Network Design and Implementation Report: LUMCAT Limited
VerifiedAdded on 2025/05/03
|17
|2892
|346
AI Summary
Desklib provides solved assignments and past papers to help students succeed.

Networking
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Contents
Introduction......................................................................................................................................2
LO1 Examining networking principles and their protocols............................................................3
P1 Discuss the benefits and constraints of different network types and standards.....................3
P2 Explain the impact of network topology, communication and bandwidth requirements.......4
M1 Compare common networking principles and how protocols enable the effectiveness of
networked systems.......................................................................................................................4
LO2 Explaining networking devices and operations.......................................................................6
P3 Discuss the operating principles of networking devices and server types.............................6
P4 Discuss the inter-dependence of workstation hardware with relevant networking software. 6
M2 Explore a range of server types and justify the selection of a server, considering a given
scenario regarding cost and performance optimisation...............................................................7
LO3 Designing efficient networked systems...................................................................................9
P5 Design a networked system to meet a given specification.....................................................9
P6 Test and evaluate the design to meet the requirements and analyse user feedback...............9
M3 Install and configure network services and applications on your choice............................10
LO4 Implementing and diagnosing networked systems................................................................14
P7 Implement a networked system based on a prepared design................................................14
P8 Document and analyse test results against expected results.................................................14
M4 Recommend potential enhancements for the networked systems.......................................15
References......................................................................................................................................16
1
Introduction......................................................................................................................................2
LO1 Examining networking principles and their protocols............................................................3
P1 Discuss the benefits and constraints of different network types and standards.....................3
P2 Explain the impact of network topology, communication and bandwidth requirements.......4
M1 Compare common networking principles and how protocols enable the effectiveness of
networked systems.......................................................................................................................4
LO2 Explaining networking devices and operations.......................................................................6
P3 Discuss the operating principles of networking devices and server types.............................6
P4 Discuss the inter-dependence of workstation hardware with relevant networking software. 6
M2 Explore a range of server types and justify the selection of a server, considering a given
scenario regarding cost and performance optimisation...............................................................7
LO3 Designing efficient networked systems...................................................................................9
P5 Design a networked system to meet a given specification.....................................................9
P6 Test and evaluate the design to meet the requirements and analyse user feedback...............9
M3 Install and configure network services and applications on your choice............................10
LO4 Implementing and diagnosing networked systems................................................................14
P7 Implement a networked system based on a prepared design................................................14
P8 Document and analyse test results against expected results.................................................14
M4 Recommend potential enhancements for the networked systems.......................................15
References......................................................................................................................................16
1

Introduction
This study provides comprehensive explanations and recommendations for setting up LUMCAT
Limited network architecture. There are three departments as HR, Design, Sales present in this
organization environment. Now a fresh division is being introduced to the organization as R&D.
Other than these services, there are three locally connected servers which are DNS, Email and
Web (HTTP) Web, Email and DNS.
2
This study provides comprehensive explanations and recommendations for setting up LUMCAT
Limited network architecture. There are three departments as HR, Design, Sales present in this
organization environment. Now a fresh division is being introduced to the organization as R&D.
Other than these services, there are three locally connected servers which are DNS, Email and
Web (HTTP) Web, Email and DNS.
2
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

LO1 Examining networking principles and their protocols
P1 Discuss the benefits and constraints of different network types and standards.
1. Local Area Network (LAN): These networks are generally isolated and by isolated, we mean
limited to a specific area or an organization. It's generally built in a physical place. E.g.
Business organization, house, etc. It could consist of devices such as a printer, computers,
laptops, Servers, modems, routers and switch. Generally used for file sharing likes files,
documents of different formats.
2. Metro Politian Area Network (MAN): it could be described as a big computer network where
personal computing devices from distinct geographical locations are attached to each other.
Its design and constructed method are quite comparable to LAN, but the difference could lie
regarding the expansion of these networks. They can extend to a whole town or big buildings
like a college campus or a business zone (Dani, 2015).
3. Wide Area Network (WAN): Wide zone or area network is comparable to a LAN network,
but here all devices are linked by cell line or satellite connections, fiber optic wires
(Mikhaylov, 2016).
Network standards and its types
These norms are the papers containing physical as well as technical requirements for designing
the computer networks. Following these certain norms can result in safe and reliable network
design. These standards or norms are further categorized as:
1. De facto standard: It means standards based on facts or traditions. There is no prescribed
planning or proposal while we design these standards. For e.g., SNA
2. De jure Standard: These standards are created in harmony with the laws and regulation.
These norms are created with adequate studies to meet the need for data communication.
There are some pre-established organizations for developing these protocols and standards
such as; IEEE (Institute of electrical and electronics engineers), ANSI (American national
standard institute) etc (Ratasuk, 2015).
3
P1 Discuss the benefits and constraints of different network types and standards.
1. Local Area Network (LAN): These networks are generally isolated and by isolated, we mean
limited to a specific area or an organization. It's generally built in a physical place. E.g.
Business organization, house, etc. It could consist of devices such as a printer, computers,
laptops, Servers, modems, routers and switch. Generally used for file sharing likes files,
documents of different formats.
2. Metro Politian Area Network (MAN): it could be described as a big computer network where
personal computing devices from distinct geographical locations are attached to each other.
Its design and constructed method are quite comparable to LAN, but the difference could lie
regarding the expansion of these networks. They can extend to a whole town or big buildings
like a college campus or a business zone (Dani, 2015).
3. Wide Area Network (WAN): Wide zone or area network is comparable to a LAN network,
but here all devices are linked by cell line or satellite connections, fiber optic wires
(Mikhaylov, 2016).
Network standards and its types
These norms are the papers containing physical as well as technical requirements for designing
the computer networks. Following these certain norms can result in safe and reliable network
design. These standards or norms are further categorized as:
1. De facto standard: It means standards based on facts or traditions. There is no prescribed
planning or proposal while we design these standards. For e.g., SNA
2. De jure Standard: These standards are created in harmony with the laws and regulation.
These norms are created with adequate studies to meet the need for data communication.
There are some pre-established organizations for developing these protocols and standards
such as; IEEE (Institute of electrical and electronics engineers), ANSI (American national
standard institute) etc (Ratasuk, 2015).
3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

P2 Explain the impact of network topology, communication and bandwidth
requirements.
It is possible to configure or arrange a network in various forms. Topology is called the physical
design or structure of linked machines in a network. The following are different network
topologies:
1. Bus: Each node or unit is connected to another node separately. It's very easy to design this
network topology, but it does have some disadvantages like if any node has any error in
working, then it’s not an easy task to find out that node. Also, data duplicity is another issue
in the BUS topology (Shahrampour, 2015).
2. Ring: The design similarity index of Ring and Bus topology is nearly same but the difference
it there is no ending point to this topology structure like BUS topology. Nodes are connected
in a circle looking structure, which is a primary reason for the problems which can arise
when we are adding any new device to the topology.
3. Star: Each and every node in this network retains a total persona and dedicated link to a
switch that connects all other nodes. There is a node-to-node link to switch in this topology.
In this, we may require more wiring than other topologies.
4. Mesh: Nodes are interconnected with each other in this topology. It is usually used in a
network that is wireless. It needs a large quantity of overhead that could be very hard to
handle.
5. Hybrid: This topology is nothing but refers to a topology which is a combination of more
than one topology (Aslan, 2016).
M1 Compare common networking principles and how protocols enable the
effectiveness of networked systems.
We have mentioned some of the common protocols and technologies which are commonly used
in a network.
1. OSPF: For routing in very large network which can be a solo network itself or a group of
subnets, we use OSPF protocol (Open shortest path first). It was designed and developed by
4
requirements.
It is possible to configure or arrange a network in various forms. Topology is called the physical
design or structure of linked machines in a network. The following are different network
topologies:
1. Bus: Each node or unit is connected to another node separately. It's very easy to design this
network topology, but it does have some disadvantages like if any node has any error in
working, then it’s not an easy task to find out that node. Also, data duplicity is another issue
in the BUS topology (Shahrampour, 2015).
2. Ring: The design similarity index of Ring and Bus topology is nearly same but the difference
it there is no ending point to this topology structure like BUS topology. Nodes are connected
in a circle looking structure, which is a primary reason for the problems which can arise
when we are adding any new device to the topology.
3. Star: Each and every node in this network retains a total persona and dedicated link to a
switch that connects all other nodes. There is a node-to-node link to switch in this topology.
In this, we may require more wiring than other topologies.
4. Mesh: Nodes are interconnected with each other in this topology. It is usually used in a
network that is wireless. It needs a large quantity of overhead that could be very hard to
handle.
5. Hybrid: This topology is nothing but refers to a topology which is a combination of more
than one topology (Aslan, 2016).
M1 Compare common networking principles and how protocols enable the
effectiveness of networked systems.
We have mentioned some of the common protocols and technologies which are commonly used
in a network.
1. OSPF: For routing in very large network which can be a solo network itself or a group of
subnets, we use OSPF protocol (Open shortest path first). It was designed and developed by
4

Internet Engineering Taskforce as one of the Standard protocol which can run on
multivendor routers or devices. It uses port no 89. It also uses two multicast address
224.0.0.5 and 224.0.0.6 for sending routing updates. It maintains the whole topology diagram
information as to it works on link state routing algorithm (Vasisht, 2016).
2. File Transfer Protocol (FTP): FTP is primarily a normal network protocol used to receive or
send data, files and information from customer to host or between servers. If any user who
has administrator rights wants to save a file to a database, then he/she might require a
username and password.
3. SMTP: Simple mail transfer protocol (SMTP): SMTP acts as a protocol which transfers
electronic-mails from host to host or server to host. SMTP works with POP3 service at all
times for its full functioning.
4. Transmission Control Protocol and Internet (TCP / IP): TCP/IP is a protocol stack. TCP / IP
model explains how the protocols like FTP, SMTP, and HTTP work and operate. It is
originated from OSI model, which has 7 layers whereas TCP/IP has 4 layers namely;
Internet, transport, network and network physical or physical layer (Kobo, 2017).
Network Protocols ensures accurate consumption of unlike networking systems.
OSI model’s Layer 2 (Datalink layer) protocols manage how the information or frames are
circulated to the NICs (Network interface cards) of hosts.
Then the Layer 3 (Network layer) protocol, which is called Internetwork Protocol (IP) works for
transmitting, guiding packets between the networks. The protocols at layer 2 use a 32-bit address
to identify any host on a network.
TCP and UDP work on Layer 4(Transport Layer). TCP or Transmission Control Protocol creates
links for sharing data or segments between two hosts by using sockets, which are formed by Port
no and IP address. It is slow in transmitting but error and data loss free. On the other hand, UDP
does not guarantee the packets delivery. It is fast than TCP (Medhi, 2017).
5
multivendor routers or devices. It uses port no 89. It also uses two multicast address
224.0.0.5 and 224.0.0.6 for sending routing updates. It maintains the whole topology diagram
information as to it works on link state routing algorithm (Vasisht, 2016).
2. File Transfer Protocol (FTP): FTP is primarily a normal network protocol used to receive or
send data, files and information from customer to host or between servers. If any user who
has administrator rights wants to save a file to a database, then he/she might require a
username and password.
3. SMTP: Simple mail transfer protocol (SMTP): SMTP acts as a protocol which transfers
electronic-mails from host to host or server to host. SMTP works with POP3 service at all
times for its full functioning.
4. Transmission Control Protocol and Internet (TCP / IP): TCP/IP is a protocol stack. TCP / IP
model explains how the protocols like FTP, SMTP, and HTTP work and operate. It is
originated from OSI model, which has 7 layers whereas TCP/IP has 4 layers namely;
Internet, transport, network and network physical or physical layer (Kobo, 2017).
Network Protocols ensures accurate consumption of unlike networking systems.
OSI model’s Layer 2 (Datalink layer) protocols manage how the information or frames are
circulated to the NICs (Network interface cards) of hosts.
Then the Layer 3 (Network layer) protocol, which is called Internetwork Protocol (IP) works for
transmitting, guiding packets between the networks. The protocols at layer 2 use a 32-bit address
to identify any host on a network.
TCP and UDP work on Layer 4(Transport Layer). TCP or Transmission Control Protocol creates
links for sharing data or segments between two hosts by using sockets, which are formed by Port
no and IP address. It is slow in transmitting but error and data loss free. On the other hand, UDP
does not guarantee the packets delivery. It is fast than TCP (Medhi, 2017).
5
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

LO2 Explaining networking devices and operations
P3 Discuss the operating principles of networking devices and server types
1. Network interface card (NIC): A network interface controller or card also termed as LAN
adapter, Network adapter or interface for physical network is one of the computer hardware
parts that join two PCs to each other or to different Network device. It provides expansion
capability to a computer so that it can connect to any local, remote or internet network
through an RJ-45 connector (Kamble, 2015).
2. Hub: A hub is the most fundamental network machinery which is required for connecting
together various pcs or other network equipment like switch and router. It does not have any
routing records or decision making features for the packet regarding where and how to
transmit it. It simply shares data across each link. It has a single field of broadcasting. There
is a single bandwidth that all adjoining devices share, so when various machines want to
interact concurrently, its processing becomes slow. We can use Switch to resolve this defect.
3. Switch: A network switch is a machine that links computers to a computer. It functions on
packet switching mechanism to obtain process and deliver information to the specified
destination host. A switch retains a MAC address table. When a PC wishes to communicate
with another computer then switch will retrieve the MAC address and port no from this table.
A switch packet usually consists of data, sender IP, Receiver IP, sender MAC, Receiver
MAC.
4. Router: This device lets you transmit data and information packets between different
networks of computers. Routers are responsible for routing a packet into various locations.
The router is essentially used to interact between two distinct networks.
P4 Discuss the inter-dependence of workstation hardware with relevant networking
software.
Software: Network software has the procedures and guidelines that are needed to link the
nodes to each other. They enable the devices for exchange of data and information.
6
P3 Discuss the operating principles of networking devices and server types
1. Network interface card (NIC): A network interface controller or card also termed as LAN
adapter, Network adapter or interface for physical network is one of the computer hardware
parts that join two PCs to each other or to different Network device. It provides expansion
capability to a computer so that it can connect to any local, remote or internet network
through an RJ-45 connector (Kamble, 2015).
2. Hub: A hub is the most fundamental network machinery which is required for connecting
together various pcs or other network equipment like switch and router. It does not have any
routing records or decision making features for the packet regarding where and how to
transmit it. It simply shares data across each link. It has a single field of broadcasting. There
is a single bandwidth that all adjoining devices share, so when various machines want to
interact concurrently, its processing becomes slow. We can use Switch to resolve this defect.
3. Switch: A network switch is a machine that links computers to a computer. It functions on
packet switching mechanism to obtain process and deliver information to the specified
destination host. A switch retains a MAC address table. When a PC wishes to communicate
with another computer then switch will retrieve the MAC address and port no from this table.
A switch packet usually consists of data, sender IP, Receiver IP, sender MAC, Receiver
MAC.
4. Router: This device lets you transmit data and information packets between different
networks of computers. Routers are responsible for routing a packet into various locations.
The router is essentially used to interact between two distinct networks.
P4 Discuss the inter-dependence of workstation hardware with relevant networking
software.
Software: Network software has the procedures and guidelines that are needed to link the
nodes to each other. They enable the devices for exchange of data and information.
6
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Application sharing: When the devices use the same application for data sharing, they must
use an identical platform or program so that they can connect and manage the resources
easily.
Devices and hardware sharing: Devices on a common network may also share hardware
resources like fax, printer, Phone. This can reduce the overall components need, as well as
the cost of the network.
Operating System: Windows, Macintosh or Linux
M2 Explore a range of server types and justify the selection of a server, considering
a given scenario regarding cost and performance optimisation.
A Server receives requests from the users, hosts in the network. Then it processes the requests
from other device or node (client) and delivers the needed response. Window servers are
considered to be easy to configure servers. We can also create servers through Linux. Some of
the most required servers are FTP server, proxy servers, E-Mail or SMTP server, Web (HTTP or
HTTPS) server.
a. Proxy Servers: In between a customer and a server, these servers behave as an inner person.
Client here refers to an internet browser such as Chrome, Firefox or IE. When the client
makes an investigation, the internet browser will attempt to fix it; otherwise, the web browser
will accelerate the request to the real server. These servers reduce query time in this manner.
It also helps the network administrator in filtering the access requests to the websites related
to social media, adult websites etc. which are generally not allowed to use in a corporate
environment.
b. Mail Servers: It is widely used to deliver e-mail or electronic mails over a computer network.
These kinds of server obtain messages from further nodes or consumers and submit the mail
to another node for which the email was destined to reach.
c. Web Servers: This is usually a server that used to host websites or webpages frequently. All
material is simple HTML language made up data which may consist of audio, videos,
pictures, graphs etc.
7
use an identical platform or program so that they can connect and manage the resources
easily.
Devices and hardware sharing: Devices on a common network may also share hardware
resources like fax, printer, Phone. This can reduce the overall components need, as well as
the cost of the network.
Operating System: Windows, Macintosh or Linux
M2 Explore a range of server types and justify the selection of a server, considering
a given scenario regarding cost and performance optimisation.
A Server receives requests from the users, hosts in the network. Then it processes the requests
from other device or node (client) and delivers the needed response. Window servers are
considered to be easy to configure servers. We can also create servers through Linux. Some of
the most required servers are FTP server, proxy servers, E-Mail or SMTP server, Web (HTTP or
HTTPS) server.
a. Proxy Servers: In between a customer and a server, these servers behave as an inner person.
Client here refers to an internet browser such as Chrome, Firefox or IE. When the client
makes an investigation, the internet browser will attempt to fix it; otherwise, the web browser
will accelerate the request to the real server. These servers reduce query time in this manner.
It also helps the network administrator in filtering the access requests to the websites related
to social media, adult websites etc. which are generally not allowed to use in a corporate
environment.
b. Mail Servers: It is widely used to deliver e-mail or electronic mails over a computer network.
These kinds of server obtain messages from further nodes or consumers and submit the mail
to another node for which the email was destined to reach.
c. Web Servers: This is usually a server that used to host websites or webpages frequently. All
material is simple HTML language made up data which may consist of audio, videos,
pictures, graphs etc.
7

d. Application Servers: All applications between a user and a server are managed by application
servers.
e. FTP Servers: A fundamental protocol of Network which easily transfers data between
different hosts or clients and between servers. FTP servers contain all the files and record
which are continuously needed by the company employees.
Ideal prerequisites for selecting server types for the network could be;
Software specifications:
Operating systems (OS) - Linux, Windows or Macintosh
Expansion/Upgrade Criteria – Must be capable of extension
Drive types; memory and transmission speed
Physical features
Other devices; Printer: HP, Processors: INTEL i3 or i5 gen
8
servers.
e. FTP Servers: A fundamental protocol of Network which easily transfers data between
different hosts or clients and between servers. FTP servers contain all the files and record
which are continuously needed by the company employees.
Ideal prerequisites for selecting server types for the network could be;
Software specifications:
Operating systems (OS) - Linux, Windows or Macintosh
Expansion/Upgrade Criteria – Must be capable of extension
Drive types; memory and transmission speed
Physical features
Other devices; Printer: HP, Processors: INTEL i3 or i5 gen
8
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

LO3 Designing efficient networked systems
P5 Design a networked system to meet a given specification.
P6 Test and evaluate the design to meet the requirements and analyse user
feedback.
1. We must first decide which instruments are to be used in accordance with our demands. As
we can see, router, switch, PCs and computers are the primary equipment in the design
2. We now have to choose particular equipment from any seller according to our needs and
budget.
3. Then we will position the equipment according to the proposal in their corresponding
locations
4. Now we will set up the physical wiring and connections between the devices for allowing
them to have a transmission medium.
Straight cable: these cables have RJ-45 connector at the ends and they are used to connect the
different devices like a router to switch, Router to PC, PC to switch etc.
9
P5 Design a networked system to meet a given specification.
P6 Test and evaluate the design to meet the requirements and analyse user
feedback.
1. We must first decide which instruments are to be used in accordance with our demands. As
we can see, router, switch, PCs and computers are the primary equipment in the design
2. We now have to choose particular equipment from any seller according to our needs and
budget.
3. Then we will position the equipment according to the proposal in their corresponding
locations
4. Now we will set up the physical wiring and connections between the devices for allowing
them to have a transmission medium.
Straight cable: these cables have RJ-45 connector at the ends and they are used to connect the
different devices like a router to switch, Router to PC, PC to switch etc.
9
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Crossover cables: These cables also have RJ-45 connector at the terminating end and these join
same devices like a router with a router, switch to switch or PC to PC.
M3 Install and configure network services and applications on your choice.
a. Router
1. Setting up IP Address: we have been asked to set the IP address from 192.168.10.0/24
network. We have different departments like sales, design, HR and R&D. every department has
different no of host needs. So we will use concepts of Subnetting for dividing this major network
into small subnets.
Department Network Address/CIDR notation
Sales 192.168.10.0/26
Design 192.168.10.64/26
R&D 192.168.10.128/27
HR 192.168.10.160/28
Servers 192.168.10.176/29
Now we will create the subinterfaces for the different department which will help us in inter-
VLAN routing like this:
10
same devices like a router with a router, switch to switch or PC to PC.
M3 Install and configure network services and applications on your choice.
a. Router
1. Setting up IP Address: we have been asked to set the IP address from 192.168.10.0/24
network. We have different departments like sales, design, HR and R&D. every department has
different no of host needs. So we will use concepts of Subnetting for dividing this major network
into small subnets.
Department Network Address/CIDR notation
Sales 192.168.10.0/26
Design 192.168.10.64/26
R&D 192.168.10.128/27
HR 192.168.10.160/28
Servers 192.168.10.176/29
Now we will create the subinterfaces for the different department which will help us in inter-
VLAN routing like this:
10

11
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 17
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.