Advanced Networking: Design, Implementation, and Testing
VerifiedAdded on  2025/05/03
|26
|4072
|346
AI Summary
Desklib provides solved assignments and past papers to help students succeed.

Networking
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

TABLE OF CONTENTS
Introduction................................................................................................................................1
Task 1.........................................................................................................................................2
P1 Discuss the benefits and constraints of different network types and standards................2
P2 Explain the impact of network topology, communication and bandwidth requirements. 3
Task 2.........................................................................................................................................5
P3 Discuss the operating principles of networking devices and server types........................5
P4 Discuss the inter-dependence of workstation hardware with relevant networking
software..................................................................................................................................6
Task 3.........................................................................................................................................8
P5 Design a networked system to meet a given specification...............................................8
P6 Test and evaluate the design to meet the requirements and analyse user feedback..........9
Task 4.......................................................................................................................................12
P7 Implement a networked system based on a prepared design..........................................12
P8 Document and analyse test results against expected results...........................................18
Conclusion................................................................................................................................21
References................................................................................................................................22
Introduction................................................................................................................................1
Task 1.........................................................................................................................................2
P1 Discuss the benefits and constraints of different network types and standards................2
P2 Explain the impact of network topology, communication and bandwidth requirements. 3
Task 2.........................................................................................................................................5
P3 Discuss the operating principles of networking devices and server types........................5
P4 Discuss the inter-dependence of workstation hardware with relevant networking
software..................................................................................................................................6
Task 3.........................................................................................................................................8
P5 Design a networked system to meet a given specification...............................................8
P6 Test and evaluate the design to meet the requirements and analyse user feedback..........9
Task 4.......................................................................................................................................12
P7 Implement a networked system based on a prepared design..........................................12
P8 Document and analyse test results against expected results...........................................18
Conclusion................................................................................................................................21
References................................................................................................................................22

LIST OF FIGURES
Figure 1: Network types.............................................................................................................2
Figure 2: Network topology.......................................................................................................4
Figure 3: Communication based on TCP and UDP...................................................................4
Figure 4: Network design with added department.....................................................................8
Figure 5: Defining static routing..............................................................................................12
Figure 6: Setting VLAN...........................................................................................................13
Figure 7: Mapping connections................................................................................................13
Figure 8: Configuring firewall on web server..........................................................................14
Figure 9: Static IP address on workstation...............................................................................15
Figure 10: Enabling DHCP on computer.................................................................................15
Figure 11: Configuration of web server...................................................................................16
Figure 12: Setting DNS server.................................................................................................16
Figure 13: File server configuration.........................................................................................17
Figure 14: Email server configuration.....................................................................................17
Figure 15: Web service testing from computer........................................................................20
Figure 1: Network types.............................................................................................................2
Figure 2: Network topology.......................................................................................................4
Figure 3: Communication based on TCP and UDP...................................................................4
Figure 4: Network design with added department.....................................................................8
Figure 5: Defining static routing..............................................................................................12
Figure 6: Setting VLAN...........................................................................................................13
Figure 7: Mapping connections................................................................................................13
Figure 8: Configuring firewall on web server..........................................................................14
Figure 9: Static IP address on workstation...............................................................................15
Figure 10: Enabling DHCP on computer.................................................................................15
Figure 11: Configuration of web server...................................................................................16
Figure 12: Setting DNS server.................................................................................................16
Figure 13: File server configuration.........................................................................................17
Figure 14: Email server configuration.....................................................................................17
Figure 15: Web service testing from computer........................................................................20
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

LIST OF TABLES
Table 1: Network maintenance plan........................................................................................10
Table 2: Test plan.....................................................................................................................10
Table 3: Test results.................................................................................................................18
Table 1: Network maintenance plan........................................................................................10
Table 2: Test plan.....................................................................................................................10
Table 3: Test results.................................................................................................................18
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Introduction
Local area network is good enough to meet the requirement of small number of users whereas
it is also easy to install and manage. The organization, Lucmat Ltd wants to update the local
area network for addition of some of the devices for increased demands. The presented report
will discuss the benefits and limitations with network standards and types in which client
server and peer-to-peer systems will be discussed. Also, various network topologies,
communication and bandwidth requirements of the business will be discussed. The
networking software and workstation components will be discussed for their interrelationship
whereas the operating principles also will be examined for the network devices. The later
sections of the report will focus on the network system design and implementation whereas
testing and documentations also will be part of the deployment.
1
Local area network is good enough to meet the requirement of small number of users whereas
it is also easy to install and manage. The organization, Lucmat Ltd wants to update the local
area network for addition of some of the devices for increased demands. The presented report
will discuss the benefits and limitations with network standards and types in which client
server and peer-to-peer systems will be discussed. Also, various network topologies,
communication and bandwidth requirements of the business will be discussed. The
networking software and workstation components will be discussed for their interrelationship
whereas the operating principles also will be examined for the network devices. The later
sections of the report will focus on the network system design and implementation whereas
testing and documentations also will be part of the deployment.
1

Task 1
P1 Discuss the benefits and constraints of different network types and standards
The purpose of the organization is to extend the local area network to meet the new
requirements. These are network types to consider in the practices:
Client-server network: The organizational servers can be used to connect all devices so that
cost and complexities at each computing device can be reduced and network monitoring and
change management can be centralized. For example, web server can be connected to all
computers so that they can update and fetch the data from the server and overall dependency
on the workstation for data availability can be reduced. It has benefits to centralize the
configuration and management but it also increases the dependencies on the servers for
network and data availability (Comer, 2018). Single breach to server security and connection
can lead network failure.
Figure 1: Network types
Peer-to-peer network: It means to connect the devices to each other so that they can share
data effectively with high security. However, it becomes complex with increasing number of
devices as connections and cables also increases. It has benefits to achieve dedicated
connections and high performance but complexity and cost for the network is high and
increases with addition of time (Robertazzi, 2017).
Network standards
The network has requirement of the standards to formulate the communication among
devices with high efficiency. IEEE standards are major to consider in network
communication and services:
2
P1 Discuss the benefits and constraints of different network types and standards
The purpose of the organization is to extend the local area network to meet the new
requirements. These are network types to consider in the practices:
Client-server network: The organizational servers can be used to connect all devices so that
cost and complexities at each computing device can be reduced and network monitoring and
change management can be centralized. For example, web server can be connected to all
computers so that they can update and fetch the data from the server and overall dependency
on the workstation for data availability can be reduced. It has benefits to centralize the
configuration and management but it also increases the dependencies on the servers for
network and data availability (Comer, 2018). Single breach to server security and connection
can lead network failure.
Figure 1: Network types
Peer-to-peer network: It means to connect the devices to each other so that they can share
data effectively with high security. However, it becomes complex with increasing number of
devices as connections and cables also increases. It has benefits to achieve dedicated
connections and high performance but complexity and cost for the network is high and
increases with addition of time (Robertazzi, 2017).
Network standards
The network has requirement of the standards to formulate the communication among
devices with high efficiency. IEEE standards are major to consider in network
communication and services:
2
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Local area network/ metropolitan area network standard: IEEE 802.1 standards are used for
local area networking services whereas 802.1d is used to achieve spanning tree protocol to
control the network redundancy whereas 802.1q is significant to achieve virtual local area
networking (Rose, 2001).
Ethernet: The core purpose of the standard is to support the physical and ethical cable based
connections. It is used to optimize the bandwidth, performance and security with Ethernet
cables those might vary in their capabilities.
Token ring standards: The standard defines how computers can connect in a ring format and
how the token can be acquires to start transmission. The standard has values to define the
transmission capabilities. The standard is required to eliminate the centralization of the
network system and to reduce the need of server systems for the transmission and
communication services (Hiertz et al., 2010). However, failure of a device in token ring can
lead failure of the network whereas the overall usability of the bandwidth is low.
Wireless LAN: The wireless is another option for the organization to add new devices. The
wireless router can be used to provide connections regardless of infrastructure. However,
security management is somehow complex and costly during installation.
P2 Explain the impact of network topology, communication and bandwidth requirements
The organizational requirements for the network topology also influence the network
utilization and communication services. For example, bus topology sequential connection of
the devices and there is high dependency on the common bus whereas there is chance of
congestion and high data dropping if most of the devices are active in communication. It can
lead performance and service availability issues. However, it also helps to achieve cost
effective network deployment along with easy connection troubleshooting. Star topology
connects all devices through a single switch (Comer and Droms, 2003). It provides easy
control and troubleshooting but also has high dependency on the central device. It impacts the
devices for the performance, use of the bandwidth and security also. If there is a failure in
network node then the network has no big influence but the failure of the central device can
lead failure whereas each device has dedicated connection for high performance and reliable
communication. Ring also has impact on performance because there is no shared use of the
cable whereas token acquiring process consumes time. However, it also saves business cost
through elimination of server.
3
local area networking services whereas 802.1d is used to achieve spanning tree protocol to
control the network redundancy whereas 802.1q is significant to achieve virtual local area
networking (Rose, 2001).
Ethernet: The core purpose of the standard is to support the physical and ethical cable based
connections. It is used to optimize the bandwidth, performance and security with Ethernet
cables those might vary in their capabilities.
Token ring standards: The standard defines how computers can connect in a ring format and
how the token can be acquires to start transmission. The standard has values to define the
transmission capabilities. The standard is required to eliminate the centralization of the
network system and to reduce the need of server systems for the transmission and
communication services (Hiertz et al., 2010). However, failure of a device in token ring can
lead failure of the network whereas the overall usability of the bandwidth is low.
Wireless LAN: The wireless is another option for the organization to add new devices. The
wireless router can be used to provide connections regardless of infrastructure. However,
security management is somehow complex and costly during installation.
P2 Explain the impact of network topology, communication and bandwidth requirements
The organizational requirements for the network topology also influence the network
utilization and communication services. For example, bus topology sequential connection of
the devices and there is high dependency on the common bus whereas there is chance of
congestion and high data dropping if most of the devices are active in communication. It can
lead performance and service availability issues. However, it also helps to achieve cost
effective network deployment along with easy connection troubleshooting. Star topology
connects all devices through a single switch (Comer and Droms, 2003). It provides easy
control and troubleshooting but also has high dependency on the central device. It impacts the
devices for the performance, use of the bandwidth and security also. If there is a failure in
network node then the network has no big influence but the failure of the central device can
lead failure whereas each device has dedicated connection for high performance and reliable
communication. Ring also has impact on performance because there is no shared use of the
cable whereas token acquiring process consumes time. However, it also saves business cost
through elimination of server.
3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Figure 2: Network topology
Communication services also impact the business. For example, TCP/IP has guaranteed
services with pre-establishment of the connection among devices but it has lack of bandwidth
utilization for security purpose and ensures faster data transmission. At another side, UDP
has values to transmit data with high speed and to make use of the multiple paths for the
communication to reduce packet dropping and enhance the network utilization (Kurose and
Ross, 2011).
Figure 3: Communication based on TCP and UDP
The organizational bandwidth requirements also impact the cost, performance and selection
of the devices and technologies. For example, the need of high bandwidth might include the
use of fibre optic cable as well as dedicated connections to the devices whereas adequate
bandwidth requirements can be achieved through use of the Ethernet cable with 10 or 100
mbps speed. Therefore, bandwidth requirements also impacts for the reliability and quality of
the services.
4
Communication services also impact the business. For example, TCP/IP has guaranteed
services with pre-establishment of the connection among devices but it has lack of bandwidth
utilization for security purpose and ensures faster data transmission. At another side, UDP
has values to transmit data with high speed and to make use of the multiple paths for the
communication to reduce packet dropping and enhance the network utilization (Kurose and
Ross, 2011).
Figure 3: Communication based on TCP and UDP
The organizational bandwidth requirements also impact the cost, performance and selection
of the devices and technologies. For example, the need of high bandwidth might include the
use of fibre optic cable as well as dedicated connections to the devices whereas adequate
bandwidth requirements can be achieved through use of the Ethernet cable with 10 or 100
mbps speed. Therefore, bandwidth requirements also impacts for the reliability and quality of
the services.
4

Task 2
P3 Discuss the operating principles of networking devices and server types
Networking devices and their operating principles
The selection and operations of the devices are essential to review as these define the network
performance and reliability. Following are some of the major devices with their working
principles:
Router: The device has operating system to collect the information about the connected
devices and then to prepare the routing tables for faster and reliable transmission. It also
works on network layer to work prepare packages for transport layer and unpack the
packages for data link layer. The main purpose is to provide communication through effective
routing of the data packets.
Switches: The main purpose is to prepare the data frames and to deliver the packets to the
end devices. The switches are also used to create the virtual local area network, segment the
devices from each other and to add the modularity in the network system (Comer, 2018).
Hub: This is much similar to a switch but it has no concept of the spanning tree protocol or
segmentation of the devices. It has main principle to forward the data packets on all the
connected ports whereas computing device accept the data if it is intended for it. Therefore, it
has values to create multiple copies of the data during broadcast.
Repeater: The primary purpose is to reduce the noise and errors from the data load and to
forward the packet with same frequency it acquired during initial transmission (Barrett and
King, 2005). It is used to provide communication among devices when there is large distance
between them and there is external influence of the signals on the data load.
Bridge: The organization can use bridges in future when there is need to connect with
external network systems. The main principle of the bridge is to establish the communication
among two or heterogeneous network systems. They might vary for their implementation
technology, device operations and address format.
Server types
Following are some of the major server systems, the organization required to add extension to
existing systems.
5
P3 Discuss the operating principles of networking devices and server types
Networking devices and their operating principles
The selection and operations of the devices are essential to review as these define the network
performance and reliability. Following are some of the major devices with their working
principles:
Router: The device has operating system to collect the information about the connected
devices and then to prepare the routing tables for faster and reliable transmission. It also
works on network layer to work prepare packages for transport layer and unpack the
packages for data link layer. The main purpose is to provide communication through effective
routing of the data packets.
Switches: The main purpose is to prepare the data frames and to deliver the packets to the
end devices. The switches are also used to create the virtual local area network, segment the
devices from each other and to add the modularity in the network system (Comer, 2018).
Hub: This is much similar to a switch but it has no concept of the spanning tree protocol or
segmentation of the devices. It has main principle to forward the data packets on all the
connected ports whereas computing device accept the data if it is intended for it. Therefore, it
has values to create multiple copies of the data during broadcast.
Repeater: The primary purpose is to reduce the noise and errors from the data load and to
forward the packet with same frequency it acquired during initial transmission (Barrett and
King, 2005). It is used to provide communication among devices when there is large distance
between them and there is external influence of the signals on the data load.
Bridge: The organization can use bridges in future when there is need to connect with
external network systems. The main principle of the bridge is to establish the communication
among two or heterogeneous network systems. They might vary for their implementation
technology, device operations and address format.
Server types
Following are some of the major server systems, the organization required to add extension to
existing systems.
5
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Web server: The client system such as user browser send the request for a particular web
page or file through the domain name locating. The web server uses HTTP protocol to
entertain the user request but there is also use of validation and verification for the particular
domain name and user access. Therefore, web server is used to achieve performance as well
as centralization for data availability and services.
File server: The core purpose of file server is to centralize the storage for the devices and
provide easy distribution of the files to the users through FTP protocol. The user makes
request to server through browser or FTP client and the server validate the user request and
might prompt for authentication to avail downloading and uploading of the content.
Email server: Internal communication is required to achieve effective performance and
quality in the business operations and decisions making (Robertazzi, 2017). The organization
can use SMTP protocol for the email services whereas each user needs authentication on
server to send an email to others. It also supports attachment of multimedia content.
DNS server: The main purpose of the server is to identify the domain name and provide
translation of the domain address into IP address and port number to provide hierarchical
navigation to the file. It is required to manage the domain name services so that effective
mapping to the target device, server or computing machine, can be achieved.
P4 Discuss the inter-dependence of workstation hardware with relevant networking software
It is essential to have workstation components required for the networking so that desired
performance and reliability can be achieved. For example, workstations have to use network
interface card whereas there is need of network operating system to make use of the
component for communication. The network interface card works at physical layer and send
the data to switches for the data frames and then communication started (Rose, 2001).
Therefore, network software is required to be compatible with the selected hardware
component on the workplace.
The network interface card has main purpose to create MAC address for the machine which
is unique and useful in the communication. The main use of the MAC address is to achieve
the unique identification of the device while the same public IP address might be used in
other networks also. The wired network has use of MAC address to achieve data sharing and
communication without the use of IP address. Also, wireless network services can be
established with the network interface card.
6
page or file through the domain name locating. The web server uses HTTP protocol to
entertain the user request but there is also use of validation and verification for the particular
domain name and user access. Therefore, web server is used to achieve performance as well
as centralization for data availability and services.
File server: The core purpose of file server is to centralize the storage for the devices and
provide easy distribution of the files to the users through FTP protocol. The user makes
request to server through browser or FTP client and the server validate the user request and
might prompt for authentication to avail downloading and uploading of the content.
Email server: Internal communication is required to achieve effective performance and
quality in the business operations and decisions making (Robertazzi, 2017). The organization
can use SMTP protocol for the email services whereas each user needs authentication on
server to send an email to others. It also supports attachment of multimedia content.
DNS server: The main purpose of the server is to identify the domain name and provide
translation of the domain address into IP address and port number to provide hierarchical
navigation to the file. It is required to manage the domain name services so that effective
mapping to the target device, server or computing machine, can be achieved.
P4 Discuss the inter-dependence of workstation hardware with relevant networking software
It is essential to have workstation components required for the networking so that desired
performance and reliability can be achieved. For example, workstations have to use network
interface card whereas there is need of network operating system to make use of the
component for communication. The network interface card works at physical layer and send
the data to switches for the data frames and then communication started (Rose, 2001).
Therefore, network software is required to be compatible with the selected hardware
component on the workplace.
The network interface card has main purpose to create MAC address for the machine which
is unique and useful in the communication. The main use of the MAC address is to achieve
the unique identification of the device while the same public IP address might be used in
other networks also. The wired network has use of MAC address to achieve data sharing and
communication without the use of IP address. Also, wireless network services can be
established with the network interface card.
6
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Also, the workstation hardware such as cable has relationship with network software.
Ethernet cable is required to connect with network interface cable whereas it is also
connected to the switches or routers those manage the data packets and ensure effective
communication (Comer, 2018). Therefore, network software has use of hardware components
of workstations to achieve the desired benefits.
7
Ethernet cable is required to connect with network interface cable whereas it is also
connected to the switches or routers those manage the data packets and ensure effective
communication (Comer, 2018). Therefore, network software has use of hardware components
of workstations to achieve the desired benefits.
7

Task 3
P5 Design a networked system to meet a given specification
The organization wants to add 20 more computers in the network system whereas there is
need of the modification in the existing network design to meet the performance, security and
reliability. The organization can use the start topologies through the switches to connect the
end devices whereas the switches can contain the required number of ports to ensure physical
connection security. Also, spanning tree protocols and virtual local area network services can
be configured to achieve the performance and reliability. The organization can dependent the
operations on packet switching and so that the frame relay protocol can be used at core to
meet the network demands (Robertazzi, 2011). Ethernet cable with bandwidth of 100 mbps is
used to connect the devices. Also, the network has use of multiple connections to ensure high
availability of devices.
Figure 4: Network design with added department
The network system focuses on the installation and configuration of firewall and access
control list so that security can be achieved whereas access to the web and other server is
constraint. The network design has use of dynamic host configuration protocol so that address
8
P5 Design a networked system to meet a given specification
The organization wants to add 20 more computers in the network system whereas there is
need of the modification in the existing network design to meet the performance, security and
reliability. The organization can use the start topologies through the switches to connect the
end devices whereas the switches can contain the required number of ports to ensure physical
connection security. Also, spanning tree protocols and virtual local area network services can
be configured to achieve the performance and reliability. The organization can dependent the
operations on packet switching and so that the frame relay protocol can be used at core to
meet the network demands (Robertazzi, 2011). Ethernet cable with bandwidth of 100 mbps is
used to connect the devices. Also, the network has use of multiple connections to ensure high
availability of devices.
Figure 4: Network design with added department
The network system focuses on the installation and configuration of firewall and access
control list so that security can be achieved whereas access to the web and other server is
constraint. The network design has use of dynamic host configuration protocol so that address
8
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 26
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.