Networking Principles and Protocols: A Comprehensive Report
VerifiedAdded on  2025/06/20
|34
|3343
|213
AI Summary
Desklib offers solved assignments and past papers to help students succeed.

Networking
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Contents
Introduction.................................................................................................................................................4
LO1 Examine networking principles and their protocols.............................................................................5
P1 Discuss the benefits and constraints of different network types and standards...................................5
P2 Explain the impact of the network topology, communication and bandwidth requirements..............6
LO2 Explain networking devices and operation..........................................................................................7
P3 Discuss the operating principles of networking devices and server types...........................................7
P4 Discuss the interdependence of workstation hardware with relevant networking software................9
LO3 Design Efficient Networked Systems................................................................................................10
P5 Design a networked system to meet a given specification................................................................10
P6 Test and Evaluate the design to meet the requirements and analyze user feedback..........................13
LO4 Implement and Diagnose networked systems....................................................................................22
P7 Implement a network system based on a prepared design................................................................22
P8 Document and Analyze test results against the expected results.......................................................23
Conclusion.................................................................................................................................................33
References.................................................................................................................................................34
Figure 1 DHCP..........................................................................................................................................10
Figure 2 Ping.............................................................................................................................................11
Figure 3 Network.......................................................................................................................................12
Figure 4 FTP Test......................................................................................................................................13
Figure 5 FTP..............................................................................................................................................14
Figure 6 Web Test.....................................................................................................................................15
Figure 7 Web.............................................................................................................................................16
Figure 8 Ping.............................................................................................................................................17
Figure 9 Email Client................................................................................................................................18
Figure 10 Email.........................................................................................................................................19
Figure 11 DNS Client................................................................................................................................20
Figure 12 DNS..........................................................................................................................................21
Figure 13 Network Based Design..............................................................................................................22
Figure 14 DHCP........................................................................................................................................23
Figure 15 Web Test...................................................................................................................................24
Figure 16 Web...........................................................................................................................................25
Introduction.................................................................................................................................................4
LO1 Examine networking principles and their protocols.............................................................................5
P1 Discuss the benefits and constraints of different network types and standards...................................5
P2 Explain the impact of the network topology, communication and bandwidth requirements..............6
LO2 Explain networking devices and operation..........................................................................................7
P3 Discuss the operating principles of networking devices and server types...........................................7
P4 Discuss the interdependence of workstation hardware with relevant networking software................9
LO3 Design Efficient Networked Systems................................................................................................10
P5 Design a networked system to meet a given specification................................................................10
P6 Test and Evaluate the design to meet the requirements and analyze user feedback..........................13
LO4 Implement and Diagnose networked systems....................................................................................22
P7 Implement a network system based on a prepared design................................................................22
P8 Document and Analyze test results against the expected results.......................................................23
Conclusion.................................................................................................................................................33
References.................................................................................................................................................34
Figure 1 DHCP..........................................................................................................................................10
Figure 2 Ping.............................................................................................................................................11
Figure 3 Network.......................................................................................................................................12
Figure 4 FTP Test......................................................................................................................................13
Figure 5 FTP..............................................................................................................................................14
Figure 6 Web Test.....................................................................................................................................15
Figure 7 Web.............................................................................................................................................16
Figure 8 Ping.............................................................................................................................................17
Figure 9 Email Client................................................................................................................................18
Figure 10 Email.........................................................................................................................................19
Figure 11 DNS Client................................................................................................................................20
Figure 12 DNS..........................................................................................................................................21
Figure 13 Network Based Design..............................................................................................................22
Figure 14 DHCP........................................................................................................................................23
Figure 15 Web Test...................................................................................................................................24
Figure 16 Web...........................................................................................................................................25

Figure 17 Email.........................................................................................................................................26
Figure 18 Email Received.........................................................................................................................27
Figure 19 FTP Test....................................................................................................................................28
Figure 20 FTP Test....................................................................................................................................29
Figure 21 Ping...........................................................................................................................................30
Figure 22 DNS..........................................................................................................................................31
Figure 23 DNS Client................................................................................................................................32
Figure 18 Email Received.........................................................................................................................27
Figure 19 FTP Test....................................................................................................................................28
Figure 20 FTP Test....................................................................................................................................29
Figure 21 Ping...........................................................................................................................................30
Figure 22 DNS..........................................................................................................................................31
Figure 23 DNS Client................................................................................................................................32
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Introduction
Networking is defined as the technology that is having the responsibility of supporting the
communication between multiple programs that are running systems that are physically very
much apart from each other. A computer network is an important component of the whole
networking process. It is defined as the collection of computer systems that are cabled in such a
manner that they are having the ability to exchange the information between all the computers
that are connected to each other by the help of the created network. The need for the creation of a
network of various systems arises when multiple numbers of computer systems are cabled with
each other in order to distribute the data that is needed to be shared and resources which are
required. A set of computer systems exchanging the data by the help of the common rule and
regulation called protocols over the media and communication. In the following document that
has been created discuss the dos and don'ts of the networking process. After going through this
report, a learner would be having the ability to perform the tasks and answers and questions such
as examining the principles of networking and the protocols that they follow, examining the
operations and the devices that are used for the whole process of networking, designing an
efficient system that implements networking, implementation of the created networking systems.
Networking is defined as the technology that is having the responsibility of supporting the
communication between multiple programs that are running systems that are physically very
much apart from each other. A computer network is an important component of the whole
networking process. It is defined as the collection of computer systems that are cabled in such a
manner that they are having the ability to exchange the information between all the computers
that are connected to each other by the help of the created network. The need for the creation of a
network of various systems arises when multiple numbers of computer systems are cabled with
each other in order to distribute the data that is needed to be shared and resources which are
required. A set of computer systems exchanging the data by the help of the common rule and
regulation called protocols over the media and communication. In the following document that
has been created discuss the dos and don'ts of the networking process. After going through this
report, a learner would be having the ability to perform the tasks and answers and questions such
as examining the principles of networking and the protocols that they follow, examining the
operations and the devices that are used for the whole process of networking, designing an
efficient system that implements networking, implementation of the created networking systems.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

LO1 Examine networking principles and their protocols
P1 Discuss the benefits and constraints of different network types and standards.
Following are the benefits as well as constraints of different kind of networks and their standards
Benefits
1. File Sharing: One of the major advantages of the computer networks is that it allows the
sharing of the files over the network which is generally without the help of networks,
requires a lot of physical tasks. There is a central system in this whole network which can
monitor all the files that are being shared over the whole network (Rehman, 2019)
2. Resource Sharing: Just like file sharing, resource sharing is another one of the major
benefits of using networking systems. Not only files but the resources can also be shared
over a network among all the systems that are present in the network. These resources
may include internet connection as if there are 10 systems in a network, and all of them
need an internet connection, then they all can share a common resource of internet
connection (Rehman, 2019).
3. Cheap Set Up: There can be no better advantage of any format of systems than the set up
of the format being in expensive and so is it for the set of creating a network. Without the
use of the network, all the tasks that are performed over the network would've been much
more expensive than it is while doing it over the network such as file sharing, resource
sharing, etc (About Networking, 2019).
Constraints
1. Security Concerns: One of the major disadvantages of using the networking system is
that the networking set of the systems can also be accessed by some kind of elements that
may want to steal the data by using the same network through which the whole sharing
and the processes are being performed. Hence it would not be wrong to say that the
networking process can have some serious security problems (About Networking, 2019).
2. Virus and Malware: If the internet and networking are involved then it next to obvious
that there would be involvement of the threats such as viruses and malware. The viruses
can severely affect the data that is being shared over the network. Attackers can put
malware in the files that are being shared over the network in order to steal the data it has
which may affect all the clients as well as the employees that are working over the
network (About Networking, 2019).
3. Lack of robustness: There are various files and systems through which a network is
created. Each and every network has a central database, a central system, and the main
file system and if any of these elements are damaged the entire network becomes useless
and all the processes are instantly stopped. In the case of the large networks, this can be a
P1 Discuss the benefits and constraints of different network types and standards.
Following are the benefits as well as constraints of different kind of networks and their standards
Benefits
1. File Sharing: One of the major advantages of the computer networks is that it allows the
sharing of the files over the network which is generally without the help of networks,
requires a lot of physical tasks. There is a central system in this whole network which can
monitor all the files that are being shared over the whole network (Rehman, 2019)
2. Resource Sharing: Just like file sharing, resource sharing is another one of the major
benefits of using networking systems. Not only files but the resources can also be shared
over a network among all the systems that are present in the network. These resources
may include internet connection as if there are 10 systems in a network, and all of them
need an internet connection, then they all can share a common resource of internet
connection (Rehman, 2019).
3. Cheap Set Up: There can be no better advantage of any format of systems than the set up
of the format being in expensive and so is it for the set of creating a network. Without the
use of the network, all the tasks that are performed over the network would've been much
more expensive than it is while doing it over the network such as file sharing, resource
sharing, etc (About Networking, 2019).
Constraints
1. Security Concerns: One of the major disadvantages of using the networking system is
that the networking set of the systems can also be accessed by some kind of elements that
may want to steal the data by using the same network through which the whole sharing
and the processes are being performed. Hence it would not be wrong to say that the
networking process can have some serious security problems (About Networking, 2019).
2. Virus and Malware: If the internet and networking are involved then it next to obvious
that there would be involvement of the threats such as viruses and malware. The viruses
can severely affect the data that is being shared over the network. Attackers can put
malware in the files that are being shared over the network in order to steal the data it has
which may affect all the clients as well as the employees that are working over the
network (About Networking, 2019).
3. Lack of robustness: There are various files and systems through which a network is
created. Each and every network has a central database, a central system, and the main
file system and if any of these elements are damaged the entire network becomes useless
and all the processes are instantly stopped. In the case of the large networks, this can be a

highly serious failure and may affect the entire organization which was working over the
networks in a huge way leaving negative results (About Networking, 2019).
P2 Explain the impact of the network topology, communication, and bandwidth
requirements
The efficiency of any kind of system network is precisely impacted due to the latest
technologies, which we adopt in creating the interconnections of the network. As per the
previous studies that are done in the past in this same field of networking, the network topology
is defined as the technique for configuration of certain kinds of components that are associated
with the computers such as link, node, etc. In simple terms, the network topologies can be
defined as a topological development of a computer network as per the studies that are done
earlier on the same topic of networking. In the field of mathematics, topologies are the studies
that deal with the connection of the items that are having some of the most normal features. It
can also be said that the network topologies refer to the manner in which the networks that are
associated with the networks are cabled to each other as well as with the resources that they
share. Each of the topologies is suited to some particular jobs and are having their own benefits
as well as limitations. The most appropriate example that can be taken in this case for the perfect
explanation of network topology is the Local Area Network or LAN (Aristarkus, et. al., 2016).
If the impact of communication is talked about then it can be without a doubt said that there are
various organizations that are using communication technologies in the operations that it
performs in their day to day performance cycle, and apart from that there are many individuals
too that using the technologies of communication in order to complete their personal as well as
the professional tasks that might be assigned to them by the organization or some type of clients
such as banks, firms, bill payments, etc. Networking has also been much easier after the
introduction of modern communication techniques (Fenell, 2019).
Bandwidth creates a major impact over the whole period of the time that is generally been taken
in the process of downloading or even uploading any kind of information over the networks. Any
connection that consists of a lot of bandwidth that is made available and provides a smooth as
well as responsive user experience. It can also be said that the speed of the process of
transferring the data from one computer to another is directly proportional to the value of
bandwidth of the channel through which the data or the information is being transferred. But that
does not mean that the speed of transfer can limitlessly be increased because once the bandwidth
is known to be sufficient, it does not have any more effect on the networking (Stone, 2019).
networks in a huge way leaving negative results (About Networking, 2019).
P2 Explain the impact of the network topology, communication, and bandwidth
requirements
The efficiency of any kind of system network is precisely impacted due to the latest
technologies, which we adopt in creating the interconnections of the network. As per the
previous studies that are done in the past in this same field of networking, the network topology
is defined as the technique for configuration of certain kinds of components that are associated
with the computers such as link, node, etc. In simple terms, the network topologies can be
defined as a topological development of a computer network as per the studies that are done
earlier on the same topic of networking. In the field of mathematics, topologies are the studies
that deal with the connection of the items that are having some of the most normal features. It
can also be said that the network topologies refer to the manner in which the networks that are
associated with the networks are cabled to each other as well as with the resources that they
share. Each of the topologies is suited to some particular jobs and are having their own benefits
as well as limitations. The most appropriate example that can be taken in this case for the perfect
explanation of network topology is the Local Area Network or LAN (Aristarkus, et. al., 2016).
If the impact of communication is talked about then it can be without a doubt said that there are
various organizations that are using communication technologies in the operations that it
performs in their day to day performance cycle, and apart from that there are many individuals
too that using the technologies of communication in order to complete their personal as well as
the professional tasks that might be assigned to them by the organization or some type of clients
such as banks, firms, bill payments, etc. Networking has also been much easier after the
introduction of modern communication techniques (Fenell, 2019).
Bandwidth creates a major impact over the whole period of the time that is generally been taken
in the process of downloading or even uploading any kind of information over the networks. Any
connection that consists of a lot of bandwidth that is made available and provides a smooth as
well as responsive user experience. It can also be said that the speed of the process of
transferring the data from one computer to another is directly proportional to the value of
bandwidth of the channel through which the data or the information is being transferred. But that
does not mean that the speed of transfer can limitlessly be increased because once the bandwidth
is known to be sufficient, it does not have any more effect on the networking (Stone, 2019).
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

LO2 Explain networking devices and operation
P3 Discuss the operating principles of networking devices and server types
The following are the various types of networking devices and their networking principals.
1. Network Hub: The Network Hub is defined as one of the networking devices which are
having their usage for creating a connection between two or more hosts of the network. A
network hub is also having its application for transferring the data or the information over
the network (Shekhar, 2016).
2. Network Switch: A switch is also having its usage in the layer while the configuration on
the LAN Connection but in this case, it can also be said that a switch is known to be
better than a hub as it is considered to be more intelligent as compared to the hub
(Shekhar, 2016).
3. Modem: A modem is said to be one of the most commonly used as well as the most
interesting networking device in the whole field of networking systems. It is the set of
wires that are set up and later configured when there is a requirement of the internet
connection in an organization.
4. A router is defined as a network device that is having the task as well as the responsibility
of for routing or providing a way to the traffic from one type network to another type of
network (Shekhar, 2016).
Following are the Operating Principals of Server Types
1. Web Server: In the simplest form of explanation, a Web server is defined as the type of
server that is having the responsibility of serving static matter to a browser by the help of
the process of loading the files from the disks and then providing them across the
networks to the web browser of the user that is being used at the time of transaction or the
operation (Beal, 2011).
2. Application Server: There are many instances where the application server is referred to
as one of the various kinds of middlewares, the application server occupies a huge
amount of the computer based territories between the database server as well as the end
users, and is often responsible for establishing the connection between the 2 (Beal, 2011).
3. Real Time Server: The Real time communication servers were earlier known by the name
of the chat servers or sometimes back they were even called the IRC Servers. These types
of server are until now, by some people, known by the name of Instant messaging server,
the real time communication server is having the responsibility to provide a
communication channel between 2 system in order to do the transfer of the data on the
instant basis (Beal, 2011).
4. FTP Server: the FTP server is based upon one of the first ever services that were provided
y the internet that is File Transfer Protocol (FTP). This has made it even more possible to
P3 Discuss the operating principles of networking devices and server types
The following are the various types of networking devices and their networking principals.
1. Network Hub: The Network Hub is defined as one of the networking devices which are
having their usage for creating a connection between two or more hosts of the network. A
network hub is also having its application for transferring the data or the information over
the network (Shekhar, 2016).
2. Network Switch: A switch is also having its usage in the layer while the configuration on
the LAN Connection but in this case, it can also be said that a switch is known to be
better than a hub as it is considered to be more intelligent as compared to the hub
(Shekhar, 2016).
3. Modem: A modem is said to be one of the most commonly used as well as the most
interesting networking device in the whole field of networking systems. It is the set of
wires that are set up and later configured when there is a requirement of the internet
connection in an organization.
4. A router is defined as a network device that is having the task as well as the responsibility
of for routing or providing a way to the traffic from one type network to another type of
network (Shekhar, 2016).
Following are the Operating Principals of Server Types
1. Web Server: In the simplest form of explanation, a Web server is defined as the type of
server that is having the responsibility of serving static matter to a browser by the help of
the process of loading the files from the disks and then providing them across the
networks to the web browser of the user that is being used at the time of transaction or the
operation (Beal, 2011).
2. Application Server: There are many instances where the application server is referred to
as one of the various kinds of middlewares, the application server occupies a huge
amount of the computer based territories between the database server as well as the end
users, and is often responsible for establishing the connection between the 2 (Beal, 2011).
3. Real Time Server: The Real time communication servers were earlier known by the name
of the chat servers or sometimes back they were even called the IRC Servers. These types
of server are until now, by some people, known by the name of Instant messaging server,
the real time communication server is having the responsibility to provide a
communication channel between 2 system in order to do the transfer of the data on the
instant basis (Beal, 2011).
4. FTP Server: the FTP server is based upon one of the first ever services that were provided
y the internet that is File Transfer Protocol (FTP). This has made it even more possible to
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

transfer of multiple files over the network safely between the computer systems along
with providing the security and organization with the control over the transfer of the data
or the information (Beal, 2011).
with providing the security and organization with the control over the transfer of the data
or the information (Beal, 2011).

P4 Discuss the interdependence of workstation hardware with relevant networking
software
A workstation is defined as a computer that is known to be having an intention for individual
usage which is of a good quality rate and is considered to be having more capabilities as
compared to the person or the normal desktop computers that are used in an organization. An as
they are also having all the features that are present in a desktop personal computer, it can also
be having its usage that can be independent as well as free of the main frame taking the
assumption that it is having its own application already installed and the disk memory of its own
(Muyoubo, 2019).
A computer network is an important component of the whole networking process. It is defined as
the collection of computer systems that are cabled in such a manner that they are having the
ability to exchange the information between all the computers that are connected to each other by
the help of the created network (Muyoubo, 2019). The need for the creation of a network of
various systems arises when multiple numbers of computer systems are cabled with each other in
order to distribute the data that is needed to be shared and resources which are required. A set of
the computer systems exchanging the data by the help of the common rule and regulation called
protocols over the media and communication (Muyoubo, 2019).
software
A workstation is defined as a computer that is known to be having an intention for individual
usage which is of a good quality rate and is considered to be having more capabilities as
compared to the person or the normal desktop computers that are used in an organization. An as
they are also having all the features that are present in a desktop personal computer, it can also
be having its usage that can be independent as well as free of the main frame taking the
assumption that it is having its own application already installed and the disk memory of its own
(Muyoubo, 2019).
A computer network is an important component of the whole networking process. It is defined as
the collection of computer systems that are cabled in such a manner that they are having the
ability to exchange the information between all the computers that are connected to each other by
the help of the created network (Muyoubo, 2019). The need for the creation of a network of
various systems arises when multiple numbers of computer systems are cabled with each other in
order to distribute the data that is needed to be shared and resources which are required. A set of
the computer systems exchanging the data by the help of the common rule and regulation called
protocols over the media and communication (Muyoubo, 2019).
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

LO3 Design Efficient Networked Systems
P5 Design a networked system to meet a given specification
Figure 1 DHCP
Here, it can be clearly seen that the network that was tried to be made has been established
successfully with the following details.
Default Gateway: 10.0.0.1
DNS Server: 10.0.0.3
Start IP Address: 10.0.0.0
Subnet Mask: 255.255.255.0
P5 Design a networked system to meet a given specification
Figure 1 DHCP
Here, it can be clearly seen that the network that was tried to be made has been established
successfully with the following details.
Default Gateway: 10.0.0.1
DNS Server: 10.0.0.3
Start IP Address: 10.0.0.0
Subnet Mask: 255.255.255.0
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Max Users: 246
Figure 2 Ping
There is no loss observed in the ping and hence it can be said that the number of packets that
would be sent from the sending end is exactly equal to the number of packets that would be
received at the receiving end of the network. This means that the information sharing in the
network is working successfully. The round trip times of this whole data transfer would be at
most = 2 milliseconds and at least 0 milliseconds which averages the total speed to 1
millisecond.
Figure 2 Ping
There is no loss observed in the ping and hence it can be said that the number of packets that
would be sent from the sending end is exactly equal to the number of packets that would be
received at the receiving end of the network. This means that the information sharing in the
network is working successfully. The round trip times of this whole data transfer would be at
most = 2 milliseconds and at least 0 milliseconds which averages the total speed to 1
millisecond.

Figure 3 Network
This is the superficial look of the network that has been established above along with the tasks
this network can have the capability of doing. The network is having various features such as
Email, File Transfer Protocol, Dynamic Host Configuration Protocol, Domain Name System,
Web Access, etc. and all of the characteristics must be in a working condition in order to run the
network flawlessly. Even if a single one of these features of network stopped working it can
severely affect the performance of the network and in some cases may completely terminate the
network for a permanent or temporary basis.
This is the superficial look of the network that has been established above along with the tasks
this network can have the capability of doing. The network is having various features such as
Email, File Transfer Protocol, Dynamic Host Configuration Protocol, Domain Name System,
Web Access, etc. and all of the characteristics must be in a working condition in order to run the
network flawlessly. Even if a single one of these features of network stopped working it can
severely affect the performance of the network and in some cases may completely terminate the
network for a permanent or temporary basis.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 34
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.