Unit 2 Assignment Brief 1 1
Unit 2 Assignment Brief 1 1
Unit 2 Assignment Brief 1 1
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the
consequences of plagiarism. I understand that making a false declaration is a form of malpractice.
Student’s signature
Grading grid
P1 P2 P3 P4 P5 P6 P7 P8 M1 M2 M3 M4 D1 D2 D3
❒ Summative Feedback:
❒ Resubmission Feedback:
Submission format
Part 1
The submission is in the form of an individual written report. This should be written in a concise, formal
business style using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using the Harvard
referencing system. Please also provide a bibliography using the Harvard referencing system. The
recommended word limit is 2,000–2,500 words, although you will not be penalized for exceeding the total word
limit.
Part 2
The submission is in the form of an individual evidence portfolio. This assignment can be completed as a group,
but each student must produce their own portfolio, which will contain:
A fully completed test plan including an evaluation of results and recommendations for improvements to
LAN.
Part 3
You are required to make use of headings, paragraphs, subsections and illustrations as appropriate, and all work
must be supported with research and referenced using the Harvard referencing system.
Assignment Brief
You are employed as a Network Engineer by Nguyen Networking Limited, a high-tech networking solution
development company, which have branches in Hồ Chí Minh City, Hà Nội, Đà Nẵng and Cần Thơ.
The company has been contracted to implement a networking project from a local educational institute. The
specification of the project is given below:
People: 200 students, 15 teachers, 12 marketing and administration staff, 05 higher managers including the
head of academics and the program manager, 03 computer network administrators.
Resources: 50 student lab computers, 35 staff computers, 03 printers.
Building: 03 floors, all computers and printers are on the ground floor apart from the IT labs – one lab located
on the first floor and another located on the second floor.
As a first task, the CEO of the company Mr. Nguyen has asked you to investigate and explain networking
principles, protocols and devices and submit a report.
Part 1
You will need to produce a report that includes the following:
1. An introduction to provide an overview of your report.
5. Discussion on operating principles of networking devices and server types and networking software.
7. Explore a range of server types and justify the selection of a server, considering a given scenario
regarding cost and performance optimization.
8. For the given specification, identify the topology protocol for the efficient utilization of a networking
system.
The CEO Mr. Nguyen is happy with your first report and now he has asked you to analyze the specification
from the institution, as given earlier.
You need to design and implement the networking project within a given time frame:
3. Produce a test plan to evaluate this design for the requirements of bandwidth and cost constraints as per
user specifications.
4. Justify the security requirements and quality of services needed for selection of accessories.
2. Conduct verification with e.g. Ping, extended ping, trace route, telnet, SSH, etc.
3. Record the test results and analyze these against expected results.
4. Investigate what functionalities would allow the system to support device growth and the addition of
communication devices.
ASSESMENT CRITERIA
A LAN consists of connected workstations and personal computers, each capable of accessing and
sharing data and devices, such as printers, scanners and data storage devices, anywhere on the LAN.
LANs are characterized by higher data and data transfer rates and there is no need for leased lines.
https://www.techopedia.com/definition/5526/local-area-network-lan (1)
https://image.shutterstock.com/image-vector/lan-local-area-network-one-600w-1450373921.jpg
• Local area networks are typically installed in or around a house and can not spread to the wider area
• This costs more money to set up WAN for the first time in the office. Routers, switches, and extra security
software may be purchased.
The difference between LAN and WAN is that LAN has a small area of connection and WAN is consists of
multiple LANs connected to each other.
https://previews.123rf.com/images/sergeyvasutin/sergeyvasutin1708/sergeyvasutin170800105/85424239-
vector-red-wan-word-with-blue-linear-icons-on-white-background-round-web-banner-concept-of-wide-area.jpg
https://ars.els-cdn.com/content/image/3-s2.0-B9780124046276000075-f07-13-9780124046276.jpg
Network standard:
• • Gigabit Wi-Fi refers to the forthcoming 802.11ac Wireless LAN standard that enables data transfer rates of
433Mbps per spatial stream and up to 1.3Gbps for three (three) hardware antennas.
• Also sometimes referred to as "5 G Wi-Fi," Gigabit Wi-Fi operates only in the 5 GHz frequency range (where
there is far less potential for interference at the moment) compared to the 802.11n spec, which operates in both
5 GHz and 2.4 GHz. Gigabit Wi-Fi products, including 802.11n, will offer backward compatibility with previous
802.11 specifications.
https://1.bp.blogspot.com/-wCyt7C1_JpM/WpnWUqzx-
9I/AAAAAAAAAEk/fJ7HKFs35aUKaARdXJIpR5kJrZPW50_0ACLcBGAs/s1600/main-qimg-
7fcbfda26c33c2aa41403290410a3242-c.jpg
Advantages of Bus Topology
http://www.omnisecu.com/basic-networking/network-topologies-bus-topology.php
-Star Topology
In star topology, all the devices are connected to a single hub through a cable. This hub is the central node and all
others nodes are connected to the central node. The hub can be passive in nature i.e. not intelligent hub such as
broadcasting devices, at the same time the hub can be intelligent known as active hubs. Active hubs have
repeaters in them.
https://encrypted-tbn0.gstatic.com/images?
q=tbn:ANd9GcSc7f83Y9Rh2frFLaThfSKaG24xJ0za9HPadawhPoX70EXGXzXAFQ&s
Advantages of star topology
Centralized management of the network, through the use of the central computer, hub, or switch.
Easy to add another computer to the network.
If one computer on the network fails, the rest of the network continues to function normally.
Disadvantages of star topology
May have a higher cost to implement, especially when using a switch or router as the central network
device.
The central network device determines the performance and number of nodes the network can handle.
If the central computer, hub, or switch fails, the entire network goes down and all computers are
disconnected from the network.
https://www.computerhope.com/jargon/s/startopo.htm
Ring Topology
In this topology, it forms a ring connecting a devices with its exactly two neighbouring devices.
Advantages of Ring Topology:
Flow of data is in circular direction which minimizes the chance of packet collision.
The uni-directional ring topology provides very high speed.
It has better performance than bus topology, even when the nodes are increased.
Ring network can handle high volume of nodes in a network (Robust).
It can handle heavy traffic as compared to bus topology due to Token passing principal.
Ring topology provides good communication over a long distance.
The maintenance of ring network is much easier compared to the bus network.
There is no need of network server to control the flow of data.
Troubleshooting in ring network is much easier because cable faults can be easily located.
Ring network is less costly compared to the other topologies I.e. (mesh, hybrid, and tree topology).
Disadvantage of Ring Topology:
A single break in the cable can cause disturbance in the entire network
In Uni-directional Ring, a data packet (token) must pass through all the nodes.
Addition and removal of any node in a network is difficult and can cause issue in network activity.
Ring network is much slower than Ethernet network under normal load conditions.
https://computernetworktopology.com/ring-topology-advantages-disadvantages/
-Mesh Topology
In mesh topology, every device is connected to another device via particular channel.
https://i0.wp.com/computernetworktopology.com/wp-content/uploads/2019/03/tree-topology.jpg?
resize=688%2C544&ssl=1
Advantages of Tree Topology
It is a mixture of bus and star topology, as leaf nodes can add more nodes in the hierarchical chain, this
provides high scalability.
If one of their nodes gets damaged, other nodes in a network are not affected. This provides easy
monitoring and detection of faults.
Supported by a number of vendors of hardware and software.
For individual segments, point-to-point wiring.
Disadvantages of Tree Topology
Compared with star and bus topology, broad cabling is required.
The whole network breaks on the failure of a node.
It is very difficult to configure the tree network than other topologies of the network.
https://computernetworktopology.com/tree-topology/
-Hybrid Topology
This is simply a topology that refers to the case of the use of more than one topology. Ti is a
combination of the topology of stars and rings.
https://www.researchgate.net/profile/Zulfiqar_Ali58/publication/329420203/figure/fig2/AS:7004644
29547536@1544015142903/Hybrid-Network-topology.jpg
Advantages
Used to create larger networks It is easy to detect large volumes of fault
Disadvantages
It is difficult to install and configure more costly than other topologies.
The effect of current technology, connectivity and norms on the network:
OSPF: is a routing protocol that is commonly used either by a single network or a group network for a larger
network. It is planned by the task force for Internet Technology. It can also be used as a protocol for gateways.
FTP: File Transfer Protocol (FTP) is mainly a standard network protocol used to transfer data from client to host or
from server to server. When a user or administrator wants to upload a file to a website, they need a username,
password, and host address.
SMTP: Simple protocol for mail transfer is like a media that transfers e-mail. SMTP operates with POP3 support at
all times.
TCP / IP: a group of protocol stacks is the Transmission Control Protocol and the Internet Protocol. It's basically
different protocol towing. TCP / IP is intimately linked to FTP, SMTP, and HTTP.
-Data Communications
• Signal transmission
• Telephone line sending and receiving information
• Encoding, interfacing, signal integrity, multiplexing, etc. Networking
• Topology & architecture for interconnecting devices
• Communications system networks
Bandwidth:
Bandwidth is the ability of a wired or wireless network communication link to transmit, in a given amount of
time, the maximum amount of data from one point to another over a computer network or internet connection
— usually one second.
Bandwidth, synonymous with capacity, describes the rate of data transfer. Bandwidth is not a network speed
calculation — a common misconception.
Average load expected; peak load expected; availability of local internet; cost constraints, performance.
• Average load expected; peak load expected; availability of local internet; cost constraints, performance.
The effect of the criteria for network bandwidth:
• Bandwidth affects how long it takes for the Internet to download or upload information. A link with plenty of
bandwidth available offers a user experience that is seamless and sensitive. The more bandwidth available, the
quicker data can be transferred; furthermore, this imposes the rule of rising returns. Once you have enough
bandwidth, there is no further effect on Internet efficiency.
Hub:First is Hub, a Hub is a physical interface capable of connecting devices to share information. The
Hub will then send the message to the other devices that have linked to the Hub when a computer
sends a message to the Hub.
This is a very useful way of sharing information at work, especially in an office.
The system is the easiest and lowest priced.
Also known as the Repeater Multiport. Physical layer functions like Repeater.
Data transfer to all ports + Hubs
Hubs:- Cheap price
Also known as Multi-port Repeater-
Physical Layer works like Repeater-
Transfer of data for all connected ports
https://cdn.mos.cms.futurecdn.net/c49783c4a8e1ccd6691e1b50ba506b0d.jpg
Bridge:
A bridge is a type of computer network interface that connects to other bridge networks using the same
protocol.
Bridge devices work on the Open System Interconnect (OSI) model's data link layer, linking and interacti
ng between two different networks. Bridges are similar to repeaters and hubs, transmitting data to each
node.Nevertheless, bridges preserve the address table for media access control (MAC) as soon as new s
egments are found, and subsequent transmissions are sent to the receiver only.
http://alien.slackbook.org/blog/wp-content/uploads/2011/03/wrt54gl-300x211.jpg
Router: A router is an Internet-connected device that communicates with your home devices. A typical
home has a number of internet-connected devices— personal computers, laptops, smartphones,
printers, thermostats, smart televisions, and more. These devices form a network with your router. A
router is the easiest and most effective way to manage incoming and outgoing Internet traffic on that
network.
The information traveling on your home network
could be an email, a movie, or a live feed from your baby cam, each of which takes up varying amounts
of bandwidth. Making sure that information is delivered quickly3 and correctly is a big task — and
getting bigger.
Gateway: A gateway is a computer network node (router), a main stop point for data on its way to or
from other networks. We can connect and send data back and forth thanks to gateways. Besides
gateways (as well as a lot of other hardware and software), the Internet would not be used to us.
The gateway is the device in an office that routes traffic from a workstation to the external network that
supports the web pages. The gateway is the Internet Service Provider that gives you access to the whole
Internet for basic internet connections at home.
https://cdn.shopify.com/s/files/1/1439/1668/products/usg_03_1024x1024.png?v=1475833310
Server type:
Web
File
Database
Virtualization
Application servers Application servers also referred to as middleware, and often connect the two,
occupy a large chunk of computing territory between database servers and end user.
Client Servers
A server in the client / server programming model is a program that receives and fulfills requests from cli
ent programs on the same or other computers.
FTP Servers
File Transfer Protocol, one of the oldest Internet services, enables one or more files to be securely
transferred between computers while maintaining data security and synchronization and transfer
control.
List Servers
List servers offer a way to better manage mailing lists, whether they are shared sites open to the public o
r lists with one-way ads.
Mail Servers
Mail servers distribute and store mail across corporate networks (via LANs and WANs) and nearly as
omnipresent and essential as web servers across the Web.
Open Source Servers
Open source software is a critical part of many IT infrastructures, ranging from your basic open source
server operating system to cloud software that will help you do your job.
Proxy Servers
Proxy servers sit between a client program (usually a web browser) and an external server (usually another web
server) to filter requests, improve performance, and share connections.
Server Platforms
A term often used synonymously with the operating system, a platform is the underlying hardware or software of
the system and is thus the engine operated by the server.
Telnet Servers
A Telnet server enables users to connect to a host computer and perform tasks on the remote computer as if they
were running.
Virtual Servers
In 2009, the number of virtual servers deployed was higher than that of physical servers. Virtualization of the
server has become almost ubiquitous in the data center today. Server Watch examines the latest trends from
hypervisors to hybrid clouds in virtualization technology.
Web Servers
Definition: A computer running websites is a web server. It is a computer program that distributes as needed web
pages. The web server's basic goal is to store, process and provide users with web pages. Hypertext Transfer
Protocol (HTTP) is used to allow this intercommunication. Most of these web pages are static content, including
HTML documents, images, style sheets. Check and so on. In addition to HTTP, a web server also supports SMTP
(Simple Mail Transfer Protocol) and FTP (File Transfer Protocol) protocols for email, file transfer and storage.
Description: A web server's main role is to view the content of the website. If a web server is not publicly exposed
and used internally, it is considered an intranet server. When someone asks a website by adding the URL or
domain address to the address bar of a web browser (such as Chrome or Firefox) (such as
www.economictimes.com), the client sends a request to the Internet to access the correction. This address's web
page. A Domain Name Server (DNS) translates this URL to a Web Server address (for example 192.168.216.345).
P4 Discuss the inter-dependence of workstation
hardware with relevant networking software.
Network software is an extremely broad term for a range of software aimed at the design and
implementation of modern networks. Various types of network software support the creation,
calibration and operation of networks.
In using network software, the size and scope of a network plays a key role in decision making.
Companies or other parties can choose specific network software tools for setup and installation. Other
network software resources help administrators and security personnel to monitor a network to protect
it against a range of attacks, to prevent data breaches, or to limit unauthorized access. Other tools help
to make network operations work better.
Another category of network software is related to network virtualization. With new virtual networks,
various tools take the place of old legacy systems built on physical hardware setups.
In general, network software must be applied according to security needs. This can include factors such
as whether a network is attached to the global Internet as well as specific goals and objectives for use.
https://www.techopedia.com/definition/4317/network-software
2.Overview of hardware and software
Recall that information systems contain both hardware and software. Hardware is the part of an
information system you can touch — the physical components of the technology. Computers,
keyboards, disk drives, iPads, and flash drives are all examples of information systems hardware.
Software is the set of instructions that tells the hardware what to do. When programmers create
software programs, what they are really doing is simply typing out lists of instructions that tell the
hardware what 0are many types of application software as well. For example, word processing or
spreadsheet applications are productivity software, and antivirus programs installed on a computer are
an example of utility software.
3. The relationship between hardware and software
Essentially, computer software controls computer hardware. These two components are
complementary and cannot act independently of one another. In order for a computer to
effectively manipulate data and produce useful output, its hardware and software must work
together. Without software, computer hardware is useless. Conversely, computer software
cannot be used without supporting hardware. Similarly, computer software has to first be
loaded into the computer’s hardware and then executed. There are several categories of
software, with the two main categories being operating-system software, which makes the
hardware usable, and application software, which does something useful. Examples of operating
systems include Microsoft Windows on a personal computer and Google’s Android on a mobile
phone. Examples of application software are Microsoft Excel and Angry Birds.
https://www.sophia.org/tutorials/the-relationship-between-hardware-and-software
P5: Design a networked system to meet a given
specification.
This is my idea of a LAN.
First floor :i Have a Staff manager room and bussiness room 2 Switch and one severs and 3 admin pc , 8 pc and
3 printer
Third floor: I have student room . Room in student class have 22 pc and one switch
First floor
Software
Network configuration
Hardware
Tools
We need a clear plan and reasonable calculations to test this stage is quite complicated
Performance metrics are to be determined
response time.
Constraints.
State the conditions for successful operation.
Planning and performance test design
Calculate each circumstance and case if there is a sudden increase or decrease in the consumer
and data. Therefore, to handle each situation, we need two or more versions.
This test may takes 1 month or maybe longer depend on your resource.
Stress test:
Stress testing is described as a form of software testing to verify the system's stability and reliability.
This test primarily tests the machine under extremely heavy load conditions for its robustness and error
handling.
Distributed Stress Testing: Testing is done on all server clients in distributed client-server systems. Stress
server's function is to distribute a collection of stress tests to all stress clients and monitor the client's
status. The server adds the client's name and starts sending data for testing after the client contacts the
server.
Meanwhile, lient machines, meanwhile, send a signal or heartbeat that it is connected to the server. If
no signals from the client computer are provided by the server, it needs to be further examined for
debugging. A server may connect to the 2 clients (Client1 and Client2) from the figure, but it can not
send or receive a Client 3 signal.
Night run is the best way to run these scenarios for stress testing. Large server farms need a more
efficient method to assess which machines have suffered stress failures to examine.
System Stress Testing: This test focuses on identifying data locking and blocking vulnerabilities, network
problems and performance gaps in a system
Transactional stress testing: stress testing is conducted between two or more applications on one or
more transactions. It is used to fine tune and optimize the device
Exploratory stress testing: This is one of the methods of stress testing used to test the system for specific
criteria or situations that are unlikely to take place in a real scenario. It is used in unforeseen situations
such as:
Stress Testing process can be done in 5 major steps: • Planning the Stress Test: Here you collect data
from the system, evaluate the system, identify the stress test objectives. (this take about 1 day) • Create
Automation Scripts: You develop the automatic stress test scripts in this process, generate the test data
for the stress scenarios. (this • Script Execution: In this stage, you run the Stress testing automation
scripts and store the stress results. (this can take 2 to 3 day) • Results Analysis: After completion, the
results of the stress test are evaluated and bottlenecks are identified. • Tweaking and optimizing: at this
stage, you are fine-tuning the system, changing the configuration, optimizing the code with the desired
benchmark. (This also takes 2 days to make sure that everything is all right) Eventually, you run the
whole cycle again to determine that the desired results were accomplished through the changes. For
example, it is necessary to have 2 to 3 cycles of the stress test process to achieve the performance goals .
Failure Test It is a way to gauge the capacity of a system in order to ensure whether a system is capable
of allocating extra resource. The entire process is an effort to create a backup system. Failover Testing
aims to verify that a system is efficiently handling extra resource like additional CPU or servers during a
failure.
Step 1: Data Collection The first step in a root cause failure analysis is data collection. During this step,
NTS will collect information about how the device failed and when it occurred. We will also work with
you to determine your goals for the failure analysis examination, determine how the part should
operate, and consult with additional subject matter experts, if needed.(this may take 1day to complete
depend on the numbers of devices)
We will be conducting tests on the product being analyzed during this phase. Checking a representative
sample of failed devices and those that work properly is normal. This can help determine which
components will malfunction and when the failure will occur. If necessary, in checking for malfunction
analysis, we prefer non-destructive tests. It helps to provide the most accurate data for the consumer
and is more cost-effective. Sometimes the diagnosis of failure involves cross-sections of the material or
thermal monitoring. We carry out these tests later in the data collection process in these cases.
Step 2: Analyze Data Collected to Determine Root Cause Failure Determining the root cause of the
failure is the next step in the failure analysis process. Device failure is seldom the outcome of a single
incident. Our experience has shown that even a "fast" failure has multiple inputs. It means that there
are often different ways of preventing potential loss. Consider this example of an electronic device
failure. An organization has received customer complaints of a device short circuiting periodically and
contracts with NTS to conduct a root cause failure analysis. Electronic failure analysis tests show the
component short circuits because depending on where the metal in the part is located the metal used is
of the wrong hardness. (this will take 2 days)
Step 3: Determining Corrective Actions For most companies, the most important part of a root cause
deficiency report is assessing corrective actions. You will provide a comprehensive report on both the
causes and effects of system failure when using NTS for root cause analysis. NTS can also provide
recommendations for troubleshooting. (this only take 1 day)
In some cases, we find that failure occurs when customers use a device for too long or in the wrong
operating conditions. In these cases, our recommendations might include additional product education
for marketing and sales staff. These employees can then provide this information to customers. This
prevents device failures from improper use or application. We can also help you determine whether
corrective action is needed. It is inappropriate for some companies to determine the economic costs of
fixing unusual product failure. When system failure is uncommon and has minimal effects, it may be
more cost-effective to repair failed components than to alter the production process. Checking for
failure detection will give you the information you need to make an informed decision .
ToTal Time like 4 days
P7-quan-trong-2.pkt
I will first go to (pc 46) select (office) then select (command prompt)
then enter the ping + command line with the number I defined for the machine 35
I will choose PC0 on the 2nd floor instead of PC 35 to make sure I can ping each room and there are no
errors.
Steps similar to above and here will give the maximum results:
I will continue to check if I can connect to the Internet:
Here is the implementation:
I will choose pc46 as a template. First go to Pc46 and select the desktop, then select the web browser
Then enter the server address
Here's the result
After the performance test, I went to the Stess test.
The stages of the stress test are as follows:
I will choose any 2 -> (PC 52) (pc4)
then I go to PC52 to select the desktop, the next step select it (command prompt) and enter the
command line ping -t number PC4
I went to PC 14 to choose the desktop (command prompt), then I entered the ping command and the
number of computers defined for PC 26
I went to PC 0 to choose the desktop (command prompt), then I entered the ping command and the
number of computers defined for PC 37