Networking Technologies: Design, Implementation, and Evaluation of a Local Area Network
VerifiedAdded on  2024/05/21
|32
|4255
|498
AI Summary
This report delves into the fundamental concepts of networking technologies, exploring various network types, topologies, and protocols. It provides a comprehensive analysis of a local area network (LAN) designed for an organization, encompassing its design, implementation, and evaluation. The report examines the selection and configuration of network devices, including routers, switches, and servers, along with the installation and configuration of network services and applications. Furthermore, it outlines a maintenance schedule to ensure the network's ongoing performance and security. The report concludes with recommendations for potential enhancements to make the network more secure, robust, and scalable.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
NETWORKING TECHNOLOGIES
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
TABLE OF CONTENTS
INTRODUCTION......................................................................................................................1
LO1............................................................................................................................................2
P1 Discuss the benefits and constraints of different network types and standards................2
P2 Explain the impact of network topology, communication and bandwidth requirements. 6
M1 Compare common networking principles and how protocols enable the effectiveness
of networked systems.............................................................................................................8
LO2..........................................................................................................................................10
P3 Discuss the operating principles of networking devices and server types......................10
P4 Discuss the interdependence of workstation hardware with relevant networking
software................................................................................................................................11
LO3..........................................................................................................................................12
P5. Design a network system to meet a given specification................................................12
P6. Test and evaluate the design to meet the requirements and analyses user feedback.....13
M3 Install and configure network services and applications...............................................15
D2 Design a maintenance schedule to support the networked system.................................16
M4 Recommend potential enhancements for the networked systems more secure, robust
applications..........................................................................................................................18
LO4..........................................................................................................................................19
P7 Implement a networked system based on a prepared design..........................................19
P8 Document and analyse test results against expected results...........................................24
D3 Use critical reflection to evaluate own work and justify valid conclusions...................25
CONCLUSION........................................................................................................................27
REFERENCES.........................................................................................................................28
INTRODUCTION......................................................................................................................1
LO1............................................................................................................................................2
P1 Discuss the benefits and constraints of different network types and standards................2
P2 Explain the impact of network topology, communication and bandwidth requirements. 6
M1 Compare common networking principles and how protocols enable the effectiveness
of networked systems.............................................................................................................8
LO2..........................................................................................................................................10
P3 Discuss the operating principles of networking devices and server types......................10
P4 Discuss the interdependence of workstation hardware with relevant networking
software................................................................................................................................11
LO3..........................................................................................................................................12
P5. Design a network system to meet a given specification................................................12
P6. Test and evaluate the design to meet the requirements and analyses user feedback.....13
M3 Install and configure network services and applications...............................................15
D2 Design a maintenance schedule to support the networked system.................................16
M4 Recommend potential enhancements for the networked systems more secure, robust
applications..........................................................................................................................18
LO4..........................................................................................................................................19
P7 Implement a networked system based on a prepared design..........................................19
P8 Document and analyse test results against expected results...........................................24
D3 Use critical reflection to evaluate own work and justify valid conclusions...................25
CONCLUSION........................................................................................................................27
REFERENCES.........................................................................................................................28
LIST OF FIGURES
Figure 1: Types of Network.......................................................................................................3
Figure 2: Protocols used in different network layer...................................................................6
Figure 3: Global Wireless Standards..........................................................................................7
Figure 4: Network design.........................................................................................................12
Figure 5: user’s opinion on network design.............................................................................13
Figure 6: Switch configuration.................................................................................................19
Figure 7: Router configuration.................................................................................................20
Figure 8: Web server configuration.........................................................................................21
Figure 9: DNS configuration....................................................................................................21
Figure 10: User and password on mail server..........................................................................22
Figure 11: FTP configuration...................................................................................................22
Figure 12: IP address on computers.........................................................................................23
Figure 13: Printer configuration...............................................................................................23
Figure 14: Screenshot for the successful ping command.........................................................25
Figure 15: Screenshot for failed ping command......................................................................25
Figure 1: Types of Network.......................................................................................................3
Figure 2: Protocols used in different network layer...................................................................6
Figure 3: Global Wireless Standards..........................................................................................7
Figure 4: Network design.........................................................................................................12
Figure 5: user’s opinion on network design.............................................................................13
Figure 6: Switch configuration.................................................................................................19
Figure 7: Router configuration.................................................................................................20
Figure 8: Web server configuration.........................................................................................21
Figure 9: DNS configuration....................................................................................................21
Figure 10: User and password on mail server..........................................................................22
Figure 11: FTP configuration...................................................................................................22
Figure 12: IP address on computers.........................................................................................23
Figure 13: Printer configuration...............................................................................................23
Figure 14: Screenshot for the successful ping command.........................................................25
Figure 15: Screenshot for failed ping command......................................................................25
LIST OF TABLES
Table 1: Different network system.............................................................................................2
Table 2: Different types of networks.........................................................................................3
Table 3: Different types of network topologies.........................................................................4
Table 4: Various Protocols used in networking.........................................................................8
Table 5: Network Maintenance Schedule................................................................................16
Table 6: Changes for network enhancement............................................................................18
Table 7: Network Test results..................................................................................................20
Table 1: Different network system.............................................................................................2
Table 2: Different types of networks.........................................................................................3
Table 3: Different types of network topologies.........................................................................4
Table 4: Various Protocols used in networking.........................................................................8
Table 5: Network Maintenance Schedule................................................................................16
Table 6: Changes for network enhancement............................................................................18
Table 7: Network Test results..................................................................................................20
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
INTRODUCTION
Networking is very effective for any organisation as it is effective in offering communication
in the network. In this present report, different network types, systems, topologies will be
studied along with their benefit and constraints. A LAN network is designed and
implemented for the provided organisation. Various hardware and software devices are used
in the network which will be studied. Different Servers and protocols will be studied in the
present report along with testing principles. The network is tested and the result of the test are
compared with the expected result. Proper maintenance schedule is provided in the network
for enhancing its performance for future requirement.
1
Networking is very effective for any organisation as it is effective in offering communication
in the network. In this present report, different network types, systems, topologies will be
studied along with their benefit and constraints. A LAN network is designed and
implemented for the provided organisation. Various hardware and software devices are used
in the network which will be studied. Different Servers and protocols will be studied in the
present report along with testing principles. The network is tested and the result of the test are
compared with the expected result. Proper maintenance schedule is provided in the network
for enhancing its performance for future requirement.
1
LO1
P1 Discuss the benefits and constraints of different network types and standards.
Network systems
Table 1: Different network system
Network
systems
Peer-to-peer network system Client- server network system
Description In these network, workstation is
connected with each other for
communication and flow of data
without a server for controlling the
operations in the network (O'brien
et al 2017).
Here, the computers in the network
uses a server for controlling and
allocation of resources and data.
Communication and sessions with
clients is complete through server.
Benefit ï‚· High performance
ï‚· Cost effective
ï‚· Cost effective
ï‚· Centralized network
management
ï‚· Security is high
Constraints ï‚· Complex network
management
ï‚· Less secure
ï‚· Server Dependency is high.
ï‚· Performance is low
Image
2
P1 Discuss the benefits and constraints of different network types and standards.
Network systems
Table 1: Different network system
Network
systems
Peer-to-peer network system Client- server network system
Description In these network, workstation is
connected with each other for
communication and flow of data
without a server for controlling the
operations in the network (O'brien
et al 2017).
Here, the computers in the network
uses a server for controlling and
allocation of resources and data.
Communication and sessions with
clients is complete through server.
Benefit ï‚· High performance
ï‚· Cost effective
ï‚· Cost effective
ï‚· Centralized network
management
ï‚· Security is high
Constraints ï‚· Complex network
management
ï‚· Less secure
ï‚· Server Dependency is high.
ï‚· Performance is low
Image
2
Network types
Figure 1: Types of Network
(Source: https://www.lifewire.com/lans-wans-and-other-area-networks-817376, 2018 )
Table 2: Different types of networks
Network
type
Personal area
network (PAN)
Local Area
Network (LAN)
Wide Area
Network
(WAN)
Metropolitan
Area
Network(MAN)
Descriptio
n
personal devices
of a user are
interconnected
with each other it
forms PAN (Faith
et al 2017).
These network
plan is generally
used for
connecting
computers and
devices over a
small
organization
which is limited
to a group of
buildings,
building or even a
Networking is
done over of
two or more
LANs network
linked together.
Data are
transfer in high
speed using
satellite links or
phone lines.
MAN is larger
in size then
LAN and ranges
over a large
campus, city. It
can be operated
and maintained
by a single
owner.
3
Figure 1: Types of Network
(Source: https://www.lifewire.com/lans-wans-and-other-area-networks-817376, 2018 )
Table 2: Different types of networks
Network
type
Personal area
network (PAN)
Local Area
Network (LAN)
Wide Area
Network
(WAN)
Metropolitan
Area
Network(MAN)
Descriptio
n
personal devices
of a user are
interconnected
with each other it
forms PAN (Faith
et al 2017).
These network
plan is generally
used for
connecting
computers and
devices over a
small
organization
which is limited
to a group of
buildings,
building or even a
Networking is
done over of
two or more
LANs network
linked together.
Data are
transfer in high
speed using
satellite links or
phone lines.
MAN is larger
in size then
LAN and ranges
over a large
campus, city. It
can be operated
and maintained
by a single
owner.
3
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
room.
Benefits ï‚· Simple
structuring
ï‚· cost effective
network
ï‚· Instant data
sharing
ï‚· High speed
data transfer
ï‚· Easy to
establish
ï‚· Easy network
management.
ï‚· High
scalability
ï‚· high
performance
ï‚· high speed
networking
ï‚· security is
high
Constraint
s
ï‚· Security
control
ï‚· Bandwidth
limitations
ï‚· Network
administrator
is required
ï‚· Size is limited
ï‚· Hard to
establish
ï‚· Costly
ï‚· Structural
complexity
arises
ï‚· Security is
low
ï‚· Hard to
establish
ï‚· More
security
feature is
required.
Image
Network topologies
Table 3: Different types of network topologies
Types of
topology
Image Description Benefit Constraints
4
Benefits ï‚· Simple
structuring
ï‚· cost effective
network
ï‚· Instant data
sharing
ï‚· High speed
data transfer
ï‚· Easy to
establish
ï‚· Easy network
management.
ï‚· High
scalability
ï‚· high
performance
ï‚· high speed
networking
ï‚· security is
high
Constraint
s
ï‚· Security
control
ï‚· Bandwidth
limitations
ï‚· Network
administrator
is required
ï‚· Size is limited
ï‚· Hard to
establish
ï‚· Costly
ï‚· Structural
complexity
arises
ï‚· Security is
low
ï‚· Hard to
establish
ï‚· More
security
feature is
required.
Image
Network topologies
Table 3: Different types of network topologies
Types of
topology
Image Description Benefit Constraints
4
Star
topology
Workstation are
connected in this
type of network
using a centralized
device(Switch/hub)
ï‚· Maintenance is
easy
ï‚· Performance is
high
ï‚· Dependency
is high in
the
centralized
device
ï‚· Costly due
to high
cable
requirement
Ring
topology
Computer and
devices are
connected with one
another using the
ring format (Bisht,
and Singh, 2015).
ï‚· easy
implementation
ï‚· cost effective
ï‚· single node
failure leads
to network
failure.
ï‚· Low
scalability
Mesh
topology
All the computing
devices are capable
of linking with all
or many of the
computer present
in the network.
ï‚· Many devices
can be
connected
ï‚· Cost effective
ï‚· High
maintenance
cost
ï‚· complex
structure
Bus
topology
The workstations
in these types of
network
communicate with
server by means of
single cable or
node.
ï‚· Less cable
therefore low
cost
ï‚· Simple
structuring
ï‚· High load in
cable
ï‚· Breakdown if
cable fails
5
topology
Workstation are
connected in this
type of network
using a centralized
device(Switch/hub)
ï‚· Maintenance is
easy
ï‚· Performance is
high
ï‚· Dependency
is high in
the
centralized
device
ï‚· Costly due
to high
cable
requirement
Ring
topology
Computer and
devices are
connected with one
another using the
ring format (Bisht,
and Singh, 2015).
ï‚· easy
implementation
ï‚· cost effective
ï‚· single node
failure leads
to network
failure.
ï‚· Low
scalability
Mesh
topology
All the computing
devices are capable
of linking with all
or many of the
computer present
in the network.
ï‚· Many devices
can be
connected
ï‚· Cost effective
ï‚· High
maintenance
cost
ï‚· complex
structure
Bus
topology
The workstations
in these types of
network
communicate with
server by means of
single cable or
node.
ï‚· Less cable
therefore low
cost
ï‚· Simple
structuring
ï‚· High load in
cable
ï‚· Breakdown if
cable fails
5
P2 Explain the impact of network topology, communication and bandwidth requirements.
Network technology
Token Ring: In LAN network, if the computing devices are linked with one another though
ring topology, then it uses a data frame of three byte for transmission of the data and for
utilisation of resources. In these structure, server is not required for managing the network
therefore it is cost efficient (Comer, 2015). However, the network is in capable of
performing simultaneous operation like data transmission.
Ethernet: It is the network form when the devices in the network are connected with the help
of various different types of cables. Network Interface Card or NIC is effectively used in
ethernet. Transmission of data is done using various technologies. The Ethernet is simple
structuring hence it is easy to understand and implement.
Communication
TCP/IP and OSI Model: OSI or the Open System Interconnection is a seven layered a
theoretical model, which helps in implementation of a network using various protocols. On
other hand, TCP/IP stands for Transmission protocol and internet protocols, it is four layer
telecommunication structure and is communication oriented model (Alani, 2014)
Figure 2: Protocols used in different network layer
(Source: http://www.ids-sax2.com, 2018 )
Standards
6
Network technology
Token Ring: In LAN network, if the computing devices are linked with one another though
ring topology, then it uses a data frame of three byte for transmission of the data and for
utilisation of resources. In these structure, server is not required for managing the network
therefore it is cost efficient (Comer, 2015). However, the network is in capable of
performing simultaneous operation like data transmission.
Ethernet: It is the network form when the devices in the network are connected with the help
of various different types of cables. Network Interface Card or NIC is effectively used in
ethernet. Transmission of data is done using various technologies. The Ethernet is simple
structuring hence it is easy to understand and implement.
Communication
TCP/IP and OSI Model: OSI or the Open System Interconnection is a seven layered a
theoretical model, which helps in implementation of a network using various protocols. On
other hand, TCP/IP stands for Transmission protocol and internet protocols, it is four layer
telecommunication structure and is communication oriented model (Alani, 2014)
Figure 2: Protocols used in different network layer
(Source: http://www.ids-sax2.com, 2018 )
Standards
6
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Network for any organisation is implemented ding various standards for maintaining its
security. It mainly uses IEEE standards which are for ethernet connection. Wireless and
ethernet standards guides the clients and the device manufacturing organisation. They provide
proper resource utilisation and high performance (Ethernet standard, 2018).
Figure 3: Global Wireless Standards.
(Source: http://www.electronicdesign.com/iot, 2018)
7
security. It mainly uses IEEE standards which are for ethernet connection. Wireless and
ethernet standards guides the clients and the device manufacturing organisation. They provide
proper resource utilisation and high performance (Ethernet standard, 2018).
Figure 3: Global Wireless Standards.
(Source: http://www.electronicdesign.com/iot, 2018)
7
M1 Compare common networking principles and how protocols enable the effectiveness of
networked systems.
Protocols
Table 4: Various Protocols used in networking
Protocol Description
HTTP Information from client to server and server to client is sent and receive
via web page using this HTTP protocol. The user generates a Request over
server, and as a response the server forwards information in the form of
web page.
IP In a network, data packet travels from the source to destination device
through IP address. It provides fast and secure data delivery.
SMTP Simple Mail Transfer Protocol is commonly used for client-server
network model. Communication of mail can be managed using a Local
server.
DNS This protocol is implemented for isolating an existing request that is being
processed in the domain. Web address can be interpreted to form the
corresponding IP address
DHCP For network administration, allocation of address space for the computing
devices can be reduced providing quicker connectivity with the server.
Networking principles:
In computer network, all the function and operation are held by following four networking
principles:
Switching
technique
Massage passing
concept
Addressing issue Data representation
Data are transmitting
in a network from
Its main concern is
to establish
Different methods
can be used for
Transmitted data in a
network is checked
8
networked systems.
Protocols
Table 4: Various Protocols used in networking
Protocol Description
HTTP Information from client to server and server to client is sent and receive
via web page using this HTTP protocol. The user generates a Request over
server, and as a response the server forwards information in the form of
web page.
IP In a network, data packet travels from the source to destination device
through IP address. It provides fast and secure data delivery.
SMTP Simple Mail Transfer Protocol is commonly used for client-server
network model. Communication of mail can be managed using a Local
server.
DNS This protocol is implemented for isolating an existing request that is being
processed in the domain. Web address can be interpreted to form the
corresponding IP address
DHCP For network administration, allocation of address space for the computing
devices can be reduced providing quicker connectivity with the server.
Networking principles:
In computer network, all the function and operation are held by following four networking
principles:
Switching
technique
Massage passing
concept
Addressing issue Data representation
Data are transmitting
in a network from
Its main concern is
to establish
Different methods
can be used for
Transmitted data in a
network is checked
8
one device to other
until the data reaches
the destination
device assigned for
it. There are three
types of Switching-
message switching,
packet switching
and circuit
switching
connection between
the receiver and
sender along with
the provided
address.
addressing the
transmission of data
in a network.
Addressing is
possible by address,
name, content,
source and route.
for its size, bytes,
pointer order etc.
9
until the data reaches
the destination
device assigned for
it. There are three
types of Switching-
message switching,
packet switching
and circuit
switching
connection between
the receiver and
sender along with
the provided
address.
addressing the
transmission of data
in a network.
Addressing is
possible by address,
name, content,
source and route.
for its size, bytes,
pointer order etc.
9
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
LO2
P3 Discuss the operating principles of networking devices and server types.
Types of servers used in a network:
Server Types Description
File server It helps in stores data file in the network
Mail server These are used for accessing and managing user
mail from any place and any time with a system
and authentication details.
Web server web page is stored in this server.
Database server Provides a common database in the network for
data storage and management.
Selection requirements
The organisational network mainly uses file server and web server. For achieving high
network performance, it is recommended that Apache web server must be accompanied with
web server on the window server. To the high number of computers and printers, server must
be capable of storing a large data base. The network in lastly requires file serve and ACLs for
security purpose.
10
P3 Discuss the operating principles of networking devices and server types.
Types of servers used in a network:
Server Types Description
File server It helps in stores data file in the network
Mail server These are used for accessing and managing user
mail from any place and any time with a system
and authentication details.
Web server web page is stored in this server.
Database server Provides a common database in the network for
data storage and management.
Selection requirements
The organisational network mainly uses file server and web server. For achieving high
network performance, it is recommended that Apache web server must be accompanied with
web server on the window server. To the high number of computers and printers, server must
be capable of storing a large data base. The network in lastly requires file serve and ACLs for
security purpose.
10
P4 Discuss the interdependence of workstation hardware with relevant networking software
All the devices in network uses the Network Interface Cards (NIC)for communication
purposes. For transmission of data the ethernet uses NIC though RJ-5 port. Various cables are
used for connecting the devices. The network also supports wireless devices using NIC. In
the network routers are used for data communication that is connected with the networking
end device through switches that helps in data delivery and traffic controlling. The
workstation receives data packets though NIC, and the screen displays the information after
processing them through specific softwares. Data and information follows same path through
segmentation and creation of data packets in the network.
11
All the devices in network uses the Network Interface Cards (NIC)for communication
purposes. For transmission of data the ethernet uses NIC though RJ-5 port. Various cables are
used for connecting the devices. The network also supports wireless devices using NIC. In
the network routers are used for data communication that is connected with the networking
end device through switches that helps in data delivery and traffic controlling. The
workstation receives data packets though NIC, and the screen displays the information after
processing them through specific softwares. Data and information follows same path through
segmentation and creation of data packets in the network.
11
LO3
P5. Design a network system to meet a given specification
Local area network is used for designing the organizational network having four different
servers to fulfill the user requirements. Ethernet cables can be used for connecting the
computing devices and printers. Printers in the network can be shared that helps in cost
cutting. Connections in the network are made with help of switches and router makes the
network more reliable, scalable and offers high performance.
The current network design, is operative in respect to security, cost, management and
reliability. However, the network can possibly enhance by implementing of wireless devices
and new switches that will provide network flexibility, scalability and cost optimization.
Grouping of the devices can be done with switches having more ports for scalability and
administration of the network.
Figure 4: Network design
12
P5. Design a network system to meet a given specification
Local area network is used for designing the organizational network having four different
servers to fulfill the user requirements. Ethernet cables can be used for connecting the
computing devices and printers. Printers in the network can be shared that helps in cost
cutting. Connections in the network are made with help of switches and router makes the
network more reliable, scalable and offers high performance.
The current network design, is operative in respect to security, cost, management and
reliability. However, the network can possibly enhance by implementing of wireless devices
and new switches that will provide network flexibility, scalability and cost optimization.
Grouping of the devices can be done with switches having more ports for scalability and
administration of the network.
Figure 4: Network design
12
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
P6. Test and evaluate the design to meet the requirements and analyses user feedback
Questionnaire has been designed for network evaluation to check reliability, security,
connectivity, performance and bandwidth utilization.
Questionnaires
1. Is the network has proper tools and applications as per user requirements?
A. Yes B. No
2. Are you pleased with the network performance while establishing communication?
A. Yes B. No
3. Do you think system’s performance is operative as per the assigned role?
A. Yes B. No
4. Do the network need any changes?
A. Yes B. No
5. Does the computers in the network required high maintenance?
A. Yes B. No
Satisfied
80%
Not satisfied
20%
Network acceptance
Satisfied
Not satisfied
Figure 5: user’s opinion on network design
13
Questionnaire has been designed for network evaluation to check reliability, security,
connectivity, performance and bandwidth utilization.
Questionnaires
1. Is the network has proper tools and applications as per user requirements?
A. Yes B. No
2. Are you pleased with the network performance while establishing communication?
A. Yes B. No
3. Do you think system’s performance is operative as per the assigned role?
A. Yes B. No
4. Do the network need any changes?
A. Yes B. No
5. Does the computers in the network required high maintenance?
A. Yes B. No
Satisfied
80%
Not satisfied
20%
Network acceptance
Satisfied
Not satisfied
Figure 5: user’s opinion on network design
13
The above questionnaire was given to 30 network users, and it was seen that almost 80% of
the users were quite satisfied with the network. But there was some user who recommended
some changes to be made for attaining high performance and security.
Bandwidth: 10mbps is demanded.
Communication: Computers in the finance and sale department are under management
control.
Scalability: Most of switches and hubs are free for supporting addition of new devices in the
network without having structural changes.
Selection of components: Router, switches, printer and workstations used are as per user
requirement for effective performance, communication and operations.
14
the users were quite satisfied with the network. But there was some user who recommended
some changes to be made for attaining high performance and security.
Bandwidth: 10mbps is demanded.
Communication: Computers in the finance and sale department are under management
control.
Scalability: Most of switches and hubs are free for supporting addition of new devices in the
network without having structural changes.
Selection of components: Router, switches, printer and workstations used are as per user
requirement for effective performance, communication and operations.
14
M3 Install and configure network services and applications
The organization uses a single router for tying up with the internet service provider. It can
also be constituted for network routing. The network effectively uses switches for network
expansion using the end devices. Along with printers and computers the organizational
network also consists of a firewall that help in managing the data packet flow and security of
network servers. Some of the network services and applications used in the organizational
network are discussed below:
Services
Network devices are used in the network of the organization for communication purpose and
to achieve services for data transmission. For achieving web service and easy file sharing
Web server is used. Network demand high security for all the data and information present in
the network and the server hence proper physical security is offered along with connectivity
as per user demand.
The workstations in the network effectively uses NIC or Network Interface Card for being
connected with wireless service provider or with so Ethernet. Centralized service control and
automated and easy addressing is achieved. To support finance and sale department suitable
storage space must be provided.
DNS: DNS server is used for mapping the web address along with the IP address of the
workstation. It works by providing an automated gateway that discover and links with various
devices and servers (DNS server, 2018). DNS also forms a server chain if the network is big,
these can also be used for back up.
IP addressing: To get the static IP address, IP addressing is used that also provide network
security. DHCP is used for dynamic addressing. For a device, configuration of IP address is
done along with DNS address, default gateway address and subnet mask.
Application softwares: For managing the user accounts in a network along with access
permission Active directory cab be effectively used. To monitor the network traffic, DNS
records can be used. Network monitoring software along with Command line tools can be
implemented for executing various operations and guaranteeing network.
15
The organization uses a single router for tying up with the internet service provider. It can
also be constituted for network routing. The network effectively uses switches for network
expansion using the end devices. Along with printers and computers the organizational
network also consists of a firewall that help in managing the data packet flow and security of
network servers. Some of the network services and applications used in the organizational
network are discussed below:
Services
Network devices are used in the network of the organization for communication purpose and
to achieve services for data transmission. For achieving web service and easy file sharing
Web server is used. Network demand high security for all the data and information present in
the network and the server hence proper physical security is offered along with connectivity
as per user demand.
The workstations in the network effectively uses NIC or Network Interface Card for being
connected with wireless service provider or with so Ethernet. Centralized service control and
automated and easy addressing is achieved. To support finance and sale department suitable
storage space must be provided.
DNS: DNS server is used for mapping the web address along with the IP address of the
workstation. It works by providing an automated gateway that discover and links with various
devices and servers (DNS server, 2018). DNS also forms a server chain if the network is big,
these can also be used for back up.
IP addressing: To get the static IP address, IP addressing is used that also provide network
security. DHCP is used for dynamic addressing. For a device, configuration of IP address is
done along with DNS address, default gateway address and subnet mask.
Application softwares: For managing the user accounts in a network along with access
permission Active directory cab be effectively used. To monitor the network traffic, DNS
records can be used. Network monitoring software along with Command line tools can be
implemented for executing various operations and guaranteeing network.
15
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
D2 Design a maintenance schedule to support the networked system.
Table 5: Network Maintenance Schedule
Activity Description Agenda
Connectivity The function and performance of the
entire organizational networks is
checked.
Weekly basis
Cable configuration Network is checked for any kind of
cracked cables and if found it is
substituted with a new one. It also
includes extending the network service
with new connections.
As per Claim
File permission Proper authentication and permission is
required for accessing and sharing a file
in the network.
Frequently
Hardware configuration Hardware configuration is checked for
maintaining network security and for
effective addressing of the devices.
Weekly
Software configuration All the software application along with
anti-virus software must be upgraded
and updated to its latest version
available in the market.
Weekly
Security Both physical and logical security is
required to be upgraded in the network
to avoid network security breach.
On claim
Auditing Audit must be organised in the
organisation for checking the utilisation
of resource, functionality, connectivity
of all the networking devices.
Monthly
16
Table 5: Network Maintenance Schedule
Activity Description Agenda
Connectivity The function and performance of the
entire organizational networks is
checked.
Weekly basis
Cable configuration Network is checked for any kind of
cracked cables and if found it is
substituted with a new one. It also
includes extending the network service
with new connections.
As per Claim
File permission Proper authentication and permission is
required for accessing and sharing a file
in the network.
Frequently
Hardware configuration Hardware configuration is checked for
maintaining network security and for
effective addressing of the devices.
Weekly
Software configuration All the software application along with
anti-virus software must be upgraded
and updated to its latest version
available in the market.
Weekly
Security Both physical and logical security is
required to be upgraded in the network
to avoid network security breach.
On claim
Auditing Audit must be organised in the
organisation for checking the utilisation
of resource, functionality, connectivity
of all the networking devices.
Monthly
16
A Maintenance schedule is designed for the organisational network which helps in
maintaining the network and quickly resolve occurrence of any kind of network issue
presently or as per future need.
17
maintaining the network and quickly resolve occurrence of any kind of network issue
presently or as per future need.
17
M4 Recommend potential enhancements for the networked systems more secure, robust
applications
For achieving better network service and performance the organisation can opt for making
various changes in the organisational network:
Table 6: Changes for network enhancement
Changes Description
Wireless connection The organisational network mostly has wired connections.
However, it can also use wireless connection for connecting
various mobile devices through wireless access point. It will be
helpful in manage the network of the organisation more efficiently
(Frangopol, and Bocchini, 2012).
Software The organisation can opt for using various software tools for
improving the network in terms of performance and security. The
organisation can implement a centralised dashboard that will be
useful for managing the entire network. Various software can be
installed in the systems that will reduce the time require for
managing the network and tracking the performance of the network
manually.
Physical security Physical security is an essential element in any network. It secures
the network by keeping the intruder away from the network
devices. Therefore, separate cabins are used for storing the network
server with proper locks and authentication. Physical security will
help in safeguarding the network from any kind of physical
damage. Alerts and notification will be generated in case of any
security breach.
18
applications
For achieving better network service and performance the organisation can opt for making
various changes in the organisational network:
Table 6: Changes for network enhancement
Changes Description
Wireless connection The organisational network mostly has wired connections.
However, it can also use wireless connection for connecting
various mobile devices through wireless access point. It will be
helpful in manage the network of the organisation more efficiently
(Frangopol, and Bocchini, 2012).
Software The organisation can opt for using various software tools for
improving the network in terms of performance and security. The
organisation can implement a centralised dashboard that will be
useful for managing the entire network. Various software can be
installed in the systems that will reduce the time require for
managing the network and tracking the performance of the network
manually.
Physical security Physical security is an essential element in any network. It secures
the network by keeping the intruder away from the network
devices. Therefore, separate cabins are used for storing the network
server with proper locks and authentication. Physical security will
help in safeguarding the network from any kind of physical
damage. Alerts and notification will be generated in case of any
security breach.
18
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
LO4
P7 Implement a networked system based on a prepared design.
Network Switches: Main purpose of switches in the network is to create device grouping
using the VLAN network. Switches provide device connectivity and resources allocation
along with the maintenance of network security.
Figure 6: Switch configuration
Router: In the organizational network, router is effectively configured for RIP algorithm. It
helps in forwarding and transmitting data packets in the network devices. With the help of
router computing devices can get linked with the internet service provider (Lin et al 2013).
19
P7 Implement a networked system based on a prepared design.
Network Switches: Main purpose of switches in the network is to create device grouping
using the VLAN network. Switches provide device connectivity and resources allocation
along with the maintenance of network security.
Figure 6: Switch configuration
Router: In the organizational network, router is effectively configured for RIP algorithm. It
helps in forwarding and transmitting data packets in the network devices. With the help of
router computing devices can get linked with the internet service provider (Lin et al 2013).
19
Figure 7: Router configuration
Address allocation: The organizational network uses Class C IP addressing for device
connectivity. It has been found that an address range for 300 computers have already been
kept reserved for future need.
Server installation: Windows is used as the Operating system for the server so that it capable
of delivering administrative function and accustomed user interface for proper network
management. Windows 2012 (OS) is operative for fulfilling the user requirement in terms of
reliability, performance and security.
Server configuration: for communication of the network the server is configured for mail
service, HTTP and FTP. The Server support addressing all the networking for data
transmission and accessing them.
20
Address allocation: The organizational network uses Class C IP addressing for device
connectivity. It has been found that an address range for 300 computers have already been
kept reserved for future need.
Server installation: Windows is used as the Operating system for the server so that it capable
of delivering administrative function and accustomed user interface for proper network
management. Windows 2012 (OS) is operative for fulfilling the user requirement in terms of
reliability, performance and security.
Server configuration: for communication of the network the server is configured for mail
service, HTTP and FTP. The Server support addressing all the networking for data
transmission and accessing them.
20
Figure 8: Web server configuration
Figure 9: DNS configuration
21
Figure 9: DNS configuration
21
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Figure 10: User and password on mail server
Figure 11: FTP configuration
Client configuration: IP addressing and dynamic addressing services are used for all the
devices in the network for automatic connection with the servers.
22
Figure 11: FTP configuration
Client configuration: IP addressing and dynamic addressing services are used for all the
devices in the network for automatic connection with the servers.
22
Figure 12: IP address on computers
Figure 13: Printer configuration
23
Figure 13: Printer configuration
23
P8 Document and analyse test results against expected results
Table 7: Network Test results
Parameter Result Expected Result Achieved
Bandwidth Network need to provide
effective bandwidth in all the
devices in the network
Bandwidth of 10 Mbps is offered for
all the devices in the network for
supporting proper communication in
the network.
Scalability Network must be capable of
adding new computing devices in
the organizational network as per
future requirement.
Switches and address space are not
completely used.
Availability In the network it is expected that
uptime is kept available
fiber optic cable of high quality is used
in the network that guarantees
availability of resource and data.
Simplicity The network should be save cost
effective and time saving.
Automated operation in the network
with the help of Active directory and
other tools is effective in offering
network simplicity
Security High Security and protection of
data, information and resources is
expected.
ACL and firewall used in the network
provide adequate network security
avoiding malicious activities.
24
Table 7: Network Test results
Parameter Result Expected Result Achieved
Bandwidth Network need to provide
effective bandwidth in all the
devices in the network
Bandwidth of 10 Mbps is offered for
all the devices in the network for
supporting proper communication in
the network.
Scalability Network must be capable of
adding new computing devices in
the organizational network as per
future requirement.
Switches and address space are not
completely used.
Availability In the network it is expected that
uptime is kept available
fiber optic cable of high quality is used
in the network that guarantees
availability of resource and data.
Simplicity The network should be save cost
effective and time saving.
Automated operation in the network
with the help of Active directory and
other tools is effective in offering
network simplicity
Security High Security and protection of
data, information and resources is
expected.
ACL and firewall used in the network
provide adequate network security
avoiding malicious activities.
24
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
D3 Use critical reflection to evaluate own work and justify valid conclusions.
On the basis of communication and bandwidth among the devices, network efficiency is
checked and tested. For the organisation, network was tested as shown below:
Communication: Ping command is used for testing the network communication. At first,
ping command is used for testing connectivity of computing devices in a single department.
Good connectivity implies that communication among the devices are successful (Ping
command, 2018). Secondly, computers of other departments are test with ping command by
checking the connectivity of the server.
Figure 14: Screenshot for the successful ping command
Figure 15: Screenshot for failed ping command
25
On the basis of communication and bandwidth among the devices, network efficiency is
checked and tested. For the organisation, network was tested as shown below:
Communication: Ping command is used for testing the network communication. At first,
ping command is used for testing connectivity of computing devices in a single department.
Good connectivity implies that communication among the devices are successful (Ping
command, 2018). Secondly, computers of other departments are test with ping command by
checking the connectivity of the server.
Figure 14: Screenshot for the successful ping command
Figure 15: Screenshot for failed ping command
25
Bandwidth: Show-interface command is used in the network for testing the bandwidth
among all the devices is tested. Correct bandwidth in the network provides proper
transmission of data.
Above testing is helpful for knowing and understanding the network performance. It can be
concluded that the present network was effective to attain the user need and requirement.in
this network, all the computing devices are capable of communicating and offers data
transmission appropriately. No loss of data is seen in the network. All the devices were
provided with adequate that is offers proper data transmission over 10mbps bandwidth.
26
among all the devices is tested. Correct bandwidth in the network provides proper
transmission of data.
Above testing is helpful for knowing and understanding the network performance. It can be
concluded that the present network was effective to attain the user need and requirement.in
this network, all the computing devices are capable of communicating and offers data
transmission appropriately. No loss of data is seen in the network. All the devices were
provided with adequate that is offers proper data transmission over 10mbps bandwidth.
26
CONCLUSION
The above report discussed about basic of computer network and technologies it applies for
implementation of the network. The report has provided brief knowledge about different
network types, topologies and protocols in the network. Various hardware and software and
interdependency of the network has been studied.
This report has provided a network design with the help of Cisco Packet tracer for the
organisation along with its implementation and evaluation as per the organisational need.
Network components has been configured and tested with proper documentations. The report
lastly provides recommendations and maintenance schedule for enhancing the present
network.
27
The above report discussed about basic of computer network and technologies it applies for
implementation of the network. The report has provided brief knowledge about different
network types, topologies and protocols in the network. Various hardware and software and
interdependency of the network has been studied.
This report has provided a network design with the help of Cisco Packet tracer for the
organisation along with its implementation and evaluation as per the organisational need.
Network components has been configured and tested with proper documentations. The report
lastly provides recommendations and maintenance schedule for enhancing the present
network.
27
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
REFERENCES
Books and Journals.
Alani, M.M., 2014. Guide to OSI and TCP/IP models. Berlin: Springer.
Bisht, N. and Singh, S., 2015. Analytical study of different network topologies. International
Research Journal of Engineering and Technology (IRJET), 2(01).
Comer, D., 2015. Computer networks and internets. Pearson.
Faith, P. and Harris, T., Visa International Service Association, 2017. Personal area network.
U.S. Patent 9,699,162.
Frangopol, D.M. and Bocchini, P., 2012. Bridge network performance, maintenance and
optimisation under uncertainty: accomplishments and challenges. Structure and
Infrastructure Engineering, 8(4), pp.341-356.
Lin, M., Chen, Q. and Yan, S., 2013. Network in network. arXiv preprint arXiv:1312.4400.
O'brien, W.G., Yeap, T.H. and Lou, D., Bce Inc., 2017. Device authentication and secur
channel management for peer-to-peer initiated communications. U.S. Patent 9,755,825.
Online references
Ethernet standard, 2018 [Online][Accessed through ]
<https://www.ieee.org/standards/index.html >[Accessed on: 26th April, 2018]
Ping Command 2018 [Online][Accessed through ]<https://www.lifewire.com/ping-
command-2618099>>[Accessed on: 26th April, 2018]
DNS server, 2018[Online][Accessed through ]
<https://www.cloudflare.com/learning/dns/what-is-dns/>[Accessed on: 26th April, 2018]
28
Books and Journals.
Alani, M.M., 2014. Guide to OSI and TCP/IP models. Berlin: Springer.
Bisht, N. and Singh, S., 2015. Analytical study of different network topologies. International
Research Journal of Engineering and Technology (IRJET), 2(01).
Comer, D., 2015. Computer networks and internets. Pearson.
Faith, P. and Harris, T., Visa International Service Association, 2017. Personal area network.
U.S. Patent 9,699,162.
Frangopol, D.M. and Bocchini, P., 2012. Bridge network performance, maintenance and
optimisation under uncertainty: accomplishments and challenges. Structure and
Infrastructure Engineering, 8(4), pp.341-356.
Lin, M., Chen, Q. and Yan, S., 2013. Network in network. arXiv preprint arXiv:1312.4400.
O'brien, W.G., Yeap, T.H. and Lou, D., Bce Inc., 2017. Device authentication and secur
channel management for peer-to-peer initiated communications. U.S. Patent 9,755,825.
Online references
Ethernet standard, 2018 [Online][Accessed through ]
<https://www.ieee.org/standards/index.html >[Accessed on: 26th April, 2018]
Ping Command 2018 [Online][Accessed through ]<https://www.lifewire.com/ping-
command-2618099>>[Accessed on: 26th April, 2018]
DNS server, 2018[Online][Accessed through ]
<https://www.cloudflare.com/learning/dns/what-is-dns/>[Accessed on: 26th April, 2018]
28
1 out of 32
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024  |  Zucol Services PVT LTD  |  All rights reserved.