control
Local Area Network All the devices in the network of a
small organization are connected in
LAN network using switches and
hubs.
Benefit
Easy to establish
High data transfer
network management is
easy.
Constraints
Size is limited
For managing the network,
5
Network administrator is
needed.
Wide Area Network Networking is done over of two or
more LANs network linked together.
Data are transfer in high speed using
satellite links or phone lines.
Benefit
Performance is high
Scalability is offered
Constraints
Security is low
Implementation is costly
and hard.
Structural complexity
Metropolitan Area
Network
MAN is larger in size then LAN and
ranges over a large campus, city. It
can be operated and maintained by a
single owner.
Benefit
Network security is high
speed networking is proper
Constraints
Complexity in structuring
6
needed.
Wide Area Network Networking is done over of two or
more LANs network linked together.
Data are transfer in high speed using
satellite links or phone lines.
Benefit
Performance is high
Scalability is offered
Constraints
Security is low
Implementation is costly
and hard.
Structural complexity
Metropolitan Area
Network
MAN is larger in size then LAN and
ranges over a large campus, city. It
can be operated and maintained by a
single owner.
Benefit
Network security is high
speed networking is proper
Constraints
Complexity in structuring
6
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
P2 Explain the impact of network topology, communication and bandwidth requirements.
Network technology
Token Ring Network: A token ring network is a commonly a local area network where all
the computing devices are linked either though a ring or star topology. It passes logical token
from one host to another (Millet,2015). Host having a token is capable of sending dataand
releasing of thetokens is done only when the receipt of data is inveterate. Three-byte data
frame is used for data transmission and resource utilization. In this type of network server
requirement is not necessary making it a cost-effective structure. Token Ring network has the
ability to perform concurrent operation such as data transmission.
Figure 2: Token ring structure
(Source: http://www.allsyllabus.com/aj/note/Computer_Science/, 2018)
Ethernet: In this type of network,various networking devices are inter linked with one
another using different cables. This network also used Network Interface Card for
connectivity of the devices and the internet (Rivaud, et al 2014).Data Transmission in
ethernet is done by using various technologies. The network structuring in Ethernet is simple
and quite easy to implement and understand.
7
Network technology
Token Ring Network: A token ring network is a commonly a local area network where all
the computing devices are linked either though a ring or star topology. It passes logical token
from one host to another (Millet,2015). Host having a token is capable of sending dataand
releasing of thetokens is done only when the receipt of data is inveterate. Three-byte data
frame is used for data transmission and resource utilization. In this type of network server
requirement is not necessary making it a cost-effective structure. Token Ring network has the
ability to perform concurrent operation such as data transmission.
Figure 2: Token ring structure
(Source: http://www.allsyllabus.com/aj/note/Computer_Science/, 2018)
Ethernet: In this type of network,various networking devices are inter linked with one
another using different cables. This network also used Network Interface Card for
connectivity of the devices and the internet (Rivaud, et al 2014).Data Transmission in
ethernet is done by using various technologies. The network structuring in Ethernet is simple
and quite easy to implement and understand.
7
Figure 3: Ethernet network
(source: https://www.elprocus.com, 2018)
Network Communication
TCP/IP and OSI Model: OSI system is a theoretical model that has seven layers
Interconnected with one another using different protocols. While on other side, Transmission
protocol and internet protocols (TCP/IP) is a four-layerstructure that is used for
telecommunication and it is a communication-oriented model (TCP/IP and OSI model, 2018).
Figure 4: Network models and protocols used
8
(source: https://www.elprocus.com, 2018)
Network Communication
TCP/IP and OSI Model: OSI system is a theoretical model that has seven layers
Interconnected with one another using different protocols. While on other side, Transmission
protocol and internet protocols (TCP/IP) is a four-layerstructure that is used for
telecommunication and it is a communication-oriented model (TCP/IP and OSI model, 2018).
Figure 4: Network models and protocols used
8
(http://www.dummies.com/programming/networking/cisco/network-basics-tcpip-and-osi-
network-model-comparisons/, 2018)
Network Standards
For security and protection of the network, different standards are used. Network mainly
implements IEEE standards that are mainly for networks ethernet connection. Bothe ethernet
standards and wireless standards helps the clients along with the manufacturers for
understanding the networking devices and connection. Appropriateutilization of the available
resource along with high performance of the network is offered.
9
network-model-comparisons/, 2018)
Network Standards
For security and protection of the network, different standards are used. Network mainly
implements IEEE standards that are mainly for networks ethernet connection. Bothe ethernet
standards and wireless standards helps the clients along with the manufacturers for
understanding the networking devices and connection. Appropriateutilization of the available
resource along with high performance of the network is offered.
9
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
M1 Compare common networking principles and how protocols enable the effectiveness of
networked systems.
Networking Protocols
HTTP: This protocol is used forsending and receivingvarious data andInformation from the
server to client and vice versa though web page using the internet. A request is generated by a
user over the network server and the server as a response to the request forward webpage
containing lots of information.
SMTP: SMTP or Simple Mail Transfer Protocol is applied in the network model having
client-server. Using this protocol all the communication of the user mail is managed by a
Local server.
IP: it is a mnemonic used for Internet protocol, these protocols are used in a network for
transmission of data packet from a source device to the particular destination via the specific
IP address. IP addressing helps in offering faster transmission and protected data delivery.
DHCP: For the administration of the present network the address space allocation of the
computing devices in the network can be reduced for a faster and easier connectivityod the
device with the server.
DNS: DNS protocol are implemented in the organizational network, it helps in separating a
present request which is processed in the domain server. Web address of a system can be
effectively construed using the consistent IP address.
Networking principles:
Four networking principles are applied in the computer network system for effective
operation and functionality:
Table 3: Networking principles
Switching technique Massage passing
concept
Addressing issue Data representation
In the computer
network, Data
transmission take
places by transferring
the data from one
device to another
The main idea behind
this principle id to
establish an effective
connection between
the sender and the
receiverof data in the
For addressing the
data transmission over
a network various
method can be
implemented in a
network.These
All the data to be
transmitted in the
organizational network
is tested and checked
according to their byte
size, value and order
10
networked systems.
Networking Protocols
HTTP: This protocol is used forsending and receivingvarious data andInformation from the
server to client and vice versa though web page using the internet. A request is generated by a
user over the network server and the server as a response to the request forward webpage
containing lots of information.
SMTP: SMTP or Simple Mail Transfer Protocol is applied in the network model having
client-server. Using this protocol all the communication of the user mail is managed by a
Local server.
IP: it is a mnemonic used for Internet protocol, these protocols are used in a network for
transmission of data packet from a source device to the particular destination via the specific
IP address. IP addressing helps in offering faster transmission and protected data delivery.
DHCP: For the administration of the present network the address space allocation of the
computing devices in the network can be reduced for a faster and easier connectivityod the
device with the server.
DNS: DNS protocol are implemented in the organizational network, it helps in separating a
present request which is processed in the domain server. Web address of a system can be
effectively construed using the consistent IP address.
Networking principles:
Four networking principles are applied in the computer network system for effective
operation and functionality:
Table 3: Networking principles
Switching technique Massage passing
concept
Addressing issue Data representation
In the computer
network, Data
transmission take
places by transferring
the data from one
device to another
The main idea behind
this principle id to
establish an effective
connection between
the sender and the
receiverof data in the
For addressing the
data transmission over
a network various
method can be
implemented in a
network.These
All the data to be
transmitted in the
organizational network
is tested and checked
according to their byte
size, value and order
10
unless the data reaches
the assigned
destination device.
Switching techniques
are of three types-
packet switching,
message switching and
circuit switching
network by offering
proper addressing.
Addressing is done on
the basis of name,
address, route content
and source
of the pointer.
11
the assigned
destination device.
Switching techniques
are of three types-
packet switching,
message switching and
circuit switching
network by offering
proper addressing.
Addressing is done on
the basis of name,
address, route content
and source
of the pointer.
11
LO2
P3 Discuss the operating principles of networking devices and server types[M2]
Network servers used in a network:
Table 4: Network servers in the network
Server Types Description Image
Web server The server has web page.
Through HTTP these
server serves the user with
web pages as a response
to the request sent by the
user.
Database server These server in applied in
the network to provide a
mutual database system
for the whole network that
helps in managing and
storing the for data.
Mail server These are used for
accessing and managing
user mail from any place
and any time with a
system and authentication
details (Huang, et al
2013.).
12
P3 Discuss the operating principles of networking devices and server types[M2]
Network servers used in a network:
Table 4: Network servers in the network
Server Types Description Image
Web server The server has web page.
Through HTTP these
server serves the user with
web pages as a response
to the request sent by the
user.
Database server These server in applied in
the network to provide a
mutual database system
for the whole network that
helps in managing and
storing the for data.
Mail server These are used for
accessing and managing
user mail from any place
and any time with a
system and authentication
details (Huang, et al
2013.).
12
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
File server These file serversare used
for storing various data
files in the organizational
network
Selection requirements
In the present network for organization, four different types of servers are used mainly a
webserver and a file server. High network performance is attained by using anApache web server
along with the web server. The organization need to store large amount of data in the network for
which file server are used. Management of the data is done using the database server. For
security of the network ACL list and file server are effectively implemented in the network
13
for storing various data
files in the organizational
network
Selection requirements
In the present network for organization, four different types of servers are used mainly a
webserver and a file server. High network performance is attained by using anApache web server
along with the web server. The organization need to store large amount of data in the network for
which file server are used. Management of the data is done using the database server. For
security of the network ACL list and file server are effectively implemented in the network
13
P4 Discuss the inter-dependence of workstation hardware with relevant networking software
The computing devices in the network are implemented with NIC or the Network Interface Cards
that help in establishing communication (Shi et al 2016). Data transmission in the over the
ethernet connection can be done though the RJ-5 port using different types of cabling. The
Network Interface Card can also be used for connecting wireless devices in the network without
any changes in functionality and functionality. Routers are also usedin the current network for
establishing data communication among the end networkingdevices. Switches are also used in
the network, that offerstraffic control along with successful data delivery. Data packets in the
network can received by the workstation by using the NIC. In a network, information after
processing using particular softwares are displayed in the monitor screen for the users. All the
information and datain the network follows a specific path via segmentation.
14
The computing devices in the network are implemented with NIC or the Network Interface Cards
that help in establishing communication (Shi et al 2016). Data transmission in the over the
ethernet connection can be done though the RJ-5 port using different types of cabling. The
Network Interface Card can also be used for connecting wireless devices in the network without
any changes in functionality and functionality. Routers are also usedin the current network for
establishing data communication among the end networkingdevices. Switches are also used in
the network, that offerstraffic control along with successful data delivery. Data packets in the
network can received by the workstation by using the NIC. In a network, information after
processing using particular softwares are displayed in the monitor screen for the users. All the
information and datain the network follows a specific path via segmentation.
14
LO3
P5 Design a networked system to meet a given specification
The organizational network, implements LAN network for satisfaction for of the user
requirements. Devices in the network are connected using ethernet cables. The printers are used
in the network are shared that helps in cost cutting. Switch and routers are used for establishing
connections that provides scalability, reliability and provided higher network performance.
The current network can be improved byapplyingnew switched and wireless devices for
providing scalability, flexibility and cost optimization of the network. Devices in the network are
grouped with switches that has more available ports that support administration and scalability of
the entire network.
Figure 5: Network design
(Source: Created with Packet Tracer)
15
P5 Design a networked system to meet a given specification
The organizational network, implements LAN network for satisfaction for of the user
requirements. Devices in the network are connected using ethernet cables. The printers are used
in the network are shared that helps in cost cutting. Switch and routers are used for establishing
connections that provides scalability, reliability and provided higher network performance.
The current network can be improved byapplyingnew switched and wireless devices for
providing scalability, flexibility and cost optimization of the network. Devices in the network are
grouped with switches that has more available ports that support administration and scalability of
the entire network.
Figure 5: Network design
(Source: Created with Packet Tracer)
15
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
P6 Test and evaluate the design to meet the requirements and analyze user feedback.
A set of questionnaires is designed for the network assessmentfor checking security, reliability,
performance, bandwidth utilization and connectivity.
Table 5: Questionnaires
Questionnaires
1. Does the Network has appropriate application and tools and according to user requirements?
A. Yes B. No
2. Are you happy with network performance and bandwidth for the network communication?
A. Yes B. No
3. Is the system’s performance is functioning according to their assigned?
A. Yes B. No
4. Does the network require any kind of changes?
A. Yes B. No
5. Is the network need high maintenance?
A. Yes B. No
Satisfied
Not satisfied
0% 10% 20% 30% 40% 50% 60% 70% 80% 90%
Satisfied ; 85%
Not satisfied;
15%
Network acceptance
Network acceptance
Figure 6: user’s opinion on network design
The designed questionnaire was provided to a group of 30 users of the network. From the above,
85% ofusers were found pleased with the provided network. However, there were some user who
16
A set of questionnaires is designed for the network assessmentfor checking security, reliability,
performance, bandwidth utilization and connectivity.
Table 5: Questionnaires
Questionnaires
1. Does the Network has appropriate application and tools and according to user requirements?
A. Yes B. No
2. Are you happy with network performance and bandwidth for the network communication?
A. Yes B. No
3. Is the system’s performance is functioning according to their assigned?
A. Yes B. No
4. Does the network require any kind of changes?
A. Yes B. No
5. Is the network need high maintenance?
A. Yes B. No
Satisfied
Not satisfied
0% 10% 20% 30% 40% 50% 60% 70% 80% 90%
Satisfied ; 85%
Not satisfied;
15%
Network acceptance
Network acceptance
Figure 6: user’s opinion on network design
The designed questionnaire was provided to a group of 30 users of the network. From the above,
85% ofusers were found pleased with the provided network. However, there were some user who
16
were not satisfied with the network hence some changes are required to be introduced for
security and performance.
Bandwidth: demands 10mbps.
Communication: the finance and sale department are underneaththe control of management.
Scalability: Switches and hubs used in the network supports additional devices.
Components selection: Switches, router, workstations and printer used according to user
requirement for operativeoperations, performanceand communication.
17
security and performance.
Bandwidth: demands 10mbps.
Communication: the finance and sale department are underneaththe control of management.
Scalability: Switches and hubs used in the network supports additional devices.
Components selection: Switches, router, workstations and printer used according to user
requirement for operativeoperations, performanceand communication.
17
M3 Install and configure network services and applications on your choice
Single router is used for connecting the devices with the internet service provider. It will be
effective to established for network routing. Network switches is used for expending withthe end
devices. Computer and printers are used in network and implements with firewall for handling
the flow of data packet. Few of network application and services are discussed below:
Network Services
For communication in the network, computing devices are used.Web services and file sharing in
the network the network is web server. Network security is required securing all the data and
resources.The network has NIC for the workstations for connecting it with wireless service
provider or even with Ethernet. Addressing of the devices is done though centralized service
control.
IP addressing: Static IP address is achieved though IP addressing. That help in offeringsecurity
of the network. Dynamic addressing is achieved through DHCP.Hence, for a networking device
IP configuration for the IP address is done with using DNS address, subnet mask and default
gateway address (Kottomtharayil et al 2015)
DNS: Mapping of the web address of the network is done using the DNS server along with IP
address. An automated gateway is used for discovering and linkingwith server and various
devices.
Application softwares: User accounts are managed in a network with proper access
permission.The network uses active directory. Network traffic is monitorthough DNS records.
Command linetools along with network monitoring softwarefor performingnumerous operations.
18
Single router is used for connecting the devices with the internet service provider. It will be
effective to established for network routing. Network switches is used for expending withthe end
devices. Computer and printers are used in network and implements with firewall for handling
the flow of data packet. Few of network application and services are discussed below:
Network Services
For communication in the network, computing devices are used.Web services and file sharing in
the network the network is web server. Network security is required securing all the data and
resources.The network has NIC for the workstations for connecting it with wireless service
provider or even with Ethernet. Addressing of the devices is done though centralized service
control.
IP addressing: Static IP address is achieved though IP addressing. That help in offeringsecurity
of the network. Dynamic addressing is achieved through DHCP.Hence, for a networking device
IP configuration for the IP address is done with using DNS address, subnet mask and default
gateway address (Kottomtharayil et al 2015)
DNS: Mapping of the web address of the network is done using the DNS server along with IP
address. An automated gateway is used for discovering and linkingwith server and various
devices.
Application softwares: User accounts are managed in a network with proper access
permission.The network uses active directory. Network traffic is monitorthough DNS records.
Command linetools along with network monitoring softwarefor performingnumerous operations.
18
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
D2 Design a maintenance schedule to support the networked system.
Table 6: Network maintenance schedule
Elements Description Time list
Cable configuration The whole network connectivity ischecked for splitand cracked
cables and replacedby new cable. This also embracesnetwork
extension by connecting new devices in the network.
As per
requirement
Hardware
configuration
Configuration of hardware is checked regularly preservingthe
security of the network security and operativedevices
addressing(Kizza, 2017).
Weekly
File permission File sharing and accessing is done in appropriatepermission and
authentication.
Frequently
Security The network security is maintained for both logical and
physical, it need to upgraded so security breach can be avoided.
Weekly
Software
configuration
Software application like anti-virus should be updated and
upgraded to its latest version.
Weekly
Auditing The organization must regularly perform audit for checking the
resource utilization, connectivity and functionality of the
devices.
Monthly
Connectivity organizational networks are checked for connectivity and
performance.
Weekly
19
Table 6: Network maintenance schedule
Elements Description Time list
Cable configuration The whole network connectivity ischecked for splitand cracked
cables and replacedby new cable. This also embracesnetwork
extension by connecting new devices in the network.
As per
requirement
Hardware
configuration
Configuration of hardware is checked regularly preservingthe
security of the network security and operativedevices
addressing(Kizza, 2017).
Weekly
File permission File sharing and accessing is done in appropriatepermission and
authentication.
Frequently
Security The network security is maintained for both logical and
physical, it need to upgraded so security breach can be avoided.
Weekly
Software
configuration
Software application like anti-virus should be updated and
upgraded to its latest version.
Weekly
Auditing The organization must regularly perform audit for checking the
resource utilization, connectivity and functionality of the
devices.
Monthly
Connectivity organizational networks are checked for connectivity and
performance.
Weekly
19
LO4
P7 Implement a networked system based on a prepared design
Table 7: Network components
Network components Description
Router The router in the network is configured successfully forattaining the
RIP algorithm. Router in the network is useful for data packet
transmission among the computing devices. The computers can be
connected to the internet service provider with the help of router.
Network Switches Switches are configured in the organizational network for grouping of
connected devices using VLAN network(Appenzeller, et al 2015.).
Connectivity and allocation of resources in the network is done though
switches. Security of the entire network can be maintained and
controlled using routers.
Address allocation Class C IP addressing is used in the organizational network for
connectivity of the devices. Address range for more than 300 computers
is reserved for the network need in the future
Server installation Server Operating system in the network is windows 12 which is
effective in offering accustomed user interface along with
administrative function for efficient management of the network the OS
used in the serverfulfills the requirements of the user in relationsto
network security, reliability and performance.
Server configuration Four different servers are configured in the network for supporting
network addressing that helps in transmission of data in the network.
Clientconfiguration For connecting the network devices directly and automatically the
network systems used IP addressing and dynamic addressing services.
20
P7 Implement a networked system based on a prepared design
Table 7: Network components
Network components Description
Router The router in the network is configured successfully forattaining the
RIP algorithm. Router in the network is useful for data packet
transmission among the computing devices. The computers can be
connected to the internet service provider with the help of router.
Network Switches Switches are configured in the organizational network for grouping of
connected devices using VLAN network(Appenzeller, et al 2015.).
Connectivity and allocation of resources in the network is done though
switches. Security of the entire network can be maintained and
controlled using routers.
Address allocation Class C IP addressing is used in the organizational network for
connectivity of the devices. Address range for more than 300 computers
is reserved for the network need in the future
Server installation Server Operating system in the network is windows 12 which is
effective in offering accustomed user interface along with
administrative function for efficient management of the network the OS
used in the serverfulfills the requirements of the user in relationsto
network security, reliability and performance.
Server configuration Four different servers are configured in the network for supporting
network addressing that helps in transmission of data in the network.
Clientconfiguration For connecting the network devices directly and automatically the
network systems used IP addressing and dynamic addressing services.
20
Figure 7: Configuring DSL for connection with external WAN service
Figure 8: RIP configuration on router in Cisco packet tracer
21
Figure 8: RIP configuration on router in Cisco packet tracer
21
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Figure 9: Ethernet address on router
Figure 10: VLAN database in main switch of the network
22
Figure 10: VLAN database in main switch of the network
22
Figure 11: IP address of the printer shared in finance department
Figure 12: Static IP address on the computers
23
Figure 12: Static IP address on the computers
23
Figure 13: IP addressing on server machine
Figure 14: Managing HTTPS connections and files
24
Figure 14: Managing HTTPS connections and files
24
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Figure 15: Enabling and mapping DNS address for servers
Figure 16: Configuring email services
25
Figure 16: Configuring email services
25
Figure 17: Managing FTP users and permissions
Figure 18: Managing IP address permission through firewall
26
Figure 18: Managing IP address permission through firewall
26
P8 Document and analyze test results against expected results
Table 8: test result
Sl no. Test Result Expected Result Achieved
1 Simplicity Network must be time saving and cost
efficient.
The network has various
automated procedurethat is
effective in attaining network
simplicity though an Active
directory and other tools.
2 Scalability The organizational network should be
proficientin adding any new devices
in the network according to needs.
All the switches and address space
in the current network are not used
completely.
3 Availability uptime of the network need to be set
asidefor making it available.
The systems are connected with
high quality fiber optic cable
hence the availability of data and
resources in the network is easy.
4 Security Network Security and defense system
is expected in the network of data and
resource protection.
The network applies firewall
policies and ACL for maintaining
network security so that any kind
of malicious activities can be
avoided.
5 Bandwidth Sufficient bandwidth is required to be
maintained in the network for proper
communication and data transfer.
All the devices in the network has
a bandwidth of 10 Mbps for
effective communication.
27
Table 8: test result
Sl no. Test Result Expected Result Achieved
1 Simplicity Network must be time saving and cost
efficient.
The network has various
automated procedurethat is
effective in attaining network
simplicity though an Active
directory and other tools.
2 Scalability The organizational network should be
proficientin adding any new devices
in the network according to needs.
All the switches and address space
in the current network are not used
completely.
3 Availability uptime of the network need to be set
asidefor making it available.
The systems are connected with
high quality fiber optic cable
hence the availability of data and
resources in the network is easy.
4 Security Network Security and defense system
is expected in the network of data and
resource protection.
The network applies firewall
policies and ACL for maintaining
network security so that any kind
of malicious activities can be
avoided.
5 Bandwidth Sufficient bandwidth is required to be
maintained in the network for proper
communication and data transfer.
All the devices in the network has
a bandwidth of 10 Mbps for
effective communication.
27
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Figure 19: Ping successful for other computers in same department
28
28
Figure 20: Connection from finance department is successful to web server
29
29
M4 Recommend potential enhancements for the networked systems
Business of an organization depend mostly on the network performance. For enhancing the
performance of the networked system-
All the user in the network must be skilled and trained regarding the network, along with
knowledge of security and safety.
Applications in the network must be prioritized. Along with resource and tools
availabilities to the user.
Upgrade the present network with new and advance technologies for enhancing the
processing power and increasing bandwidth.
The network should have an effective network security system; hence antivirus and
malware software need to be installed in the system for filtering the traffic and to reduce
data loss.
30
Business of an organization depend mostly on the network performance. For enhancing the
performance of the networked system-
All the user in the network must be skilled and trained regarding the network, along with
knowledge of security and safety.
Applications in the network must be prioritized. Along with resource and tools
availabilities to the user.
Upgrade the present network with new and advance technologies for enhancing the
processing power and increasing bandwidth.
The network should have an effective network security system; hence antivirus and
malware software need to be installed in the system for filtering the traffic and to reduce
data loss.
30
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
D3 Use critical reflection to evaluate own work a
For a computer network, the proficiency is checked and tested through the output of
communication and bandwidth among all the computing devices connected in the network. Test
for the present organizational network is made known below:
Test for Communication:
For testing the communication Ping command is used.It is a Command Prompt command that
check whether the source computer reached theparticular computer at the destination. Ping
command tests the networking device’s availability (Ping Command, 2018). When a ping fails it
provides results response as request timed out,whereas a successful resultas reply frommessage
along with round trip delay in time period of milliseconds. In the present scenario ping
command was applied for testing the computers connectivity in an individual department. It was
found that all the devices were appropriately connected. Then the computers in other
departments were tested with another ping command for checking server connectivity.
Figure 21: PING command
31
For a computer network, the proficiency is checked and tested through the output of
communication and bandwidth among all the computing devices connected in the network. Test
for the present organizational network is made known below:
Test for Communication:
For testing the communication Ping command is used.It is a Command Prompt command that
check whether the source computer reached theparticular computer at the destination. Ping
command tests the networking device’s availability (Ping Command, 2018). When a ping fails it
provides results response as request timed out,whereas a successful resultas reply frommessage
along with round trip delay in time period of milliseconds. In the present scenario ping
command was applied for testing the computers connectivity in an individual department. It was
found that all the devices were appropriately connected. Then the computers in other
departments were tested with another ping command for checking server connectivity.
Figure 21: PING command
31
Bandwidth: bandwidth test program sends files of recognized size in the organizational network
to the distant computer for calculating time needed for downloading the file atdestination
successfully in megabits per second.
These tests areeffective in understanding the performance of the network. Conclusion can be
made from the test result that the current network is operativeforsuccessfully fulling the
requirement of the users in the network. Data loss was not seen and data transmission over the
network was with a 10mbps bandwidth supporting video and audio files.
32
to the distant computer for calculating time needed for downloading the file atdestination
successfully in megabits per second.
These tests areeffective in understanding the performance of the network. Conclusion can be
made from the test result that the current network is operativeforsuccessfully fulling the
requirement of the users in the network. Data loss was not seen and data transmission over the
network was with a 10mbps bandwidth supporting video and audio files.
32
Conclusion
The fundaments of computer technologies and network has been studied in this report.
Illustration are made regarding various network types, topologies and protocols used for
implementation and functionality of a network. A network consists of different hardware and
software components, their interdependency has been studied in the report.A network design
using Cisco Packet tracer has been provided for the organization. All the network components in
the organizational network has been tested and configured comparing with the expected result.
At last, the above report effectively provides a maintenance schedule and recommendationsfor
improving the performance and security of the provided network for the organization.
33
The fundaments of computer technologies and network has been studied in this report.
Illustration are made regarding various network types, topologies and protocols used for
implementation and functionality of a network. A network consists of different hardware and
software components, their interdependency has been studied in the report.A network design
using Cisco Packet tracer has been provided for the organization. All the network components in
the organizational network has been tested and configured comparing with the expected result.
At last, the above report effectively provides a maintenance schedule and recommendationsfor
improving the performance and security of the provided network for the organization.
33
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
References
Books and Journals
Appenzeller, G., Big Switch Networks Inc, 2015. Methods for configuring network switches.
U.S. Patent 9,001,827..
Comer, D., 2015. Computer networks and internets. Pearson.
Huang, H.H., Transpacific Optics LLC, 2013. Network server for providing scanning
functionality to a computer. U.S. Patent 8,463,878.
Kizza, J.M., 2017. Guide to computer network security. Springer.
Kottomtharayil, R., Gokhale, P., Prahlad, A., Vijayan, M.K., Ngo, D. and Devassy, V.,
CommVault Systems Inc, 2015. System and method for sharing media in a computer network.
U.S. Patent 9,021,213.
Millet, T., Fortinet Inc, 2015. Identifying nodes in a ring network. U.S. Patent 9,143,351.
Peiffer, C. and L'heureux, I., Juniper Networks Inc, 2013. System and method for maintaining
statefulness during client-server interactions. U.S. Patent 8,346,848.
Rivaud, D., Gazier, M. and Dziawa, M., Ciena Corp, 2014. Ethernet network synchronization
systems and methods. U.S. Patent 8,630,315.
Shi, J., Liang, T., Wu, H., Liu, B. and Zhang, B., 2016, September. Ndn-nic: Name-based
filtering on network interface card. In Proceedings of the 3rd ACM Conference on Information-
Centric Networking (pp. 40-49). ACM.
Online references
TCP/IP and OSI model, 2018 [Online][Accessed through] <http://fiberbit.com.tw/tcpip-model-
vs-osi-model/> [Accessed on: 2nd May, 2018]
Ping Command, 2018[Online] [Accessed through]< https://www.techrepublic.com/article/new-
to-networking-introducing-the-ping-command > [Accessed on: 2nd May, 2018]
34
Books and Journals
Appenzeller, G., Big Switch Networks Inc, 2015. Methods for configuring network switches.
U.S. Patent 9,001,827..
Comer, D., 2015. Computer networks and internets. Pearson.
Huang, H.H., Transpacific Optics LLC, 2013. Network server for providing scanning
functionality to a computer. U.S. Patent 8,463,878.
Kizza, J.M., 2017. Guide to computer network security. Springer.
Kottomtharayil, R., Gokhale, P., Prahlad, A., Vijayan, M.K., Ngo, D. and Devassy, V.,
CommVault Systems Inc, 2015. System and method for sharing media in a computer network.
U.S. Patent 9,021,213.
Millet, T., Fortinet Inc, 2015. Identifying nodes in a ring network. U.S. Patent 9,143,351.
Peiffer, C. and L'heureux, I., Juniper Networks Inc, 2013. System and method for maintaining
statefulness during client-server interactions. U.S. Patent 8,346,848.
Rivaud, D., Gazier, M. and Dziawa, M., Ciena Corp, 2014. Ethernet network synchronization
systems and methods. U.S. Patent 8,630,315.
Shi, J., Liang, T., Wu, H., Liu, B. and Zhang, B., 2016, September. Ndn-nic: Name-based
filtering on network interface card. In Proceedings of the 3rd ACM Conference on Information-
Centric Networking (pp. 40-49). ACM.
Online references
TCP/IP and OSI model, 2018 [Online][Accessed through] <http://fiberbit.com.tw/tcpip-model-
vs-osi-model/> [Accessed on: 2nd May, 2018]
Ping Command, 2018[Online] [Accessed through]< https://www.techrepublic.com/article/new-
to-networking-introducing-the-ping-command > [Accessed on: 2nd May, 2018]
34
1 out of 38
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.