Assignment Front Sheet: Qualification BTEC Level 5 HND Diploma in Computing Unit Number and Title Unit 2: Networking

Download as pdf or txt
Download as pdf or txt
You are on page 1of 32

ASSIGNMENT FRONT SHEET

Qualification BTEC Level 5 HND Diploma in Computing

Unit number and


Unit 2: Networking
title
Date Received 1st
Submission date December, 30th 2019 December, 25th 2019
submission
Date Received 2nd
Re-submission Date
submission

Student Name Cù Duy Lộc Student ID GCS 17470

Class GCS0801A Assessor name Hồ Nguyễn Phú Bảo

Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the
consequences of plagiarism. I understand that making a false declaration is a form of malpractice.

Student’s signature

Grading grid

P1 P2 P3 P4 P5 P6 P7 P8 M1 M2 M3 M4 D1 D2 D3

1
 Summative Feedback:

 Resubmission Feedback:

Grade: Assessor Signature: Date:

Signature & Date:

Fall 2019 (Part 2)

Qualification BTEC Level 5 HND Diploma in Computing

Unit number Unit 2: Networking

Assignment title Networking Infrastructure

Academic Year Fall 2019 (Part 2)

Unit Tutor Hồ Nguyễn Phú Bảo

Issue date Submission date December, 27th 2019

IV name and date Cù Duy Lộc

2
Submission format

Part 1
The submission is in the form of an individual written report. This should be written in a concise, formal business
style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections
as appropriate, and all work must be supported with research and referenced using the Harvard referencing
system. Please also provide a bibliography using the Harvard referencing system. The recommended word limit
is 2,000–2,500 words, although you will not be penalized for exceeding the total word limit.

Part 2
The submission is in the form of an individual evidence portfolio. This assignment can be completed as a group,
but each student must produce their own portfolio, which will contain:
• A LAN design plan and blueprint and justification document.
• A fully completed test plan including an evaluation of results and recommendations for improvements to LAN.
• A proposed and justified maintenance schedule.

Part 3
• Evidence of an implemented network.

You are required to make use of headings, paragraphs, subsections and illustrations as appropriate, and all work
must be supported with research and referenced using the Harvard referencing system.

Unit Learning Outcomes


LO1: Examine networking principles and their protocols.
LO2: Explain networking devices and operations.
LO3: Design efficient networked systems.
LO4: Implement and diagnose networked systems.

Assignment Brief

You are employed as a Network Engineer by Nguyen Networking Limited, a high-tech networking solution
development company, which have branches in Hồ Chí Minh City, Hà Nội, Đà Nẵng and Cần Thơ.

The company has been contracted to implement a networking project from a local educational institute. The
specification of the project is given below:

People: 200 students, 15 teachers, 12 marketing and administration staff, 05 higher managers including the
head of academics and the program manager, 03 computer network administrators.

Resources: 50 student lab computers, 35 staff computers, 03 printers.

Building: 03 floors, all computers and printers are on the ground floor apart from the IT labs – one lab located
on the first floor and another located on the second floor.

As a first task, the CEO of the company Mr. Nguyen has asked you to investigate and explain networking
principles, protocols and devices and submit a report.

Part 1

3
You will need to produce a report that includes the following:
1. An introduction to provide an overview of your report.
2. Benefits and constraints of different types of networks and networking standards.
3. The impact of network topology, speed of communication and bandwidth requirements.
4. Effectiveness of networking systems.
5. Discussion on operating principles of networking devices and server types and networking software.
6. Discuss the relationship of workstation hardware with networking software.
7. Explore a range of server types and justify the selection of a server, considering a given scenario regarding
cost and performance optimization.
8. For the given specification, identify the topology protocol for the efficient utilization of a networking system.

The CEO Mr. Nguyen is happy with your first report and now he has asked you to analyze the specification from
the institution, as given earlier.

You need to design and implement the networking project within a given time frame:

Part 2 - Design efficient networked systems


1. Prepare a written step-by-step plan of how you are going to design a Local Area Network including a blueprint
of your LAN.
2. Justify your choice of devices for your network design.
3. Produce a test plan to evaluate this design for the requirements of bandwidth and cost constraints as per
user specifications.
4. Justify the security requirements and quality of services needed for selection of accessories.
5. Suggest a maintenance schedule to support the networked system.

Part 3 - Implement test and diagnose networked systems


1. Implement a networked system based on your prepared design.
2. Conduct verification with e.g. Ping, extended ping, trace route, telnet, SSH, etc.
3. Record the test results and analyze these against expected results.
4. Investigate what functionalities would allow the system to support device growth and the addition of
communication devices.
5. Discuss the significance of upgrades and security requirements in your recommendations.

ASSESMENT CRITERIA

Learning Outcomes and Assessment Criteria

Pass Merit Distinction

LO1 Examine networking principles and their protocols. LO1 & 2


D1 Considering a given scenario,
P1 Discuss the benefits and constraints of M1 Compare common
identify the topology protocol
different network types and standards. networking principles and how
selected for the efficient
protocols enable the
utilization of a networking
P2 Explain the impact of network topology, effectiveness of networked
system.
communication and bandwidth systems.
requirements.

LO2 Explain networking devices and operations

4
P3 Discuss the operating principles of M2 Explore a range of server
networking devices and server types. types and justify the selection of a
server, considering a given
P4 Discuss the inter-dependence of scenario regarding cost and
workstation hardware with relevant performance optimisation.
networking software.

LO3 Design efficient networked systems

P5 Design a networked system to meet a M3 Install and configure network D2 Design a maintenance
given specification. services and applications on your schedule to support the
choice. networked system.
P6 Test and evaluate the design to meet
the requirements and analyse user
feedback.

LO4 Implement and diagnose networked systems

P7 Implement a networked system based M4 Recommend potential D3 Use critical reflection to


on a prepared design. enhancements for the networked evaluate own work and justify
systems. valid conclusions.
P8 Document and analyse test results
against expected results.

Contents
P1 Discuss the benefits and constraints of different network types and standards …………………
…………………………………………………………………………………………………….………5.
P2 Explain the impact of network topology, communication and bandwidth requirements................
……………………………………………………………………………………………………………11.
P3 Discuss the operating principles of networking devices and server types.........................................
……………………………………………………………………………………………………………14.
P4 Discuss the inter-dependence of workstation hardware with relevant networking software……...
……………………………………………………………………………………………………………22.
P5 Design a networked system to meet a given specification………………………………………...23.
P6 Test and evaluate the design to meet the requirements and analyse user feedback……………….
……………………………………………………………………………………………………………26.
P7 Implement a networked system based on a prepared design……………………………………..27.
P8 Document and analyse test results against expected results……………………………………...28.
5
References……………………………………………………………………………………………….30.

P1 Discuss the benefits and constraints of different network types and standards.
❖ Network system or computer network is a combination of computers together through networked
devices and media (network protocol, transmission environment) in a certain structure and
computers This exchange information back and forth to each other.

6
➢ Benefits of the network for users and administrators

• Share your file to other users


• View, edit and copy files on another computer as easily as working with an object on your own
computer.
• Computers, devices in the same network can share resources such as printers, fax machines,
computer storage devices (HDD, FDD and CD drives), webcams, scanners, modems and many
other devices.
• In addition, network users can also share files and programs on the same network.

There are 4 main types that can be mentioned: LAN, WAN, INTRANET, SAN,
1. Local Network Area (LAN).
LAN has a full name is Local Network Area. LAN is understood as a combination of many
devices that are connected together in a network in a certain area (Company, school, housing,
etc.) Pairing devices in the same system allows these devices to exchange data with each other
quickly and easily (sharing files, images, printers, etc.).

Along with the ever-increasing technological development, LANs are increasingly being
developed and operated in many other forms, such as WANs - LANs are connected together
through routers ( Router) or WLAN (Wireless Local Network Area) wireless LAN - computers
connected to the network via Wi-Fi.

7
2. Wide Area Network (WAN).
MAN network is a network model that is connected from many LANs together through
cables, transmission facilities, etc. The connection range is in a wide area like in a city.

The main object using the MAN network model is that organizations and businesses have
many branches or parts connected together. The purpose of using the MAN network for
businesses is because this network model will help provide businesses with many types of
value-added services at the same time on a connection line of voice-data-video. Best of all,
this service also makes it easy to deploy professional applications.

3. INTRANET
An intranet is an internal (of course) internal network, based on TCP / IP, and this type of
network is often applied in companies, businesses, schools, etc. The intranet system wants to
operate, accessible must have authentication information, including the Username and
Password. And intranet-based sites work similarly to other Internet-based websites, but are
protected by a Firewall layer, which protects the system from unknown access.

8
Intended for use similar to the Internet, the intranet is used to exchange and share internal
information. However, the intranet has an advantage that is protected by the Firewall, meaning
that the user must have an account to access the system (different from the Internet where there
is a network, a computer can use it).

4. Storage area network (SAN).


SAN (Storage area network) is a high-speed network and dedicated to connecting to the general
storage of storage devices with multiple servers. The SAN stores resources from public users
and organizes them under high performance and independence. This allows each server to access
the memory and share it as a drive directly attached to the server. When the server wants to
access a SAN storage device it sends requests based on blocks.
SAN is a storage network assembled using three main components: cable, host bus adapter
(HBA) and finally the switch. Each switch system and SAN storage must be connected to each
other, of course, physical connections must be supported with a bandwidth that can handle a full
range of data operations.

9
❖ Constraints:
➢ Local area network (LAN):
• High Setup Cost: The initial setup costs of installing Local Area Networks is high because
there is special software required to make a server. Also, communication devices like
an ethernet cable, switches, hubs, routers, cables are costly.
• Privacy Violations: The LAN administrator can see and check personal data files of each
and every LAN user. Moreover, he can view the computer and internet history of the LAN
user.
• Data Security Threat: Unauthorised users can access important data of an office or campus
if a server hard disk is not properly secured by the LAN administrator.
• LAN Maintenance Job: Local Area Network requires a LAN Administrator because there
are problems such as software installations, program faults or hardware failures or cable
disturbances in Local Area Network. A LAN Administrator is required to maintain these
issues.
• Covers Limited Area: LANs are restricted in size they cover a small area like a single
office, single building or a group of nearby buildings.
➢ Wide Area Network (WAN):
• Security problems: Wide Area Networks faces more security problem as compare to
LANs and MANs. One of the key disadvantages of WANs is a security issue when many
different people have the ability to use information from other computers.
• Needs firewall and antivirus software: As it faces security issue, therefore it is a basic
need of WANs to use firewalls and antivirus software to protect data transfer on the internet
which can be accessed and changed by hackers. Also, some people can inject a virus into
the computers so antivirus software is also needed to install.
• The setup cost is high: A WAN network covers a large geographical area, it is very
expensive to setup in the initial stage. It may involve purchasing different networking
devices, i.e routers, switches, and extra security software.

•Troubleshooting problems: A WAN network covers large geographical areas, so fixing


the problem in a network is a very difficult job. Most of WANs wires go into the sea and if
those wires get broken. It involves a lot of hard work to fix those lines under the sea.
• Maintenance Issues: Once set up, maintaining a WAN network is a full-time job which
requires high tech skills of network supervisors and technicians.
➢ Metropolitan Area Network (MAN):
• Difficult To Manage: It is very difficult to manage if the size and number of LANs network
increase. This is due to security and extra configuration problems.
• Internet Speed Difference: As it cannot work on phone copper wires. Copper wires affect
the speed of MAN.So high cost is needed for fiber optics.
• Hackers Attack: In this network, there is a high risk of attacking hackers as compared to
LAN. So data may be a leak. Highly security staff is the need in MAN.

10

Technical Staff Requires to Set up: Highly technical people require to setup MAN. The
technical people are network administrators and troubleshooters.
• Need More wires: In MAN more than LAN network, cables require. As you know, it is a
combination of two LANs.
➢ Wireless LAN (WLAN):
• Proprietary solutions: slow standardization procedure lead to many proprietary solutions
only working in an homogeneous environment.
• Safety and security: using radio waves for data transmission might interfere with other
high-tech equipment .
• QoS: WLANs offer tipically lower QoS. Lower bandwidth due to limitations in radio
transmission (1-10 Mbit/s) and higher error rates due to interference.
• Cost: ethernet adapter vs wireless LAN adapters.
➢ Storage Area Network (SAN):

Not good for high traffic: If client computers need intensive data transfer then SAN is not
the right choice. SAN is good for low data traffic.
• Sensitive data may be leaked: As all the client computers share the same set of storage
devices so sensitive data can be leaked. It is better to not store sensitive data on this
network.
❖ Standars:
• Networking standards define the rules for data communications that are needed for
interoperability of networking technologies and processes. Standards help in creating and
maintaining open markets and allow different vendors to compete on the basis of the quality
of their products while being compatible with existing market products.

• During data communication, a number of standards may be used simultaneously at the


different layers. The commonly used standards at each layer are:

1. Application layer : HTTP, HTML, POP, H.323, IMAP


2. Transport layer: TCP, SPX
3. Network layer: IP, IPX
4. Data link layer: Ethernet IEEE 802.3, X.25, Frame Relay
5. Physical layer: RS-232C (cable), V.92 (modem).
Types of Standards
Standards are of two types:
• De facto: These are the standards that are followed without any formal plan or approval
by any organization. They have come into existence due to traditions or facts. For
example, the HTTP had started as a de facto standard.

De jure: These standards are the ones which have been adopted through legislation by
any officially recognized standards organization. Most of the communication standards
that are used today are de jure standards.
Standards Organizations

11
Some of the noted standards organizations are:

• International Standards Organization (ISO)


• International Telecommunication Union (ITU)
• Institute of Electronics and Electrical Engineers (IEEE)
• American National Standards Institute (ANSI)
• Internet Research Task Force (IETF)
• Electronic Industries Association (EIA)

P2 Explain the impact of network topology, communication and bandwidth requirements.


Network topology is the arrangement of different elements (links, nodes, etc.) of a computer network.
Mostly, it is the topological structure of a computer network, and can be described physically and logically.
The physical topology (physical topology) is the arrangement of various network components, including
the equipment storage and installation of the connecting cables, while the logical topology (topological
topology) indicates How data flows in a network. The distances between the network nodes, physical
intersections, transmission rates, or signal types may differ between the two networks even though their
topology may be identical.
There are 7 types of network topologies
• Star Topology:
The star network has all stations connected to a central device that receives signals from the
stations and transfers them to the destination station. Depending on network communication

12
requirements, the central equipment may be a switch, router, hub or central server. The role
of the central equipment is to establish Point to Point links.

The network setup is simple, it is easy to reconfigure the network (adding, removing
stations) and can control and troubleshoot quickly, and maximize the transmission speed of
the physical line. However, the line length connecting a station to the central equipment is
limited (within 100m, with current technology).

• Bus Topology:
All stations divide a common bus route. The main current is limited at the two ends by two
special connectors called end points. Each station is connected to the main shaft via T
connector or transceiver. The bus network model operates on Point to Multipoint or
Broadcast links. The backbone network is easy to design and has a low cost, but it has poor
stability, when it is difficult to detect, only one broken node will go down the entire network.

• Ring Topology:
On the network, the ring is transmitted in a single direction. Each station of the network is
connected to each other by a relay that receives the signal and then forwards to the next
station on the ring. Thus the signal is circulated on a loop in a successive sequence of Point
to Point links between transmitters. The ring network has advantages and disadvantages
similar to the star network, but the ring network requires a more complex network access
protocol than the star network. There are also mixed connections between such network
architectures as the Star Bus or Star Ring.

13
• Mesh Topology:
In this topology every node conected with each other node. It generally used in warreless
network. It need a large amount of overhead which very difficult to manage+

• Line Topology:
In a line topology—also known as daisy-chaining or bus topology—the host communicates
directly with all nodes through one bus line. A standard Ethernet device or switch can be
added to the end of the chain if desired and used as normal. Be aware that these devices will
compete for network bandwidth with the FieldDAQ device. Reliable system design requires
awareness of the bandwidth consumed by each device during operations. This topology
offers no redundant links.

• Tree Topology:

14
Tree topology is a special type of structure in which many connected elements are arranged
like the branches of a tree. For example, tree topologies are frequently used to organize the
computers in a corporate network, or the information in a database.

• Fully connected Topology:


Fully connected replication topology indicates that all database servers connect to each other
and that Enterprise Replication establishes and manages the connections. Replication
messages are sent directly from one database server to another. No additional routing is
necessary to deliver replication messages

P3 Discuss the operating principles of networking devices and server types.

There are 6 most popular network devices, including Repeater, Hub, Switch, Bridge, Router
and Gateway
➢ Repeater
In areas with large space, the signal transmission between hearing aids often decreases.
Computers that are far from the signal source will be weaker than nearby devices. Therefore,
you need devices that can amplify the signal, so that the signal can be transmitted farther but
stronger. Repeater is a device in layer 1 (Physic Layer) in the OSI model. When we use the
Repeater, the physical signal at the input will be amplified, thereby providing a stronger and
more stable signal for the output, to be able to reach farther locations. If you want to ensure
the speed of the connection with large office areas, or use in telegrams, information
transmission via fiber optic,…then you should choose Repeater.

15
Ex:
➢ Hub
Hub has many ports from 4 to 24 ports, and is considered as a multi-port repeater. When
information is transmitted to one hub port, the other ports also receive the information
immediately.
Currently there are 2 common types of hubs: Active Hub and Smart Hub:
• Active Hub: This type of Hub is much more commonly used, needs to be powered
when operating. Active Hub is used to amplify incoming signals and divide the
remaining ports to ensure the necessary signal speed when used.
• Smart Hub: also known as Intelligent Hub also has the same function as Active
Hub, but is integrated with a chip that can automatically detect errors on the network.

Ex:
➢ Switch
Working of Switch
• When switch receives data from one of the connected devices, it forwards data only to
the port on which the destination system is connected.
• Uses the Media Access Control (MAC) address of the devices to determine the correct
port.
• Refers to MAC table which stores MAC address with corresponding port number.

16
Frame Structure

• Multiple switches are useful in the network for redundancy and network expansion.
• Maximum number of ports available on switch are 48; this restricts the number of users
that can be connected to the switch.
• To include more users than the available ports on switch, another switch is required.
• This switch should be connected to the previous switch for the data transfer between
two segments.

Connecting Ethernet Segments – I

• Multiple switches are useful in the network for redundancy and network expansion.

• Maximum number of ports available on switch are 48; this restricts the number of users
that can be connected to the switch.

• To include more users than the available ports on switch, another switch is required.

• This switch should be connected to the previous switch for the data transfer between two
segments.

Connecting Ethernet Segments – II

• A crossover cable is required to connect two or more switches.

• Crossover ports are also known as uplink, in port or out port.

• Crossover cable allows you to connect two computers together using 1000Base-T NICs
without a switch in between.

Multispeed Switches
• Having number of ports such as 100 Base T and one or two gigabit ports
• Port detects the speed of NIC and runs at that speed is called auto sensing

17
• Port runs at 10, 100 or gigabit is referred to as 10/100/1000 port
Ex:

➢ Bridge
A bridge is a network device belonging to layer 2 of the OSI model (Data Link Layer).
Bridges are used to pair two networks to form a single large network. Bridges are commonly
used as a bridge between two networks. The bridge observes packets on all networks. When
a packet is transferred from one computer on one network to another on the network, Bridge
copies and sends this packet to the destination network.
Working mode of Bridge
The working mode of a bridge: compared with the OSI model, a bridge works on the basis
of class LLC, is the upper part of layer 2. Thus, it will have to implement the protocols below
this class for both networks to be able to switch messages back and forth. A bridge itself
does not have its own network address.

➢ Router
Similar to bridge
Routers are classified in the 3rd layer of the OSI model (Network Layer), which is
responsible for connecting two or more IP networks together.

Routers connect different types of networks, from high-speed local Ethernet to slow-speed
long-distance phone lines. But the Router's ability to work is slower than Bridge, because it

18
needs to calculate to find the way for the signal packets, especially when connecting to the
networks that are not at the same speed, it needs to work more.

Ex:
➢ Gateway
Gateway connects two networks with different protocols, such as networks using IP
protocols with networks using IPX, Novell, DECnet, SNA ... With computers in networks
using different protocols can be easy. Easily connect with each other.

The gateway is capable of distinguishing protocols and applications when transferring email
from one network to another, converting a remote session.
• The gateway has two sides, WAN side and LAN side.
• The WAN side connects to modem and therefore to the Internet via ISP and the LAN
side connects to the network via hub or switch. So, while configuring gateway you need
to configure both WAN and LAN sides.
• Firewall is a gateway device.

Ex:

server types
1. Application Servers
Sometimes referred to as a type of middleware, application servers occupy a large chunk of computing
territory between database servers and the end user, and they often connect the two.

19
2. Client Servers
In the client/server programming model, a server is a program that awaits and fulfills requests from client
programs in the same or other computers. A given application in a computer may function as a client with
requests for services from other programs and also as a server of requests from other programs.

3. Collaboration Servers
In many ways, collaboration software, once called ‘groupware,’ demonstrates the original power of the
Web. Collaboration software designed to enable users to collaborate, regardless of location, via the Internet
or a corporate intranet and to work together in a virtual atmosphere.

20
4. FTP Servers
One of the oldest of the Internet services, File Transfer Protocol, makes it possible to move one or more
files securely between computers while providing file security and organization as well as transfer control.

5. List Servers
List servers offer a way to better manage mailing lists, whether they be interactive discussions open to the
public or one-way lists that deliver announcements, newsletters or advertising.

6. Mail Servers
Almost as ubiquitous and crucial as Web servers, mail servers move and store mail over corporate networks
(via LANs and WANs) and across the Internet.

21
7. Proxy Servers
Proxy servers sit between a client program (typically a Web browser) and an external server (typically
another server on the Web) to filter requests, improve performance, and share connections.

8. Web Servers
At its core, a Web server serves static content to a Web browser by loading a file from a disk and serving
it across the network to a user’s Web browser. This entire exchange is mediated by the browser and server
talking to each other using HTTP.

9. Virtual Servers
In 2009, the number of virtual servers deployed exceeded the number of physical servers. Today, server
virtualization has become near ubiquitous in the data center. From hypervisors to hybrid clouds,
ServerWatch looks at the latest virtualization technology trends.

10. Telnet Servers

22
A Telnet server enables users to log on to a host computer and perform tasks as if they’re working on the
remote computer itself.

P4 Discuss the inter-dependence of workstation hardware with relevant networking software.

A workstation is a computer reserved for users or groups of users engaged in business or


professional work. It includes one or more high-resolution monitors and processors that
are faster than a personal computer (PC). A workstation also has greater multitasking
capabilities due to the addition of random access memory (RAM), disk space and disk
space. A workstation may also have a higher speed graphics adapter and more connected
peripherals. Workstations usually are built with an optimized design for complex data
manipulation and visualization.

Networking software
Network software is a fundamental element for any network. It helps administrators deploy, manage
and monitor a network. Traditional networks are made up of specialized hardware, such as routers
and switches, and network software packages into the solution. Software-defined networks (SDNs)
separate the software from hardware, making it easy to innovate and adapt the network to quickly
respond to changing network needs. Separating functions from hardware, such as firewalls or load
balancers, is called network functional virtualization (NFV).

Network software is not the same as software applications. The former exposes the inner workings
of the network to administrators, while software applications allow end users to perform specific
tasks. Network software is invisible to end users - it is simply used to facilitate those users to access
network resources seamlessly.

23
Network software allows multiple devices, such as desktops, laptops, mobile phones, tablets, and
other systems to connect to each other, as well as other networks. The Internet is a prime example
of a globally connected server and computer system based on network software to ensure end user
access.

P5 Design a networked system to meet a given specification


Introduce:

If I had to plan to build a 3-storey company network, I would present the network design of a 3-storey
building like this. Building: 3 floors, all computers and printers are on the ground floor outside the IT lab

-One lab is on the first floor and another lab is on the second floor. The network devices I use in this
design include: DNS server, FTP, DHCP, Mail server, syslog server, NTP, Web server and 6 Switches.

❖ Logical:

FIRST FLOOR including: internet, ASA, Cable-modem, Main server (right) and Staff (left)

24
SECOND FLOOR:

THIRD FLOOR:

Some types of PC, Switch, Router, Laptop and its price when used

➢ FIRST FLOOR will use the following types:

25
- 13 PC x 14.500.000 = 188.500.000 VNĐ
- 2 Router x 11.999.000 = 23.998.000 VNĐ
- 2 Switch x 22.909.000 = 45.818.000 VNĐ

FIRST FLOOR and SECOND FLOOR:

26
27
- 20 PC x 8.900.000 = 178.000.000 VNĐ
- 4 Switch x 19.527.000 = 78.108.000 VNĐ
- 2 Router x 7.062.500 = 14.125.000 VNĐ
- 150m Cable x 65.000 = 325.000 VNĐ
- 3 Printer x 2.690.000 = 8.070.000 VNĐ
➢ The total value of a building is: 536.944.000 VNĐ.

P6 .Test and evaluate the design to meet the requirements and analyse user feedback.
➢ performance test

Performance testing is defined as a type of testing software used to ensure software applications work
effectively within the expected workload of the application.

The features and functions of a software system are not the only concerns. The performance of a software
application such as response time, reliability, resource usage and its scalability is also remarkable.

The goal of Performance Testing is not to find bugs, it is an essential activity for developing
performance-optimization solutions for software. Performance testing helps us avoid unforeseen
situations before deploying applications in real-world environments.

➢ Stress Test

Involves testing an application on a workload that is too large to see how it handles high traffic or how it
handles data. The goal is to determine the limit of an application.

➢ Reliability Test

A type of test to verify that software is capable of performing an error-free operation for a specified
period of time in a specified environment. It is also about testing the reliability of that system. Example:
The probability that a computer in a store is up and running for eight hours without an error is 99% =>
this factor is called reliability.

➢ Scalability test

The goal of the test is to extend the application, to determine the effectiveness of the software application
when "expanding" to support increased user load, support for capacity addition planning system.

❖ General performance issues of a system


28
Most performance issues are about speed, response time, load time and poor scalability. Speed is often
one of the most important attributes of an application. A slow-running application will take time,
reducing user satisfaction with the system, possibly losing potential users. Performance testing is
performed to ensure the application runs fast enough to attract attention and attention as well as bring
satisfaction and satisfaction of users.

• Some performance issues


- Load time is too long: The load time is usually the initial time of an application to launch. This
should usually be kept to a minimum. Although some applications may not be able to perform the
download for less than a minute, the download time will be kept in seconds if it is best.
- Slow response time: Response time is the time required when a user enters data into an
application until the application gives feedback to that input. In general this will be very fast.
Again if users have to wait too long, they lose interest.
- Poor scalability: A software product with poor scalability cannot handle the expected number of
users or when it does not meet the range of users then load testing must be performed. to make
sure the application can handle the expected number of users.

P7 Implement a networked system based on a prepared design.

asm..pkt

P8 Document and analyse test results against expected results.


Performance test.
- I will access random computer, choose desktop and press Command Prompt.

29
Then I will enter the ping command on a computer that has a specific IP address. It’s like a way of
transferring data between devices and helps me know if the connection is good.

- Ping 192.168.10.1 and I have the result below.

- Ping 192.168.20.2 and I have the result below

30
31
References
[1] SearchNetworking. (2019). What is a LAN? - Definition from WhatIs.com. [online] Available at:
https://searchnetworking.techtarget.com/definition/local-area-network-LAN [Accessed 27 Dec. 2019].

[2] Computer Network Topology. (2019). Local Area Network | Advantages and Disadvantages of LAN
(2019). [online] Available at: https://computernetworktopology.com/local-area-network/ [Accessed 27
Dec. 2019].

[3] Openlca.org. (2019). [online] Available at: http://www.openlca.org/collaboration-server/ [Accessed 27


Dec. 2019].https://www.nhgeorgia.com/blog/network-server-types-explained-6

[4] Webopedia.com. (2019). Server Types - Webopedia.com. [online] Available at:


https://www.webopedia.com/quick_ref/servers.asp [Accessed 27 Dec. 2019].https://hocban.vn/web-
server-la-gi

[5] En.wikipedia.org. (2019). Network topology. [online] Available at:


https://en.wikipedia.org/wiki/Network_topology [Accessed 27 Dec. 2019].

[6] Yourownlinux.com. (2019). NETWORK SWITCH : Purpose and Functions. [online] Available at:
http://www.yourownlinux.com/2013/07/network-switch-purpose-and-functions.html [Accessed 27 Dec.
2019].

[7] DNSstuff. (2019). What is Network Topology? Best Guide to Types & Diagrams - DNSstuff. [online]
Available at: https://www.dnsstuff.com/what-is-network-topology [Accessed 27 Dec. 2019].

[8] Sophia. (2019). The Relationship Between Hardware and Software. [online] Available at:
https://www.sophia.org/tutorials/the-relationship-between-hardware-and-software [Accessed 27
Dec. 2019].

[9] Techblog của VCCloud. (2019). Performance Testing - Techblog của VCCloud. [online] Available at:
https://tech.bizflycloud.vn/performance-testing-kiem-thu-hieu-nang-
20180601110304363.htm?fbclid=IwAR1KhsxRzLjrciJkJhrDba5bdKXJQy3qBDhxFObXZsiVzGYvDuB
SxDs8WDQ [Accessed 27 Dec. 2019].

[10] Stackify. (2019). Performance Testing Types, Steps, Best Practices, and Metrics. [online] Available
at: https://stackify.com/ultimate-guide-performance-testing-and-software-testing/ [Accessed 27 Dec.
2019].
[11] Guru99.com. (2019). What is STRESS Testing in Software Testing? Tools, Types, Examples. [online]
Available at: https://www.guru99.com/stress-testing-tutorial.html#2 [Accessed 27 Dec. 2019].

[12] National Technical Systems. (2019). Failure Analysis - Root Cause Failure Analysis | NTS. [online]
Available at: https://www.nts.com/services/testing/failure-analysis/ [Accessed 27 Dec. 2019].

32

You might also like