Networking Technologies
VerifiedAdded on 2023/03/30
|38
|6945
|394
AI Summary
This document discusses the benefits and constraints of different networking systems, types and topologies. It analyzes and identifies the requirements of the system for a network in order to convince the management of a given case study company. The document also evaluates the impact of current network technology, communication and standards for the case study company.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Networking Technologies 1
Networking Technologies
Student's Name:
Instructor's Name:
Date:
Networking Technologies
Student's Name:
Instructor's Name:
Date:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Networking Technologies 2
Contents
Task 1..........................................................................................................................................................3
1.1 Discuss the benefits and constraints of different networking systems, types and topologies.
Analyse and clearly identify the requirements of the system for this network in order to convince the
management of the given case study company......................................................................................3
Personal Area Network........................................................................................................................3
Local Area Network.............................................................................................................................4
Metropolitan Area Network................................................................................................................4
Wide Area Network.............................................................................................................................4
Proposed Network for Beta Communication...........................................................................................4
1.2 Evaluate the impact of current network technology, communication and standards for the given
case study company................................................................................................................................5
1.3 Discuss how protocols enable the effective utilization of different networking systems..................7
Task 2..........................................................................................................................................................8
2.1 Discuss the role of software and hardware components for the given company case study............9
Hardware Requirements.....................................................................................................................9
Software Requirements.....................................................................................................................10
2.2 Discuss server types and selection requirement for the given company case study.......................11
2.3 Discuss the inter-dependence of workstation hardware with network components......................12
The hierarchical LAN design comprises of three important layers:...................................................12
Diagrammatic representation of how hardware components are connected at Beta
Communications:...............................................................................................................................16
Task 3........................................................................................................................................................16
A high level LAN design for Beta Communication would appear as follows:.........................................16
Designing the LAN Network for Beta Communication at the Access Layer...........................................18
Design Overview at the Distribution Layer............................................................................................19
Task 4........................................................................................................................................................20
4.1 Implement a network system based on the proposed design.........................................................20
4.2 Test network systems to meet user requirements..........................................................................24
4.3 Document and Analyse test results against expected results..........................................................24
4.4 Recommend potential enhancement for the networked systems..................................................25
4.5 Design a maintenance schedule to support the network system....................................................25
References.................................................................................................................................................27
Contents
Task 1..........................................................................................................................................................3
1.1 Discuss the benefits and constraints of different networking systems, types and topologies.
Analyse and clearly identify the requirements of the system for this network in order to convince the
management of the given case study company......................................................................................3
Personal Area Network........................................................................................................................3
Local Area Network.............................................................................................................................4
Metropolitan Area Network................................................................................................................4
Wide Area Network.............................................................................................................................4
Proposed Network for Beta Communication...........................................................................................4
1.2 Evaluate the impact of current network technology, communication and standards for the given
case study company................................................................................................................................5
1.3 Discuss how protocols enable the effective utilization of different networking systems..................7
Task 2..........................................................................................................................................................8
2.1 Discuss the role of software and hardware components for the given company case study............9
Hardware Requirements.....................................................................................................................9
Software Requirements.....................................................................................................................10
2.2 Discuss server types and selection requirement for the given company case study.......................11
2.3 Discuss the inter-dependence of workstation hardware with network components......................12
The hierarchical LAN design comprises of three important layers:...................................................12
Diagrammatic representation of how hardware components are connected at Beta
Communications:...............................................................................................................................16
Task 3........................................................................................................................................................16
A high level LAN design for Beta Communication would appear as follows:.........................................16
Designing the LAN Network for Beta Communication at the Access Layer...........................................18
Design Overview at the Distribution Layer............................................................................................19
Task 4........................................................................................................................................................20
4.1 Implement a network system based on the proposed design.........................................................20
4.2 Test network systems to meet user requirements..........................................................................24
4.3 Document and Analyse test results against expected results..........................................................24
4.4 Recommend potential enhancement for the networked systems..................................................25
4.5 Design a maintenance schedule to support the network system....................................................25
References.................................................................................................................................................27
Networking Technologies 3
Task 1
1.1 Discuss the benefits and constraints of different
networking systems, types and topologies. Analyse and
clearly identify the requirements of the system for this
network in order to convince the management of the given
case study company.
Computer networks can be categorized into different types. All networks are characterized based
on the type of activities carried out by a company. The actual size of a network depends on its
geographic area, the total number of computers and people who are a part of the organization’s
network. Networks can include anything like a room with a handful of computers or a million
devices spread across the world. Networks are differentiated based on its size.
Different Types of Networking Systems
Peer to Peer network is the simplest form of network. This is where two or more computers are
connected together. These computers share resources without the help of a server. The P2P
networks can have ad hoc connections, where computers transfer files through an Universal
Serial Bus. P2P networks can be both simple or complex. In the grander scale, they need special
protocols and customized applications for the communication.
Benefits of P2P
1) These networks don’t need a network operating system
2) These networks don’t need expensive servers
3) These networks are easy to setup and they don’t need specialist staff
Drawbacks of P2P
1) It is difficult to take centralized backups
2) It is not possible to organize the network centrally
Task 1
1.1 Discuss the benefits and constraints of different
networking systems, types and topologies. Analyse and
clearly identify the requirements of the system for this
network in order to convince the management of the given
case study company.
Computer networks can be categorized into different types. All networks are characterized based
on the type of activities carried out by a company. The actual size of a network depends on its
geographic area, the total number of computers and people who are a part of the organization’s
network. Networks can include anything like a room with a handful of computers or a million
devices spread across the world. Networks are differentiated based on its size.
Different Types of Networking Systems
Peer to Peer network is the simplest form of network. This is where two or more computers are
connected together. These computers share resources without the help of a server. The P2P
networks can have ad hoc connections, where computers transfer files through an Universal
Serial Bus. P2P networks can be both simple or complex. In the grander scale, they need special
protocols and customized applications for the communication.
Benefits of P2P
1) These networks don’t need a network operating system
2) These networks don’t need expensive servers
3) These networks are easy to setup and they don’t need specialist staff
Drawbacks of P2P
1) It is difficult to take centralized backups
2) It is not possible to organize the network centrally
Networking Technologies 4
3) Performance issues are common
4) There are less secure
Client-Server Networks allow files to be stored in a specialized machine called the server. Data
is never stored in the hard disk of each workstation. The servers are designed to provide data to
remote clients whenever required. Indeed, Beta Communications requires a similar kind of
network. Where several clients are able to communicate, transfer files and store data centrally in
servers.
Benefits of Client-Server Networks
1) Files are stored centrally
2) Network devices can be controlled centrally
3) Backups and network security is never a problem
Drawbacks of Client-Server Networks
1) A specialized network operating system is required
2) Network peripherals can be very expensive
3) A trained network team is required
4) Network failures can be expensive and difficult to troubleshoot
Cloud Networking is a new and an upcoming concept where clients are allowed to access and
connect with devices that are located across the globe. Cloud gives clients the freedom to pay-as-
they-use. This form of networking helps all business technologies.
Benefits of cloud networking
3) Performance issues are common
4) There are less secure
Client-Server Networks allow files to be stored in a specialized machine called the server. Data
is never stored in the hard disk of each workstation. The servers are designed to provide data to
remote clients whenever required. Indeed, Beta Communications requires a similar kind of
network. Where several clients are able to communicate, transfer files and store data centrally in
servers.
Benefits of Client-Server Networks
1) Files are stored centrally
2) Network devices can be controlled centrally
3) Backups and network security is never a problem
Drawbacks of Client-Server Networks
1) A specialized network operating system is required
2) Network peripherals can be very expensive
3) A trained network team is required
4) Network failures can be expensive and difficult to troubleshoot
Cloud Networking is a new and an upcoming concept where clients are allowed to access and
connect with devices that are located across the globe. Cloud gives clients the freedom to pay-as-
they-use. This form of networking helps all business technologies.
Benefits of cloud networking
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Networking Technologies 5
1) Cloud networks can save lots of money. They can follow zero in-house hardware
investments.
2) Cloud networks are reliable and much more consistent
3) Cloud networks offer an strategic edge to various companies
Drawbacks of cloud networking
1) With more clients, cloud service providers are likely to face greater downtimes
2) Security is always an issue with cloud computing
3) Clients or network managers have limited control over cloud networks
Virtualized networks help in cutting down the cost of network devices. These networks are
known for its agility and efficiency. Virtual networks are useful when there is plenty of CPU
intense processing and very little dependence on dedicated hardware. Web application firewalls
are ideal forms of virtualized networks.
Benefits of Virtual Networks
1) Resources can be shared easily
2) Network efficiency can be maintained
3) Virtual networks are easy to define
4) It is easy to extend virtual networks using Ethernet mode LANs. In the longer run, Beta
Communications can shift to virtualized networks
Drawbacks of Virtual Networks
1) Designing and constructing virtual networks is difficult
2) Security implementations are difficult
1) Cloud networks can save lots of money. They can follow zero in-house hardware
investments.
2) Cloud networks are reliable and much more consistent
3) Cloud networks offer an strategic edge to various companies
Drawbacks of cloud networking
1) With more clients, cloud service providers are likely to face greater downtimes
2) Security is always an issue with cloud computing
3) Clients or network managers have limited control over cloud networks
Virtualized networks help in cutting down the cost of network devices. These networks are
known for its agility and efficiency. Virtual networks are useful when there is plenty of CPU
intense processing and very little dependence on dedicated hardware. Web application firewalls
are ideal forms of virtualized networks.
Benefits of Virtual Networks
1) Resources can be shared easily
2) Network efficiency can be maintained
3) Virtual networks are easy to define
4) It is easy to extend virtual networks using Ethernet mode LANs. In the longer run, Beta
Communications can shift to virtualized networks
Drawbacks of Virtual Networks
1) Designing and constructing virtual networks is difficult
2) Security implementations are difficult
Networking Technologies 6
Clustered networks are a superset of centralized network systems. Even client-server networks
are a form of centralized networks. Here, a group of machines are connected together with a
centralized server. The server helps with storing files and handling communication. It is possible
to include as many clients as required in a clustered/centralized networking system.
Different types of network are:
1) Personal area network (PAN)
2) Local area network (LAN)
3) Metropolitan area network (MAN)
4) Wide area network (WAN)
There are few network types for general purpose too. This includes the process of sending
files from one system to another or the internet. This includes the following:
1) Storage area network (SAN)
2) Enterprise Private Network (EPN)
3) Virtual Private Network (VPN)
Personal Area Network
Personal area network is an organized network around a particular individual. The individual is
bound within a single building. The building could be anything like his residence or office. An
ideal PAN is built using one or more peripheral devices, telephone and computers. If several
people are using the network, it is also known as home area network (HAN).
Local Area Network
Local Area Network comprises of computers in a specific site. Often, individual office building
invest on LAN. The LAN is extremely helpful in sharing printers, data storage and other
resources. LANs can be established very easily, using hardware devices like Ethernet cables,
Clustered networks are a superset of centralized network systems. Even client-server networks
are a form of centralized networks. Here, a group of machines are connected together with a
centralized server. The server helps with storing files and handling communication. It is possible
to include as many clients as required in a clustered/centralized networking system.
Different types of network are:
1) Personal area network (PAN)
2) Local area network (LAN)
3) Metropolitan area network (MAN)
4) Wide area network (WAN)
There are few network types for general purpose too. This includes the process of sending
files from one system to another or the internet. This includes the following:
1) Storage area network (SAN)
2) Enterprise Private Network (EPN)
3) Virtual Private Network (VPN)
Personal Area Network
Personal area network is an organized network around a particular individual. The individual is
bound within a single building. The building could be anything like his residence or office. An
ideal PAN is built using one or more peripheral devices, telephone and computers. If several
people are using the network, it is also known as home area network (HAN).
Local Area Network
Local Area Network comprises of computers in a specific site. Often, individual office building
invest on LAN. The LAN is extremely helpful in sharing printers, data storage and other
resources. LANs can be established very easily, using hardware devices like Ethernet cables,
Networking Technologies 7
network adapters and hubs. A very small LAN comprises of 2 machines, whereas there can be
huge LAN structures that connect numerous computers. LAN relies on wired connections that
ensure high security and speed. LANs are best used in single site applications where people need
to share resources among a known group and not the entire world.
Metropolitan Area Network
MAN connects computers within a city, campus or a region bigger than what a LAN can cover.
MAN depends on network configuration. It can be used to connect areas that range from several
miles to tens of miles.
Wide Area Network
Wide Area Network is used to connect an entire nation or the whole world. WAN comprises of
several smaller network. WAN can be a collection of MANs and LANs. The internet is a very
good example of a public WAN.
Proposed Network for Beta Communication
Beta communication wants a network that can connect three buildings. These buildings have
employees and devices to handle the company’s day to day operations. According to present
requirements, the company doesn’t want a network that connects the entire region, country or
world. The best network type to satisfy this requirement would be “LAN”. With an efficient
LAN connection, Beta communication will be able to communicate, share and manage devices,
people and data that is spread across three buildings. The company can expand this LAN
connection to more buildings when required. Moreover, LAN allows easy access, high security
and fast data transfer rates. It is easy to separate responsibilities across each building with the
help of LAN.
Different network topologies
network adapters and hubs. A very small LAN comprises of 2 machines, whereas there can be
huge LAN structures that connect numerous computers. LAN relies on wired connections that
ensure high security and speed. LANs are best used in single site applications where people need
to share resources among a known group and not the entire world.
Metropolitan Area Network
MAN connects computers within a city, campus or a region bigger than what a LAN can cover.
MAN depends on network configuration. It can be used to connect areas that range from several
miles to tens of miles.
Wide Area Network
Wide Area Network is used to connect an entire nation or the whole world. WAN comprises of
several smaller network. WAN can be a collection of MANs and LANs. The internet is a very
good example of a public WAN.
Proposed Network for Beta Communication
Beta communication wants a network that can connect three buildings. These buildings have
employees and devices to handle the company’s day to day operations. According to present
requirements, the company doesn’t want a network that connects the entire region, country or
world. The best network type to satisfy this requirement would be “LAN”. With an efficient
LAN connection, Beta communication will be able to communicate, share and manage devices,
people and data that is spread across three buildings. The company can expand this LAN
connection to more buildings when required. Moreover, LAN allows easy access, high security
and fast data transfer rates. It is easy to separate responsibilities across each building with the
help of LAN.
Different network topologies
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Networking Technologies 8
Network topology defines the way nodes or devices in a network are connected. It also defines
how networks communicate with one another. Each arrangement has its own advantages and
disadvantages.
The Bus topology has a central bus to which all network nodes are connected. All computers and
devices are connected to a single cable. This topology has two end points and nothing more. This
is an example of a linear topology. Data is transmitted in a single direction.
Benefits of Bus topology:
1) cost effective
2) fewer cables are required
3) easy to expand in a linear fashion
Drawbacks of Bus topology
1) cable failures can bring down the entire network
2) heavy network traffic will decrease the network’s performance
Recommendation
It is not recommended for businesses to rely on bus topology. That is because the length of
cables is greatly limited and the risks of network failures are high.
Ring Topology is where all computers are connected to form a ring. The last device is connected
to the first device. Every device will have exactly two neighbors. This topology has plenty of
repeaters. If nodes want to communicate with one another, data would be transmitted to all the
nodes in between. Data is often transmitted in a sequential fashion, and two way communication
is possible in dual ring topologies.
Network topology defines the way nodes or devices in a network are connected. It also defines
how networks communicate with one another. Each arrangement has its own advantages and
disadvantages.
The Bus topology has a central bus to which all network nodes are connected. All computers and
devices are connected to a single cable. This topology has two end points and nothing more. This
is an example of a linear topology. Data is transmitted in a single direction.
Benefits of Bus topology:
1) cost effective
2) fewer cables are required
3) easy to expand in a linear fashion
Drawbacks of Bus topology
1) cable failures can bring down the entire network
2) heavy network traffic will decrease the network’s performance
Recommendation
It is not recommended for businesses to rely on bus topology. That is because the length of
cables is greatly limited and the risks of network failures are high.
Ring Topology is where all computers are connected to form a ring. The last device is connected
to the first device. Every device will have exactly two neighbors. This topology has plenty of
repeaters. If nodes want to communicate with one another, data would be transmitted to all the
nodes in between. Data is often transmitted in a sequential fashion, and two way communication
is possible in dual ring topologies.
Networking Technologies 9
Benefits of Ring Topology
1) Cheap to expand
2) Cheap to install
3) High traffic doesn’t affect the network’s performance
Drawbacks of Ring Topology
1) It is difficult to find errors
2) Adding or removing devices is difficult
Recommendation
Beta Communication doesn’t need a ring topology. It will have issues tracking faults. Ring
topology is not recommended for big businesses. It endures high maintenance charges and
performance hassles. Failure can disturb the entire network.
Star topology is where computers are connected through cables to a single hub. This hub is a
central node. The hub is responsible for transferring data. All nodes have a dedicated connection
to the hub. This connection is established using coaxial cables, optical fiber cables and twisted
pair wires.
Benefits of Star topology
1) when there are few nodes, star topology is very fast
2) easy to troubleshoot, setup and modify
3) even with node failures, the network will continue to function
Drawbacks of Star topology
1) expensive
Benefits of Ring Topology
1) Cheap to expand
2) Cheap to install
3) High traffic doesn’t affect the network’s performance
Drawbacks of Ring Topology
1) It is difficult to find errors
2) Adding or removing devices is difficult
Recommendation
Beta Communication doesn’t need a ring topology. It will have issues tracking faults. Ring
topology is not recommended for big businesses. It endures high maintenance charges and
performance hassles. Failure can disturb the entire network.
Star topology is where computers are connected through cables to a single hub. This hub is a
central node. The hub is responsible for transferring data. All nodes have a dedicated connection
to the hub. This connection is established using coaxial cables, optical fiber cables and twisted
pair wires.
Benefits of Star topology
1) when there are few nodes, star topology is very fast
2) easy to troubleshoot, setup and modify
3) even with node failures, the network will continue to function
Drawbacks of Star topology
1) expensive
Networking Technologies 10
2) if the hub fails, the entire network would come down
3) performance depends on the hub
Recommendation
The star topology suffers high-dependency issues. All nodes depend on a single hub. This can be
very risky for the business organization.
Mesh topology involves point to point connection with all devices and nodes in the network.
There are two ways of transmitting data in a Mesh topology. Routing and Flooding can be used
to transfer data. Likewise, there are two different types of Mesh topologies. Partial mesh and full
mesh network topologies. Partial mesh topology involves two or four devices connected in a
mesh. Full mesh topology is where all devices are connected to form a mesh.
Benefits of Mesh Network
1) robust
2) easy to handle faults
3) high privacy and security of data
Drawbacks of Mesh Network
1) Difficult to install and configure
2) High Cabling charges
Recommendation
Most organizations don’t prefer mesh topologies due to its high cabling charges. It is often
difficult for network managers to handle this topology. Thus, it would be wise for Beta
Communications to avoid mesh networks.
2) if the hub fails, the entire network would come down
3) performance depends on the hub
Recommendation
The star topology suffers high-dependency issues. All nodes depend on a single hub. This can be
very risky for the business organization.
Mesh topology involves point to point connection with all devices and nodes in the network.
There are two ways of transmitting data in a Mesh topology. Routing and Flooding can be used
to transfer data. Likewise, there are two different types of Mesh topologies. Partial mesh and full
mesh network topologies. Partial mesh topology involves two or four devices connected in a
mesh. Full mesh topology is where all devices are connected to form a mesh.
Benefits of Mesh Network
1) robust
2) easy to handle faults
3) high privacy and security of data
Drawbacks of Mesh Network
1) Difficult to install and configure
2) High Cabling charges
Recommendation
Most organizations don’t prefer mesh topologies due to its high cabling charges. It is often
difficult for network managers to handle this topology. Thus, it would be wise for Beta
Communications to avoid mesh networks.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Networking Technologies 11
Tree topology connects nodes to form a hierarchy. This is also known as hierarchical topology.
This is an ideal topology if workstations are connected in small groups. It is meant for wide area
networks.
Benefits of Tree topology
1) expansion of nodes can be done easily
2) easy to detect errors
3) easy to maintain and manage the network
Drawbacks of tree topology
1) costly
2) heavily cabled
3) if the central hub fails the network comes down
Recommendation
Due to the unreliable nature of the network topology, it would be better for Beta Communication
to pick a different topology. In this topology, the entire network fails if the central hub comes
down.
Hybrid topology is a mix of two or more topologies. This is an ideal network topology for Beta
Communication. For instance, they can mix mesh and star topologies together. Both the benefits
and disadvantages of topologies will be inherited and can be overcome.
Benefits of Hybrid Topology
1) Scalable
2) Flexible
Tree topology connects nodes to form a hierarchy. This is also known as hierarchical topology.
This is an ideal topology if workstations are connected in small groups. It is meant for wide area
networks.
Benefits of Tree topology
1) expansion of nodes can be done easily
2) easy to detect errors
3) easy to maintain and manage the network
Drawbacks of tree topology
1) costly
2) heavily cabled
3) if the central hub fails the network comes down
Recommendation
Due to the unreliable nature of the network topology, it would be better for Beta Communication
to pick a different topology. In this topology, the entire network fails if the central hub comes
down.
Hybrid topology is a mix of two or more topologies. This is an ideal network topology for Beta
Communication. For instance, they can mix mesh and star topologies together. Both the benefits
and disadvantages of topologies will be inherited and can be overcome.
Benefits of Hybrid Topology
1) Scalable
2) Flexible
Networking Technologies 12
3) Effective
4) Reliable
Drawbacks of hybrid topology
1) expensive
2) complex in design
Recommendation
With the help of the network administrator, Beta Communication can pull together a hybrid
network. They will be able to ensure efficient data transfers, high performance and
detect/troubleshoot errors easily.
1.2 Evaluate the impact of current network technology,
communication and standards for the given case study
company.
[4]
Ethernet LAN
Ethernet is a widely used Local Area Network topology. In the TCP/IP Stack, it is a link layer
protocol. It describes how devices can be formatted to help with transmission. Also, it defines
how data can be put together in a network connection. Ethernet touches both layer 1 and layer 2.
It works on the OSI network model. Ethernet networks define two different types of
transmission: frame and packet. The frame includes details of the payload, addressing
information, VLAN tags and QOS information. The frames are wrapped inside a packet. Several
bytes of information are used to establish the marking and connection.
3) Effective
4) Reliable
Drawbacks of hybrid topology
1) expensive
2) complex in design
Recommendation
With the help of the network administrator, Beta Communication can pull together a hybrid
network. They will be able to ensure efficient data transfers, high performance and
detect/troubleshoot errors easily.
1.2 Evaluate the impact of current network technology,
communication and standards for the given case study
company.
[4]
Ethernet LAN
Ethernet is a widely used Local Area Network topology. In the TCP/IP Stack, it is a link layer
protocol. It describes how devices can be formatted to help with transmission. Also, it defines
how data can be put together in a network connection. Ethernet touches both layer 1 and layer 2.
It works on the OSI network model. Ethernet networks define two different types of
transmission: frame and packet. The frame includes details of the payload, addressing
information, VLAN tags and QOS information. The frames are wrapped inside a packet. Several
bytes of information are used to establish the marking and connection.
Networking Technologies 13
Ethernet belongs to the IEEE 802.3 family of standards. It was initially designed to work on
coaxial cables. Newer versions of Ethernet LAN are designed to use fiber optical cabling or
twisted pair cables. Ethernet standards have improved drastically in the past few years. Today,
Ethernet supports high transmission rates and better frame content.
Base Communication can rely on Ethernet systems that are known as 100 BASE-T. These
systems provide transmission at 100 megabits per second. Gigabit Ethernet allows data to be
transmitted at 1000 Mbps. Network engineers at Beta Communication should use 100 BASE-T
for end-user devices. And, the storage and servers should have 1000 BASE-T devices.
Communication in LAN
LAN networks are meant to connect two or more systems together. Ethernet plays an important
role in LAN standardization. It combines many effective and efficient standards, resulting in
cheaper and minimalistic implementation. Bandwidth and throughput are important factors of
communication. Ethernet resolves many issues with bandwidth and throughput by using the right
kind of equipment.
Fast Ethernet represents an Ethernet network that sends and receives data at 100 Mbit/s. It relies
on fiber optic cables and twisted pair cables. Devices like network cameras and laptops can be
connected using 10BASE-T or 100BASE-TX Ethernet interfaces. Fast Ethernet with twisted pair
cables are known as Cat-5 Cables.
Gigabit Ethernet also depends on fiber optics and twisted pair cables. These Ethernet connections
transfer at a data rate of 1000 Mbit/s. These have become the de facto standard. They can be used
to transmit data across long distances without any interruptions. Data can be transmitted to
longer distances between 550 and 5000 m.
Ethernet belongs to the IEEE 802.3 family of standards. It was initially designed to work on
coaxial cables. Newer versions of Ethernet LAN are designed to use fiber optical cabling or
twisted pair cables. Ethernet standards have improved drastically in the past few years. Today,
Ethernet supports high transmission rates and better frame content.
Base Communication can rely on Ethernet systems that are known as 100 BASE-T. These
systems provide transmission at 100 megabits per second. Gigabit Ethernet allows data to be
transmitted at 1000 Mbps. Network engineers at Beta Communication should use 100 BASE-T
for end-user devices. And, the storage and servers should have 1000 BASE-T devices.
Communication in LAN
LAN networks are meant to connect two or more systems together. Ethernet plays an important
role in LAN standardization. It combines many effective and efficient standards, resulting in
cheaper and minimalistic implementation. Bandwidth and throughput are important factors of
communication. Ethernet resolves many issues with bandwidth and throughput by using the right
kind of equipment.
Fast Ethernet represents an Ethernet network that sends and receives data at 100 Mbit/s. It relies
on fiber optic cables and twisted pair cables. Devices like network cameras and laptops can be
connected using 10BASE-T or 100BASE-TX Ethernet interfaces. Fast Ethernet with twisted pair
cables are known as Cat-5 Cables.
Gigabit Ethernet also depends on fiber optics and twisted pair cables. These Ethernet connections
transfer at a data rate of 1000 Mbit/s. These have become the de facto standard. They can be used
to transmit data across long distances without any interruptions. Data can be transmitted to
longer distances between 550 and 5000 m.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Networking Technologies 14
10 Gigabit Ethernet is the next generation technology. It delivers data at very high speeds. In
many cases, the cables can transfer data at 10,000 Mbit/s. These wires can be used to abridge
gaps that are as high as 10,000m.
Network Standards
Open Systems Interconnection alias OSI is a reference model that describes how devices connect
over networks. This is a conceptual framework. It helps organizations like Beta Communication
develop software programs and products that are interoperable. However, OSI is very rarely
implemented in huge networks. Though it is capable of putting functions together in well-defined
network layers. The OSI model breaks all communication between two network devices into
seven distinct groups. These groups/layers have related functionality. When users transfer data in
the network, it flows through these layers. The seven layers are:
1) application layer
2) presentation layer
3) session layer
4) transport layer
5) data layer
6) network layer
7) physical layer
Transmission Control Protocol alias TCP is the most common communication protocol or
language in networking. It can be used to send and receive information from devices. This is a
two-layer protocol. The higher layer is responsible for assembling files or messages into smaller
packets. These packets would be transmitted over the network. The lower part is responsible for
10 Gigabit Ethernet is the next generation technology. It delivers data at very high speeds. In
many cases, the cables can transfer data at 10,000 Mbit/s. These wires can be used to abridge
gaps that are as high as 10,000m.
Network Standards
Open Systems Interconnection alias OSI is a reference model that describes how devices connect
over networks. This is a conceptual framework. It helps organizations like Beta Communication
develop software programs and products that are interoperable. However, OSI is very rarely
implemented in huge networks. Though it is capable of putting functions together in well-defined
network layers. The OSI model breaks all communication between two network devices into
seven distinct groups. These groups/layers have related functionality. When users transfer data in
the network, it flows through these layers. The seven layers are:
1) application layer
2) presentation layer
3) session layer
4) transport layer
5) data layer
6) network layer
7) physical layer
Transmission Control Protocol alias TCP is the most common communication protocol or
language in networking. It can be used to send and receive information from devices. This is a
two-layer protocol. The higher layer is responsible for assembling files or messages into smaller
packets. These packets would be transmitted over the network. The lower part is responsible for
Networking Technologies 15
handling addresses. It makes sure the packet reaches the right destination. TCP depends on the
client-server model for communication. Users (clients) request for services from the server. In
most cases, TCP is a point to point connection. TCP is a stateless model because no two client
requests are related.
The standard specification for Ethernet is 802.3. This is a method used to communicate in LANs.
This specification revolves around the working characteristics of Ethernet and the physical
media. It supports data transfer at 10 megabits per second. Some of the most widely used 802.3
specifications are:
1) 10 BASE-2
2) 10 BASE-5
3) 10 BASE-F
4) 10 BASE-T
5) 10 BASE-36
Here 10 represents the transmission speed and BASE represents the baseband signaling (Ethernet
signals) that gets carried in the medium. The numbers represent the length of the coaxial cable
segment, F represents fiber optics and T represents twisted-pair cables.
1.3 Discuss how protocols enable the effective utilization of
different networking systems.
[4]
Network protocols are important roles for communication. The protocols differ from one
network to another. Violation of network protocols will result in immediate breakdown or
slowness of communication. Protocols are critical for all networks. This is because computer
networks are a connection of paths that can be used to transfer data. The connections can be built
handling addresses. It makes sure the packet reaches the right destination. TCP depends on the
client-server model for communication. Users (clients) request for services from the server. In
most cases, TCP is a point to point connection. TCP is a stateless model because no two client
requests are related.
The standard specification for Ethernet is 802.3. This is a method used to communicate in LANs.
This specification revolves around the working characteristics of Ethernet and the physical
media. It supports data transfer at 10 megabits per second. Some of the most widely used 802.3
specifications are:
1) 10 BASE-2
2) 10 BASE-5
3) 10 BASE-F
4) 10 BASE-T
5) 10 BASE-36
Here 10 represents the transmission speed and BASE represents the baseband signaling (Ethernet
signals) that gets carried in the medium. The numbers represent the length of the coaxial cable
segment, F represents fiber optics and T represents twisted-pair cables.
1.3 Discuss how protocols enable the effective utilization of
different networking systems.
[4]
Network protocols are important roles for communication. The protocols differ from one
network to another. Violation of network protocols will result in immediate breakdown or
slowness of communication. Protocols are critical for all networks. This is because computer
networks are a connection of paths that can be used to transfer data. The connections can be built
Networking Technologies 16
upon different network standards. For two network standards to communicate, there should be a
set of predefined rules and regulations. Without the right set of protocols, networks will not be
able to operate efficiently. Network protocols are used to define packet size, type and format.
The protocols can be used to decide what happens when a particular error occurs.
Different Protocol for LAN communication
File Transfer Protocol alias FTP defines a set of rules for transferring copies of files between two
devices. This is a simple protocol that refer to the process of copying files using the FTP
technologies. To access the FTP server, the client needs a username and password. These
credentials are set in the server by the administrator. FTP allows users to transfer data in two
different modes: binary and plain text. The mode of transfer should be set in the FTP client.
Hypertext Transfer Protocol alias HTTP is a standard network protocol used in web servers and
browsers. It is used for communication. The protocol is quite similar to FTP. It is used by client
programs to request for information from remote servers. HTTP is a stateless protocol. The
connection gets dropped once the client makes a request. As the server responses to a request, the
connection gets closed. HTTP has three message types: HEAD, GET and POST. Almost all our
web requests are processed using HTTP.
Internet Control Message Protocol alias ICMP is responsible for transferring control information.
This information is about the status of the network. It is more network inclined than application
oriented. All internet protocols require ICMP to function properly. ICMP messages are distinct
from UDP and TCP. A well-known ICMP message would be the “ping” utility. During a ping,
the ICMP probes remote hosts to measure the round-trip time and responsiveness. Few other
upon different network standards. For two network standards to communicate, there should be a
set of predefined rules and regulations. Without the right set of protocols, networks will not be
able to operate efficiently. Network protocols are used to define packet size, type and format.
The protocols can be used to decide what happens when a particular error occurs.
Different Protocol for LAN communication
File Transfer Protocol alias FTP defines a set of rules for transferring copies of files between two
devices. This is a simple protocol that refer to the process of copying files using the FTP
technologies. To access the FTP server, the client needs a username and password. These
credentials are set in the server by the administrator. FTP allows users to transfer data in two
different modes: binary and plain text. The mode of transfer should be set in the FTP client.
Hypertext Transfer Protocol alias HTTP is a standard network protocol used in web servers and
browsers. It is used for communication. The protocol is quite similar to FTP. It is used by client
programs to request for information from remote servers. HTTP is a stateless protocol. The
connection gets dropped once the client makes a request. As the server responses to a request, the
connection gets closed. HTTP has three message types: HEAD, GET and POST. Almost all our
web requests are processed using HTTP.
Internet Control Message Protocol alias ICMP is responsible for transferring control information.
This information is about the status of the network. It is more network inclined than application
oriented. All internet protocols require ICMP to function properly. ICMP messages are distinct
from UDP and TCP. A well-known ICMP message would be the “ping” utility. During a ping,
the ICMP probes remote hosts to measure the round-trip time and responsiveness. Few other
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Networking Technologies 17
ICMP messages would be traceroute, to identify the intermediate routing devices or hops in a
path.
Address Resolution Protocol alias ARP is responsible for converting IP addresses to the
corresponding physical network address. Both Ethernet and Wi-Fi requires the ARP to function
properly. This is a Layer 2 protocol in the OSI Model. It was initially implemented to support the
device drivers in network operating systems. Here is a simple real time usage of the ARP:
1) The Network Adapters are produced with physical addresses known as the Media Access
Control address.
2) When devices want to communicate with a target device, this MAC address is converted
to an IP address and stored in an ARP cache.
3) ARP request and ARP reply messages are used to convert IP to MAC and MAC to IP.
User Datagram Protocol alias UDP was designed and released in 1980. This is one of the world’s
oldest network protocols. It is a very simple protocol in the client-server network model. UDP is
known as an unreliable protocol when compared against TCP. That is because UDP doesn’t have
any error correcting or checking involved. UDP is used in videoconferencing applications. It is
necessary for real-time performance.
Beta Communications can create its very own protocol standard. The company can define how
its computers, devices, networks, people and “building” communicate. The protocol standard can
rely on a specific set of hardware and software devices too. These rules will make sure
“communication” is possible.
Task 2
ICMP messages would be traceroute, to identify the intermediate routing devices or hops in a
path.
Address Resolution Protocol alias ARP is responsible for converting IP addresses to the
corresponding physical network address. Both Ethernet and Wi-Fi requires the ARP to function
properly. This is a Layer 2 protocol in the OSI Model. It was initially implemented to support the
device drivers in network operating systems. Here is a simple real time usage of the ARP:
1) The Network Adapters are produced with physical addresses known as the Media Access
Control address.
2) When devices want to communicate with a target device, this MAC address is converted
to an IP address and stored in an ARP cache.
3) ARP request and ARP reply messages are used to convert IP to MAC and MAC to IP.
User Datagram Protocol alias UDP was designed and released in 1980. This is one of the world’s
oldest network protocols. It is a very simple protocol in the client-server network model. UDP is
known as an unreliable protocol when compared against TCP. That is because UDP doesn’t have
any error correcting or checking involved. UDP is used in videoconferencing applications. It is
necessary for real-time performance.
Beta Communications can create its very own protocol standard. The company can define how
its computers, devices, networks, people and “building” communicate. The protocol standard can
rely on a specific set of hardware and software devices too. These rules will make sure
“communication” is possible.
Task 2
Networking Technologies 18
2.1 Discuss the role of software and hardware components for
the given company case study.
[3]
Local Area Network (LAN) is a high speed network connection that connects and shares
resources. Beta Communication can opt for a LAN connection because its buildings are spread
across a relatively small region. The company can go with wired LAN because the three
buildings are located close to one another. There are different types of cabling technologies to
help with Beta Communications network requirements.
Hardware Requirements
For a LAN connection, Beta communication needs to buy Ethernet Cables. The Unshielded
Twisted Pair (UTP) cables have 8 insulated copper wires. These wires are grouped into four
pairs. The wires are carefully twisted to reduce interference and signal degradation. The number
of twists differs from one to another. The fastest UTP connection is Category 5 UTP also known
as 100BaseT. This is a fast Ethernet LAN connection. The cable transfers data at 100 Mbps or
more. For Beta Communication to reduce the risks of outside interference, it can opt for thin
coax cabling.
Repeater is an important device in the Physical layer. The device is responsible for connecting
two different cable segments. Repeaters operate on the bits, improve signal strength and ensure
reliable data flow.
Hub is similar to the repeater. However, it doesn’t isolate traffic. Signals can collide in a hub.
After a collision, signals should be retransmitted.
Bridge is a part of the data link layer. It is different from hubs and repeaters. The bridge works
on frames of data. It makes use of look-up tables to identify a route for each data frame. The
2.1 Discuss the role of software and hardware components for
the given company case study.
[3]
Local Area Network (LAN) is a high speed network connection that connects and shares
resources. Beta Communication can opt for a LAN connection because its buildings are spread
across a relatively small region. The company can go with wired LAN because the three
buildings are located close to one another. There are different types of cabling technologies to
help with Beta Communications network requirements.
Hardware Requirements
For a LAN connection, Beta communication needs to buy Ethernet Cables. The Unshielded
Twisted Pair (UTP) cables have 8 insulated copper wires. These wires are grouped into four
pairs. The wires are carefully twisted to reduce interference and signal degradation. The number
of twists differs from one to another. The fastest UTP connection is Category 5 UTP also known
as 100BaseT. This is a fast Ethernet LAN connection. The cable transfers data at 100 Mbps or
more. For Beta Communication to reduce the risks of outside interference, it can opt for thin
coax cabling.
Repeater is an important device in the Physical layer. The device is responsible for connecting
two different cable segments. Repeaters operate on the bits, improve signal strength and ensure
reliable data flow.
Hub is similar to the repeater. However, it doesn’t isolate traffic. Signals can collide in a hub.
After a collision, signals should be retransmitted.
Bridge is a part of the data link layer. It is different from hubs and repeaters. The bridge works
on frames of data. It makes use of look-up tables to identify a route for each data frame. The
Networking Technologies 19
bridge transfers data from the source to the destination address. It uses the frame header to
identify the destination address. Bridges can manage high traffic and are designed to avoid
collisions.
Network Interface Cards are required to differentiate networked computers and desktop devices.
The interface card is required to establish and control all forms of network communications.
Servers and PC/Workstations are devices that give end users an interface. End users can
configure and access information from these terminals. The Servers should be powerful enough
to handle traffic from three different buildings. And, the PCs/Workstations can be configured
based on user requirements.
Software Requirements
Operating System Software
Client OS
There are several different types of client operating systems. This includes Windows 7, Windows 8,
Windows 10, MAC OS Sierra and Ubuntu. The client operating system runs on a machine that is
connected in the network. It can be used to perform different activities like browse the internet,
download a file or upload information. Network users rely on the client operating system for their daily
works.
Server OS
Examples of server operating systems would be Windows Server 2012 and Linux (Red Hat). The server
computer has all services installed in it. The server is not for network users. The server computer is what
clients connect and establish connections with. The server operating system is the software layer on
which many other programs and applications in the server hardware can run. There are several different
types of server roles: database servers, web servers, application servers, print servers and mail servers.
Beta Communication needs to handle all these servers.
Applications
Team Viewer
Team Viewer is a useful application in networks. It can be used to establish remote control sessions
within the local area network. This program uses the computer host names or IP addresses to establish
the remote control.
bridge transfers data from the source to the destination address. It uses the frame header to
identify the destination address. Bridges can manage high traffic and are designed to avoid
collisions.
Network Interface Cards are required to differentiate networked computers and desktop devices.
The interface card is required to establish and control all forms of network communications.
Servers and PC/Workstations are devices that give end users an interface. End users can
configure and access information from these terminals. The Servers should be powerful enough
to handle traffic from three different buildings. And, the PCs/Workstations can be configured
based on user requirements.
Software Requirements
Operating System Software
Client OS
There are several different types of client operating systems. This includes Windows 7, Windows 8,
Windows 10, MAC OS Sierra and Ubuntu. The client operating system runs on a machine that is
connected in the network. It can be used to perform different activities like browse the internet,
download a file or upload information. Network users rely on the client operating system for their daily
works.
Server OS
Examples of server operating systems would be Windows Server 2012 and Linux (Red Hat). The server
computer has all services installed in it. The server is not for network users. The server computer is what
clients connect and establish connections with. The server operating system is the software layer on
which many other programs and applications in the server hardware can run. There are several different
types of server roles: database servers, web servers, application servers, print servers and mail servers.
Beta Communication needs to handle all these servers.
Applications
Team Viewer
Team Viewer is a useful application in networks. It can be used to establish remote control sessions
within the local area network. This program uses the computer host names or IP addresses to establish
the remote control.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Networking Technologies 20
Remote Desktop
Remote Desktop is a feature in an operating system that lets users connect their devices with other
locations. Then, the devices are checked if they can interact like local machines. Remote desktops are
capable of doing various tasks:
1) Perform administrative tasks
2) Access workplaces from anywhere
3) Fix various computer issues
4) Demonstrate a software application or process
Remote Desktop depends on various protocols like VNC and RDP. Beta communication should configure
these protocols to establish a secure remote desktop connection.
Command Prompt
Command prompts are useful in extracting information about the network. For example, you can see
various system addresses and details of the subnet mask, default gateway and the current state of your
network adapter. Command prompts are often used by network administrators and engineers when
they wish to configure or troubleshoot issues.
Services
Windows services
In order to establish a strong network, Beta Communication requires various Windows Services. These
services are similar to other application programs. However, services run in the background and they
don’t have a specific user interface. The windows services are intended to take care of core operating
system functionalities. This includes tasks like printing, event logging, web servicing, error reporting and
file serving. Some Windows servers are responsible for ensuring security in the network. This includes
taking care of firewalls. Windows services have four different types of startup modes:
1) Automatic
2) Automatic (Delayed Start)
3) Manual
4) Disabled
Apache
Apache is a widely used open source web server software. It can be used by Beta Communication if they
are concerned about performance and easy maintenance. Web services from Apache are extremely
secure, fast and reliable. More than 67% of web servers in the world are built upon Apache. Network
engineers have the freedom to design different environments with various modules and extensions.
Internet Information Service (IIS)
Internet Information Services is a general purpose and flexible web server that runs on Windows
systems. It is designed to serve requested HTML files and pages. The service accepts requests from
remote clients and returns responses. The basic functionality of IIS is to let web servers share necessary
Remote Desktop
Remote Desktop is a feature in an operating system that lets users connect their devices with other
locations. Then, the devices are checked if they can interact like local machines. Remote desktops are
capable of doing various tasks:
1) Perform administrative tasks
2) Access workplaces from anywhere
3) Fix various computer issues
4) Demonstrate a software application or process
Remote Desktop depends on various protocols like VNC and RDP. Beta communication should configure
these protocols to establish a secure remote desktop connection.
Command Prompt
Command prompts are useful in extracting information about the network. For example, you can see
various system addresses and details of the subnet mask, default gateway and the current state of your
network adapter. Command prompts are often used by network administrators and engineers when
they wish to configure or troubleshoot issues.
Services
Windows services
In order to establish a strong network, Beta Communication requires various Windows Services. These
services are similar to other application programs. However, services run in the background and they
don’t have a specific user interface. The windows services are intended to take care of core operating
system functionalities. This includes tasks like printing, event logging, web servicing, error reporting and
file serving. Some Windows servers are responsible for ensuring security in the network. This includes
taking care of firewalls. Windows services have four different types of startup modes:
1) Automatic
2) Automatic (Delayed Start)
3) Manual
4) Disabled
Apache
Apache is a widely used open source web server software. It can be used by Beta Communication if they
are concerned about performance and easy maintenance. Web services from Apache are extremely
secure, fast and reliable. More than 67% of web servers in the world are built upon Apache. Network
engineers have the freedom to design different environments with various modules and extensions.
Internet Information Service (IIS)
Internet Information Services is a general purpose and flexible web server that runs on Windows
systems. It is designed to serve requested HTML files and pages. The service accepts requests from
remote clients and returns responses. The basic functionality of IIS is to let web servers share necessary
Networking Technologies 21
information across LANs like corporate intranets. Beta Communication requires IIS to deliver
information that can be used in forms (static webpages) through file exchanges, text documents and
more.
2.2 Discuss server types and selection requirement for the
given company case study
[2]
Local Area Network servers are programs that serve as resources for printers, storage devices,
application programs and other peripherals. Servers can be configured to provide resources to
several attached workstations. In Beta Communication, the LAN Server should have an
administrator. Ideally, the Network Infrastructure Manager will be responsible for handling the
servers. The NIM should set up and administer the entire local area network on behalf of all the
other users. LAN servers can be housed inside a machine that connects to other servers. Such
machines are known as proxy servers. The proxy server is present between client programs and
external servers. The proxy server shares connections, improves performance and filters requests.
Different types of servers
Server Purpose Cost Examples
File Server Stores all network user files Hardware – 2500 USD
Software – 500 USD
Bandwidth – Soft Cost
Print Server Manages all printers in the network
and prints user documents on the
network printers
Hardware – 250 USD D Link DP
Ethernet Print
Server
Communicatio
n Server
Manages common network
communication functions like internet
information across LANs like corporate intranets. Beta Communication requires IIS to deliver
information that can be used in forms (static webpages) through file exchanges, text documents and
more.
2.2 Discuss server types and selection requirement for the
given company case study
[2]
Local Area Network servers are programs that serve as resources for printers, storage devices,
application programs and other peripherals. Servers can be configured to provide resources to
several attached workstations. In Beta Communication, the LAN Server should have an
administrator. Ideally, the Network Infrastructure Manager will be responsible for handling the
servers. The NIM should set up and administer the entire local area network on behalf of all the
other users. LAN servers can be housed inside a machine that connects to other servers. Such
machines are known as proxy servers. The proxy server is present between client programs and
external servers. The proxy server shares connections, improves performance and filters requests.
Different types of servers
Server Purpose Cost Examples
File Server Stores all network user files Hardware – 2500 USD
Software – 500 USD
Bandwidth – Soft Cost
Print Server Manages all printers in the network
and prints user documents on the
network printers
Hardware – 250 USD D Link DP
Ethernet Print
Server
Communicatio
n Server
Manages common network
communication functions like internet
Networking Technologies 22
services, remote access, fax, email
and firewalls
Application
Server
Shares common application software
and eradicates the need for software
to be installed separately in the
workstations
Application Deployment
– 112,000 USD
Integration – 340,000
USD
Software & Hardware –
40,000
Installation &
Configuration – 15,000
USD
JBoss
Database
Server
Manages databases in the network,
handles all data stores and processes
data queries
Domain Server Manages user authentication and
authorizes resource access within
logical domains
Beta Communication will require the following servers:
Mail Server is responsible for moving and storing mails. These servers are designed to
communicate across LAN connections. The mail servers are as important and ubiquitous as web
servers.
services, remote access, fax, email
and firewalls
Application
Server
Shares common application software
and eradicates the need for software
to be installed separately in the
workstations
Application Deployment
– 112,000 USD
Integration – 340,000
USD
Software & Hardware –
40,000
Installation &
Configuration – 15,000
USD
JBoss
Database
Server
Manages databases in the network,
handles all data stores and processes
data queries
Domain Server Manages user authentication and
authorizes resource access within
logical domains
Beta Communication will require the following servers:
Mail Server is responsible for moving and storing mails. These servers are designed to
communicate across LAN connections. The mail servers are as important and ubiquitous as web
servers.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Networking Technologies 23
Web Server is responsible for providing static content. Web browsers load content from disks
and share it across all network users. The exchange happens using protocols. The most
commonly used protocol is HTTP. However, Beta Communication uses FTP to share files. This
is a file transfer protocol that can be used to send and receive files across systems with valid
privileges. FTP is one of the world’s oldest internet services. It is famous for secure file
transfers. Beta communication can control every transfer that happens through FTP.
Application Server is also known as middleware. It serves as a bridge between database servers
and end users.
2.3 Discuss the inter-dependence of workstation hardware
with network components
[5]
The network interface card (NIC) is a bridge between computers. It is a piece of equipment that
can join multiple devices in a local area network together. Networked devices need protocols to
communicate with one another. This is where the network interface card becomes useful. The
NIC links computers in such a way that data can be transmitted within the LAN. A very good
example of a Network Interface Card would be the Ethernet Card. This card is responsible for
communicating between OSI layer 1 and layer 2 devices. With the help of NIC, low level
addressing structures are handled.
The network interface card features a port and this port accommodates the Ethernet cable. The
Ethernet cable runs into the switches and hubs that are responsible for passing data between
network devices using the MAC address.
Routers are responsible for forwarding the IP Packets. The IP packets are transmitted from one
network to another network. The router is responsible for joining several network gateways
Web Server is responsible for providing static content. Web browsers load content from disks
and share it across all network users. The exchange happens using protocols. The most
commonly used protocol is HTTP. However, Beta Communication uses FTP to share files. This
is a file transfer protocol that can be used to send and receive files across systems with valid
privileges. FTP is one of the world’s oldest internet services. It is famous for secure file
transfers. Beta communication can control every transfer that happens through FTP.
Application Server is also known as middleware. It serves as a bridge between database servers
and end users.
2.3 Discuss the inter-dependence of workstation hardware
with network components
[5]
The network interface card (NIC) is a bridge between computers. It is a piece of equipment that
can join multiple devices in a local area network together. Networked devices need protocols to
communicate with one another. This is where the network interface card becomes useful. The
NIC links computers in such a way that data can be transmitted within the LAN. A very good
example of a Network Interface Card would be the Ethernet Card. This card is responsible for
communicating between OSI layer 1 and layer 2 devices. With the help of NIC, low level
addressing structures are handled.
The network interface card features a port and this port accommodates the Ethernet cable. The
Ethernet cable runs into the switches and hubs that are responsible for passing data between
network devices using the MAC address.
Routers are responsible for forwarding the IP Packets. The IP packets are transmitted from one
network to another network. The router is responsible for joining several network gateways
Networking Technologies 24
together. Routers have two network interface cards. They can have more NICs too. One NIC
connects to the source network and the other to a destination network. Routers can connect as
many networks as possible. Apart from routing traffic, the router is responsible for learning the
fastest routes and sending packets in these routes.
Wi-Fi technology can be used by Beta Communications. This technology plays an integral role
in network connectivity through radio waves. The connection is established using wireless
adapters. These adapters are hotspots. The Wi-Fi network transmits radio waves that carry
information. The network devices and computers should have a wireless adapter to translate
information in the radio signal. The radio signals go through a “router” that decodes the message.
Wi-Fi networks are designed to work on two-way traffic. Data from the internet will also go
through the same router, be coded into radio signals and then decoded by the computer’s wireless
adapter. Wi-Fi uses a wireless network interface controller to connect radio-based computer
devices. The WNIC works on layer 1 and layer 2. The card features an antenna that
communicates radio signals.
together. Routers have two network interface cards. They can have more NICs too. One NIC
connects to the source network and the other to a destination network. Routers can connect as
many networks as possible. Apart from routing traffic, the router is responsible for learning the
fastest routes and sending packets in these routes.
Wi-Fi technology can be used by Beta Communications. This technology plays an integral role
in network connectivity through radio waves. The connection is established using wireless
adapters. These adapters are hotspots. The Wi-Fi network transmits radio waves that carry
information. The network devices and computers should have a wireless adapter to translate
information in the radio signal. The radio signals go through a “router” that decodes the message.
Wi-Fi networks are designed to work on two-way traffic. Data from the internet will also go
through the same router, be coded into radio signals and then decoded by the computer’s wireless
adapter. Wi-Fi uses a wireless network interface controller to connect radio-based computer
devices. The WNIC works on layer 1 and layer 2. The card features an antenna that
communicates radio signals.
Networking Technologies 25
Task 3
A high level LAN design for Beta Communication would appear
as follows:
The above diagram gives an outline of how the three buildings are connected to one another.
Core represents building 1, where the network engineers establish all the servers. Building 2 and
Building 3 should access information from the Core, building 1. Building 1 involves two major
entities, the core and aggregation. Building 2 and Building 3 have the “Access” points. Many
devices are used to create this LAN. Recommended network products are from “Brocade”. This
brand specializes in providing sophisticated servers, network access controllers, call managers
and switches. Brocade Products would be used by Beta Communication as showing in the
diagram.
Task 3
A high level LAN design for Beta Communication would appear
as follows:
The above diagram gives an outline of how the three buildings are connected to one another.
Core represents building 1, where the network engineers establish all the servers. Building 2 and
Building 3 should access information from the Core, building 1. Building 1 involves two major
entities, the core and aggregation. Building 2 and Building 3 have the “Access” points. Many
devices are used to create this LAN. Recommended network products are from “Brocade”. This
brand specializes in providing sophisticated servers, network access controllers, call managers
and switches. Brocade Products would be used by Beta Communication as showing in the
diagram.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Networking Technologies 26
This network design allows the organization to expand in near future. Remote Location in the
above figure is an example of how the company can expand the proposed network. It is possible
to use existing network devices from Brocade and expand the LAN.
The following components should be chosen wisely to facilitate easy expansion of network:
1) Switch – It would be wiser for the network engineers to pick a 48 port switch over the
optimal ones. That way, switches don’t have to be replaced when the company plans to
expand.
2) Routers – the routers are responsible for communication in different sites or logical
groupings. The core routers should be powerful. There are should be separate core
routers, distribution routers and access routers to broadcast packets. Each of these routers
should have policy-based traffic control. That way, traffic can be prioritized easily.
3) Protocols – there are many scalable protocols. This includes the Enhanced IGRP,
NetWare Link Services protocol and open shortest path first. These protocols ensure
congestion control, reachability and fast convergence.
4) Software – the network should have tunnels to configure point to point links in
discontinuous networks. The company must have a dial backup plan too.
Brocade Beta Communication LAN Solution
Brocade offers an advanced range of layer 2 and layer 3 networking solutions. The products are
meant for enterprises. They ensure high performance, resilience and energy efficiency. Brocade
offers wireless access, core switches and aggregation switches.
For Beta Communication, stackable and chassis-based switches are chosen. These
switches range between 24 and 48 ports. The switches transfer data at 96 Gbps.
This network design allows the organization to expand in near future. Remote Location in the
above figure is an example of how the company can expand the proposed network. It is possible
to use existing network devices from Brocade and expand the LAN.
The following components should be chosen wisely to facilitate easy expansion of network:
1) Switch – It would be wiser for the network engineers to pick a 48 port switch over the
optimal ones. That way, switches don’t have to be replaced when the company plans to
expand.
2) Routers – the routers are responsible for communication in different sites or logical
groupings. The core routers should be powerful. There are should be separate core
routers, distribution routers and access routers to broadcast packets. Each of these routers
should have policy-based traffic control. That way, traffic can be prioritized easily.
3) Protocols – there are many scalable protocols. This includes the Enhanced IGRP,
NetWare Link Services protocol and open shortest path first. These protocols ensure
congestion control, reachability and fast convergence.
4) Software – the network should have tunnels to configure point to point links in
discontinuous networks. The company must have a dial backup plan too.
Brocade Beta Communication LAN Solution
Brocade offers an advanced range of layer 2 and layer 3 networking solutions. The products are
meant for enterprises. They ensure high performance, resilience and energy efficiency. Brocade
offers wireless access, core switches and aggregation switches.
For Beta Communication, stackable and chassis-based switches are chosen. These
switches range between 24 and 48 ports. The switches transfer data at 96 Gbps.
Networking Technologies 27
The aggregation layer is established using the Brocade FastIron WS Series. This series
supports 10/100/1000 Mbps clients and PoE enabled network devices. It offers layer 3
switching too.
Device Model Feature
Core Switch
Stackable L3 Managed
Switch
(T3700G-28TQ)
Stackable
Support L3 Routing, Static Routing
Pluggable, Redundant power
module design, working around the
clock
Convergence
Switch
Gigabit L2 Managed
Switch
(T2600G-28TS)
Full gigabit ports, wired-speed
forwarding
Access Switch
Unmanaged Switch
(TL-SG1024)
Full gigabit ports, wired-speed
forwarding
Unmanaged PoE Switch
(TL-SG1008P)
Full gigabit ports, wired-speed
forwarding
4*PoE ports, transfer data and
power on one single cable
Wireless AP
EAP220
11n dual band with maximum speed
of 600Mbps
Ceiling/Wall mounting
Supports 802.3af Standard PoE
EAP320
11ac dual band with maximum
speed of 1200Mbps
Ceiling/Wall mounting
Supports 802.3at Standard PoE
EAP330 11ac dual band with maximum
The aggregation layer is established using the Brocade FastIron WS Series. This series
supports 10/100/1000 Mbps clients and PoE enabled network devices. It offers layer 3
switching too.
Device Model Feature
Core Switch
Stackable L3 Managed
Switch
(T3700G-28TQ)
Stackable
Support L3 Routing, Static Routing
Pluggable, Redundant power
module design, working around the
clock
Convergence
Switch
Gigabit L2 Managed
Switch
(T2600G-28TS)
Full gigabit ports, wired-speed
forwarding
Access Switch
Unmanaged Switch
(TL-SG1024)
Full gigabit ports, wired-speed
forwarding
Unmanaged PoE Switch
(TL-SG1008P)
Full gigabit ports, wired-speed
forwarding
4*PoE ports, transfer data and
power on one single cable
Wireless AP
EAP220
11n dual band with maximum speed
of 600Mbps
Ceiling/Wall mounting
Supports 802.3af Standard PoE
EAP320
11ac dual band with maximum
speed of 1200Mbps
Ceiling/Wall mounting
Supports 802.3at Standard PoE
EAP330 11ac dual band with maximum
Networking Technologies 28
speed of 1900Mbps
Ceiling/Wall mounting
2*gigabit ports, ETH1 supports
802.3at Standard PoE
Topology
Beta Communications uses hybrid topology with mesh- and star- topologies. Here are the
benefits of using hybrid topology:
1) Mesh allows all the devices to be interconnected with one another. Data transfer can
happen in all directions.
2) Mesh makes the network fail proof. Even if a component fails, there are alternate devices
to rely on. Data transfer will never get affected.
speed of 1900Mbps
Ceiling/Wall mounting
2*gigabit ports, ETH1 supports
802.3at Standard PoE
Topology
Beta Communications uses hybrid topology with mesh- and star- topologies. Here are the
benefits of using hybrid topology:
1) Mesh allows all the devices to be interconnected with one another. Data transfer can
happen in all directions.
2) Mesh makes the network fail proof. Even if a component fails, there are alternate devices
to rely on. Data transfer will never get affected.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Networking Technologies 29
3) Mesh improves the performance of the network.
4) Star topology helps in creating a centralized hub for storing and accessing information.
5) Star topology helps with easy maintenance.
6) Both mesh and star topology supports easy modification and expansion of nodes.
7) Though complicated it is easy to maintain and troubleshoot the mesh and star topology.
Questionnaire
Few questions that will help in understanding the effectiveness of Beta Communication LAN
would be:
1) Are you facing any slowness?
2) Are you able to transfer data across departments?
3) Are you able to establish secure connections between departments?
4) Are you facing any performance issues?
5) What is the turnaround time of your data requests?
6) What is the response time of your data requests?
7) Are the firewalls working well?
3) Mesh improves the performance of the network.
4) Star topology helps in creating a centralized hub for storing and accessing information.
5) Star topology helps with easy maintenance.
6) Both mesh and star topology supports easy modification and expansion of nodes.
7) Though complicated it is easy to maintain and troubleshoot the mesh and star topology.
Questionnaire
Few questions that will help in understanding the effectiveness of Beta Communication LAN
would be:
1) Are you facing any slowness?
2) Are you able to transfer data across departments?
3) Are you able to establish secure connections between departments?
4) Are you facing any performance issues?
5) What is the turnaround time of your data requests?
6) What is the response time of your data requests?
7) Are the firewalls working well?
Networking Technologies 30
Task 4
Task 4
Networking Technologies 31
4.1 Implement a network system based on the proposed
design.
Here is a sample network layout and simulator code for Beta Communication.
Blueprint:
Network Simulator Code:
#Create a new simulator object
Set ns
#Define a color for data flows
$ns color 1 Blue
$ns color 2 red
#Open the NAM trace file
Set nf [open out .nam w]
$ns namtrace-all $nf
#Define a ‘finish’ procedure
4.1 Implement a network system based on the proposed
design.
Here is a sample network layout and simulator code for Beta Communication.
Blueprint:
Network Simulator Code:
#Create a new simulator object
Set ns
#Define a color for data flows
$ns color 1 Blue
$ns color 2 red
#Open the NAM trace file
Set nf [open out .nam w]
$ns namtrace-all $nf
#Define a ‘finish’ procedure
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Networking Technologies 32
Proc finish(){
Global ns nf
$ns flush-trace
Close $nf
Exec nam out.nam &
Exit 0
}
#create four nodes
Set n0 [$ns node]
Set n1 [$ns node]
Set n2 [$ns node]
Set n3 [$ns node]
#create links between the nodes
$ns duplex-link $n0 $n2 2Mb 10ms DropTail
$ns duplex-link $n1 $n2 2Mb 10ms DropTail
$ns simplex-link $n2 $n3 0.3Mb 100ms DropTail
$ns simplex-link $n3 $n2 0.3Mb 100ms DropTail
set lan [$ns newLan "$n3 $n4 $n5" 0.5Mb 40ms LL Queue/DropTail MAC/Csma/Cd Channel]
#Give node position
$ns duplex-link-op $n0 $n2 orient right-down
$ns duplex-link-op $n1 $n2 orient right-up
$ns simplex-link-op $n2 $n3 orient right
$ns simplex-link-op $n3 $n2 orient left
Proc finish(){
Global ns nf
$ns flush-trace
Close $nf
Exec nam out.nam &
Exit 0
}
#create four nodes
Set n0 [$ns node]
Set n1 [$ns node]
Set n2 [$ns node]
Set n3 [$ns node]
#create links between the nodes
$ns duplex-link $n0 $n2 2Mb 10ms DropTail
$ns duplex-link $n1 $n2 2Mb 10ms DropTail
$ns simplex-link $n2 $n3 0.3Mb 100ms DropTail
$ns simplex-link $n3 $n2 0.3Mb 100ms DropTail
set lan [$ns newLan "$n3 $n4 $n5" 0.5Mb 40ms LL Queue/DropTail MAC/Csma/Cd Channel]
#Give node position
$ns duplex-link-op $n0 $n2 orient right-down
$ns duplex-link-op $n1 $n2 orient right-up
$ns simplex-link-op $n2 $n3 orient right
$ns simplex-link-op $n3 $n2 orient left
Networking Technologies 33
#set queue size of link(n2-n3) to 20
$ns queue-limit $n2 $n3 20
#setup TCP connection
set tcp [new Agent/TCP/Newreno]
$ns attach-agent $n0 $tcp
set sink [new Agent/TCPSink/DelAck]
$ns attach-agent $n4 $sink
$ns connect $tcp $sink
$tcp set fid_ 1
$tcp set packet_size_ 552
#set ftp over tcp connection
set ftp [new Application/FTP]
$ftp attach-agent $tcp
#setup a UDP connection
set udp [new Agent/UDP]
$ns attach-agent $n1 $udp
set null [new Agent/Null]
$ns attach-agent $n5 $null
$ns connect $udp $null
$udp set fid_ 2
#setup a CBR over UDP connection
set cbr [new Application/Traffic/CBR]
$cbr attach-agent $udp
#set queue size of link(n2-n3) to 20
$ns queue-limit $n2 $n3 20
#setup TCP connection
set tcp [new Agent/TCP/Newreno]
$ns attach-agent $n0 $tcp
set sink [new Agent/TCPSink/DelAck]
$ns attach-agent $n4 $sink
$ns connect $tcp $sink
$tcp set fid_ 1
$tcp set packet_size_ 552
#set ftp over tcp connection
set ftp [new Application/FTP]
$ftp attach-agent $tcp
#setup a UDP connection
set udp [new Agent/UDP]
$ns attach-agent $n1 $udp
set null [new Agent/Null]
$ns attach-agent $n5 $null
$ns connect $udp $null
$udp set fid_ 2
#setup a CBR over UDP connection
set cbr [new Application/Traffic/CBR]
$cbr attach-agent $udp
Networking Technologies 34
$cbr set type_ CBR
$cbr set packet_size_ 1000
$cbr set rate_ 0.01Mb
$cbr set random_ false
#scheduling the events
$ns at 0.1 "$cbr start"
$ns at 1.0 "$ftp start"
$ns at 124.0 "$ftp stop"
$ns at 125.5 "$cbr stop"
proc plotWindow {tcpSource file} {
global ns
set time 0.1
set now [$ns now]
set cwnd [$tcpSource set cwnd_]
puts $file "$now $cwnd"
$ns at [expr $now+$time] "plotWindow $tcpSource $file"
}
$ns at 0.1 "plotWindow $tcp $winfile"
$ns at 125.0 "finish"
$ns run
4.2 Test network systems to meet user requirements.
This LAN network can be tested in several ways. The network has to be tested for security,
reliability and performance. For example, teams at Building 1 should ping the stations at
Building 2 and Building 3. They should have steady access to the other resources. The
$cbr set type_ CBR
$cbr set packet_size_ 1000
$cbr set rate_ 0.01Mb
$cbr set random_ false
#scheduling the events
$ns at 0.1 "$cbr start"
$ns at 1.0 "$ftp start"
$ns at 124.0 "$ftp stop"
$ns at 125.5 "$cbr stop"
proc plotWindow {tcpSource file} {
global ns
set time 0.1
set now [$ns now]
set cwnd [$tcpSource set cwnd_]
puts $file "$now $cwnd"
$ns at [expr $now+$time] "plotWindow $tcpSource $file"
}
$ns at 0.1 "plotWindow $tcp $winfile"
$ns at 125.0 "finish"
$ns run
4.2 Test network systems to meet user requirements.
This LAN network can be tested in several ways. The network has to be tested for security,
reliability and performance. For example, teams at Building 1 should ping the stations at
Building 2 and Building 3. They should have steady access to the other resources. The
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Networking Technologies 35
bandwidth should be in good shape at all times. This includes high bandwidth even when files
are transferred between the two destinations.
Another way to check for network availability is by disconnecting an uplink cable from the
access layer switches. This will check if the access list is being affected incoming traffic. Traffic
can be filtered using different rules too. Beta Communication makes use of a subnet wise policy.
That means, users from one subnet will have restrictions and certain rules. When client machines
ping, access should be provided based on the subnet rules.
A traffic generator software program can be used to check if workstations at each building are
functioning properly or not. An authorized device can be plugged into the switch port and
verified if functionalities happen as expected.
With the above mentioned tests, a series of results have been generated for the simulated LAN.
4.3 Document and Analyse test results against expected
results.
Test results for the simulated LAN are shown below:
The following screenshot is an overview of the speed test:
bandwidth should be in good shape at all times. This includes high bandwidth even when files
are transferred between the two destinations.
Another way to check for network availability is by disconnecting an uplink cable from the
access layer switches. This will check if the access list is being affected incoming traffic. Traffic
can be filtered using different rules too. Beta Communication makes use of a subnet wise policy.
That means, users from one subnet will have restrictions and certain rules. When client machines
ping, access should be provided based on the subnet rules.
A traffic generator software program can be used to check if workstations at each building are
functioning properly or not. An authorized device can be plugged into the switch port and
verified if functionalities happen as expected.
With the above mentioned tests, a series of results have been generated for the simulated LAN.
4.3 Document and Analyse test results against expected
results.
Test results for the simulated LAN are shown below:
The following screenshot is an overview of the speed test:
Networking Technologies 36
4.4 Recommend potential enhancement for the networked
systems.
Beta Communication has the opportunity to expand their current network.
These changes will help them handle the changing environment:
1) They can upgrade to a wireless LAN environment
2) They can replace servers with better and more powerful ones
3) They can introduce new servers into the current LAN architect. For example, the
company can invest on Virtual Servers. These servers will let the organization benefit
from virtualization techniques.
4) As the company invests on branches that are far apart, they can venture into WAN or
Cloud infrastructure.
4.5 Design a maintenance schedule to support the network
system.
The current LAN architecture requires frequent maintenance.
Here are few important maintenance points to be remembered:
1) Sever maintenance – a quick review of potential problems. The logs should be analyzed
for errors. There should be hotfix installations and review of service packs. All hard disks
should be checked for health reports and usage. A disaster recovery status should be
obtained with backup strategies.
2) Network maintenance – A document of all network devices should be produced. This
includes documents on routers, hubs and switches. The device configuration should be
reviewed. The firewall configuration should be reviewed!
4.4 Recommend potential enhancement for the networked
systems.
Beta Communication has the opportunity to expand their current network.
These changes will help them handle the changing environment:
1) They can upgrade to a wireless LAN environment
2) They can replace servers with better and more powerful ones
3) They can introduce new servers into the current LAN architect. For example, the
company can invest on Virtual Servers. These servers will let the organization benefit
from virtualization techniques.
4) As the company invests on branches that are far apart, they can venture into WAN or
Cloud infrastructure.
4.5 Design a maintenance schedule to support the network
system.
The current LAN architecture requires frequent maintenance.
Here are few important maintenance points to be remembered:
1) Sever maintenance – a quick review of potential problems. The logs should be analyzed
for errors. There should be hotfix installations and review of service packs. All hard disks
should be checked for health reports and usage. A disaster recovery status should be
obtained with backup strategies.
2) Network maintenance – A document of all network devices should be produced. This
includes documents on routers, hubs and switches. The device configuration should be
reviewed. The firewall configuration should be reviewed!
Networking Technologies 37
3) Workstation maintenance – disk usage should be reviewed. Hardware statistics must be
reviewed. Service pack installation and hotfix history must be reviewed. Antivirus
programs in each workstation should be reviewed.
References
1. Bonaventure, O. 2011. Computer Networking: Principles, Protocols and Practice.
Available at https://www.saylor.org/site/wp-content/uploads/2012/02/Computer-
Networking-Principles-Bonaventure-1-30-31-OTC1.pdf [Accessed 16th June 2017].
3) Workstation maintenance – disk usage should be reviewed. Hardware statistics must be
reviewed. Service pack installation and hotfix history must be reviewed. Antivirus
programs in each workstation should be reviewed.
References
1. Bonaventure, O. 2011. Computer Networking: Principles, Protocols and Practice.
Available at https://www.saylor.org/site/wp-content/uploads/2012/02/Computer-
Networking-Principles-Bonaventure-1-30-31-OTC1.pdf [Accessed 16th June 2017].
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Networking Technologies 38
2. Meyers, M. (n.d.). Introducing basic network concepts. Available at
https://www3.nd.edu/~cpoellab/teaching/cse40814_fall14/networks.pdf [Accessed 16th
June 2017].
3. Stallings, W. 2016. Cryptography and Network Security: Principles and Practice.
London, UK: Pearson, 7th edition.
4. Stallings, W. 2011. Network Security Essentials: Applications and Standards. London,
UK: Pearson, 4th edition.
5. Smith, J., Woodhams, J., & Marg, R. 2010. Controller-Based Wireless LAN
Fundamentals: An end-to-end reference guide to design, deploy, manage, and secure
802.11 wireless networks. Cisco Press, 1st edition.
2. Meyers, M. (n.d.). Introducing basic network concepts. Available at
https://www3.nd.edu/~cpoellab/teaching/cse40814_fall14/networks.pdf [Accessed 16th
June 2017].
3. Stallings, W. 2016. Cryptography and Network Security: Principles and Practice.
London, UK: Pearson, 7th edition.
4. Stallings, W. 2011. Network Security Essentials: Applications and Standards. London,
UK: Pearson, 4th edition.
5. Smith, J., Woodhams, J., & Marg, R. 2010. Controller-Based Wireless LAN
Fundamentals: An end-to-end reference guide to design, deploy, manage, and secure
802.11 wireless networks. Cisco Press, 1st edition.
1 out of 38
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.