You are on page 1of 157

lOMoARcPSD|23573241

Downstudocu.com
lan-design-implementation-for-syntax-solutions
HND in Computing (ESOFT Metro Campus)

Studocu is not sponsored or endorsed by any college or university


Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)
lOMoARcPSD|23573241

Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)

pg. 1
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

INTERNAL VERIFICATION – ASSESSMENT DECISIONS


Programme title

BTEC Higher National Diploma in Computing

Assessor Internal
Verifier

Unit 02: Networking


Unit(s)

Assignment title LAN Design & Implementation for SYNTAX SOLUTIONS

JESURASAN SAJEEVAN ANGEL (TRI/A -004511)


Student’s name
List which assessment Pass Merit Distinction
criteria the Assessor has
awarded.

INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded match


those shown in the assignment brief?

Y/N
Is the Pass/Merit/Distinction grade awarded
justified by the assessor’s comments on the
student work?

Y/N

Has the work been assessed


accurately?
Y/N

pg. 2
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Is the feedback to the student:

Give details:

• Constructive?

Y/N
• Linked to relevant assessment
criteria?
Y/N

• Identifying opportunities for


improved performance? Y/N

• Agreeing actions?

Y/N
Does the assessment decision need
amending?
Y/N

Assessor signature Date

Internal Verifier signature Date

Programme Leader signature (if required)

Date

Confirm action completed


Remedial action taken

Give details:

Assessor signature Date

pg. 3
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Internal
Verifier
signature Date

Programme Leader
signature (if
required) Date

pg. 4
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Higher Nationals - Summative Assignment Feedback Form


JESURASAN SAJEEVAN ANGEL (TRI/A -004511)
Student Name/ID
Unit 02: Networking
Unit Title
Assignment Number 1 Assessor
Date Received
Submission Date
1st submission
Date Received 2nd
Re-submission Date
submission

Assessor Feedback:
LO1 Examine networking principles and their protocols.

Pass, Merit & Distinction P1 P2 M1


Descripts

LO2 Explain networking devices and operations.

Pass, Merit & Distinction P3 P4 M2 D1


Descripts

LO3 Design efficient networked systems.


Pass, Merit & Distinction P5 P6 M3 D2
Descripts

LO4 Implement and diagnose networked systems.


Pass, Merit & Distinction P7 P8 M4 D3
Descripts

Grade: Assessor Signature: Date:

Resubmission Feedback:

Grade: Assessor Signature: Date:

Internal Verifier’s Comments:

Signature & Date:

pg. 5
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.

Assignment Feedback
Formative Feedback: Assessor to Student

Action Plan

Summative feedback

Feedback: Student to Assessor

Assessor Date
signature

Student Date
signature

pg. 6
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Pearson Higher Nationals in


Computing
Unit 02: Networking
Assignment 01

pg. 7
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

General Guidelines

1. A Cover page or title page – You should always attach a title page to your assignment. Use previous
page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.

Word Processing Rules

1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.

Important Points:

1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory
information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the
before mentioned compulsory information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will then
be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and
a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course

pg. 8
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

pg. 9
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct form. I further understand what it means to copy
another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of Pearson UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my own,
and where I have made use of another’s work, I will attribute the source in the correct way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Pearson, UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.

sajeevanangeloffi@gmail.com

Student’s Signature: Date:


(Provide E-mail ID) (Provide Submission Date)

pg. 10
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Higher National Diploma in Computing


Assignment Brief
Student Name /ID Number JESURASAN SAJEEVAN ANGEL (TRI/A -004511)

Unit Number and Title Unit 2: Networking

Academic Year 2021/22

Unit Tutor
Assignment Title LAN Design & Implementation for SYNTAX SOLUTIONS

Issue Date

Submission Date
IV Name & Date

Submission format

The submission should be in the form of an individual report written in a concise, formal business style
using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using Harvard
referencing system. Please also provide an end list of references using the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures, although
you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:

LO1 Examine networking principles and their protocols.

LO2 Explain networking devices and operations.

LO3 Design efficient networked systems.

LO4 Implement and diagnose networked systems.

Assignment Brief and Guidance:

pg. 11
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Scenario

SYNTAX SOLUTIONS is a privately owned, well-known Software company located in Colombo. The
Management of SYNTAX SOLUTIONS has purchased a 3-story building in the heart of Matara. They are
planning to make it one of the state-of-the-art companies in Matara with the latest facilities.

It is expected to have nearly 150 employees in Matara branch.

Department Number of Users

Customer Care 10

Sales and Marketing 20

Finance 25

Legal 5

HR 10

Developers 55

Network Team 5

Server Room Servers +ISP connections

Fo ll owi ng r eq u ir ements ar e given b y th e Man ag emen t.


 All the departme nts mus t be s ep ar ated with u niq u e s u b n et and should not
c ommunic ate with eac h other u n les s th er e is a s pecial r eq uir emen t .

 192.16 8.10.0/24 is given and should be used for all the departme nts exc ept the
serve r room. IPs sho uld assign u s ing DHCP.

 ERP an d CRM Syst ems need to be implemente d in M atara branc h in loc al servers.

 Nu mb er of s er ver s r eq u ir ed for th e Ser ver r o om need to be dec ided by the Network

pg. 12
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

designer and should be ass igned with 10 .254.1.0/24 subnet. (Uses s tatic IPs )

 High lev el o f r ed u n d an cy is expec ted in ne twork design to elim inate single point of
failures a nd traffic bottle nec ks.

 Sales an d Mar keti ng Team ne ed to ac c ess Network resourc es u si ng WIFI


c onnec tiv ity.

 Pr o p er meth o d s for netwo r kin g mo n ito r ing and tr o u bl es h o otin g need to be


establis hed.

 All pos sible n etwo r k s ecu r ity mec hanisms should be im plemented.

Assume you have been appo inte d as t he ne w network c onsult ant of SYNTA X SOL UTI ON S.
Prepare a network arc hitec t ural design and implement it with yo ur sugge stio ns and
rec ommendations to meet the com pany requirements.

(Note : Cle arly sta te y our assumptions. You a re allowed to de sign the ne two rk accordin g
to y ou r a ssumptions, but main re qui reme nts should not be v iol ate d)

A ctiv ity 01

 Disc uss t he benefits and c onstraints of different network system type s that c an be
implemented in the M atara branc h and the mai n IEEE Ethernet standards that c an be
used in above LAN and WL AN design .

 Disc uss the im po rtanc e and impac t of netwo rk topo lo gies and network protoc ol
suites w hile c omparing the main net wo rk topologies and network protoco l suites that
are used in networ k des ign using examples. Rec ommend suitable network topolo gies
and network protoc ol suites for abo ve sc enario and j ustify your answer with valid
points.

pg. 13
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

A ctiv ity 02
 Disc uss the operating princ iples of network devic es (Ex: Router, Sw itc h, Etc .) and server
types that can be used for above sc enario while exploring different servers tha t are
available in today’s market with their spec ific ations . Rec omme nd server/se rvers for the
above sc enario and j ustify your se lec tion with valid points .

 Disc uss the inter-dependenc e of workst ation hardware with netwo rking software and
provide examples fo r networking so ftware that c an be use d in above ne twork design.

A ctiv ity 03

 Pr ep ar e a wr itten netwo r k d es ign p lan to meet th e abo ve m entio n ed u s er


r eq ui r em ents in clu d in g a b lu ep r in t d r aw n u s in g a mo delin g to o l. (Ex: Micr o s o ft Visi o ,
Ed r awMax).

Su pp o r t y o ur ans wer b y p r ovi din g th e VL A N an d IP s u b n ettin g s ch eme fo r th e ab o ve


s cen ari o an d th e lis t o f d evices , n etwo r k co mp o nen ts and s o ftwar e us ed to d esign the
n etw o r k for ab o ve s cenar io an d w h ile ju s tifyi ng y ou r s electio ns .

 Tes t an d eval u ate the p r o p os ed des ign to meet th e r eq u ir emen ts an d analys e u s er


feed b ack b y u s ing a Us er feed b ack fo rm.

 Install and configure Netwo rk servi ces , devic es and applic ations (Ex: VLAN,D HCP,
DNS,Proxy, Web, E tc .) ac co rding to the proposed design to ac c ompl ish the user
requirements and design a detailed M aintenanc e sc he dule for abov e Network.

pg. 14
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

*No te: - Scr een s h o ts o f Co n figu r ati on s cr ip ts s h o uld b e p r es ented .

A ctiv ity 04
 Implement a networked system based on your prepared design wit h v alid evidenc e s and
rec ommend potential future enhanc ements fo r the ne tworked system with valid
j ustific ations to yo ur rec ommendat ions . Use cr itic al reflec tion to c ritic ally evaluat e the
design, plan, c onfiguration, and testing of your network while j ustifying with valid
c onc lus ions.

 Develo p test c ases and conduc t verific ation (E x: Ping, exte nded ping, trace ro ute ,
telnet , SS H, etc .) to test the abo ve Network and analyse the test results against the
expec ted results.

pg. 15
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

pg. 16
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Grading Rubric

Grading Criteria Achieved Feedback

LO1 : Examine networking principles and their protocols.

P1
Discuss the benefits and constraints of different network types
and standards.

P2
Explain the impact of network topology, communication and
bandwidth requirements.

M1
Compare common networking principles and how protocols
enable the effectiveness of networked systems.

LO2 : Explain networking devices and operations

P3
Discuss the operating principles of networking devices and
server types.

P4
Discuss the inter-dependence of workstation hardware with
relevant networking software.

M2
Explore a range of server types and justify the selection of a
server, considering a given scenario regarding cost and
performance optimization.

LO 1 & LO2

pg. 17
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

D1 Critically evaluate the topology protocol selected for a given


scenario to demonstrate the efficient utilisation of a networking
system.
LO3 : Design efficient networked systems

P5
Design a networked system to meet a given specification.

P6
Test and evaluate the design to meet the requirements and
analyze user feedback.

M3
Install and configure network services and applications on your
choice.

D2
Design a maintenance schedule to support the networked
system.

LO4 : Implement and diagnose networked systems

P7
Implement a networked system based on a prepared design.

P8
Document and analyze test results against expected results.

M4
Recommend potential enhancements for the networked
systems.

D3
Use critical reflection to evaluate own work and justify valid
conclusions.

pg. 18
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Acknowledgement

I would like to express my special thanks of gratitude to my lecture (mr.safran) as well as our
head (mr.dewanath) who gave me the golden opportunity to do this wonderful assignment on
the topic (network), which also helped me in doing a lot of Research and I came to know about
so many new things I am really thankful to them.
Secondly i would also like to thank my parents and friends who helped me a lot in finalizing
this project within the limited time frame.

Your faithful student

Sajeevan angel

pg. 19
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Acknowledgement ................................................................................................................... 19

Activity 01................................................................................................................................. 26

Network ...................................................................................................................................26

Examples of network topologies .............................................................................................27

Computer Network Types ........................................................................................................ 28

1. LAN ....................................................................................................................................... 28

2. MAN ..................................................................................................................................... 31

3. WAN ..................................................................................................................................... 34

PAN (personal area network): ................................................................................................. 36

Campus Area Network (CAN)................................................................................................... 43

Enterprise Private Network (EPN) ...........................................................................................44

1.1.3 ...... The main IEEE Ethernet standards that can be used in above LAN and WLAN
design........................................................................................................................... 45

IEEE Ethernet standards........................................................................................................... 45

1.1.3.2IEEE 802 ....................................................................................................... 47

IEEE Ethernet standards for LAN..............................................................................................47

IEEE Ethernet standards for WLAN .......................................................................................... 48

Discuss the importance and impact of network topologies and network protocol
suites while comparing the main network topologies and network protocol suites
that are used in network design using examples. Recommend suitable
networtopologies and network protocol suites for above scenario and justify your
answerwith valid points............................................................................................... 48

What is network topology?...................................................................................................... 48

Types of network topology ...................................................................................................... 49

Bus Topology ............................................................................................................................ 50

Ring Topology........................................................................................................................... 52

Dual Ring Topology .................................................................................................................. 53

pg. 20
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Star Topology ........................................................................................................................... 55

Tree Topology .......................................................................................................................... 56

Mesh Topology......................................................................................................................... 59

Hybrd Topology ........................................................................................................................ 60

1.2.2.1Ethernet topology 63

1.2.2.2Fast-Ethernet topology ................................................................................................. 64

1.2.2.3Giga-Ethernet topology ................................................................................................65

1.2.2.4Virtual LAN ....................................................................................... 67

Compare common networking principles and how protocols enable the


effectivenesof networked systems.............................................................................. 68

Network protocols ................................................................................................................... 68

Classification of network protocols ......................................................................................... 70

Activity 02................................................................................................................................. 81

Discuss the operating principles of network devices (Ex: Router, Switch, Etc.) and server
types that can be used for above scenario while exploring different servers that are available
in today’s market with their specifications. Recommend server/servers for the above
scenario and justify your selection with valid points. .............................................................81

Discuss the operating principles of networking devices and server types. ............................. 81

Network Devices and Their Types ...........................................................................................81

What are Network Devices? .................................................................................................... 81

Types of Network Devices........................................................................................................ 82

Network Hub ............................................................................................................................ 82

Active Hub ................................................................................................................................ 83

Passive Hub .............................................................................................................................. 83

Network Switch........................................................................................................................ 83

Modem ..................................................................................................................................... 84
pg. 21
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Network Router .......................................................................................................................84

Bridge ....................................................................................................................................... 85

Repeater................................................................................................................................... 85

Gateway ................................................................................................................................... 86

exploring different servers that are available in today’s market with their
specifications. Recommend server/servers for the above scenario and justify your
selection with valid points. .......................................................................................... 87

What is a server? .....................................................................................................................87

How a server works.................................................................................................................. 89

Types of servers ....................................................................................................................... 89

File servers ............................................................................................................................... 90

Print servers ............................................................................................................................. 90

Application servers ..................................................................................................................90

DNS servers .............................................................................................................................. 90

Mail servers .............................................................................................................................. 90

Web servers ............................................................................................................................. 91

Database servers ...................................................................................................................... 92

Virtual servers .......................................................................................................................... 92

Proxy servers ............................................................................................................................ 92

Monitoring and management servers ..................................................................................... 92

Server structures ...................................................................................................................... 93

Mainframe or minicomputer (AS/400) .................................................................................... 93

Computer hardware server......................................................................................................93

Blade servers ............................................................................................................................ 93

Combining servers ...................................................................................................................94

Virtual servers .......................................................................................................................... 94

pg. 22
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Examples of server operating systems .................................................................................... 94

Microsoft Windows servers ..................................................................................................... 94

Linux / Unix servers .................................................................................................................. 95

NetWare ................................................................................................................................... 95

Cloud servers............................................................................................................................ 95

Components of a server computer .......................................................................................... 95

Motherboard: ..........................................................................................................................96

Processor:................................................................................................................................. 96

Intel Processors ........................................................................................................................ 97

Memory:................................................................................................................................... 97

Hard drives: .............................................................................................................................. 97

Network connection: ............................................................................................................... 97

Video: ....................................................................................................................................... 97

SERVER OPERATING SYSTEMS ................................................................................................. 98

Choosing the right server ......................................................................................................... 98

Server available in market ....................................................................................................... 99

CONCLUSION .......................................................................................................................... 112

Discuss the inter-dependence of workstation hardware with networking software


and provide examples for networking software that can be used in above network
design. ........................................................................................................................ 113

Activity 03............................................................................................................................... 117

3.1 ............Prepare a written network design plan to meet the above mentioned user
requirements including a blueprint drawn using a modeling tool. ........................... 117

Project scope .............................................................................................................117

software used to design the network(Edraw) ........................................... 120

Test and evaluate the proposed design to meet the requirements and analyse user
feedback by using a User feedback form. ................................................................. 121
pg. 23
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Responses .................................................................................................................. 124

Install and configure Network services, devices and applications (Ex: VLAN, DHCP,
DNS, Proxy, Web, Etc.) according to the proposed design to accomplish the user
requirements and design a detailed Maintenance schedule for above Network ....126

Configure VLAN ...................................................................................................................... 126

VLAN 2 .................................................................................................................................... 128

VLAN IP ADRESS ..................................................................................................................... 129

Configure Telnet ....................................................................................................................131

Configure SSH......................................................................................................................... 132

Server Install Services ............................................................................................................ 134

Configure DHCP Server .......................................................................................................... 140

Configure HTTP Server ........................................................................................................... 141

Maintenance schedule...............................................................................................142

Systems ...................................................................................................................... 142

Server Maintenance ............................................................................................................... 142

Why is server maintenance important? ................................................................................ 142

Server statistics ...................................................................................................................... 142

Server Maintenance ............................................................................................................... 143

2. Check disk usage. ............................................................................................................... 143

3. Monitor RAID Alarms. ........................................................................................................144

4. Update Your OS. ................................................................................................................. 144

5. Update your Control Panel. ...............................................................................................144

6. Check application updates. ................................................................................................ 145

7. Check remote management tools. ....................................................................................145

9. Check server utilization. ..................................................................................................... 145

10. Review user accounts. .....................................................................................................145

pg. 24
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

11. Change passwords. ..........................................................................................................145

12. Check system security. ..................................................................................................... 146

SYSTEM MAINTANCE ................................................................................................. 146

Network Maintenance ............................................................................................... 146

Activity 04............................................................................................................................... 149

Implement a networked system based on your prepared design with valid evidences and
recommend potential future enhancements for the networked system with valid
justifications to your recommendations. Use critical reflection to critically evaluate the
design, plan, configuration, and testing of your network while justifying with valid
conclusions............................................................................................................................. 149

Network design cisco pocket tracer ......................................................................................149

ping......................................................................................................................................... 150

Extended ping (-t) ..................................................................................................................150

trace ....................................................................................................................................... 152

telnet ...................................................................................................................................... 152

SSH .........................................................................................................................................153

Test report .............................................................................................................................153

Conclusion .............................................................................................................................. 154

References .............................................................................................................................155

pg. 25
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Activity 01

Discuss the benefits and constraints of different network system types

Network

A network is a collection of computers, servers, mainframes, network devices, peripherals, or


other devices connected to one another to allow the sharing of data. An example of a network
is the Internet, which connects millions of people all over the world. To the right is an example
image of a home network with multiple computers and other network devices all conn
ected.

FIGURE 1 https://www.computerhope.com/jargon/n/network.gif

pg. 26
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Network topologies and types of networks

The term network topology describes the relationship of connected devices in terms of a
geometric graph. Devices are represented as vertices, and their connections are represented as
edges on the graph. It describes how many connections each device has, in what order, and it
what sort of hierarchy.

Typical network configurations include the bus topology, mesh topology, ring topology, star
topology, tree topology and hybrid topology.

FIGURE 2 https://www.computerhope.com/jargon/n/nettopo.gif

Examples of network topologies

pg. 27
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Most home networks are configured in a tree topology that connects to the Internet. Corporate
networks often use tree topologies, but they also often incorporate star topologies, and an
Intranet.

Computer Network Types

A computer network is a group of computers linked to each other that enables the computer to
communicate with another computer and share their resources, data, and applications.

A computer network can be categorized by their size. A computer network is mainly of four
types:

Computer Network Types


LAN(Local Area Network)
PAN(Personal Area Network)
MAN(Metropolitan Area Network)
WAN(Wide Area Network)

1. LAN

The full form of LAN is the ‘Local Area Network. ‘ As the name suggests, it connects the
computers by covering the local area within 10m to 1.5 km. Since it covers a small local area,
you will find LAN in local places like offices, colleges, schools, groups of buildings, business
organizations.

This network is managed and used by one person or one small organization. This network is
used for resource sharing, data storage, document printing by connecting devices like printers,
scanners, projectors, and other storage components.

pg. 28
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

In (LAN, WAN, and MAN), The LAN often connected via Ethernet cables and Wi-Fi also
Token Ring and Fiber Distributed Data Interface, or FDDI, TCP/IP are the most common
protocol that is used in this network.

When you share your internet connection with someone else, such sharing is also an example
of LAN. The smallest LAN can be made up of only two computers.

The transmission rate of LAN ranges from 4Mbps to 16Mbps and can maximize up to 100
Mbps. For the interconnection of the host in LAN, we can use any type of network topology
which meets the need of the network such as a bus or ring topology.

In a LAN, we can connect up to 1000 computers. Most LANs are used in wire connections.
But nowadays, it is also being used without wire, i.e., in wireless connections. The bonus point
of this network is its high speed, lower expenses, and security.

Figure 3 https://digitalworld839.com/wp-content/uploads/2020/07/LAN-Local-Area-
Network-1-768x644.jpg

Features of LAN:
The network capacity of a LAN is limited to a single room and small geographical areas like
homes, small firms, and offices.

The LAN has the advantage of high speed for data transfer.

pg. 29
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

File transfer and recovery are more manageable in a LAN network because backup files are
stored in a server.

It has no connection with the external system, which ensures privacy.

The LAN network is a private network, it doesn’t own by any government bodies.

The network ranges from 1m to 1.5km.

Uses of LAN:

LAN often use as a local network at home for sharing data as well as on-campus of a college
and school. Similarly, LAN is used as an intranet for business organizations via wifi.

Advantages of LAN

Resource Sharing: Unlimited data sharing via computer resources such as printers, DVD-
ROM, modems, drives, and hard disks with local area networks; this reduces costs.

Software Applications Sharing: It is cheaper for each client to use the same software on the
network instead of buying separately licensed software.

Easy and Cheap Communication: Communication will be handy and economical because data
and messages can be easily transferred to networked computers.

Centralized Data: All the data of users is saved on the server’s database, one should not worry
about losing the data and documents. Since there is a backup option to avoid such errors.

Security Level: Intermediate.

pg. 30
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Internet Sharing: Local area network facilitates the sharing of a single Internet connection
among all the users who are connected with the LAN.

Disadvantages of LAN

Setup Cost: Although LANs will save costs over time due to sharing computer resources, the
initial cost of establishing a local area network is a bit expensive.

LAN Maintenance: Local area networks require a LAN administrator for handling software
installation, wiring setup, hardware failures, or cable malfunctions.

Server Load: If the server is not very good, it cannot overload many computer connections,
which can cause damage.

Security: There is a risk of insecurity because hackers can enter the system. Similarly, viruses,
malware can also enter into a LAN it can damage all those that are connected.

Covers Limited Area: The local area network is limited covers only a small area such as a
home, an office, a building, or a cluster of nearby buildings.

2. MAN
The Full form of MAN is the ‘Metropolitan Area Network.’ The WAN is a superior version of
the LAN network, often used in cities and other locations covering a range of 5-60 km to
transfer data at high speed.

MANs are high-speed connection networks because It is an extensive network by connecting


several LANs into a single large network with a common bridge.

pg. 31
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Under this network of MAN, two or more local area networks are connected. That bridge is
called backbone lines which usually established by optical cable and twisted pair cables to
boost data transfer speed.

This network connects all the prominent colleges, schools, and government offices, business
organizations in the city. Thus, we can say that a MAN network is made up of multiple LANs.

The best example of a MAN is Cable TV situated in the middle of a city, as its cable spreads
throughout the city, and the user uses the service through the cable network.

A big business organization has its own MAN. Through which it connects to a different branch.
If such networks start being used on a college campus, they call it a CAN (campus area
network).

MAN can be considered as a group of one or more LAN networks connected together through
a single cable. RS-232, X-25, Frame Relay, and ATM are the common protocol practice for
communication in MAN.

Figure 4
https://digitalworld839.com/wp-content/uploads/2020/07/MAN-Metropolitan-Area-
Network-1-min.jpg

pg. 32
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Features of MAN:

The network coverage of MAN is more massive than LAN but smaller than WAN.

It is bounded in large geographical areas such as a town, city.


The data transmission speed is moderate.
Its ownership can be public or private parties.
The network ranges from 5 to 60km.

Uses of MAN:

MAN used in various government bodies, police stations, private firms that are situated within
a city. The officers, employees can easily communicate either with each other or between
their departments and branches in order to pass the important data and message quickly over
this network without any need for the Internet connection.

Thus it provides various resource sharing over a large distance in the city than the LAN
networks.

Advantages of MAN

MAN provides high-speed communication via fiber optic cable.

This provides a good backbone for large networks and gives WANs more access.

It serves many towns and cities and thus provides great inter-connectivity in large areas at a
low cost.

The dual bus used in MAN helps in the transmission of data in both directions simultaneously.

Disadvantages of MAN

MAN needs more cables from joining connections from one place to another.

pg. 33
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Greater will be the cable length, the more will be the cost of establishing the MAN.

At such a big distance anyone can hack the network. One can’t put security at each point of
the network in the widespread areas, hence it becomes easier for unwanted people to access
it for their own benefits.

It is difficult for the system to protect from the graphical areas of hackers and industrial
espionage.
3. WAN

A WAN full-form is ‘Wide Area Network. ‘ A WAN is used to connect computers that are not
close to one another. It is the collection of many LANs with a much more extensive range than
LAN and MAN.

In LAN, WAN, and MAN, the WAN network’s geographical periphery is more widespread
such as a network of systems spread across the entire city, country, or even continent.

This network connects has similar structures, as LANs and MANs. Most WANs are public
networks, like the phone line and satellites, telephone systems, or leased lines.

Generally, fiber optic cable is used as a medium for transmission in WAN. This network works
on physical, data-link, and network layers of the OSI Reference Model.

Devices involved for the transmission of data, images, video, big database, and files in the
connection of WAN more diversified, ranging from routers to switches, bridges, firewall
modems, and so on.

Some of the most common WAN protocols in use today are Frame Relay, X-25, Integrated
Services Digital Network, or ISDN, and Point-to-Point Protocol, or PPP.

An example of the largest WAN is the Internet. Through the Internet, people can connect from
one place or other computers or users anywhere in the world. It is implemented by a public
broadcasting system.

pg. 34
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Figure 5

https://digitalworld839.com/wp-content/uploads/2020/07/WAN-Wide-Area-Network-
768x644.jpg

Features of WAN:

It is generally used for voice and data for mobile and landline phone applications.

A large number of people can communicate with one another in this single network.

Its data transmission speed fluctuating sometimes slow or even very fast.
The network range or coverage area of a WAN is more massive, from which we can transfer
the data across the world.
Uses of WAN:
The WAN networks are used for military services. There is a satellite method of transmission
is used in this setup. WAN is used in this field for the communication and operation of the
military with high security.

Airlines and Railways use WAN networks for booking tickets from anywhere in the country.
The is done because client nodes are situated all over the country and are connected to a
centralized server to one network.

Advantages of WAN

pg. 35
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

It covers a large geographic area so that long-distance businesses and companies are able to
connect on a single network.
Shares software and resources with connecting workstations.
Messages can be sent very fast to someone else on the system, the rate of transmission is very
high even if we send large-sized files of more than 10 MB.
Everyone on the network can use the same data. This avoids problems where some users may
have older versions of information than others.
All clients associated through WAN will stay in synchronization with each other constantly,
accordingly, there will be no odds of a correspondence hole between them.

Disadvantages of WAN

A good firewall is needed to prevent anonymous hackers from hacking the data and disrupting
the network.
Setting up a network is very expensive, slow, and complicated. The more comprehensive the
system, the more expensive it.
There is a need to appoint technicians and supervisors for the full-time maintenance of
connections.

There is a need to spend many expenses for security purposes.

PAN (personal area network):

A personal area network (PAN) is a computer network organized around an individual for
personal use only. They typically used for connecting different devices like smartphones,
tablets, printers, computers, and other digital devices within the environment of an individual
user (typically within 10 meters or 33 feet).
Personal Area Network is used for a personal purpose like for data sharing among devices
within the personal area network range of 10 meters or 33 feet. For Example, If a computer is
connected with the printer, scanner, and digital camera within the range of 33 feet then it is
known as Personal Area Network.

pg. 36
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Figure 6 Personal Area Network


https://907162.smushcdn.com/2195243/wp-content/uploads/2021/02/network-types-
PAN-diagram.jpg?lossy=0&strip=1&webp=1

Advantages of personal area network:

1. In PAN no extra space requires.


2. No need of extra cable and wire.
3. Used in office, conference, and meetings
4. It is used in TV remotes, AC remotes, etc.
5. Data can Synchronize between different devices.
6. Connect to many devices at a time
7. No extra space requires.
8. Affordable Cost.
9. Portable

10. Easy to use:

11. Reliable:
12. Secure:

1.1.2.12 Disadvantages of personal area network:


1. PAN can be operated in less range of areas.

pg. 37
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

2. Can only be used for personal area


3. Slow data transfer
4. Interfere with radio signals:
5. Infrared signals travel only in a straight line

SAN (storage area network):

It is a dedicated high-speed network particularly used for data storage. This network is built
with servers, switches, fiber optic cables, and storage devices. In this system, the storage
devices are not directly connected to the servers.

Rather, storage devices are connected to the servers through switches. And, optical fibers are
used for the connection. Due to that, the data transfer speed of a SAN is very high. And for that
very reason, servers and the Operating System sees the hosted data or storage devices as local
disk drives.

It also implies that SAN provides access to only block-level operations and consolidated data
even though there are multiple storage devices and servers. And, like all the other data storage
solutions, SAN also has its good and bad sides. In this post, we will let you know what are the
benefits and drawbacks of using a SAN (Storage Area Network).

Figure 7 Storage Area Network

pg. 38
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

https://907162.smushcdn.com/2195243/wp-content/uploads/2021/02/types-of-networks-
SAN-diagram-storage-area-network.jpg?lossy=0&strip=1&webp=1

1.1.2.14 Advantages of storage area network:

1. Security
If you want to keep your data secure, then you should opt for using SAN. You can implement
various types of security measures on a SAN easily. For instance, you will be able to isolate
the users, organizations, or departments with the help of a virtual SAN.
You can also implement ACL (Access Control List) within the switches to make sure that only
the authenticated users can join. Other than these, there are a lot of other steps you can take for
securing the SAN. So, all of your data on the SAN are secured.

2. High-Speed Data Transfer


If you are annoyed with the slow data transfer rate of your storage network and storage devices,
then you would love using SAN. As SAN technology uses fiber optics to transfer the data, it
can transfer data with the speed of over 5 Gbps. It is one of the fastest data transfer network
technologies till date.

3. Failover Protection (Dynamic)

SAN offers automatic continuous network operation. It doesn’t matter if one or a few of the
servers go offline or fail. The automatic traffic rerouting function and built-in redundancy
would take over whenever a server failure happens. As a result, your storage network will be
always up. This dynamic failover protection comes in handy while you need to do maintenance
work on any of the servers.

pg. 39
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

4. Centralized Backup
SAN stores data at the block level. And, all of the data in a SAN is centralized. That means,
the data will be automatically replicated and it will be stored on a central location. So, even if
a server disconnects or goes off in the network, then all the other servers take control and
stabilize the data load. As a result, the data transfer on the SAN stays uninterrupted.

5. Faster and Cheaper Backup


We have just told you that SAN uses a centralized backup process. One can automate the entire
data backup process using centralized backup technology. That way, all of the data of your
storage network will be automatically backed up almost instantly.
It is also cheaper than using any other type of storage network. So, if taking a backup of your
data takes too long and you want to improve it, you can use SAN or Storage Area Network.

6. Better Disk Utilization


Another great advantage of using SAN is better disk management. As all of the storage arrays
are connected via a centralized storage network, all these can be managed as a single unit. So,
you can individually manage and assign the storage at the network level to the particular servers
that need it. Otherwise, without a SAN, you had to buy multiple individual storage disks and
insert them in servers one by one. Whereas using a SAN removes all these obstacles in disk
management.

7. High-end Disaster Recovery


In a SAN facility, you can implement industry-leading disaster recovery systems. Typically,
SAN will have a secondary storage array that ensures faster and easier data backup. So,
whenever a disaster hits you will have a backup of your data and it can be easily recovered
when it is necessary.
Although, it is true that implementing a disaster recovery system for a SAN is expensive. But,
you will thank yourself for implementing disaster recovery as you will be able to get back all
the lost data via the Disaster Recover feature.
8. Better Availability of Your Data and Applications
SAN or Storage Area Networks are made in a way that these are meant to never go down or
fail. This network storage technology uses lots of failsafe solutions to protect your data. As a
pg. 40
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

result, you will always get access to the data and applications that are necessary for you or your
organization. SAN also uses the top-notch algorithm for data protection, so your data will
always be safe and consistent.

9. For Big Data Center Owners


SAN has all the best features to be a perfect solution for data centers. There a lot of good
reasons to use SAN instead of other various storage solutions in a data center. It is secure,
failsafe, fast, and even needs less power to operate. So, it can be a great addition to big data
centers of organizations.

10. Simplifying Storage Administration


As you don’t have to deal with multiple disk storage devices or cables on a daily basis, SAN
helps to save you from a lot of hassle and it also saves a lot of your precious time as well.
Simply put, SAN simplifies storage administration from the ground up.

11. Easy to Add or Remove Storage Devices


You can add new storage devices simply to the SAN if you need more storage. Likewise, if
you need to remove extra storage devices, you can easily do that. You can increase or decrease
the storage space of your storage network anytime you want to even without interrupting the
entire operation on the servers. You don’t even need to stop or reset your servers to add or
remove storage space as these are not directly connected to the storage devices.

12. Everything at the Same Place

As all the servers are connected via switches, you don’t have to move storage devices from one
server to another physically, if you want to allocate new storage space from one server to
another. You can use a SAN as a single entity.

13. No Bandwidth Bottlenecks

pg. 41
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

In LAN based storage networks, the data are stored on the servers or storage disks. As a result,
you will face bandwidth bottlenecks while a huge amount of data is being transferred via LAN.
So, if your website gets a sudden spike on visitors, the servers will crash.
However, in the case of SAN, all the data are stored on the SAN. So, the resources of your
servers and storage devices are always available to the system. And, you will not face any
bandwidth bottlenecks in SAN.

1.1.2.15 Disadvantages of storage area network:

Might be Expensive for Some

Frankly, to run a decent storage Area Network system, you will need to spend a hefty amount
of money. It is because you are getting an industry-leading data storage and transfer facility.
So, if you don’t have a big business then you can avoid using SAN. Instead, you can look for
other affordable solutions.

Doesn’t Work Well with Only a Few Servers

It is not impossible to use SAN with only a few servers. However, it will be costly for you.
Whereas you could actually manage those servers yourself without spending too much. In that
regard, if you have dozens or hundreds of expensive servers, you can take advantage of using
SAN.

Data might Leak

You should always take good measures to secure the SAN. Then again, implementing high-
end security measures to a SAN is expensive. So, a lot of users don’t use them. However, if
you don’t take all the necessary precautions, sensitive data might leak as all of the client
computers uses the same storage devices and servers in SAN. (Lee, 2021)

pg. 42
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Campus Area Network (CAN)

With a campus area network (CAN), universities, colleges, and corporate campuses connect
different LANs from various departments sharing a common area. This transforms otherwise
scattered networks into a collective network that provides access to information at breathtaking
speeds while ensuring the necessary authentication to prevent privacy loopholes.

CANs are similar to LANs in operational approach, but differ in size to these types of networks.
Users who access a CAN with different devices often do so with Wi-Fi, hotspots, and Ethernet
technology.

Figure 8

https://907162.smushcdn.com/2195243/wp-content/uploads/2021/02/types-of-networks-
CAN-diagram.jpg?lossy=0&strip=1&webp=1

When to use a CAN:

You have devices spread over campus that need to communicate directly with each other.
You have the ability to provide connectivity, wired or wireless, between each building.

When not to use a CAN:

pg. 43
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Cost is a primary requirement, as less costly solutions to connect sites may exist.
Devices to be connected are spread out over a larger geographic area, not isolated to just the
campus.

Enterprise Private Network (EPN)

Bandwidth-intensive applications use a huge chunk of company network resources, slowing


down data transfer and leading to bottlenecks in business operations. An enterprise private
network (EPN) is a custom-design network, built and operated by a business to share company
resources. It connects a company’s offices across different geographic regions and is optimized
to ensure that bandwidth-centric applications run smoothly without burdening the network.

With an EPN, companies can choose to have a purpose-built network that’s fully private or a
hybrid integrated with a network Communications Service Provider (CSP). EPNs are
optimized with tunneling protocols, such as Layer 2 Tunneling Protocol (L2TP) and Internet
Protocol Security (IPsec) to ensure privacy across all network operations. Branches are
connected with MPLS technology.

Figure 9
https://907162.smushcdn.com/2195243/wp-content/uploads/2021/02/network-types-EPN-
diagram.jpg?lossy=0&strip=1&webp=1
pg. 44
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

When to use an EPN:

You need to facilitate secure communications between two locations but don’t have any direct
connectivity between the two locations.

You need to provide users spread across various locations consistent access to resources spread
across various locations.

There are requirements to scale and grow the network over time.

When not to use an EPN:

Your network team is resource-constrained. EPNs require additional time to set up, update, and
maintain.
Redundant links between locations aren’t possible, as this will introduce additional failure
points to the network.

1.1.3 The main IEEE Ethernet standards that can be used in above LAN and WLAN
design.
IEEE Ethernet standards

Ethernet is defined in a number of IEEE 802.3 standards. These standards define the physical
and data-link layer specifications for Ethernet. The most important 802.3 standards are:

pg. 45
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

10Base-T (IEEE 802.3) – 10 Mbps with category 3 unshielded twisted pair (UTP) wiring, up
to 100 meters long.
100Base-TX (IEEE 802.3u) – known as Fast Ethernet, uses category 5, 5E, or 6 UTP wiring,
up to 100 meters long.
100Base-FX (IEEE 802.3u) – a version of Fast Ethernet that uses multi-mode optical fiber. Up
to 412 meters long.

1000Base-CX (IEEE 802.3z) – uses copper twisted-pair cabling. Up to 25 meters long.


1000Base-T (IEEE 802.3ab) – Gigabit Ethernet that uses Category 5 UTP wiring. Up to 100
meters long.

1000Base-SX (IEEE 802.3z) – 1 Gigabit Ethernet running over multimode fiber-optic cable.

1000Base-LX (IEEE 802.3z) – 1 Gigabit Ethernet running over single-mode fiber.


10GBase-T (802.3.an) – 10 Gbps connections over category 5e, 6, and 7 UTP cables.

Notice how the first number in the name of the standard represents the speed of the network in
megabits per second. The word base refers to baseband, meaning that the signals are
transmitted without modulation. The last part of the standard name refers to the cabling used
to carry signals. For example, 1000Base-T means that the speed of the network is up to 1000
Mbps, baseband signaling is used, and the twisted-pair cabling will be used (T stands for
twisted-pair).

Stands for the "Institute of Electrical and Electronics Engineers" and is produced "I triple E."
The IEEE is a professional association that develops, defines, and reviews electronics and
computer science standards. Its mission is "to foster technological innovation and excellence
for the benefit of humanity."

The history of the IEEE dates back to the 1800s, when electricity started to influence society.
In 1884, the AIEE (American Institute of Electrical Engineers) was formed to support electrical
innovation. In 1912, the IRE (Institute of Radio Engineers) was created to develop wireless
telegraphy standards. In 1963, the two organizations merged to become a single entity – the
IEEE. Since then, the organization has established thousands of standards for consumer
electronics, computers, and telecommunications.

pg. 46
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

1.1.3.2 IEEE 802


The founders of the IEEE Local Area Network Standards Committee (LMSC) began discussing
standardization opportunities in 1979, submitting a project proposal "Local network for
Computer Interconnection" through the IEEE Computer Society to the IEEE in August 1979
that was formally approved by the IEEE on 13 March 1980. Today, the IEEE 802 LMSC
develops and maintains networking standards and recommended practices for local
metropolitan, and other area networks using an open, consensus-driven standards development
process, and advocates them on a global basis.
Currently, the IEEE 802 family of standards consists of 71 published standards with 54 under
development. The most widely used IEEE 802 standards are for Ethernet, Bridging and Virtual
Bridged LANs Wireless LAN, Wireless PAN, Wireless MAN, Wireless Coexistence, Media
Independent Handover Services, and Wireless RAN with a dedicated Working Group
providing focus for each area.
IEEE 802 also coordinates with other national and international standards bodies, including
ISO which has published certain IEEE 802 standards as international standards. Moreover, the
IEEE 802 LMSC and working groups garner strong international participation with ongoing
meetings and sessions being held throughout the world

IEEE Ethernet standards for LAN

Name IEEE Standard Data Rate Media Type Maximum


Distance
Ethernet 802.3 10Mbps 10Base-T 100 meters
Fast Ethernet/ 802.3u 100 100Base-TX 100 meters
100Base- Mbps 100Base-FX 2000 meters
Gigabit 802.3z 1000 1000Base-T 100 meters
Ethernet/ Mbps 1000Base-SX 275/550 meters
GigE 1000Base-LX 550/5000 meters
10 Gigabit IEEE 802.3ae 10 Gbps 10GBase-SR 300 meters
Ethernet 10GBase-LX4 300m MMF/ 10km
10GBase-LR/ER SMF
10GBase- 10km/40km
SW/LW/EW 300m/10km/40km

pg. 47
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

IEEE Ethernet standards for WLAN

Specification Data Rate Modulation Scheme Security


802.11 1 or 2 Mbps in the 2.4 FHSS, DSSS WEP and
GHz band WPA
802.11a 54 Mbps in the 5 GHz OFDM WEP and
band WPA

802.11b/High 11 Mbps (with a DSSS with CCK WEP and


Rate/Wi-Fi fallback to 5.5, 2, and WPA
1 Mbps) in the 2.4 GHz
band
802.11g/Wi-Fi 54 Mbps in the 2.4 OFDM when above 20Mbps, WEP and
GHz band DSSS with CCK when below WPA
20Mbps

Discuss the importance and impact of network topologies and network protocol suites
while comparing the main network topologies and network protocol suites that are used
in network design using examples. Recommend suitable network topologies and network
protocol suites for above scenario and justify your answer with valid points.

What is network topology?


Network topology is the description of the arrangement of nodes (e.g. networking switches and
routers) and connections in a network, often represented as a graph.

No matter how identical two organizations are, no two networks are exactly alike. However,
many organizations are relying on well-established network topology models. Network
topologies outline how devices are connected together and how data is transmitted from one
node to another.

A logical network topology is a conceptual representation of how devices operate at particular


layers of abstraction. A physical topology details how devices are physically connected.
Logical and physical topologies can both be represented as visual diagrams.

pg. 48
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

A network topology map is a map that allows an administrator to see the physical network
layout of connected devices. Having the map of a network’s topology on hand is very useful
for understanding how devices connect to each other and the best techniques for
troubleshooting.

Types of network topology


There are many different types of topologies that enterprise networks have built on today and
in the past. Some of the network topologies we’re going to look at include bus topology, ring
topology, star topology, mesh topology, and hybrid topology.

What are the types of network topology?

1.Bus Topology Simple layout and cheap but vulnerable to failure and only suitable for low
traffic volumes. Not used for office networks today, but can still be found within some
consumer products.
2.Ring Topology Easy to manage and with a low risk of collision but reliant on all nodes being
powered up and in full working order. Rarely used today.
3.Star Topology All devices are connected to a central switch, which makes it easy to add new
nodes without rebooting all currently connected devices. This topology makes efficient use of
cable and is easy to administer. On the other hand, the health of the switch is vital. This
topology requires monitoring and maintenance. However, it is a commonly encountered
topology.
4.Tree Topology A hierarchical layout that links together groups of nodes. Creates parent-child
dependencies between root nodes and regular nodes. This layout can be vulnerable to failure if
a root node has a problem. This topology is complicated and difficult to manage and it uses a
lot of cable.
5.Mesh Topology Each node is connected to every other mode with a direct link. This topology
creates a very reliable network, but requires a large amount of cable and is difficult to
administer. Wifi networks make this topology more feasible.
6.Hybrid Topology Combines two or more of the standard topologies. This can be a good
solution to create quickly link together different existing networks into a unified system. Don’t

pg. 49
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

confuse the term “hybrid network topology” with “hybrid system” – a term that is applied to
the combination of onsite and cloud resources.

Bus Topology

https://cdn.comparitech.com/wp-content/uploads/2018/11/Bus-Topology.jpg
figure 10

Pros:
Easy installation
Fewer cables required than Mesh and star topology
Good for small businesses
Low cost
Easy to manage and expand

Cons:

Backbone performance is critical


Easily congested on busy periods

Efficiency decreases rapidly with each added node

Data can only travel in one direction at any point in time

pg. 50
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Bus topology is a network type where every device is connected to a single cable that runs from
one end of the network to the other. This type of network topology is often referred to as line
topology. In a bus topology, data is transmitted in one direction only. If the bus topology has
two endpoints then it is referred to as a linear bus topology.

Smaller networks with this type of topology use a coaxial or RJ45 cable to link devices
together. However, the bus topology layout is outdated and you’re unlikely to encounter a
company using a bus topology today.

Advantages

Bus topologies were often used in smaller networks. One of the main reasons is that they keep
the layout simple. All devices are connected to a single cable so you don’t need to manage a
complex topological setup.

The layout also helped make bus topologies cost-effective because they can be run with a single
cable. In the event that more devices need to be added then you could simply join your cable
to another cable.

Disadvantages

However, relying on one cable does mean that bus topologies have a single point of failure. If
the cable fails then the entire network will go down. A cable failure would cost organizations
a lot of time while they attempt to resume service. Further to this, high network traffic would
decrease network performance because all the data travels through one cable.

This limitation makes bus topologies suitable only for smaller networks. The primary reason
is that the more network nodes you have, the slower your transmission speeds are going to be.
It is also worth noting that bus topologies are limited in the sense that they are half-duplex,
which means that data can’t be transmitted in two opposite directions simultaneously.

pg. 51
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Ring Topology

Figure 11

https://cdn.comparitech.com/wp-content/uploads/2018/11/Ring-Topology.jpg

Pros:

Low incidence of collision

Low cost
Suitable for small businesses
Dual ring option provides continuity through redundancy

Cons:
One faulty node will bring the entire network down
Requires extensive preventative maintenance and monitoring

pg. 52
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Performance declines rapidly with each additional node


Reorganizing the network requires a full system shutdown
In networks with ring topology, computers are connected to each other in a circular format.
Every device in the network will have two neighbours and no more or no less. Ring topologies
were commonly used in the past but you would be hard-pressed to find an enterprise still using
them today.

The first node is connected to the last node to link the loop together. As a consequence of being
laid out in this format packets need to travel through all network nodes on the way to their
destination.

Within this topology, one node is chosen to configure the network and monitor other devices.
Ring topologies are half-duplex but can also be made full-duplex. To make ring topologies full-
duplex you would need to have two connections between network nodes to form a Dual Ring
Topology.

Dual Ring Topology

Figure 12

https://cdn.comparitech.com/wp-content/uploads/2018/11/Dual-Ring-Topology.jpg

pg. 53
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

As mentioned above, if ring topologies are configured to be bidirectional then they are referred
to as dual ring topologies. Dual ring topologies provide each node with two connections, one
in each direction. Thus, data can flow in a clockwise or counterclockwise direction.

Advantages

With ring topologies, the risk of packet collisions is very low due to the use of token-based
protocols, which only allow one station to transmit data at a given time. This is compounded
by the fact that data can move through network nodes at high speeds which can be expanded
on when more nodes are added.

Dual ring topologies provided an extra layer of protection because they were more resistant to
failures. For instance, if a ring goes down within a node then the other ring can step up and
back it up. Ring topologies were also low cost to install.

Disadvantages

One of the reasons why ring topologies were replaced is because they are very vulnerable to
failure. The failure of one node can take the entire network out of operation. This means that
ring topology networks need to be constantly managed to ensure that all network nodes are in
good health. However, even if the nodes were in good health your network could still be
knocked offline by a transmission line failure!

Ring topologies also raised scalability concerns. For instance, bandwidth is shared by all
devices within the network. In addition, the more devices that are added to a network the more
communication delay the network experiences. This means that the number of devices added
to a network topology needed to be monitored carefully to make sure that the network resources
weren’t stretched beyond their limit.

Making changes to a ring topology was also complicated because you need to shut down the
network to make changes to existing nodes or add new nodes. This is far from ideal as you’ll
need to factor in downtime every time you want to make a change to the topological structure!

pg. 54
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Star Topology

Figure 13
https://cdn.comparitech.com/wp-content/uploads/2018/11/star-Topology.jpg

Pros:

Easy to manage from one point – the switch


Easy to add and remove nodes
Durable
Low cable usage
Good for small businesses

Cons:
Requires specialist network hardware (the switch)
Makes the network reliant on the switch’s performance
A finite number of switch ports limits the network’s size

A star topology is a topology where every node in the network is connected to one central
switch. Every device in the network is directly connected to the switch and indirectly connected
to every other node. The relationship between these elements is that the central network hub is
a server and other devices are treated as clients. The central node has the responsibility of
managing data transmissions across the whole network and acts as a repeater. With star
topologies, computers are connected with a coaxial cable, twisted pair, or optical fiber cable.

Advantages

pg. 55
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Star topologies are most commonly-used because you can manage the entire network from one
location: the central switch. As a consequence, if a node that isn’t the central node goes down
then the network will remain up. This gives star topologies a layer of protection against failures
that aren’t always present with other topology setups. Likewise, you can add new computers
without having to take the network offline like you would have to do with a ring topology.

In terms of physical network structure, star topologies require fewer cables than other topology
types. This makes them simple to set up and manage over the long-term. The simplicity of the
overall network design makes it much easier for administrators to run troubleshooting when
dealing with network performance faults.

Disadvantages
Though star topologies may be relatively safe from failure, if the central switch goes down then
the entire network will go down. As such, the administrator needs to manage the health of the
central node closely to make sure that it doesn’t go down. The performance of the network is
also tied to the central node’s configurations and performance. Star topologies are easy to
manage in most ways but they are far from cheap to set up and use.

Tree Topology

pg. 56
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Figure 14
https://cdn.comparitech.com/wp-content/uploads/2018/11/Tree-Topology.jpg

Pros:

Blends bus and star topologies

Easy to manage
Easy to expand

Suitable for middle-sized businesses

Cons:

The network is dependent on the health of the root node

Requires networking expertise


Involves a lot of cable

Larger implementations require monitoring software

Can get expensive


As the name suggests, a tree topology network is a structure that is shaped like a tree with its
many branches. Tree topologies have a root node that is connected to another node hierarchy.

pg. 57
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

The hierarchy is parent-child where there is only one mutual connection between two
connected nodes. As a general rule, a tree topology needs to have three levels to the hierarchy
to be classified this way. This form of topology is used within Wide Area Networks to sustain
lots of spread-out devices.

Advantages

The main reason why tree topologies are used is to extend bus and star topologies. Under this
hierarchical format, it is easy to add more nodes to the network when your organization grows
in size. This format also lends itself well to finding errors and troubleshooting because you can
check for network performance issues systematically throughout the tree.

Disadvantages

The most significant weakness of tree topology is the root node. If the root node fails then all
of its subtrees become partitioned. There will still be partial connectivity within the network
amongst other devices such as the failed node’s parent.

Maintaining the network system is not simple either because the more nodes you add, the more
difficult it becomes to manage the network. Another disadvantage of a tree topology is the
number of cables you need. Cables are required to connect every device throughout the
hierarchy which makes the network layout more complex when compared to a simpler
topology.

pg. 58
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Mesh Topology

Figure 15
https://cdn.comparitech.com/wp-content/uploads/2018/11/Mesh-Topology.jpg

Pros:

High speeds data transfers


Durable network that isn’t dependent on any one node

Very secure
Suitable for high-value networks for small to middle-sized networks
Easy to identify faulty equipment

Cons:

Requires a very large amount of cable


Can be difficult to secrete all the cable
Takes a long time to set up
Requires meticulous planning
There is a limit to the number of cables each computer can accommodate

A mesh topology is a point-to-point connection where nodes are interconnected. In this form
of topology, data is transmitted via two methods: routing and flooding. Routing is where nodes
use routing logic to work out the shortest distance to the packet’s destination. In contrast,

pg. 59
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

flooding is where data is sent to all nodes within the network. Flooding doesn’t require any
form of routing logic to work.

There are two forms of mesh topology: partial mesh topology and full mesh topology. With
partial mesh topology, most nodes are interconnected but there are a few which are only
connected to two or three other nodes. A full mesh topology is where every node is
interconnected.

Advantages
Mesh topologies are used first and foremost because they are reliable. The interconnectivity of
nodes makes them extremely resistant to failures. There is no single machine failure that could
bring down the entire network. The absence of a single point of failure is one of the reasons
why this is a popular topology choice. This setup is also secure from being compromised.

Disadvantages
However, mesh topologies are far from perfect. They require an immense amount of
configuration once they are deployed. The topological layout is more complex than many other
topologies and this is reflected by how long it takes to set up. You’ll need to accommodate a
whole host of new wiring which can add up to be quite expensive.

Hybrid Topology

pg. 60
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Figure 16
https://cdn.comparitech.com/wp-content/uploads/2018/11/Hybrid-Topology.jpg

Pros:
Very flexible
Suitable for middle-sized and large organizations
Infinitely extendible
Adaptable to optimize equipment us

Cons:
Requires professional management

Needs monitoring software

Equipment costs are high


When a topology is composed of two or more different topologies it is referred to as a hybrid
topology. Hybrid topologies are most-commonly encountered in larger enterprises where
individual departments have network topologies that different from another topology in the
organization. Connecting these topologies together will result in a hybrid topology. As a
consequence, the capabilities and vulnerabilities depend on the types of topology that are tied
together.

Advantages

pg. 61
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

There are many reasons why hybrid topologies are used but they all have one thing in common:
flexibility. There are few constraints on the network structure that a hybrid topology cannot
accommodate, and you can incorporate multiple topologies into one hybrid setup. As a
consequence, hybrid topologies are very scalable. The scalability of hybrid setups makes them
well-suited to larger networks.

Disadvantages

Unfortunately, hybrid topologies can be quite complex, depending on the topologies that you
decide to use. Each topology that is part of your hybrid topology will have to be managed
according to its unique network requirements. This makes administrators’ jobs more difficult
because they are going to have to attempt to manage multiple topologies rather than a single
one. In addition, setting up a hybrid topology can end up being quite costly.

1.2.2 Logical Topology

Figure 17
https://lh3.googleusercontent.com/proxy/a5JXAunu-
g1MFBW1mjl_X615IJGj1hwAYTm5ae430pigUCTJGjbqMJ1DV2rvZ9Ma34563hEFJ9rK1Jtz4OLL
AGK4BUIBxv4FPjcEJQVaYJyrj6l2t5fHalH3beX8VVYkIiuZ
pg. 62
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

1.2.2.1 Ethernet topology

The IEEE 802.3 standard is popularly called as Ethernet. It is a bus based broadcast network
with decentralized control. It can operate at 10 Mbps or 100 Mbps or above. Computers on an
Ethernet can transmit whenever they want to do so. If two or more machines transmit
simultaneously, then their packets collide. Then the transmitting computers just wait for an
arbitrary time and retransmit their signal. There are various technologies available in the LAN
market but the most popular one of them is Ethernet.

The Ethernet topology was developed at the University of Hawaii to connect computers on the
various Islands. It was radio based design. Ethernet is one of the most popular Computer
Network or LAN technologies in use today covering more than 85% of the computer networks.
Ethernet system consists of three basic elements:

1. The physical medium use to carry Ethernet signals between computers on the network

2. A set of rules (protocols) embedded in each Ethernet interface that will decide how
multiple computers on the network will have access to the data on the medium.

3. An Ethernet frame that consists of a standardized set of bits used to carry data over the
system.
The operation of Ethernet can be described in simple terms as follows:
Each computer on the Ethernet Network, also known as a node, operates independently of all
other nodes. All nodes attached to an Ethernet are connected to a shared medium over which
the Ethernet signals travel serially, one data bit at a time. o send data a station first listens to
the channel and when the channel is idle the station transmits its information in the form of an
Ethernet frame, or packet. The Ethernet rules (protocol) are defined in such a way that every
node gets a fair amount of frame transmission opportunity.
As each Ethernet frame is sent out on the shared medium, the Ethernet interfaces inside the
node look at the destination address. The interfaces compare the destination address of the
frame with their own address. The Ethernet interface with the same address as the destination
address in the frame will read the entire frame and all other network interfaces will ignore the
information. (Thakur, 2021)

pg. 63
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

1.2.2.2 Fast-Ethernet topology

An Ethernet standard for 100-Mbps data transmission. Defined by the IEEE 802.3u
specification, Fast Ethernet is used for departmental backbones, connections to high-speed
servers, and connections to workstations running bandwidth-intensive software such as CAD
or multimedia applications.
Fast Ethernet uses the same Carrier Sense Multiple Access with Collision Detection
(CSMA/CD) media access control mechanism as traditional 10-Mbps Ethernet networks. Fast
Ethernet implementations are collectively known as 100BaseT technologies. They are
generally wired in a star topology using special Fast Ethernet hubs and switches. Fast Ethernet
can be implemented in three different transmission schemes or cabling options:

1. 100BASE-TX: The most popular Fast Ethernet implementation. 100BaseTX uses two
pairs of wires in Category 5 cabling; that is, the same cabling as the popular but lower-speed
10BaseT variety of Ethernet.

2. 100BASE-FX: A duplex multimode fiber-optic cable with ST connectors used mainly


for backbone wiring.

3. 100BASE-T4: Uses four pairs of wires and enables Fast Ethernet to be used over
category 3 cabling or higher.

The Fast Ethernet specification includes mechanisms for auto-negotiation of frame speed for
the media, enabling vendors to supply dual 10/100-Mbps networking devices for smoothly
incorporating Fast Ethernet into legacy 10BaseT networks.
Upgrading to Fast Ethernet is probably the easiest and cheapest way of upgrading your network
to meet increasing bandwidth needs. Advantages of upgrading 10-Mbps Ethernet networks to
Fast Ethernet include the following:
1. Fast Ethernet integrates easily into existing 10-Mbps Ethernet networks without
requiring reinvestment in new network-management and troubleshooting software.
2. Fast Ethernet can carry voice, data, and video at 100 Mbps, which is 10 times faster
than traditional 10-Mbps Ethernet.
3. Fast Ethernet can operate over the same installed media used for a traditional 10-Mbps
Ethernet network.

pg. 64
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

4. The network can be migrated slowly to Fast Ethernet by using autosensing 10/100 hubs
and network interface cards

1.2.2.3 Giga-Ethernet topology

figure 18
https://networkencyclopedia.com/wp-content/uploads/2019/08/gigabit-ethernet.jpg

Since its inception at Xerox Corporation in the early 1970s, Ethernet has been the dominant
networking protocol. Of all current networking protocols, Ethernet has, by far, the highest
number of installed ports and provides the greatest cost performance relative to Token Ring,
Fiber Distributed Data Interface (FDDI), and Asynchronous Transfer Mode (ATM) for desktop
connectivity. Fast Ethernet, which increased Ethernet speed from 10 to 100 megabits per
second (Mbps), provided a simple, cost-effective option for backbone and server connectivity.

pg. 65
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Gigabit Ethernet builds on top of the Ethernet protocol, but increases speed tenfold over Fast
Ethernet to 1000 Mbps, or 1 gigabit per second (Gbps). This protocol, which was standardized
in June 1998, promises to be a dominant player in high-speed local area network backbones
and server connectivity. Since Gigabit Ethernet significantly leverages on Ethernet, customers
will be able to leverage their existing knowledge base to manage and maintain gigabit
networks.

The purpose of this technology brief is to provide a technical overview of Gigabit Ethernet.
This paper discusses:

1. The architecture of the Gigabit Ethernet protocol, including physical interfaces, 802.3x
flow control, and media connectivity options

2. The Gigabit Ethernet standards effort and the timing for Gigabit Ethernet
3. Comparison of Gigabit Ethernet and ATM technologies
4. Gigabit Ethernet topologies
5. Migration strategies to Gigabit Ethernet
Gigabit Ethernet Protocol Architecture
In order to accelerate speeds from 100 Mbps Fast Ethernet up to 1 Gbps, several changes need
to be made to the physical interface. It has been decided that Gigabit Ethernet will look identical
to Ethernet from the data link layer upward. The challenges involved in accelerating to 1 Gbps
have been resolved by merging two technologies together: IEEE 802.3 Ethernet and ANSI
X3T11 Fibre Channel.

pg. 66
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

1.2.2.4 Virtual LAN

Figure 19
https://www.tutorialspoint.com/assets/questions/media/39932/virtual_lan_configuration.j
pg

VLANs (Virtual LANs) are logical grouping of devices in the same broadcast domain. VLANs
are usually configured on switches by placing some interfaces into one broadcast domain and
some interfaces into another. Each VLAN acts as a subgroup of the switch ports in an Ethernet
LAN.

VLANs can spread across multiple switches, with each VLAN being treated as its own subnet
or broadcast domain. This means that frames broadcasted onto the network will be switched
only between the ports within the same VLAN.

A VLAN acts like a physical LAN, but it allows hosts to be grouped together in the same
broadcast domain even if they are not connected to the same switch. Here are the main reasons
why VLANs are used:

1. VLANs increase the number of broadcast domains while decreasing their size.

pg. 67
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

2. VLANs reduce security risks by reducing the number of hosts that receive copies of
frames that the switches flood.

3. you can keep hosts that hold sensitive data on a separate VLAN to improve security.

4. you can create more flexible network designs that group users by department instead of
by physical location.

5. network changes are achieved with ease by just configuring a port into the appropriate
VLAN.
Without VLANs, a broadcast sent from host A would reach all devices on the network. Each
device will receive and process broadcast frames, increasing the CPU overhead on each device
and reducing the overall security of the network.

Compare common networking principles and how protocols enable the effectiveness of
networked systems.

Network protocols

Network protocols are a set of rules, conventions, and data structures that dictate how devices
exchange data across networks. In other words, network protocols can be equated to languages
that two devices must understand for seamless communication of information, regardless of
their infrastructure and design disparities.

The OSI model: How network protocols work

To understand the nuances of network protocols , it's imperative to know about the Open
Systems Interconnection (OSI) model first. Considered the primary architectural model for
internet working communications, the majority of network protocols used today are structurally
based on the OSI model.

pg. 68
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

The OSI model splits the communication process between two network devices into 7 layers.
A task or group of tasks is assigned to each of these 7 layers. All the layers are self-contained,
and the tasks assigned to them can be executed independently.

To put this into context, here is a representation of the communication process between two
network devices following the OSI model:

Figure 21
https://www.manageengine.com/network-monitoring/images/network-protocols-osi.jpg

The seven layers in the OSI model can be divided into two groups: upper layers, including
layers 7, 6, and 5, and lower layers, including layers 4, 3, 2, and 1. The upper layers deal with
application issues, and the lower layers deal with data transport issues.

Network protocols divide the communication process into discrete tasks across every layer of
the OSI model. One or more network protocols operate at each layer in the communication
exchange.

pg. 69
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Following are the detailed descriptions of the functioning of network protocols in each layer
of the OSI model:

Layer 7: Application layer Provides standard services such as virtual terminal, file, and job
network protocols transfer and operations.

Layer 6: Presentation layer Masks the differences in data formats between dissimilar systems.
network protocols Encodes and decodes data, encrypts and decrypts data, and
compresses and decompresses data.
Layer 5: Session layer network Manages user sessions and dialogues.
protocols Establishes and terminates sessions between users.

Layer 4: Transport layer Manages end-to-end message delivery in networks.


network protocols Renders reliable and sequential packet delivery through error
recovery and flow control mechanisms.
Layer 3: Network layer Routes packets according to unique network device addresses.
protocols Renders flow and congestion control to prevent network resource
depletion.
Layer 2: Data link layer network Frames packets.
protocols Detects and corrects packet transmit errors.
Layer 1: Physical layer network Interfaces between network medium and devices.
protocols Defines optical, electrical, and mechanical characteristics.

Classification of network protocols

Now that you know how the OSI model works, you can dive straight into the classification of
protocols. The following are some of the most prominent protocols used in network
communication.

pg. 70
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Application layer network protocols


1. DHCP: Dynamic Host Configuration Protocol

DHCP is a communication protocol that enables network administrators to automate the


assignment of IP addresses in a network. In an IP network, every device connecting to the
internet requires a unique IP. DHCP lets network admins distribute IP addresses from a central
point and automatically send a new IP address when a device is plugged in from a different
place in the network. DHCP works on a client-server model.

Advantages of using DHCP

Centralized management of IP addresses.


Seamless addition of new clients into a network.

Reuse of IP addresses, reducing the total number of IP addresses required.

Disadvantages of using DHCP

Tracking internet activity becomes tedious, as the same device can have multiple IP addresses
over a period of time.
Computers with DHCP cannot be used as servers, as their IPs change over time.
2. DNS: Domain Name System protocol
The DNS protocol helps in translating or mapping host names to IP addresses. DNS works on
a client-server model, and uses a distributed database over a hierarchy of name servers.

Hosts are identified based on their IP addresses, but memorizing an IP address is difficult due
to its complexity. IPs are also dynamic, making it all the more necessary to map domain names
to IP addresses. DNS helps resolve this issue by converting the domain names of websites into
numerical IP addresses.

Advantages

DNS facilitates internet access.

Eliminates the need to memorize IP addresses.


pg. 71
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Disadvantages

DNS queries don't carry information pertaining to the client who initiated it. This is because
the DNS server only sees the IP from where the query came from, making the server susceptible
to manipulation from hackers.
DNS root servers, if compromised, could enable hackers to redirect to other pages for phishing
data.
3. FTP: File Transfer Protocol

File Transfer Protocol enables file sharing between hosts, both local and remote, and runs on
top of TCP. For file transfer, FTP creates two TCP connections: control and data connection.
The control connection is used to transfer control information like passwords, commands to
retrieve and store files, etc., and the data connection is used to transfer the actual file. Both of
these connections run in parallel during the entire file transfer process.

Advantages

Enables sharing large files and multiple directories at the same time.
Lets you resume file sharing if it was interrupted.

Lets you recover lost data, and schedule a file transfer.

Disadvantages

FTP lacks security. Data, usernames, and passwords are transferred in plain text, making them
vulnerable to malicious actors.
FTP lacks encryption capabilities, making it non-compliant with industry standards.
4. HTTP: Hyper Text Transfer Protocol

HTTP is an application layer protocol used for distributed, collaborative, and hypermedia
information systems. It works on a client-server model, where the web browser acts as the
client. Data such as text, images, and other multimedia files are shared over the World Wide
Web using HTTP. As a request and response type protocol, the client sends a request to the
server, which is then processed by the server before sending a response back to the client.

pg. 72
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

HTTP is a stateless protocol, meaning the client and server are only aware of each other while
the connection between them is intact. After that, both the client and server forget about each
other's existence. Due to this phenomenon, the client and server can't both retain information
between requests.

Advantages

Memory usage and CPU usage are low because of lesser concurrent connections.
Errors can be reported without closing connections.
Owing to lesser TCP connections, network congestion is reduced.
Disadvantages

HTTP lacks encryption capabilities, making it less secure.


HTTP requires more power to establish communication and transfer data.
5. IMAP and IMAP4: Internet Message Access Protocol (version 4)
IMAP is an email protocol that lets end users access and manipulate messages stored on a mail
server from their email client as if they were present locally on their remote device. IMAP
follows a client-server model, and lets multiple clients access messages on a common mail
server concurrently. IMAP includes operations for creating, deleting, and renaming mailboxes;
checking for new messages; permanently removing messages; setting and removing flags; and
much more. The current version of IMAP is version 4 revision 1.

Advantages

As the emails are stored on the mail server, local storage utilization is minimal.
In case of accidental deletion of emails or data, it is always possible to retrieve them as they
are stored on the mail server.

Disadvantages

Emails won't work without an active internet connection.

pg. 73
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

High utilization of emails by end users requires more mailbox storage, thereby augmenting
costs.

6. POP and POP3: Post Office Protocol (version 3)

The Post Office Protocol is also an email protocol. Using this protocol, the end user can
download emails from the mail server to their own email client. Once the emails are
downloaded locally, they can be read without an internet connection. Also, once the emails are
moved locally, they get deleted from the mail server, freeing up space. POP3 is not designed
to perform extensive manipulations with the messages on the mail server, unlike IMAP4. POP3
is the latest version of the Post Office Protocol.

Advantages

Read emails on local devices without internet connection.

The mail server need not have high storage capacity, as the emails get deleted when they're
moved locally.

Disadvantages

If the local device on which the emails were downloaded crashes or gets stolen, the emails are
lost.
7. SMTP: Simple Mail Transfer Protocol
SMTP is a protocol designed to transfer electronic mail reliably and efficiently. SMTP is a
push protocol and is used to send the email, whereas POP and IMAP are used to retrieve emails
on the end user's side. SMTP transfers emails between systems, and notifies on incoming
emails. Using SMTP, a client can transfer an email to another client on the same network or
another network through a relay or gateway access available to both networks.

Advantages

Ease of installation.
Connects to any system without any restriction.
It doesn't need any development from your side.

pg. 74
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Disadvantages

Back and forth conversations between servers can delay sending a message, and also increases
the chance of the message not being delivered.
Certain firewalls can block the ports used with SMTP.

8. Telnet: Terminal emulation protocol

Telnet is an application layer protocol that enables a user to communicate with a remote device.
A Telnet client is installed on the user's machine, which accesses the command line interface
of another remote machine that runs a Telnet server program.

Telnet is mostly used by network administrators to access and manage remote devices. To
access a remote device, a network admin needs to enter the IP or host name of the remote
device, after which they will be presented with a virtual terminal that can interact with the host.

Advantages

Compatible with multiple operating systems.


Saves a lot of time due to its swift connectivity with remote devices.

Disadvantages

Telnet lacks encryption capabilities and sends across critical information in clear text, making
it easier for malicious actors.

Expensive due to slow typing speeds.

9. SNMP: Simple Network Management Protocol


SNMP is an application layer protocol used to manage nodes, like servers, workstations,
routers, switches, etc., on an IP network. SNMP enables network admins to monitor network
performance, identify network glitches, and troubleshoot them. SNMP protocol is comprised
of three components: a managed device, an SNMP agent, and an SNMP manager.

The SNMP agent resides on the managed device. The agent is a software module that has local
knowledge of management information, and translates that information into a form compatible

pg. 75
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

with the SNMP manager. The SNMP manager presents the data obtained from the SNMP
agent, helping network admins manage nodes effectively.

Currently, there are three versions of SNMP: SNMP v1, SNMP v2, and SNMP v3. Both
versions 1 and 2 have many features in common, but SNMP v2 offers enhancements such as
additional protocol operations. SNMP version 3 (SNMP v3) adds security and remote
configuration capabilities to the previous versions.

Presentation layer network protocols


LPP: Lightweight Presentation Protocol
The Lightweight Presentation Protocol helps provide streamlined support for OSI application
services in networks running on TCP/IP protocols for some constrained environments. LPP is
designed for a particular class of OSI applications, namely those entities whose application
context contains only an Association Control Service Element (ACSE) and a Remote
Operations Service Element (ROSE). LPP is not applicable to entities whose application
context is more extensive, i.e., contains a Reliable Transfer Service Element.

Session layer network protocols


RPC: Remote Procedure Call protocol
RPC is a protocol for requesting a service from a program in a remote computer through a
network, and can be used without having to understand the underlying network technologies.
RPC uses TCP or UDP for carrying the messages between communicating programs. RPC also
works on client-server model. The requesting program is the client, and the service providing
program is the server.

Advantages

RPC omits many protocol layers to improve performance.


With RPC, code rewriting or redeveloping efforts are minimized.

Disadvantages

pg. 76
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Not yet proven to work effectively over wide-area networks.


Apart from TCP/IP, RPC does not support other transport protocols.
Transport layer network protocols
1. TCP: Transmission Control Protocol
TCP is a transport layer protocol that provides a reliable stream delivery and virtual connection
service to applications through the use of sequenced acknowledgement. TCP is a connection-
oriented protocol, as it requires a connection to be established between applications before data
transfer. Through flow control and acknowledgement of data, TCP provides extensive error
checking. TCP ensures sequencing of data, meaning the data packets arrive in order at the
receiving end. Retransmission of lost data packets is also feasible with TCP.

Advantages

TCP ensures three things: data reaches the destination, reaches it on time, and reaches it without
duplication.
TCP automatically breaks data into packets before transmission.
Disadvantages

TCP cannot be used for broadcast and multicast connections.


2. UDP: User Datagram Protocol
UDP is a connection-less transport layer protocol that provides a simple but unreliable message
service. Unlike TCP, UDP adds no reliability, flow control, or error recovery functions. UDP
is useful in situations where the reliability mechanisms of TCP are not necessary.
Retransmission of lost data packets isn't possible with UDP.

Advantages

Broadcast and multicast connections are possible with UDP.


UDP is faster than TCP.

Disadvantages

pg. 77
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

In UDP, it's possible that a packet may not be delivered, be delivered twice, or not be delivered
at all.

Manual disintegration of data packets is needed.

Network layer protocols


1. IP: Internet Protocol (IPv4)

IPv4 is a network layer protocol that contains addressing and control information, which helps
packets be routed in a network. IP works in tandem with TCP to deliver data packets across the
network. Under IP, each host is assigned a 32-bit address comprised of two major parts: the
network number and host number. The network number identifies a network and is assigned
by the internet, while the host number identifies a host on the network and is assigned by a
network admin. The IP is only responsible for delivering the packets, and TCP helps puts them
back in the right order.

Advantages

IPv4 encrypts data to ensure privacy and security.


With IP, routing data becomes more scalable and economical.
Disadvantages

IPv4 is labor intensive, complex, and prone to errors.

2. IPv6: Internet Protocol version 6


IPv6 is the latest version of the Internet Protocol, a network layer protocol that possesses
addressing and control information for enabling packets to be routed in the network. IPv6 was
created to deal with IPv4 exhaustion. It increases the IP address size from 32 bits to 128 bits to
support more levels of addressing.

Advantages

More efficient routing and packet processing compared to IPv4.


Better security compared to IPv4.
Disadvantages

pg. 78
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

IPv6 is not compatible with machines that run on IPv4.

Challenge in upgrading the devices to IPv6.

3. ICMP: Internet Control Message Protocol


ICMP is a network layer supporting protocol used by network devices to send error messages
and operational information. ICMP messages delivered in IP packets are used for out-of-band
messages related to network operation or misoperation. ICMP is used to announce network
errors, congestion, and timeouts, as well assist in troubleshooting.

Advantages

ICMP is used to diagnose network issues.


Disadvantages

Sending a lot of ICMP messages increases network traffic.


End users are affected if malicious users send many ICMP destination unreachable packets.

Data link layer network protocols


1. ARP: Address Resolution Protocol

The Address Resolution Protocol helps map IP addresses to physical machine addresses (or a
MAC address for Ethernet) recognized in the local network. A table called an ARP cache is
used to maintain a correlation between each IP address and its corresponding MAC address.
ARP offers the rules to make these correlations, and helps convert addresses in both directions.

Advantages

MAC addresses need not be known or memorized, as the ARP cache contains all the MAC
addresses and maps them automatically with IPs.

Disadvantages

ARP is susceptible to security attacks called ARP spoofing attacks.

pg. 79
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

When using ARP, sometimes a hacker might be able to stop the traffic altogether. This is also
known as ARP denial-of-services.

2. SLIP: Serial Line IP

SLIP is used for point-to-point serial connections using TCP/IP. SLIP is used on dedicated
serial links, and sometimes for dial-up purposes. SLIP is useful for allowing mixes of hosts and
routers to communicate with one another; for example, host-host, host-router, and router-router
are all common SLIP network configurations. SLIP is merely a packet framing protocol: It
defines a sequence of characters that frame IP packets on a serial line. It does not provide
addressing, packet type identification, error detection or correction, or compression
mechanisms.

Advantages

Since it has a small overhead, it is suitable for usage in microcontrollers.


It reuses existing dial-up connections and telephone lines.
It's easy to deploy since it's based on the Internet Protocol.
DIsadvantages

SLIP doesn't support automatic setup of network connections in multiple OSI layers at the same
time.

SLIP does not support synchronous connections, such as a connection created through the
internet from a modem to an internet service provider (ISP).

pg. 80
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Activity 02

Discuss the operating principles of network devices (Ex: Router, Switch, Etc.) and server types
that can be used for above scenario while exploring different servers that are available in today’s
market with their specifications. Recommend server/servers for the above scenario and justify
your selection with valid points.

Discuss the operating principles of networking devices and server types.

Network Devices and Their Types


There are different types of electronic devices are used in networking which are known as
network devices or network equipment. In a computer network, network devices are mainly
used for transmitting and receiving the data quickly and securely in between computers, fax
machines, printers, etc. These devices may be intra network or internetwork. There are some
devices are installed on the device such as RJ45 connector otherwise NIC card, whereas some
devices are part of the network namely switch, router, etc. These devices are specific devices,
handles digital or electrical connections to perform their exclusive roles very efficiently. This
article discusses an overview of network devices and their working.

What are Network Devices?


Definition: The devices which are used for communication between different hardware’s used
in the computer network are known as network devices. These devices are also known as
physical devices, networking hardware, and network equipment otherwise computer
networking devices. In a computer network, each network device plays a key role based on
their functionality, and also works for different purposes at different segments.

pg. 81
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Types of Network Devices


There are different types of network devices used in a computer network which include the
following.

1.Network Hub

2.Network Switch

3.Modem
4.Network Router

5.Bridge

6.Repeater

Network Hub

The network hub is one kind of networking device in a computer network, used to communicate
with various network hosts and also for data transferring. The transferring of data in a computer
network can be done in the form of packets. Whenever the data processing can be done from a
host to a network hub, then the data can transmit to all the connected ports. Similarly, all the
ports identify the data path which leads to inefficiencies & wastage. Because of this working,
a network hub cannot be so safe and secure. In addition, copying the data packets on all the
ports will make the hub slower which leads to the utilize of the network switch.

Figure 23
https://www.elprocus.com/wp-content/uploads/network-hub.jpg

Network hubs are classified into two types like active hub & passive hub.

pg. 82
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Active Hub
These hubs have their own power supply and these hubs are used to clean, increase & transmit
the signal using the network. It works as a wiring center & repeater. Active hubs play a key
role in extending the distance between nodes.

Passive Hub
These hubs collect wiring from the power supply and different nodes of an active hub. These
hubs transmit the signals over the network without improving & cleaning them. These hubs are
not suitable for extending the distance between nodes like an active hub.

Network Switch

Similar to a hub, this is also working at the layer in the LAN and a switch is more clever
compare with a hub. As the hub is used for data transferring, whereas a switch is used for
filtering & forwarding the data. So this is the more clever technique to deal with the data
packets.

Figure24
https://www.elprocus.com/wp-content/uploads/network-switch.jpg

pg. 83
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Whenever a data packet is obtained from the interfaces in the switch, then the data packet can
be filtered & transmits to the interface of the proposed receiver. Due to this reason, a switch
maintains a content addressable memory table to maintain system configuration as well as
memory.
Modem

A modem is the most important network device and it is used daily in our life. If we notice the
internet connection to homes was given with the help of a wire. then wire carries internet data
from one place to another. But, every computer gives digital or binary data in the form of zeros
& ones

Figure25
https://www.elprocus.com/wp-content/uploads/modem.jpg

The full form of the modem is a modulator and a demodulator. So it modulates as well as
demodulates the signal among the computer and a telephone line because the computer
generates digital data whereas the telephone line generates an analog signal.

Network Router
A network router is one kind of network device in a computer network and it is used for routing
traffic from one network to another. These two networks could be private to a public company
network. For example, here a router is considered as traffic police at the junction, he directs
dissimilar traffic networks to dissimilar directions.

pg. 84
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Figure26
https://www.elprocus.com/wp-content/uploads/router.jpg

Bridge
A Bridge in the computer network is used to unite two or more network segments. The main
function of a bridge in network architecture is to store as well as transmit frames among the
various segments. Bridges use MAC (Media Access Control) hardware for transferring frames.

Figure27

https://www.elprocus.com/wp-content/uploads/bridge.jpg

These are also used for connecting two physical local area networks to a larger logical local
area network. In the OSI model, bridges work at the data link & physical layers to divide the
networks from larger to smaller by controlling the data flow between the two. In recent years,
bridges are replaced by switches to provide more functionality.

Repeater
The operating of a repeater can be done at the physical layer. The main function of this device
is to reproduce the signal on a similar network before the signal gets weak otherwise damaged.

pg. 85
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

The significant point to be noted regarding these devices is that they do not strengthen the
signal. Whenever the signal gets weak, then they reproduce it at the actual strength. A repeater
is a two-port device.

Figure28

https://www.elprocus.com/wp-content/uploads/repeater.jpg

Gateway

Generally, a gateway performs at the session & transport layers in the OSI model. Gateways
offer conversion between networking technologies like OSI (Open System Interconnection) &
TCP/IP. Because of this, these are connected to two or many autonomous networks, where
each network has its own domain name service, routing algorithm, topology, protocols, and
procedures of network administration & policies.

Figure29
https://www.elprocus.com/wp-content/uploads/gateway-device.jpg

pg. 86
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Gateways execute all the functions of routers. Actually, a router with additional conversion
functionality is a gateway, so the conversion between various network technologies is known
as a protocol converter

exploring different servers that are available in today’s market with their specifications.
Recommend server/servers for the above scenario and justify your selection with valid
points.

What is a server?

A server is a computer or system that provides resources, data, services, or programs to other
computers, known as clients, over a network. In theory, whenever computers share resources
with client machines they are considered servers. There are many types of servers, including
web servers, mail servers, and virtual servers.

An individual system can provide resources and use them from another system at the same
time. This means that a device could be both a server and a client at the same time.

Some of the first servers were mainframe computers or minicomputers. Minicomputers were
much smaller than mainframe computers, hence the name. However, as technology progressed,
they ended up becoming much larger than desktop computers, which made the term
microcomputer somewhat farcical.

Initially, such servers were connected to clients known as terminals that did not do any actual
computing. These terminals, referred to as dumb terminals, existed simply to accept input via
a keyboard or card reader and to return the results of any computations to a display screen or
printer. The actual computing was done on the server.

Later, servers were often single, powerful computers connected over a network to a set of less-
powerful client computers. This network architecture is often referred to as the client-server

pg. 87
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

model, in which both the client computer and the server possess computing power, but certain
tasks are delegated to servers. In previous computing models, such as the mainframe-terminal
model, the mainframe did act as a server even though it wasn’t referred to by that name.

As technology has evolved, the definition of a server has evolved with it. These days, a server
may be nothing more than software running on one or more physical computing devices. Such
servers are often referred to as virtual servers. Originally, virtual servers were used to increase
the number of server functions a single hardware server could do. Today, virtual servers are
often run by a third-party on hardware across the Internet in an arrangement called cloud
computing.

A server may be designed to do a single task, such as a mail server, which accepts and stores
email and then provides it to a requesting client. Servers may also perform several tasks, such
as a file and print server, which both stores files and accepts print jobs from clients and then
sends them on to a network-attached printer.

Figure30

https://hlassets.paessler.com/common/files/graphics/illustration/server-14-one-forth.png

pg. 88
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

How a server works

To function as a server, a device must be configured to listen to requests from clients on a


network connection. This functionality can exist as part of the operating system as an installed
application, role, or a combination of the two.

For example, Microsoft’s Windows Server operating system provides the functionality to listen
to and respond to client requests. Additionally installed roles or services increase which kinds
of client requests the server can respond to. In another example, an Apache web server responds
to Internet browser requests via an additional application, Apache, installed on top of an
operating system.

When a client requires data or functionality from a server, it sends a request over the network.
The server receives this request and responds with the appropriate information. This is the
request and response model of client-server networking, also known as the call and response
model.

A server will often perform numerous additional tasks as part of a single request and response,
including verifying the identity of the requestor, ensuring that the client has permission to
access the data or resources requested, and properly formatting or returning the required
response in an expected way.

Types of servers

There are many types of servers that all perform different functions. Many networks contain
one or more of the common server types:

pg. 89
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

File servers
File servers store and distribute files. Multiple clients or users may share files stored on a server.
In addition, centrally storing files offers easier backup or fault tolerance solutions than
attempting to provide security and integrity for files on every device in an organization. File
server hardware can be designed to maximize read and write speeds to improve performance.

Print servers
Print servers allow for the management and distribution of printing functionality. Rather than
attaching a printer to every workstation, a single print server can respond to printing requests
from numerous clients. Today, some larger and higher-end printers come with their own built-
in print server, which removes the need for an additional computer-based print server. This
internal print server also functions by responding to print requests from a client.

Application servers
Application servers run applications in lieu of client computers running applications locally.
Application servers often run resource-intensive applications that are shared by a large number
of users. Doing so removes the need for each client to have sufficient resources to run the
applications. It also removes the need to install and maintain software on many machines as
opposed to only one.

DNS servers

Domain Name System (DNS) servers are application servers that provide name resolution to
client computers by converting names easily understood by humans into machine-readable IP
addresses. The DNS system is a widely distributed database of names and other DNS servers,
each of which can be used to request an otherwise unknown computer name. When a client
needs the address of a system, it sends a DNS request with the name of the desired resource to
a DNS server. The DNS server responds with the necessary IP address from its table of names.

Mail servers

pg. 90
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Mail servers are a very common type of application server. Mail servers receive emails sent to
a user and store them until requested by a client on behalf of said user. Having an email server
allows for a single machine to be properly configured and attached to the network at all times.
It is then ready to send and receive messages rather than requiring every client machine to have
its own email subsystem continuously running.

Web servers
One of the most abundant types of servers in today’s market is a web server. A web server is a
special kind of application server that hosts programs and data requested by users across the
Internet or an intranet. Web servers respond to requests from browsers running on client
computers for web pages, or other web-based services. Common web servers include Apache
web servers, Microsoft Internet Information Services (IIS) servers and Nginx servers.

Figure 32

https://digitalworld839.com/wp-content/uploads/2020/07/Types-Of-servers--
e1594824415821.jpg

pg. 91
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Database servers
The amount of data used by companies, users, and other services is staggering. Much of that
data is stored in databases. Databases need to be accessible to multiple clients at any given time
and can require extraordinary amounts of disk space. Both of these needs lend themselves well
to locating such databases on servers. Database servers run database applications and respond
to numerous requests from clients. Common database server applications include Oracle,
Microsoft SQL Server, DB2, and Informix.

Virtual servers
Virtual servers are taking the server world by storm. Unlike traditional servers that are installed
as an operating system on machine hardware, virtual servers exist only as defined within
specialized software called hypervisor. Each hypervisor can run hundreds, or even thousands,
of virtual servers all at once. The hypervisor presents virtual hardware to the server as if it were
real physical hardware. The virtual server uses the virtual hardware as usual, and the hypervisor
passes the actual computation and storage needs onto the real hardware beneath, which is
shared among all the other virtual servers.

Proxy servers
A proxy server acts as an intermediary between a client and a server. Often used to isolate
either the clients or servers for security purposes, a proxy server takes the request from the
client. Instead of responding to the client, it passes the request on to another server or process.
The proxy server receives the response from the second server and then replies to the original
client as if it were replying on its own. In this way, neither the client nor the responding server
needs to directly connect to each other.

Monitoring and management servers

Some servers exist to monitor or manage other systems and clients. There are many types of
monitoring servers. Several of them listen to the network and receive every client request and
server response, but some do not request or respond to data themselves. In this way, the
monitoring server can keep track of all the traffic on the network, as well as the requests and
replies of clients and servers, without interfering with those operations. A monitoring server

pg. 92
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

will respond to requests from monitoring clients such as those run by network administrators
watching the health of the network.

Server structures

The concept of servers is nearly as old as networking itself. After all, the point of a network is
to allow one computer to talk to another computer and distribute either work or resources.
Computing has evolved since then, resulting in several types of server structures and hardware.

Mainframe or minicomputer (AS/400)

You could say that the original servers, mainframe computers, and later, minicomputers,
handled almost all computing tasks except the interaction with the user through a screen and
keyboard, which was left to the client system.

Computer hardware server

The next major wave of servers included computer-based servers. In many respects, these
servers were nothing more than larger, more powerful desktop computers. Such servers were
generally more expensive and held far more memory and disk space than most client
computers. Each server was still a self-contained unit with its own motherboard, processor,
memory, disk drives, and power supply. Servers like this were often warehoused in air-
conditioned rooms called server rooms, and were later bolted into racks for better storage and
accessibility.

Blade servers
The original computer server hardware was large and stored in racks that could hold hundreds
of pounds. Over time, however, faster means of connecting hardware resulted in parts of the
server being extracted from a single self-contained device. By removing hard drives,
eliminating internal cooling, and the ongoing miniaturization of computing parts, servers were
eventually reduced to a single thin server known as a blade server. While still stored in racks
in server rooms, blade servers are smaller and can be replaced more easily.

pg. 93
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Combining servers
Even before virtualization, servers were being extracted from the standard model of a single
server operating system installed on a hardware machine. Technology, such as network-
attached storage, removed the need for a server to have its own storage. Other technologies,
such as mirroring and clustering, enabled pieces of hardware to be combined into larger, more
powerful servers. Such a server might consist of several blades, several attached storage
devices, and an external power supply, and each piece could be swapped out for another while
the server was still running.

Virtual servers

Virtual Servers still require hardware, but that hardware now runs a different process known
as a hypervisor. In some cases, such as Microsoft’s Hyper-V, a full operating system continues
to run on the hardware itself. In other cases, so-called bare-metal hypervisors can be installed
directly onto server hardware. In both instances, the hardware itself is often spread across an
array of blade servers, networked storage, and power supply, resulting in an environment where
it is impossible to tell where any individual server ends and another begins.

Examples of server operating systems

Microsoft Windows servers


An argument can be made that Windows for Workgroups was Microsoft’s first server operating
system. In that version, certain computers could be set to share resources and respond to
requests from clients, which made them servers by definition. Microsoft’s first real server
operating system was Windows NT. Its 3.5 and 3.51 versions ran on many business networks
until Microsoft released its Windows Server line that continues to exist today. The most current
Windows Server version is Windows Server 2016. This version supports numerous
applications and databases as well as a hypervisor that allows virtual servers.

pg. 94
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Linux / Unix servers

The other major player in server operating systems is the Linux/Unix realm. There are multiple
versions and flavors of Linux/Unix including Red Hat Enterprise Linux, Debian, and CentOS.
As an open-source operating system, Linux is very popular as a web server, often with the
Apache web application server installed.

NetWare
Although no longer made, NetWare was a major player in the server software space as the
client-server era was ramping up. Eventually, NetWare moved its server operating system to a
Linux-based kernel and named it a Novell Open Enterprise Server (OES).

Cloud servers
Virtual servers hosted on a third-party infrastructure on an open network, such as the Internet,
are called cloud servers. There are numerous cloud server providers these days, including
Google’s Cloud Platform, Microsoft Azure, and IBM Cloud.

However, the main pioneer of corporate cloud computing was Amazon’s AWS platform. It
originally started using spare capacity of Amazon’s own servers and networks, but AWS now
allows customers to create a virtual server nearly instantly and then adjust the amount of
resources that server may use on the fly.

Today, a server can be nothing more than the data of physical hardware that consists of multiple
processors, disk drives, memory, and network connections. But, even now, a server is still just
a system that responds to a request from a client.

Components of a server computer


The hardware components that comprise a typical server computer are similar to the
components used in less expensive client computers. However, server computers are usually
built from higher grade components than client computers for the reasons given in the

pg. 95
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

preceding section. The following paragraphs describe the typical components of a server
computer:

Motherboard:
The motherboard is the computer's main electronic circuit board to which all the other
components of your computer are connected. More than any other component, the motherboard
is the computer. All other components attach to the motherboard.
The major components on the motherboard include the processor (or CPU), supporting
circuitry called the chipset, memory, expansion slots, a standard IDE hard drive controller, and
I/O ports for devices such as keyboards, mice, and printers. Some motherboards also include
additional built-in features such as a graphic adapter, SCSI disk controller, or a network
interface.

Processor:
The processor, or CPU, is the brain of the computer. Although the processor isn't the only
component that affects overall system performance, it is the one that most people think of first
when deciding what type of server to purchase. At the time of this writing, Intel had four
processor models, summarized in Table 3-1. Two of them - the Pentium 4 and Celeron - should
be used only for desktop or notebook computers. Server computers should have an Itanium 2
or a Xeon processor, or a comparable processor from one of Intel's competitors, such as AMD.

Each motherboard is designed to support a particular type of processor. CPUs come in two
basic mounting styles: slot or socket. However, you can choose from several types of slots and
sockets, so you have to make sure that the motherboard supports the specific slot or socket style
used by the CPU. Some server motherboards have two or more slots or sockets to hold two or
more CPUs.

The term clock speed refers to how fast the basic clock that drives the processor's operation
ticks. In theory, the faster the clock speed, the faster the processor. However, clock speed alone
is reliable only for comparing processors within the same family. In fact, the Xeon is
significantly faster than the Pentium 4 running at the same clock speed. That's because the
Xeon contains more advanced circuitry than the Pentium 4, so it's able to accomplish more
work than the Pentium 4 with each tick of the clock.

pg. 96
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Intel Processors
Processors Clock Speed Intended Usage
Itanium 2 1.30-1.60GHz Servers
Xeon 1.4-3.6GHz Servers
Itanium 4 3.2-3.73 Hz Desktops
Celeron 950MHz-3.06GHz Low-end desktop

Memory:

Don't scrimp on memory. People rarely complain about servers having too much memory.
Many different types of memory are available, so you have to pick the right type of memory to
match the memory supported by your motherboard. The total memory capacity of the server
depends on the motherboard. Most new servers can support at least 12GB of memory, and
some can handle up to 32GB.

Hard drives:

Most desktop computers use inexpensive hard drives called IDE drives (sometimes also called
ATA). These drives are adequate for individual users, but because performance is more
important for servers, another type of drive known as SCSI is usually used instead. For the best
performance, use the SCSI drives along with a highperformance SCSI controller card.

Network connection:
The network connection is one of the most important parts of any server. Many servers have
network adapters built into the motherboard. If your server isn't equipped as such, you'll need
to add a separate network adapter card. See the section, "Network Interface Cards," later in this
tutorial, for more information.

Video:
Fancy graphics aren't that important for a server computer. You can equip your servers with
inexpensive generic video cards and monitors without affecting network performance. (This is
one of the few areas where it's acceptable to cut costs on a server.)

pg. 97
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Power supply: Because a server usually has more devices than a typical desktop computer, it
requires a larger power supply (300 watts is typical). If the server houses a large number of
hard drives, it may require an even larger power supply.

SERVER OPERATING SYSTEMS

A server operating system, also called a server OS, is an operating system specifically designed
to run on servers, which are specialized computers that operate within a client/server
architecture to serve the requests of client computers on the network.

OST POPULAR SERVER OPERATING SYSTEMS


Windows Server 2003
Windows Server 2008
Windows Server 2012
Linux (excluding RHEL)
Windows Server 2000
Red Hat Enterprise Linus (RHEL)

Choosing the right server

Servers form the very core of any technology infrastructure. We'll take you through some of
the key factors to consider before you buy.

Once upon a time, when servers had all of the brains (mainframes) and user workstations were
dumb (terminals), servers had all of the glory. Then, along came the PC revolution and the
whole client-server paradigm of distributed computing power turned the computing world on
its head. Servers just weren't sexy anymore. Rather, it was pushing more computing power out
to the workstation that held most people's interest.

pg. 98
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

But now the pendulum has swung back in the other direction. While workstations continue to
advance in terms of power and capability, the rise of the Web and the browser-based thin-client
interface has put renewed focus on having powerful, reliable, centralized servers to do most of
the heavy lifting. There's even been a resurgence of interest in modern versions of centralized
mainframe-like systems, for reasons of capability, scalability, and perhaps most of all, ease of
system administration and management. It's much easier to upgrade, apply security patches, or
control software licensing and distribution when you can do it all from a single place.

Server available in market

Dell PowerEdge R730 Xeon E5-2640 v4 32GB Dual 2TB SAS H330 Rack Server

Figure 33

https://img.router-
switch.com/media/catalog/product/cache/1/image/9df78eab33525d08d6e5fb8d27136e95/d/e/
dell-poweredge-r730xd-server-45-degree.jpg

pg. 99
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Dell PowerEdge R730 Xeon E5-2640 v4 32GB Dual 2TB SAS H330 Rack
Server Specification

Product Series Dell PowerEdge R730 Server

Dell PowerEdge R730 Xeon E5-2640 v4 32GB Dual 2TB SAS


Model
H330 Rack Server

Intel® Xeon® E5-2640 v4, Windows Server® 2012 Standard,


Customizable 32GB Memory, Dual 2TB SAS H330 Hard Drive and a 3 Year
ProSupport Warranty

Intel® Xeon® E5-2640 v4 2.4GHz,25M Cache,8.0GT/s


Processor
QPI,Turbo,HT,10C/20T (90W) Max Mem 2133MHz

Windows Server® 2012R2,Standard Ed,Factory Inst,No


Operating System
MED,2SKT,2VM,NO CAL

Memory 32GB RDIMM, 2400MT/s, Dual Rank, x4 Data Width

Hard Drive 2TB Hard Drive

Warranty 3 Year ProSupport and NBD On-site Service

Chipset Intel C610 series chipset

Optional supported hypervisors:

Embedded Hypervisor Microsoft® Windows Server® 2012, with Hyper-V®


(Optional) Citrix® XenServer®
VMware® vSphere® ESXiTM

pg. 100
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

HDD: SAS, SATA, nearline SAS; SSD: SAS, SATA


Storage 16 x 2.5” – up to 29TB via 1.8TB hot-plug SAS hard drives
8 x 3.5” – up to 64TB via 8TB hot-plug nearline SAS hard drives

Internal hard drive bay and hot-plug backplane:


Up to 16 x 2.5” HDD: SAS, SATA, Near-line SAS SSD: SAS,
Drive Bays SATA
Up to 8 x 3.5” HDD: SAS, SATA, Near-line SAS SSD: SAS,
SATA

Slot configuration #1:


Slot 1: Half Length, Half Height, PCIe Gen3 x8 (x16 connector)
low profile brackett
Slot 2: Half Length, Half Height, PCIe Gen3 x8 (x16 connector)
low profile brackett
Slot 3: Half Length, Half Height, PCIe Gen3 x8 (x16 connector)
low profile brackett
Slot 4: Full Length, Full Height, PCIe Gen3 x16 (x16 connector)
Slot 5: Full Length, Full Height, PCIe Gen3 x8 (x16 connector)
Slot 6: Full Length, Full Height, PCIe Gen3 x8 (x16 connector)
Slot 7: Full Length, Full Height, PCIe Gen3 x8 (x16 connector)
Slots
Dedicated RAID card slot

Slot configuration #2:


Slot 1: Half Length, Half Height, PCIe Gen3 x8 (x16 connector)
low profile bracket
Slot 2: Half Length, Half Height, PCIe Gen3 x8 (x16 connector)
low profile bracket
Slot 3: Half Length, Half Height, PCIe Gen3 x8 (x16 connector)
low profile bracket
Slot 4: Full Length, Full Height, PCIe Gen3 x16 (x16 connector)
Slot 5: Full Length, Full Height, PCIe Gen3 x8 (x16 connector)

pg. 101
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Slot 6: Full Length, Full Height, PCIe Gen3 x16 (x16 connector)
Dedicated RAID card slot

Internal:
PERC S130
PERC H330
RAID Controllers PERC H730
PERC H730P
External:
PERC H830

Network Controller 4 x 1Gb, 2 x 1Gb + 2 x 10Gb, 4 x 10Gb

Broadcom® 5719 quad-port 1Gb NIC


Broadcom 5720 dual-port 1Gb NIC
Broadcom 57810 dual-port 10Gb DA/SFP+ CNA
Broadcom 57810 dual-port 10Gb Base-T network adapter
Intel® Ethernet I350 dual-port 1Gb server adapter
Intel Ethernet I350 quad-port 1Gb server adapter
Communications Intel Ethernet X540 dual-port 10GBASE-T server adapter
Mellanox® ConnectX®-3 dual-port 10Gb Direct Attach/SFP+
server network adapter
Mellanox ConnectX-3 dual-port 40Gb Direct Attach/QSFP server
network adapter
Emulex® LPE 12000, single-port 8Gb Fibre Channel HBA
Emulex LPE 12002, dual-port 8Gb Fibre Channel HBA

pg. 102
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Emulex LPe16000B, single-port 16Gb Fibre Channel HBA


Emulex LPe16002B, dual-port 16Gb Fibre Channel HBA
Emulex OneConnect OCe14102-U1-D 2-port PCIe 10GbE CNA
QLogic® 2560, single-port 8Gb Optical Fibre Channel HBA
QLogic 2562, dual-port 8Gb Optical Fibre Channel HBA
Qlogic 2660, single-port 16GB, Fibre Channel HBA, full height
Qlogic 2662, dual-port 16GB, Fibre Channel HBA, full height

1100W AC, 86 mm (Platinum)


1100W DC, 86 mm (Gold)
Power 750W AC, 86 mm (Platinum)
750W AC, 86 mm (Diamond)
495W AC, 86 mm (Platinum)

ECC memory
Hot-plug hard drives
Hot-plug redundant cooling
Hot-plug redundant power
iDRAC8
Internal Dual SD Module
Availability
Single Device Data Correction (SDDC)
Spare Rank
Tool-less chassis
Support for high availability clustering and virtualization
Proactive systems management alerts
iDRAC8 with Lifecycle Controller

Dimensions: H: 8.73 cm (3.44 in.) x W: 44.40 cm (17.49 in.) x D:


Chassis
68.40 cm (26.92 in.)

pg. 103
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Dell OpenManage portfolio of systems management solutions,


including:
OpenManage Essentials console
Management iDRAC8 with Lifecycle Controller
iDRAC Direct
iDRAC Quick Sync
OpenManage Mobile

Dell PowerEdge R630 Xeon E5-2630 v4 16GB 1TB SAS H330 Rack Server

Dell PowerEdge R630 Server delivers accelerate enterprise applications with Dell's most
powerful server featuring highly scalable processing, memory and internal storage. This model
is the Dell PowerEdge R930 server with Dual Intel® Xeon® E7-4820 v4, Optional Operating
System, 64GB Memory, 1.2TB SAS H730P Hard Drive and a 3 Year Warranty.

Figure 34
https://img.router-
switch.com/media/catalog/product/cache/1/image/350x350/9df78eab33525d08d6e5fb8d2713
6e95/d/e/dell-poweredge-r630-server-45-degree_2.jpg

Dell PowerEdge R630 Xeon E5-2630 v4 16GB 1TB SAS H330 Rack Server Specification

Product Series Dell PowerEdge R630 Server

pg. 104
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Dell PowerEdge R630 Xeon E5-2630 v4 16GB 1TB SAS H330


Model
Rack Server

Intel® Xeon® E5-2630 v4, Optional Operating System, 16GB


Customizable Memory, 1TB SAS H330 Hard Drive and a 3 Year ProSupport
Warranty

Intel® Xeon® E5-2630 v4 2.2GHz,25M Cache,8.0 GT/s


Processor
QPI,Turbo,HT,10C/20T (85W) Max Mem 2133MHz

Operating System No Operating System

Memory 16GB RDIMM, 2400MT/s, Dual Rank, x8 Data Width

Hard Drive 1TB Hard Drive

3 Year Basic Hardware Warranty Repair, 5X10 HW-Only, 5x10


Warranty
NBD On-site

Chipset Intel C610 series chipset

Microsoft® Windows Server® 2012, with Hyper-V®


Embedded Hypervisor
VMware® vSphere® ESXi™
(Optional)
Citrix® XenServer®

HDD: SAS, SATA, nearline SAS SSD: SAS, SATA, NVMe PCIe
24 x 1.8” SSD – up to 23TB via 0.96TB hot-plug SATA SSD
Storage
10 x 2.5” – up to 18TB via 1.8TB hot-plug SAS HDD
8 x 2.5” – up to 14TB via 1.8TB hot-plug SAS HDD

Internal hard drive bay and hot-plug backplane:


Drive Bays
Up to 24 x 1.8” SATA SSD

pg. 105
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Up to 10 x 2.5” HDD: SAS, SATA, nearline SAS SSD: SAS,


SATA, Up to 4 NVMe PCIe
Up to 8 x 2.5” HDD: SAS, SATA, nearline SAS SSD: SAS, SATA

2 CPUs, 3 slots
Slot 1: Half length, half height - PCIe 3.0 x16 (x16 connector)
Slot 2: Half length, half height - PCIe 3.0 x8 (x16 connector)
Slot 3: Half length, half height - PCIe 3.0 x16 (x16 connector)
2CPUs, 2 slots
Slot 1: Half length, half height - PCIe 3.0 x16 (x16 connector)
Slots
Slot 2: 3/4 length, full height - PCIe 3.0 x16 (x16 connector)
1CPU, 2 slots
Slot 1: Half length, half height - PCIe 3.0 x8 (x16 connector)
Slot 2: 3/4 length, full height - PCIe 3.0 x16 (x16 connector

Dedicated RAID card slot

Internal:
PERC S130 (SW RAID),
PERC H330
PERC H730
RAID Controllers PERC H730P
External:
PERC H830
External HBAs (non-RAID):
12Gbps SAS HBA

Network Controller 4 x 1Gb, 2 x 1Gb + 2 x 10Gb, 4 x 10Gb

pg. 106
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Broadcom® 5719 quad-port 1Gb NIC


Broadcom 5720 dual-port 1Gb NIC
Broadcom 57810 dual-port 10Gb DA/SFP+ CNA
Broadcom 57810 dual-port 10Gb Base-T network adapter
Intel® Ethernet I350 dual-port 1Gb server adapter
Intel Ethernet I350 quad-port 1Gb server adapter
Intel Ethernet X540 dual-port 10GBASE-T server adapter
Mellanox® ConnectX®-3 dual-port 10Gb Direct Attach/SFP+
server network adapter
Mellanox ConnectX-3 dual-port 40Gb Direct Attach/QSFP server
Communications
network adapter
Emulex® LPE 12000, single-port 8Gb Fibre Channel HBA
Emulex LPE 12002, dual-port 8Gb Fibre Channel HBA
Emulex LPe16000B, single-port 16Gb Fibre Channel HBA
Emulex LPe16002B, dual-port 16Gb Fibre Channel HBA
Emulex OneConnect OCe14102-U1-D 2-port PCIe 10GbE CNA
QLogic® 2560, single-port 8Gb Optical Fibre Channel HBA
QLogic 2562, dual-port 8Gb Optical Fibre Channel HBA
Qlogic 2660, single-port 16GB, Fibre Channel HBA, full height
Qlogic 2662, dual-port 16GB, Fibre Channel HBA, full height

1100W AC, 86 mm (Platinum)


1100W DC, 86 mm
Power 750W AC, 86 mm (Platinum)
750W AC, 86 mm (Titanium)
495W AC, 86 mm (Platinum)

ECC memory
Hot-plug hard drives
Availability Hot-plug redundant cooling
Hot-plug redundant power
Internal Dual SD Module

pg. 107
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Single Device Data Correction (SDDC)


Spare Rank
Support for high availability clustering and virtualization
Proactive systems management alerts
iDRAC8 with Lifecycle Controller

The 24 x 1.8” drive and 10 x 2.5” drive configurations have the


following dimensions:

Form Factor: 1U
H: 4.28 cm (1.68 in.) x W: 48.23 cm (18.98 in.) x D: 75.51 cm
(29.72 in.)
Chassis

The 8 x 2.5” drive configuration has the following dimensions:

Form Factor: 1U
H: 4.28 cm (1.68 in.) W: 48.23 cm (18.98 in.) D: 70.05 cm (27.57
in.)

Systems management:
IPMI 2.0 compliant;
Dell OpenManage Essentials; Dell OpenManage Mobile;
Dell OpenManage Power Center

Dell OpenManage Integrations:


Management Dell OpenManage Integration Suite for Microsoft System Center
Dell OpenManage Integration for VMware® vCenter

Dell OpenManage Connections:


HP Operations Manager, IBM Tivoli® Netcool® and CA Network
and Systems Management
Dell OpenManage for Oracle Database Manager

pg. 108
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Remote management
iDRAC8 with Lifecycle Controller,
iDRAC8 Express (default)
iDRAC8 Enterprise (upgrade)
8GB vFlash media (upgrade)16GB vFlash media (upgrade)
iDRAC Quick Sync

Dell PowerEdge R930 Dual Xeon E7-4820 v4*2/ 64GB (4*16G) 1.2TB SAS H730P Rack
Server
Dell PowerEdge R930 Server delivers accelerate enterprise applications with Dell's most
powerful server featuring highly scalable processing, memory and internal storage. This model
is the Dell PowerEdge R930 server with Dual Intel® Xeon® E7-4820 v4, Optional Operating
System, 64GB Memory, 1.2TB SAS H730P Hard Drive and a 3 Year Warranty.

Figure 35
https://img.router-
switch.com/media/catalog/product/cache/1/image/350x350/9df78eab33525d08d6e5fb8d2713
6e95/d/e/dell-poweredge-r930-server-45-degree_1.jpg

pg. 109
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Dell PowerEdge R930 Dual Xeon E7-4820 v4*2/ 64GB (4*16G) 1.2TB SAS H730P Rack
Server Specification

Product Series Dell PowerEdge R930 Server

Dell PowerEdge R930 Dual Xeon E7-4820 v4*2/ 64GB (4*16G)


Model
1.2TB SAS H730P Rack Server

Dual Intel® Xeon® E7-4820 v4, Optional Operating System, 64GB


Customizable
Memory, 1.2TB SAS Hard Drive and a 3 Year Warranty

Base PE R930 Server MLK, No TPM

2x Intel Xeon E7-4820 v4 2.0GHz,25M Cache,6.4GT/s QPI


Processor
10C/20T,HT,No Turbo 115W DDR4 1:1 MaxMem1866Hz

Operating
No Operating System
System

Memory 64GB

Hard Drive 1TB Hard Drive

3 Year Basic Hardware Warranty Repair, 5X10 HW-Only, 5x10 NBD


Warranty
On-Site

Chipset Intel® C602J

pg. 110
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

2.5” SATA/SAS SSD, SAS HDD (15K, 10K), nearline SAS HDD
Storage (7.2K)
2.5” Dell PowerEdge NVMe Express Flash PCIe SSD

Up to 24 x 2.5” hot-plug 12Gb/6Gb SAS HDD or SAS/SATA SSD


Drive Bays
Up to 8 front-accessible Express Flash NVMe PCIe SSD (PCIe 3.0)

Up to 10 PCIe 3.0 slots


Slots 1 RAID slot
1 NDC slot

Internal controllers: PERC H330, PERC H730P


RAID
External HBAs (RAID): PERC H830
Controllers
External HBAs (non-RAID): 12Gbps SAS HBA

Embedded NICs:
Broadcom® 5720 quad-port 1Gb NDC
Broadcom® 57800 2x10Gb DA/SFP+ + 2x1Gb BT NDC
Broadcom® 57800 2x10Gb BT + 2x1Gb BT N DC
Communications
Broadcom® 57840S quad-port 10Gb SFP+ Direct Attach Rack NDC
Intel® I350 quad-port 1GbE NDC
Intel® X520 dual-port 10Gb DA/SFP+, + I350 DP 1GbE, NDC
Intel® X540 10GbE BT dual-port + I350 1Gb BT DP NDC

Power Hot-plug redundant PSUs: 750W AC, 1100W AC

Hot-plug hard drives, hot-plug redundant power, hot-plug redundant


Availability
fans, ECC memory, internal dual SD module

Graphics Card Matrox® G200 with 8MB memory

Chassis 4U

pg. 111
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

iDRAC8 with Lifecycle Controller


iDRAC8 Express (default)
iDRAC8 Enterprise (upgrade option)
8GB or 16GB vFlash media (upgrade options)
IPMI 2.0 compliant
Dell OpenManage Essentials
Dell OpenManage Mobile
Dell OpenManage Power Center
Management
Dell OpenManage Integrations:
Dell OpenManage Integration Suite for Microsoft System Center
Dell OpenManage Integration for VMware® vCenter

Dell OpenManage Connections:


HP Operations Manager, IBM Tivoli® Netcool®, and CA Network
and Systems Management
Dell OpenManage Plug-in for Oracle Database Manager

ReadyRails® II, the sliding rail system for the R930, provides tool-less
support for 4-post racks with square or unthreaded round mounting
Rack Support
holes, including all generations of Dell racks. The sliding rail system
also supports tooled mounting in 4-post threaded racks

CONCLUSION

Buying a server for business is a long term investment. It should be fulfil our need so we have
to consider all think such as specification, price, size, power consumption. I going to select
Dell PowerEdge R930 Dual Xeon E7-4820 GEN 10 server for SYNTAX SOLUTIONS
because it have 2x Intel Xeon E7-4820 v4 2.0GHz,25M Cache,6.4GT/s QPI 10C/20T,HT,No
Turbo 115W DDR4 1:1 MaxMem1866Hz threads and base frequency Its offer 4XNIC port it
helpful for add additional bandwidth. It best value for money.

pg. 112
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Discuss the inter-dependence of workstation hardware with networking software and


provide examples for networking software that can be used in above network design.

A network file server is a computer system used for the purpose of managing the file system,
the network printer, handling network communication, and other functions. A server may be
dedicated is such case all of its processing power is allocated to network function, or it may be
non- dedicated which means that a part of server functions allocated as a work stations or DOS
based system.
Network operating system: it is loaded into the servers’ hard disk along with the system
management tools and user utilities. When the system is started, NOS boots and other server
come under its control.
Workstations: workstations or nodes are attached to the server through the network interfaces
card and the cable; workstations are normally intelligence systems, such as the IBM pc. But
DUMV terminals are used in mainframe computers. The concept of distributed process
depends on the fact that personal computer are attached to the network performed their own
processing after loading programs and data from servers. Due to this a work station is called
an active device on the network. After processing, files are stored back on the server where
they can be used by others workstation.
Network interface card-every device connected to a LAN needs network interface card to plug
into the LAN. For example, a PC needs to have an Ethernet card installed in it to connect to an
Ethernet LAN.
Network cabling: once the server, workstations, and network interface cards are in place,
network cabling is used to network everything together. The most popular type of network
cables: Twisted pair wiring, Co-axial cable, Fiber optics cable.
pg. 113
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Workstation,
a high-performance computer system that is basically designed for a single user and has
advanced graphics capabilities, large storage capacity, and a powerful microprocessor (central
processing unit). A workstation is more capable than a personal computer (PC) but is less
advanced than a midrange computer (which can manage a large network of peripheral PCs or
workstations and handle immense data-processing and reporting tasks). The term workstation
is also sometimes ascribed to dumb terminals (i.e., without any processing capacity) that are
connected to mainframe computers. (Workstation | computer, 2021)
Network interface card
A network interface card (NIC) is a hardware component without which a computer cannot be
connected over a network. It is a circuit board installed in a computer that provides a dedicated
network connection to the computer. It is also called network interface controller, network
adapter or LAN adapter.
Purpose
1. NIC allows both wired and wireless communications.
2. NIC allows communications between computers connected via local area network
(LAN) as well as communications over large-scale network through Internet Protocol (IP).
3. NIC is both a physical layer and a data link layer device, i.e. it provides the necessary
hardware circuitry so that the physical layer processes and some data link layer processes can
run on it.
(What is network interface card (NIC)?, 2021)
Communication Medium
The Communication Medium plays an important role in Networks. If the medium works well
and properly, then the speed of transferring data is good but if the medium is not working
properly, then your data would be delayed or would not be sent or even can be lost during
transmission. In Computer Networks, we call this speed of transmitting data, as DATA RATE.
There are two types of networks that you can set-up.
1. Wired Network -Twisted Pair Wires, Coaxial Cables, Fibre Optics
2. Wireless Network – Radio Waves, Terrestrial ‘off air’ Feed, Communication Satellites
(Different Types Of Communication Mediums In Networks - hiTechMV, 2021)

Network Software

pg. 114
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Networking software is a foundational element for any network. It helps administrators deploy,
manage, and monitor a network. Traditional networks are made up of specialized hardware,
such as routers and switches, that bundle the networking software into the solution. Software-
defined networking (SDN) separates that software from the hardware, making it easier to
innovate and adapt the network to quickly meet changing network demands. The separation of
functions from hardware, such as firewalls or load balancing, is called network functions
virtualization (NFV).
Network software is not the same as software applications. The former exposes the inner-
workings of the network to administrators, while software applications enable end users to
perform specific tasks. Network software is “invisible” to end users — it is simply used to
facilitate the access those users have to network resources, in a seamless way.
The basic functionality includes both user management and file management. User
management enables administrators to add or remove users from the network. File management
allows administrators to define the location of data storage and user access to that data.
Network software allows multiple devices, such as desktops, laptops, mobile phones, tablets,
and other systems to connect to one another, as well as other networks. The internet is a prime
example of a globally connected system of servers and computers that relies on networking
software to ensure accessibility by end users. (What's Networking Software?, 2021)

Network operating system: NOS is a system that offers a shared platform for all the connected
computers that can run a shared application. Net and Novell Netware are popular examples of
network software.
Shared network: a networking software whose applications are centrally saved and each
individual computer can access the applications on their own. Oracle is an example of such
network software.
Client server network programs: one component of such applications are stored on client’s
system and the other one is stored on server. Both systems then communicate with each other
and utilizes their part of the component accordingly. For example Microsoft exchange.
Network file server
A file server is a central server in a computer network that provides file systems or at least parts
of a file system to connected clients. File servers therefore offer users a central storage place
for files on internal data media, which is accessible to all authorized clients. Here, the server
administrator defines strict rules regarding which users have which access rights: For instance,

pg. 115
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

the configuration or file authorizations of the respective file system enable the admin to set
which files can be seen and opened by a certain user or user group, and whether data can only
be viewed or also added, edited, or deleted. (server, 2021)

For example - Windows File Server, Windows Fail over cluster, Windows Server Cluster
Network Operating System
Network Operating System is a computer operating system that facilitates to connect and
communicate various autonomous computers over a network. An Autonomous computer is an
independent computer that has its own local memory, hardware, and O.S. It is self-capable to
perform operations and processing for a single user. They can either run the same or different
O.S.

The Network O.S. mainly runs on a powerful computer, that runs the server program. It
facilitates the security and capability of managing the data, user, group, application, and other
network functionalities. The main advantage of using a network o.s. is that it facilitates the
sharing of resources and memory amongst the autonomous computers in the network. It can
also facilitate the client computers to access the shared memory and resources administered by
the Server computer. In other words, the Network O.S. is mainly designed to allow multiple
users to share files and resources over the network. (What is a Network Operating System?,
2021)
For example - Microsoft Windows Server, UNIX, Linux, Mac OS X, Novell NetWare, and
BSD

Attendance Management System


Any solution that helps to monitor an employee’s time spent in the office is called an attendance
management system. Interestingly, this doesn’t necessarily have to be a digital tool – paper
registers, time clocks, and Excel-based spreadsheets are some of the legacy models of
attendance management.
But with technology evolving at lightning speed and companies looking at large, distributed
workforces, the tools to record attendance must keep pace. This has given rise to dedicated
software for employee time-tracking, ranging from on-premise software to cloud-based tools
with advanced analytics and automated schedule configuring.

pg. 116
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

A cloud-based attendance management system offers the benefits of flexibility, cost


optimization, and ease of access across devices and platforms. And several features make these
tools essential for modern organizations. (10 Key Features of Attendance Management
Systems, 2021)
For example - QuickBooks Time, TimeClock Plus, PayChex.
Network Management Software
Network management tools are used to administrate, provision, and control IT systems. These
products help users understand who is using their network, how it is organized and how it is
performing. Companies use these to improve reporting on existing networks and tighten control
over connected systems. Many products have network mapping capabilities to outline
connected devices and infrastructure. Some modern network management tools are used for
configuration management between cloud services and remote network connections.

Activity 03

Prepare a written network design plan to meet the above mentioned user requirements including
a blueprint drawn using a modeling tool. (Ex: Microsoft Visio, EdrawMax).
Support your answer by providing the VLAN and IP subnetting scheme for the above scenario
and the list of devices, network components and software used to design the network for above
scenario and while justifying your selections.

3.1 Prepare a written network design plan to meet the above mentioned user
requirements including a blueprint drawn using a modeling tool.

Project scope
The main aim of the project is provide reliable network for SYNTAX SOLUTIONS .here we
have to implement network design to new building which the management purchased in
Matara. there are 7 department and we have separate them through VLAN also sales and
Marketing Team need to connect using wifi connectivity.

pg. 117
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

ERP and CRM systems need to be implement so we need to allocated one server for customer
care and one for legal, finance, HR

3.1.2 Project hardware requirements

1. Twisted Pair Cable CAT6 - 5000M


2. Network Switches

a. 16 port – 03
b. 24 port – 03
c. 48 port – 03

3. Servers 05

4. Routers 02
5. Wifi access point 01

Figure 36

Support your answer by providing the VLAN and IP subnetting scheme for the above scenario
and the list of devices, network components and software used to design the network for above
scenario and while justifying your selections.

pg. 118
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

3.1.3 VLAN and IP subnetting scheme

Department No of Vlan ID Network Id Broadcast Id Subnet mask


Users
Customer care 10 10 192.168.10.144 192.168.10.159 255.255.255.240
Sales and 20 20 192.168.10.96 192.168.10.127 255.255.255.224
Marketing
Finance 25 30 192.168.10.64 192.168.10.95 255.255.255.224
Legal 5 40 192.168.10.160 192.168.10.167 255.255.255.248
HR 10 50 192.168.10.128 192.168.10.143 255.255.255.240
Developers 55 60 192.168.10.0 192.168.10.63 255.255.255.192
Network Team 5 70 192.168.10.168 192.168.10.175 255.255.255.248
Server room 5 100 10.254.1.0 10.254.1.255 255.255.255.0

3.1.4 list of devices and network components


Hardware Components
1. Routers

2. Switches

3. Wifi access point

4. Servers
5. PCs

6. Transmission Media(UTP)

Software Components
7. Networking Operating System(Windows server)

8. Protocol Suite(TCP/IP)

pg. 119
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

software used to design the network(Edraw)


Edraw is a powerful, all-in-one diagramming application that allows you to draw fishbone
diagrams, flowcharts, UML diagrams, floor plans, office layouts, and more. You can create
more than 280 different diagram types, from infographics to technical drawings.
With a massive library of templates and symbols at your disposal, you can get started with
network design immediately. There are thousands of templates, which are professionally and
intuitively designed, to choose from. Edraw offers excellent file compatibility, so you can
import Visio files and export your diagrams in a range of formats. This includes Visio, Word,
PDF, HTML, JPEG, and more.
Edraw has recently released an online version, which is another major benefit, allowing you to
access the program from anywhere, on any device and on any operating system. If you have
access to the internet, Edraw is at your disposal.
This network design software facilitates collaboration by letting you share diagrams on social
media via an HTML link. Because it’s based on cloud storage, you can work on a project at the
same time as other team members, while on multiple devices.

pg. 120
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Test and evaluate the proposed design to meet the requirements and analyse user
feedback by using a User feedback form.

Figure 37

pg. 121
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Figure 38

pg. 122
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Figure39

pg. 123
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Responses

Figure 40

pg. 124
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Figure 41

Figure 42

pg. 125
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Install and configure Network services, devices and applications (Ex: VLAN, DHCP,
DNS, Proxy, Web, Etc.) according to the proposed design to accomplish the user
requirements and design a detailed Maintenance schedule for above Network

Configure VLAN

Figure 43

pg. 126
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Figure 44

pg. 127
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

VLAN 2

Figure 45

pg. 128
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

VLAN IP ADRESS

Figure 46

pg. 129
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Figure 47

pg. 130
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Configure Telnet

Figure 48

pg. 131
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Configure SSH

Figure 49

pg. 132
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Figure 50

pg. 133
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Server Install Services

Figure 51

Figure 52

pg. 134
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Figure 53

Figure 54

pg. 135
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Figure 55

Figure 56

pg. 136
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Figure 57

Figure 58

pg. 137
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Figure 59

Figure 60

pg. 138
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Figure 61

Figure 62

pg. 139
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Configure DHCP Server

Figure 63

pg. 140
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Figure 64

Configure HTTP Server

Figure 65

pg. 141
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Maintenance schedule
Systems
Server Maintenance

Server Maintenance is the process of keeping the server updated and running to ensure that the
organization’s computer network is operating smoothly. The network administrator usually
does this, and it is crucial to the performance of the business. Without a proper IT service plan,
the application software will never run as expected. In severe cases, the network can even
experience partial or total failure leading to severe losses to your business.

Why is server maintenance important?

Server statistics

Think of server maintenance as putting gas in your car. You wouldn’t wait until you completely
run out of gas to go buy some more, because at that point you wouldn’t be able to drive any
further. No, you want to fill your car up with gas before your car is on empty.
You fill up your car as you need, but you also think ahead and put in extra for the longer trips.
Server maintenance is no different. You want to take care of your server before it’s too late,
maintaining current needs, while also looking to the future
You might still be wondering, what does server maintenance have to do with you?
Regular server maintenance is crucial to your business.
If you are a small (or large) company, chances are high that you have multiple servers on your
network. In order to keep your business’ computer network in optimal and reliable condition,
you need to have regular server updates, installation of patches, and diagnostics
Taking proper care of your servers will increase their life spans while saving you time and
money. This upkeep will spare you having to buy a new server and moving all of your data
from its original home prematurely (yeah, server failure is not fun).

pg. 142
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

But with regular maintenance, your business’ precious hardware and software will have a
greater chance of serving you for a long time.

Good server maintenance also boosts server productivity which, in turn, boosts your overall
business productivity. Routine server maintenance will keep your server functioning at top
speed. This will not only save you time, but also increase your work efficiency.

Properly monitored servers also give you the assurance that if anything goes wrong, you will
be able to easily recover any lost or damaged data. This way, you can get your systems back
and working before your clients even have the chance to notice there was an issue.

Server Maintenance

1. Verify your backups are working.

Before making any changes to your production system, be sure that your backups are working.
You may even want to run some test recoveries if you are going to delete critical data. While
focused on backups, you may want to make sure you have selected the right backup location.

2. Check disk usage.

Don’t use your production system as an archival system. Delete old logs, emails, and software
versions no longer used. Keeping your system free of old software limits security issues. A

pg. 143
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

smaller data footprint means faster recovery. If your usage is exceeding 90% of disk capacity,
either reduce usage or add more storage. If your partition reaches 100%, your server may stop
responding, database tables can corrupt and data may be lost.

3. Monitor RAID Alarms.

All production servers should use RAID. More importantly, you should be monitoring your
RAID status. In our decade plus in business, we have worked on countless systems where the
RAID failed. As a result, a single disk failure caused a complete system failure. At rackAID,
we either use providers that monitor our RAID for us or we have setup direct RAID monitoring.
Roughly I estimate that RAID fails in about 1% of servers per year. One percent may seem
small, but a complete server failure can turn a simple drive replacement into a multi-hour
disaster recovery scenario.

4. Update Your OS.

Updates for Linux systems are release frequently. Staying on top of these updates can be
challenging. This is why we use automated patch management tools and have monitoring in
place to alert us when a system is out of date. If you are updating your server manually (or not
at all), you may miss important security updates. Hackers often scan for vulnerably systems
within hours of a issue being disclosed. So rapid response is key. If you cannot automate your
updates, then create a schedule to update your system. I recommend weekly at a minimum for
current versions and perhaps monthly for older OS versions. I would also monitor release
notices from your distribution so you are aware of any major security threats and can respond
quickly.

5. Update your Control Panel.

If you are using a hosting or server control panel, be sure to update it as well. Sometimes this
means updating not only the control panel itself, but also software it controls. For example,
with WHM/cPanel, you must manually update PHP versions to fix known issues. Simply
updating the control panel does not also update the underlying Apache and PHP versions used
by your OS.

pg. 144
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

6. Check application updates.


Web applications account for more than 95% of all security breaches we investigate. Be sure
to update your web applications, especially popular programs like WordPress.

7. Check remote management tools.


If your server is co-located or with a dedicated server provider, you will want to check that
your remote management tools work. Remote console, remote reboot and rescue mode are what
I call the 3 essential tools for remote server management. You want to know that these will
work when you need them.

8. Check for hardware errors.


You may want to review the logs for any signs of hardware problems. Overheating notices,
disk read errors, network failures could be early indicators of potential hardware failure. These
are rare but worth a look, especially if the system has not been working within normal ranges.

9. Check server utilization.


Review your server’s disk, CPU, RAM and network utilization. If you are nearing limits, you
may need to plan on adding resources to your server or migrating to a new one. If you are not
using a performance monitoring tool, you can install systat on most Linux servers. This will
provide you some baseline performance data.

10. Review user accounts.


If you have had staff changes, client cancellations or other user changes, you will want to
remove these users from your system. Storing old sites and users is both a security and legal
risk. Depending on your service contracts, you may not have the right to retain a client’s data
after they have terminated services.

11. Change passwords.

I recommend changing passwords every 6 to 12 months, especially if you have given out
passwords to others for maintenance.

pg. 145
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

12. Check system security.


I suggest a periodic review of your server’s security using a remote auditing tool such as
Nessus. Regular security audits serve as a check on system configuration, OS updates and other
potential security risks. I suggest this at least 4 times a year and preferably monthly

SYSTEM MAINTANCE

Systems are effective and efficient or otherwise. The process of monitoring, evaluating, and
modifying of existing information systems to make required or desirable improvements may
be termed as System Maintenance.

System maintenance is an ongoing activity, which covers a wide variety of activities, including
removing program and design errors, updating documentation and test data and updating user
support. For the purpose of convenience, maintenance may be categorized into three classes,
namely:
i) Corrective Maintenance: This type of maintenance implies removing errors in a program,
which might have crept in the system due to faulty design or wrong assumptions. Thus, in
corrective maintenance, processing or performance failures are repaired.
ii) Adaptive Maintenance: In adaptive maintenance, program functions are changed to enable
the information system to satisfy the information needs of the user. This type of maintenance
may become necessary because of organizational chan

Network Maintenance
Network maintenance basically means you have to do what it takes in order to keep a network
up and running and it includes a number of tasks:

1.Troubleshooting network problems.


2.Hardware and software installation/configuration.
3.Monitoring and improving network performance.

pg. 146
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

4.Planning for future network growth.


5.Creating network documentation and keeping it up-to-date.
6.Ensuring compliance with company policies.
7.Ensuring compliance with legal regulations.
8.Securing the network against all kind of threats.
Of course this list could be different for each network you work on and perhaps you are only
responsible for a number of these tasks. All these tasks can be performed in the following way:

Structured tasks.
Interrupt-driven tasks.
Structured means you have a pre-defined plan for network maintenance that will make sure
that problems are solved before they occur. As a network engineer this will also make your life
a whole lot easier. Interrupt-driven means you just wait for trouble to occur and then fix it as
fast as you can. Interrupt-driven is more like the “fireman” approach…you wait for trouble to
happen and then you try to fix the problem as fast as you can. A structured approach where you
have a network maintenance strategy and plan reduces downtime and it’s more cost effective.

Of course you can never completely get rid of interrupt-driven tasks because sometimes things
“just go wrong” but with a good plan we can reduce the number of interrupt-driven tasks for
sure.

You don’t have to think of a complete network maintenance model yourself; there are a number
of well-known network maintenance models that we use. It’s best to use one of the models that
is best suited for your organization and adjustments if needed.

Choosing which network maintenance model you will use depends on your network and the
business. You can also use them as a template to create your own network maintenance model.

To give you an idea what a network maintenance model is about and what it looks like, here’s
an example for FCAPS:

pg. 147
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Fault management: we will configure our network devices (routers, switches, firewalls, servers,
etc.) to capture logging messages and send them to an external server. Whenever an interface
goes down or the CPU goes above 80% we want to receive an e-mail so we can see what is
going on.
Configuration management: Any changes made to the network have to be logged. We will use
a change management so relevant personnel will be notified of planned network changes.
Changes to network devices have to be reported and acknowledged before they are
implemented.
Accounting management: We will charge (guest) users for usage of the wireless network so
they’ll pay for each 100MB of data or something. It’s also commonly used to charge people
for long distance VoIP calls.
Performance management: Network performance will be monitored on all LAN and WAN
links so we know when things go wrong. QoS (Quality of Service) will be configured on the
appropiate interfaces.
Security management: We will create a security policy and implement it by using firewalls,
VPNs, intrusion prevention systems and use AAA (Authorization, Authentication and
Accounting) servers to validate user credentials. Network breaches have to be logged and a
appropiate response has to be made.

pg. 148
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Activity 04

Implement a networked system based on your prepared design with valid evidences and recommend
potential future enhancements for the networked system with valid justifications to your
recommendations. Use critical reflection to critically evaluate the design, plan, configuration, and
testing of your network while justifying with valid conclusions.

Network design cisco pocket tracer

Figure 66

pg. 149
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

ping

Extended ping (-t)


Figure 67

pg. 150
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Figure 68

pg. 151
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

trace

Figure 69

telnet

Figure 70
pg. 152
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

SSH

Figure 71

Test report

Test Case Id Test Name Test Condition Expected Outcome

T001 Ping Ping 10.254.1.5 0% loss

T002 Extended Ping Ping -t 10.254.1.5 0% loss

T003 Trace Root tracert 10.254.1.5 Run through Vlan ip

T004 Telnet telnet 192.168.10.97 Access remotely correct

T005 SSH SSH 192.168.10.97 Access remotely correct

pg. 153
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

Conclusion
In this chapter I learned definitions of network analysis, architecture, and design; the
importance of network analysis in understanding the system and providing a defensible
architecture and design; and the model for the network analysis, architecture, and design
processes.

You have also learned that networks are not independent entities but rather a part of the system
and that the delivery of network services is a goal of the system. Network services consist of
performance and function and are offered to users, applications, and devices so that they can
accomplish their work on the system. In order to architect and design a network to support
services, you need to know what they are, how they work together, and how to characterize
them. Once you do this, you will have a broad view of what the network will need to support,
which you can take to the next levels of detail as you proceed with the network analysis.

By describing the system as a set of components (e.g., user, application, device, network), you
can apply interfaces between these components to help understand the relationships, inputs,
and outputs between each of the components.

You have also learned about different types of services, from best-effort, unpredictable, and
unreliable service to predictable, bounded, and somewhat predictable service, to guaranteed
services with accountability.

To go to a level deeper in the discussion about services, we considered the service performance
characteristics capacity, delay, and RMA (reliability, maintainability, and availability). These
characteristics will be useful only if we can measure and verify their values in the system. We
discussed these values, as well as service metrics, thresholds, and boundaries. We learned that
performance characteristics could be combined into a performance envelope.

Having thought about systems, services, and their characteristics, we are now ready to quantify
what we want from our networks. To do this, we first need to gather, analyze, and understand

pg. 154
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

the requirements from the system. This is requirements analysis, the next step in the network
analysis process.

References

Comparitech. 2021. 6 Best Network Topologies Explained - Pros & Cons [Including
Diagrams]. [online] Available at: <https://www.comparitech.com/net-admin/network-
topologies-advantages-disadvantages/> [Accessed 20 May 2021].

Arcelect.com. 2021. Ethernet Topologies Gigabit LAN Standards Gigabit Ethernet Leads the
Way Over Fiber. [online] Available at: <https://arcelect.com/ethernet.htm> [Accessed 20 May
2021].

ManageEngine, c., 2021. Network Monitoring Software by ManageEngine OpManager.


[online] ManageEngine OpManager. Available at: <https://www.manageengine.com/network-
monitoring/network-protocols.html> [Accessed 20 May 2021].

Operations, I. and Explained, N., 2021. Network Devices Explained. [online]


Blog.netwrix.com. Available at: <https://blog.netwrix.com/2019/01/08/network-devices-
explained/> [Accessed 20 May 2021].

2021. [online] Available at: <https://www.router-switch.com/dell-poweredge-r930-dual-xeon-


e7-4820-v4-64gb-1-2tb-sas-server.html> [Accessed 20 May 2021].

Operations, I. and Explained, N., 2021. Network Devices Explained. [online]


Blog.netwrix.com. Available at: <https://blog.netwrix.com/2019/01/08/network-devices-
explained/> [Accessed 20 May 2021].

Interserver Tips. 2021. Common Network Protocols and Their Ports - Interserver Tips. [online]
Available at: <https://www.interserver.net/tips/kb/common-network-protocols-ports/>
[Accessed 12 May 2021].

pg. 155
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)


lOMoARcPSD|23573241

ManageEngine, c., 2021. Network Monitoring Software by ManageEngine OpManager.


[online] ManageEngine OpManager. Available at: <https://www.manageengine.com/network-
monitoring/network-protocols.html> [Accessed 12 May 2021].

Protocols, W., 2021. What Is Networking Protocols | How Networking Protocol works?.
[online] EDUCBA. Available at: <https://www.educba.com/what-is-networking-protocols/>
[Accessed 12 May 2021].

Ibm.com. 2021. IBM Docs. [online] Available at:


<https://www.ibm.com/docs/en/zos/2.4.0?topic=ipv6-internet-protocol-version-4-ipv4>
[Accessed 12 May 2021].

Ibm.com. 2021. IBM Docs. [online] Available at:


<https://www.ibm.com/docs/en/i/7.4?topic=6-ipv6-overview> [Accessed 12 May 2021].

Thakur, D., 2021. Ethernet topology - What is an Ethernet topology? How an Ethernet
Worked? - Computer Notes. [online] Computer Notes. Available at:
<https://ecomputernotes.com/computernetworkingnotes/computer-network/what-is-an-
ethernet-topology-how-an-ethernet-worked> [Accessed 12 May 2021].

pg. 156
SAJEEVAN ANGEL NETWORK

Downloaded by Bimsara Kumarasinghe (bimsarakumarasinghe97@gmail.com)

You might also like