Assignment Front Sheet: Qualification BTEC Level 5 HND Diploma in Computing Unit Number and Title Unit 2: Networking
Assignment Front Sheet: Qualification BTEC Level 5 HND Diploma in Computing Unit Number and Title Unit 2: Networking
Assignment Front Sheet: Qualification BTEC Level 5 HND Diploma in Computing Unit Number and Title Unit 2: Networking
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the
consequences of plagiarism. I understand that making a false declaration is a form of malpractice.
Student’s signature
Grading grid
P1 P2 P3 P4 P5 P6 P7 P8 M1 M2 M3 M4 D1 D2 D3
1
Summative Feedback:
Resubmission Feedback:
2
Submission format
Part 1
The submission is in the form of an individual written report. This should be written in a concise, formal business
style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections
as appropriate, and all work must be supported with research and referenced using the Harvard referencing
system. Please also provide a bibliography using the Harvard referencing system. The recommended word limit
is 2,000–2,500 words, although you will not be penalized for exceeding the total word limit.
Part 2
The submission is in the form of an individual evidence portfolio. This assignment can be completed as a group,
but each student must produce their own portfolio, which will contain:
• A LAN design plan and blueprint and justification document.
• A fully completed test plan including an evaluation of results and recommendations for improvements to LAN.
• A proposed and justified maintenance schedule.
Part 3
• Evidence of an implemented network.
You are required to make use of headings, paragraphs, subsections and illustrations as appropriate, and all work
must be supported with research and referenced using the Harvard referencing system.
Assignment Brief
You are employed as a Network Engineer by Nguyen Networking Limited, a high-tech networking solution
development company, which have branches in Hồ Chí Minh City, Hà Nội, Đà Nẵng and Cần Thơ.
The company has been contracted to implement a networking project from a local educational institute. The
specification of the project is given below:
People: 200 students, 15 teachers, 12 marketing and administration staff, 05 higher managers including the
head of academics and the program manager, 03 computer network administrators.
Building: 03 floors, all computers and printers are on the ground floor apart from the IT labs – one lab located
on the first floor and another located on the second floor.
As a first task, the CEO of the company Mr. Nguyen has asked you to investigate and explain networking
principles, protocols and devices and submit a report.
Part 1
3
You will need to produce a report that includes the following:
1. An introduction to provide an overview of your report.
2. Benefits and constraints of different types of networks and networking standards.
3. The impact of network topology, speed of communication and bandwidth requirements.
4. Effectiveness of networking systems.
5. Discussion on operating principles of networking devices and server types and networking software.
6. Discuss the relationship of workstation hardware with networking software.
7. Explore a range of server types and justify the selection of a server, considering a given scenario regarding
cost and performance optimization.
8. For the given specification, identify the topology protocol for the efficient utilization of a networking system.
The CEO Mr. Nguyen is happy with your first report and now he has asked you to analyze the specification from
the institution, as given earlier.
You need to design and implement the networking project within a given time frame:
ASSESMENT CRITERIA
4
P3 Discuss the operating principles of M2 Explore a range of server
networking devices and server types. types and justify the selection of a
server, considering a given
P4 Discuss the inter-dependence of scenario regarding cost and
workstation hardware with relevant performance optimisation.
networking software.
P5 Design a networked system to meet a M3 Install and configure network D2 Design a maintenance
given specification. services and applications on your schedule to support the
choice. networked system.
P6 Test and evaluate the design to meet
the requirements and analyse user
feedback.
Contents
P1 Discuss the benefits and constraints of different network types and standards …………………
…………………………………………………………………………………………………….………5.
P2 Explain the impact of network topology, communication and bandwidth requirements................
……………………………………………………………………………………………………………11.
P3 Discuss the operating principles of networking devices and server types.........................................
……………………………………………………………………………………………………………14.
P4 Discuss the inter-dependence of workstation hardware with relevant networking software……...
……………………………………………………………………………………………………………22.
P5 Design a networked system to meet a given specification………………………………………...23.
P6 Test and evaluate the design to meet the requirements and analyse user feedback……………….
……………………………………………………………………………………………………………26.
P7 Implement a networked system based on a prepared design……………………………………..27.
P8 Document and analyse test results against expected results……………………………………...28.
5
References……………………………………………………………………………………………….30.
P1 Discuss the benefits and constraints of different network types and standards.
❖ Network system or computer network is a combination of computers together through networked
devices and media (network protocol, transmission environment) in a certain structure and
computers This exchange information back and forth to each other.
6
➢ Benefits of the network for users and administrators
There are 4 main types that can be mentioned: LAN, WAN, INTRANET, SAN,
1. Local Network Area (LAN).
LAN has a full name is Local Network Area. LAN is understood as a combination of many
devices that are connected together in a network in a certain area (Company, school, housing,
etc.) Pairing devices in the same system allows these devices to exchange data with each other
quickly and easily (sharing files, images, printers, etc.).
Along with the ever-increasing technological development, LANs are increasingly being
developed and operated in many other forms, such as WANs - LANs are connected together
through routers ( Router) or WLAN (Wireless Local Network Area) wireless LAN - computers
connected to the network via Wi-Fi.
7
2. Wide Area Network (WAN).
MAN network is a network model that is connected from many LANs together through
cables, transmission facilities, etc. The connection range is in a wide area like in a city.
The main object using the MAN network model is that organizations and businesses have
many branches or parts connected together. The purpose of using the MAN network for
businesses is because this network model will help provide businesses with many types of
value-added services at the same time on a connection line of voice-data-video. Best of all,
this service also makes it easy to deploy professional applications.
3. INTRANET
An intranet is an internal (of course) internal network, based on TCP / IP, and this type of
network is often applied in companies, businesses, schools, etc. The intranet system wants to
operate, accessible must have authentication information, including the Username and
Password. And intranet-based sites work similarly to other Internet-based websites, but are
protected by a Firewall layer, which protects the system from unknown access.
8
Intended for use similar to the Internet, the intranet is used to exchange and share internal
information. However, the intranet has an advantage that is protected by the Firewall, meaning
that the user must have an account to access the system (different from the Internet where there
is a network, a computer can use it).
9
❖ Constraints:
➢ Local area network (LAN):
• High Setup Cost: The initial setup costs of installing Local Area Networks is high because
there is special software required to make a server. Also, communication devices like
an ethernet cable, switches, hubs, routers, cables are costly.
• Privacy Violations: The LAN administrator can see and check personal data files of each
and every LAN user. Moreover, he can view the computer and internet history of the LAN
user.
• Data Security Threat: Unauthorised users can access important data of an office or campus
if a server hard disk is not properly secured by the LAN administrator.
• LAN Maintenance Job: Local Area Network requires a LAN Administrator because there
are problems such as software installations, program faults or hardware failures or cable
disturbances in Local Area Network. A LAN Administrator is required to maintain these
issues.
• Covers Limited Area: LANs are restricted in size they cover a small area like a single
office, single building or a group of nearby buildings.
➢ Wide Area Network (WAN):
• Security problems: Wide Area Networks faces more security problem as compare to
LANs and MANs. One of the key disadvantages of WANs is a security issue when many
different people have the ability to use information from other computers.
• Needs firewall and antivirus software: As it faces security issue, therefore it is a basic
need of WANs to use firewalls and antivirus software to protect data transfer on the internet
which can be accessed and changed by hackers. Also, some people can inject a virus into
the computers so antivirus software is also needed to install.
• The setup cost is high: A WAN network covers a large geographical area, it is very
expensive to setup in the initial stage. It may involve purchasing different networking
devices, i.e routers, switches, and extra security software.
10
•
Technical Staff Requires to Set up: Highly technical people require to setup MAN. The
technical people are network administrators and troubleshooters.
• Need More wires: In MAN more than LAN network, cables require. As you know, it is a
combination of two LANs.
➢ Wireless LAN (WLAN):
• Proprietary solutions: slow standardization procedure lead to many proprietary solutions
only working in an homogeneous environment.
• Safety and security: using radio waves for data transmission might interfere with other
high-tech equipment .
• QoS: WLANs offer tipically lower QoS. Lower bandwidth due to limitations in radio
transmission (1-10 Mbit/s) and higher error rates due to interference.
• Cost: ethernet adapter vs wireless LAN adapters.
➢ Storage Area Network (SAN):
•
Not good for high traffic: If client computers need intensive data transfer then SAN is not
the right choice. SAN is good for low data traffic.
• Sensitive data may be leaked: As all the client computers share the same set of storage
devices so sensitive data can be leaked. It is better to not store sensitive data on this
network.
❖ Standars:
• Networking standards define the rules for data communications that are needed for
interoperability of networking technologies and processes. Standards help in creating and
maintaining open markets and allow different vendors to compete on the basis of the quality
of their products while being compatible with existing market products.
11
Some of the noted standards organizations are:
12
requirements, the central equipment may be a switch, router, hub or central server. The role
of the central equipment is to establish Point to Point links.
The network setup is simple, it is easy to reconfigure the network (adding, removing
stations) and can control and troubleshoot quickly, and maximize the transmission speed of
the physical line. However, the line length connecting a station to the central equipment is
limited (within 100m, with current technology).
• Bus Topology:
All stations divide a common bus route. The main current is limited at the two ends by two
special connectors called end points. Each station is connected to the main shaft via T
connector or transceiver. The bus network model operates on Point to Multipoint or
Broadcast links. The backbone network is easy to design and has a low cost, but it has poor
stability, when it is difficult to detect, only one broken node will go down the entire network.
• Ring Topology:
On the network, the ring is transmitted in a single direction. Each station of the network is
connected to each other by a relay that receives the signal and then forwards to the next
station on the ring. Thus the signal is circulated on a loop in a successive sequence of Point
to Point links between transmitters. The ring network has advantages and disadvantages
similar to the star network, but the ring network requires a more complex network access
protocol than the star network. There are also mixed connections between such network
architectures as the Star Bus or Star Ring.
13
• Mesh Topology:
In this topology every node conected with each other node. It generally used in warreless
network. It need a large amount of overhead which very difficult to manage+
• Line Topology:
In a line topology—also known as daisy-chaining or bus topology—the host communicates
directly with all nodes through one bus line. A standard Ethernet device or switch can be
added to the end of the chain if desired and used as normal. Be aware that these devices will
compete for network bandwidth with the FieldDAQ device. Reliable system design requires
awareness of the bandwidth consumed by each device during operations. This topology
offers no redundant links.
• Tree Topology:
14
Tree topology is a special type of structure in which many connected elements are arranged
like the branches of a tree. For example, tree topologies are frequently used to organize the
computers in a corporate network, or the information in a database.
There are 6 most popular network devices, including Repeater, Hub, Switch, Bridge, Router
and Gateway
➢ Repeater
In areas with large space, the signal transmission between hearing aids often decreases.
Computers that are far from the signal source will be weaker than nearby devices. Therefore,
you need devices that can amplify the signal, so that the signal can be transmitted farther but
stronger. Repeater is a device in layer 1 (Physic Layer) in the OSI model. When we use the
Repeater, the physical signal at the input will be amplified, thereby providing a stronger and
more stable signal for the output, to be able to reach farther locations. If you want to ensure
the speed of the connection with large office areas, or use in telegrams, information
transmission via fiber optic,…then you should choose Repeater.
15
Ex:
➢ Hub
Hub has many ports from 4 to 24 ports, and is considered as a multi-port repeater. When
information is transmitted to one hub port, the other ports also receive the information
immediately.
Currently there are 2 common types of hubs: Active Hub and Smart Hub:
• Active Hub: This type of Hub is much more commonly used, needs to be powered
when operating. Active Hub is used to amplify incoming signals and divide the
remaining ports to ensure the necessary signal speed when used.
• Smart Hub: also known as Intelligent Hub also has the same function as Active
Hub, but is integrated with a chip that can automatically detect errors on the network.
Ex:
➢ Switch
Working of Switch
• When switch receives data from one of the connected devices, it forwards data only to
the port on which the destination system is connected.
• Uses the Media Access Control (MAC) address of the devices to determine the correct
port.
• Refers to MAC table which stores MAC address with corresponding port number.
16
Frame Structure
• Multiple switches are useful in the network for redundancy and network expansion.
• Maximum number of ports available on switch are 48; this restricts the number of users
that can be connected to the switch.
• To include more users than the available ports on switch, another switch is required.
• This switch should be connected to the previous switch for the data transfer between
two segments.
• Multiple switches are useful in the network for redundancy and network expansion.
• Maximum number of ports available on switch are 48; this restricts the number of users
that can be connected to the switch.
• To include more users than the available ports on switch, another switch is required.
• This switch should be connected to the previous switch for the data transfer between two
segments.
• Crossover cable allows you to connect two computers together using 1000Base-T NICs
without a switch in between.
Multispeed Switches
• Having number of ports such as 100 Base T and one or two gigabit ports
• Port detects the speed of NIC and runs at that speed is called auto sensing
17
• Port runs at 10, 100 or gigabit is referred to as 10/100/1000 port
Ex:
➢ Bridge
A bridge is a network device belonging to layer 2 of the OSI model (Data Link Layer).
Bridges are used to pair two networks to form a single large network. Bridges are commonly
used as a bridge between two networks. The bridge observes packets on all networks. When
a packet is transferred from one computer on one network to another on the network, Bridge
copies and sends this packet to the destination network.
Working mode of Bridge
The working mode of a bridge: compared with the OSI model, a bridge works on the basis
of class LLC, is the upper part of layer 2. Thus, it will have to implement the protocols below
this class for both networks to be able to switch messages back and forth. A bridge itself
does not have its own network address.
➢ Router
Similar to bridge
Routers are classified in the 3rd layer of the OSI model (Network Layer), which is
responsible for connecting two or more IP networks together.
Routers connect different types of networks, from high-speed local Ethernet to slow-speed
long-distance phone lines. But the Router's ability to work is slower than Bridge, because it
18
needs to calculate to find the way for the signal packets, especially when connecting to the
networks that are not at the same speed, it needs to work more.
Ex:
➢ Gateway
Gateway connects two networks with different protocols, such as networks using IP
protocols with networks using IPX, Novell, DECnet, SNA ... With computers in networks
using different protocols can be easy. Easily connect with each other.
The gateway is capable of distinguishing protocols and applications when transferring email
from one network to another, converting a remote session.
• The gateway has two sides, WAN side and LAN side.
• The WAN side connects to modem and therefore to the Internet via ISP and the LAN
side connects to the network via hub or switch. So, while configuring gateway you need
to configure both WAN and LAN sides.
• Firewall is a gateway device.
Ex:
server types
1. Application Servers
Sometimes referred to as a type of middleware, application servers occupy a large chunk of computing
territory between database servers and the end user, and they often connect the two.
19
2. Client Servers
In the client/server programming model, a server is a program that awaits and fulfills requests from client
programs in the same or other computers. A given application in a computer may function as a client with
requests for services from other programs and also as a server of requests from other programs.
3. Collaboration Servers
In many ways, collaboration software, once called ‘groupware,’ demonstrates the original power of the
Web. Collaboration software designed to enable users to collaborate, regardless of location, via the Internet
or a corporate intranet and to work together in a virtual atmosphere.
20
4. FTP Servers
One of the oldest of the Internet services, File Transfer Protocol, makes it possible to move one or more
files securely between computers while providing file security and organization as well as transfer control.
5. List Servers
List servers offer a way to better manage mailing lists, whether they be interactive discussions open to the
public or one-way lists that deliver announcements, newsletters or advertising.
6. Mail Servers
Almost as ubiquitous and crucial as Web servers, mail servers move and store mail over corporate networks
(via LANs and WANs) and across the Internet.
21
7. Proxy Servers
Proxy servers sit between a client program (typically a Web browser) and an external server (typically
another server on the Web) to filter requests, improve performance, and share connections.
8. Web Servers
At its core, a Web server serves static content to a Web browser by loading a file from a disk and serving
it across the network to a user’s Web browser. This entire exchange is mediated by the browser and server
talking to each other using HTTP.
9. Virtual Servers
In 2009, the number of virtual servers deployed exceeded the number of physical servers. Today, server
virtualization has become near ubiquitous in the data center. From hypervisors to hybrid clouds,
ServerWatch looks at the latest virtualization technology trends.
22
A Telnet server enables users to log on to a host computer and perform tasks as if they’re working on the
remote computer itself.
Networking software
Network software is a fundamental element for any network. It helps administrators deploy, manage
and monitor a network. Traditional networks are made up of specialized hardware, such as routers
and switches, and network software packages into the solution. Software-defined networks (SDNs)
separate the software from hardware, making it easy to innovate and adapt the network to quickly
respond to changing network needs. Separating functions from hardware, such as firewalls or load
balancers, is called network functional virtualization (NFV).
Network software is not the same as software applications. The former exposes the inner workings
of the network to administrators, while software applications allow end users to perform specific
tasks. Network software is invisible to end users - it is simply used to facilitate those users to access
network resources seamlessly.
23
Network software allows multiple devices, such as desktops, laptops, mobile phones, tablets, and
other systems to connect to each other, as well as other networks. The Internet is a prime example
of a globally connected server and computer system based on network software to ensure end user
access.
If I had to plan to build a 3-storey company network, I would present the network design of a 3-storey
building like this. Building: 3 floors, all computers and printers are on the ground floor outside the IT lab
-One lab is on the first floor and another lab is on the second floor. The network devices I use in this
design include: DNS server, FTP, DHCP, Mail server, syslog server, NTP, Web server and 6 Switches.
❖ Logical:
FIRST FLOOR including: internet, ASA, Cable-modem, Main server (right) and Staff (left)
24
SECOND FLOOR:
THIRD FLOOR:
Some types of PC, Switch, Router, Laptop and its price when used
25
- 13 PC x 14.500.000 = 188.500.000 VNĐ
- 2 Router x 11.999.000 = 23.998.000 VNĐ
- 2 Switch x 22.909.000 = 45.818.000 VNĐ
26
27
- 20 PC x 8.900.000 = 178.000.000 VNĐ
- 4 Switch x 19.527.000 = 78.108.000 VNĐ
- 2 Router x 7.062.500 = 14.125.000 VNĐ
- 150m Cable x 65.000 = 325.000 VNĐ
- 3 Printer x 2.690.000 = 8.070.000 VNĐ
➢ The total value of a building is: 536.944.000 VNĐ.
P6 .Test and evaluate the design to meet the requirements and analyse user feedback.
➢ performance test
Performance testing is defined as a type of testing software used to ensure software applications work
effectively within the expected workload of the application.
The features and functions of a software system are not the only concerns. The performance of a software
application such as response time, reliability, resource usage and its scalability is also remarkable.
The goal of Performance Testing is not to find bugs, it is an essential activity for developing
performance-optimization solutions for software. Performance testing helps us avoid unforeseen
situations before deploying applications in real-world environments.
➢ Stress Test
Involves testing an application on a workload that is too large to see how it handles high traffic or how it
handles data. The goal is to determine the limit of an application.
➢ Reliability Test
A type of test to verify that software is capable of performing an error-free operation for a specified
period of time in a specified environment. It is also about testing the reliability of that system. Example:
The probability that a computer in a store is up and running for eight hours without an error is 99% =>
this factor is called reliability.
➢ Scalability test
The goal of the test is to extend the application, to determine the effectiveness of the software application
when "expanding" to support increased user load, support for capacity addition planning system.
asm..pkt
29
Then I will enter the ping command on a computer that has a specific IP address. It’s like a way of
transferring data between devices and helps me know if the connection is good.
30
31
References
[1] SearchNetworking. (2019). What is a LAN? - Definition from WhatIs.com. [online] Available at:
https://searchnetworking.techtarget.com/definition/local-area-network-LAN [Accessed 27 Dec. 2019].
[2] Computer Network Topology. (2019). Local Area Network | Advantages and Disadvantages of LAN
(2019). [online] Available at: https://computernetworktopology.com/local-area-network/ [Accessed 27
Dec. 2019].
[6] Yourownlinux.com. (2019). NETWORK SWITCH : Purpose and Functions. [online] Available at:
http://www.yourownlinux.com/2013/07/network-switch-purpose-and-functions.html [Accessed 27 Dec.
2019].
[7] DNSstuff. (2019). What is Network Topology? Best Guide to Types & Diagrams - DNSstuff. [online]
Available at: https://www.dnsstuff.com/what-is-network-topology [Accessed 27 Dec. 2019].
[8] Sophia. (2019). The Relationship Between Hardware and Software. [online] Available at:
https://www.sophia.org/tutorials/the-relationship-between-hardware-and-software [Accessed 27
Dec. 2019].
[9] Techblog của VCCloud. (2019). Performance Testing - Techblog của VCCloud. [online] Available at:
https://tech.bizflycloud.vn/performance-testing-kiem-thu-hieu-nang-
20180601110304363.htm?fbclid=IwAR1KhsxRzLjrciJkJhrDba5bdKXJQy3qBDhxFObXZsiVzGYvDuB
SxDs8WDQ [Accessed 27 Dec. 2019].
[10] Stackify. (2019). Performance Testing Types, Steps, Best Practices, and Metrics. [online] Available
at: https://stackify.com/ultimate-guide-performance-testing-and-software-testing/ [Accessed 27 Dec.
2019].
[11] Guru99.com. (2019). What is STRESS Testing in Software Testing? Tools, Types, Examples. [online]
Available at: https://www.guru99.com/stress-testing-tutorial.html#2 [Accessed 27 Dec. 2019].
[12] National Technical Systems. (2019). Failure Analysis - Root Cause Failure Analysis | NTS. [online]
Available at: https://www.nts.com/services/testing/failure-analysis/ [Accessed 27 Dec. 2019].
32