Professional Documents
Culture Documents
Downstudocu.com
lan-design-implementation-for-syntax-solutions
HND in Computing (ESOFT Metro Campus)
Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)
pg. 1
SAJEEVAN ANGEL NETWORK
Assessor Internal
Verifier
Y/N
Is the Pass/Merit/Distinction grade awarded
justified by the assessor’s comments on the
student work?
Y/N
pg. 2
SAJEEVAN ANGEL NETWORK
Give details:
• Constructive?
Y/N
• Linked to relevant assessment
criteria?
Y/N
• Agreeing actions?
Y/N
Does the assessment decision need
amending?
Y/N
Date
Give details:
pg. 3
SAJEEVAN ANGEL NETWORK
Internal
Verifier
signature Date
Programme Leader
signature (if
required) Date
pg. 4
SAJEEVAN ANGEL NETWORK
Assessor Feedback:
LO1 Examine networking principles and their protocols.
Resubmission Feedback:
pg. 5
SAJEEVAN ANGEL NETWORK
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.
Assignment Feedback
Formative Feedback: Assessor to Student
Action Plan
Summative feedback
Assessor Date
signature
Student Date
signature
pg. 6
SAJEEVAN ANGEL NETWORK
pg. 7
SAJEEVAN ANGEL NETWORK
General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment. Use previous
page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory
information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the
before mentioned compulsory information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will then
be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and
a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course
pg. 8
SAJEEVAN ANGEL NETWORK
pg. 9
SAJEEVAN ANGEL NETWORK
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct form. I further understand what it means to copy
another’s work.
sajeevanangeloffi@gmail.com
pg. 10
SAJEEVAN ANGEL NETWORK
Unit Tutor
Assignment Title LAN Design & Implementation for SYNTAX SOLUTIONS
Issue Date
Submission Date
IV Name & Date
Submission format
The submission should be in the form of an individual report written in a concise, formal business style
using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using Harvard
referencing system. Please also provide an end list of references using the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures, although
you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:
pg. 11
SAJEEVAN ANGEL NETWORK
Scenario
SYNTAX SOLUTIONS is a privately owned, well-known Software company located in Colombo. The
Management of SYNTAX SOLUTIONS has purchased a 3-story building in the heart of Matara. They are
planning to make it one of the state-of-the-art companies in Matara with the latest facilities.
Customer Care 10
Finance 25
Legal 5
HR 10
Developers 55
Network Team 5
192.16 8.10.0/24 is given and should be used for all the departme nts exc ept the
serve r room. IPs sho uld assign u s ing DHCP.
ERP an d CRM Syst ems need to be implemente d in M atara branc h in loc al servers.
pg. 12
SAJEEVAN ANGEL NETWORK
designer and should be ass igned with 10 .254.1.0/24 subnet. (Uses s tatic IPs )
High lev el o f r ed u n d an cy is expec ted in ne twork design to elim inate single point of
failures a nd traffic bottle nec ks.
All pos sible n etwo r k s ecu r ity mec hanisms should be im plemented.
Assume you have been appo inte d as t he ne w network c onsult ant of SYNTA X SOL UTI ON S.
Prepare a network arc hitec t ural design and implement it with yo ur sugge stio ns and
rec ommendations to meet the com pany requirements.
(Note : Cle arly sta te y our assumptions. You a re allowed to de sign the ne two rk accordin g
to y ou r a ssumptions, but main re qui reme nts should not be v iol ate d)
A ctiv ity 01
Disc uss t he benefits and c onstraints of different network system type s that c an be
implemented in the M atara branc h and the mai n IEEE Ethernet standards that c an be
used in above LAN and WL AN design .
Disc uss the im po rtanc e and impac t of netwo rk topo lo gies and network protoc ol
suites w hile c omparing the main net wo rk topologies and network protoco l suites that
are used in networ k des ign using examples. Rec ommend suitable network topolo gies
and network protoc ol suites for abo ve sc enario and j ustify your answer with valid
points.
pg. 13
SAJEEVAN ANGEL NETWORK
A ctiv ity 02
Disc uss the operating princ iples of network devic es (Ex: Router, Sw itc h, Etc .) and server
types that can be used for above sc enario while exploring different servers tha t are
available in today’s market with their spec ific ations . Rec omme nd server/se rvers for the
above sc enario and j ustify your se lec tion with valid points .
Disc uss the inter-dependenc e of workst ation hardware with netwo rking software and
provide examples fo r networking so ftware that c an be use d in above ne twork design.
A ctiv ity 03
Install and configure Netwo rk servi ces , devic es and applic ations (Ex: VLAN,D HCP,
DNS,Proxy, Web, E tc .) ac co rding to the proposed design to ac c ompl ish the user
requirements and design a detailed M aintenanc e sc he dule for abov e Network.
pg. 14
SAJEEVAN ANGEL NETWORK
A ctiv ity 04
Implement a networked system based on your prepared design wit h v alid evidenc e s and
rec ommend potential future enhanc ements fo r the ne tworked system with valid
j ustific ations to yo ur rec ommendat ions . Use cr itic al reflec tion to c ritic ally evaluat e the
design, plan, c onfiguration, and testing of your network while j ustifying with valid
c onc lus ions.
Develo p test c ases and conduc t verific ation (E x: Ping, exte nded ping, trace ro ute ,
telnet , SS H, etc .) to test the abo ve Network and analyse the test results against the
expec ted results.
pg. 15
SAJEEVAN ANGEL NETWORK
pg. 16
SAJEEVAN ANGEL NETWORK
Grading Rubric
P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Compare common networking principles and how protocols
enable the effectiveness of networked systems.
P3
Discuss the operating principles of networking devices and
server types.
P4
Discuss the inter-dependence of workstation hardware with
relevant networking software.
M2
Explore a range of server types and justify the selection of a
server, considering a given scenario regarding cost and
performance optimization.
LO 1 & LO2
pg. 17
SAJEEVAN ANGEL NETWORK
P5
Design a networked system to meet a given specification.
P6
Test and evaluate the design to meet the requirements and
analyze user feedback.
M3
Install and configure network services and applications on your
choice.
D2
Design a maintenance schedule to support the networked
system.
P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D3
Use critical reflection to evaluate own work and justify valid
conclusions.
pg. 18
SAJEEVAN ANGEL NETWORK
Acknowledgement
I would like to express my special thanks of gratitude to my lecture (mr.safran) as well as our
head (mr.dewanath) who gave me the golden opportunity to do this wonderful assignment on
the topic (network), which also helped me in doing a lot of Research and I came to know about
so many new things I am really thankful to them.
Secondly i would also like to thank my parents and friends who helped me a lot in finalizing
this project within the limited time frame.
Sajeevan angel
pg. 19
SAJEEVAN ANGEL NETWORK
Acknowledgement ................................................................................................................... 19
Activity 01................................................................................................................................. 26
Network ...................................................................................................................................26
1. LAN ....................................................................................................................................... 28
2. MAN ..................................................................................................................................... 31
3. WAN ..................................................................................................................................... 34
1.1.3 ...... The main IEEE Ethernet standards that can be used in above LAN and WLAN
design........................................................................................................................... 45
Discuss the importance and impact of network topologies and network protocol
suites while comparing the main network topologies and network protocol suites
that are used in network design using examples. Recommend suitable
networtopologies and network protocol suites for above scenario and justify your
answerwith valid points............................................................................................... 48
Ring Topology........................................................................................................................... 52
pg. 20
SAJEEVAN ANGEL NETWORK
Mesh Topology......................................................................................................................... 59
1.2.2.1Ethernet topology 63
Activity 02................................................................................................................................. 81
Discuss the operating principles of network devices (Ex: Router, Switch, Etc.) and server
types that can be used for above scenario while exploring different servers that are available
in today’s market with their specifications. Recommend server/servers for the above
scenario and justify your selection with valid points. .............................................................81
Discuss the operating principles of networking devices and server types. ............................. 81
Network Switch........................................................................................................................ 83
Modem ..................................................................................................................................... 84
pg. 21
SAJEEVAN ANGEL NETWORK
Bridge ....................................................................................................................................... 85
Repeater................................................................................................................................... 85
Gateway ................................................................................................................................... 86
exploring different servers that are available in today’s market with their
specifications. Recommend server/servers for the above scenario and justify your
selection with valid points. .......................................................................................... 87
pg. 22
SAJEEVAN ANGEL NETWORK
NetWare ................................................................................................................................... 95
Cloud servers............................................................................................................................ 95
Motherboard: ..........................................................................................................................96
Processor:................................................................................................................................. 96
Memory:................................................................................................................................... 97
Video: ....................................................................................................................................... 97
3.1 ............Prepare a written network design plan to meet the above mentioned user
requirements including a blueprint drawn using a modeling tool. ........................... 117
Test and evaluate the proposed design to meet the requirements and analyse user
feedback by using a User feedback form. ................................................................. 121
pg. 23
SAJEEVAN ANGEL NETWORK
Install and configure Network services, devices and applications (Ex: VLAN, DHCP,
DNS, Proxy, Web, Etc.) according to the proposed design to accomplish the user
requirements and design a detailed Maintenance schedule for above Network ....126
Maintenance schedule...............................................................................................142
pg. 24
SAJEEVAN ANGEL NETWORK
Implement a networked system based on your prepared design with valid evidences and
recommend potential future enhancements for the networked system with valid
justifications to your recommendations. Use critical reflection to critically evaluate the
design, plan, configuration, and testing of your network while justifying with valid
conclusions............................................................................................................................. 149
ping......................................................................................................................................... 150
SSH .........................................................................................................................................153
References .............................................................................................................................155
pg. 25
SAJEEVAN ANGEL NETWORK
Activity 01
Network
FIGURE 1 https://www.computerhope.com/jargon/n/network.gif
pg. 26
SAJEEVAN ANGEL NETWORK
The term network topology describes the relationship of connected devices in terms of a
geometric graph. Devices are represented as vertices, and their connections are represented as
edges on the graph. It describes how many connections each device has, in what order, and it
what sort of hierarchy.
Typical network configurations include the bus topology, mesh topology, ring topology, star
topology, tree topology and hybrid topology.
FIGURE 2 https://www.computerhope.com/jargon/n/nettopo.gif
pg. 27
SAJEEVAN ANGEL NETWORK
Most home networks are configured in a tree topology that connects to the Internet. Corporate
networks often use tree topologies, but they also often incorporate star topologies, and an
Intranet.
A computer network is a group of computers linked to each other that enables the computer to
communicate with another computer and share their resources, data, and applications.
A computer network can be categorized by their size. A computer network is mainly of four
types:
1. LAN
The full form of LAN is the ‘Local Area Network. ‘ As the name suggests, it connects the
computers by covering the local area within 10m to 1.5 km. Since it covers a small local area,
you will find LAN in local places like offices, colleges, schools, groups of buildings, business
organizations.
This network is managed and used by one person or one small organization. This network is
used for resource sharing, data storage, document printing by connecting devices like printers,
scanners, projectors, and other storage components.
pg. 28
SAJEEVAN ANGEL NETWORK
In (LAN, WAN, and MAN), The LAN often connected via Ethernet cables and Wi-Fi also
Token Ring and Fiber Distributed Data Interface, or FDDI, TCP/IP are the most common
protocol that is used in this network.
When you share your internet connection with someone else, such sharing is also an example
of LAN. The smallest LAN can be made up of only two computers.
The transmission rate of LAN ranges from 4Mbps to 16Mbps and can maximize up to 100
Mbps. For the interconnection of the host in LAN, we can use any type of network topology
which meets the need of the network such as a bus or ring topology.
In a LAN, we can connect up to 1000 computers. Most LANs are used in wire connections.
But nowadays, it is also being used without wire, i.e., in wireless connections. The bonus point
of this network is its high speed, lower expenses, and security.
Figure 3 https://digitalworld839.com/wp-content/uploads/2020/07/LAN-Local-Area-
Network-1-768x644.jpg
Features of LAN:
The network capacity of a LAN is limited to a single room and small geographical areas like
homes, small firms, and offices.
The LAN has the advantage of high speed for data transfer.
pg. 29
SAJEEVAN ANGEL NETWORK
File transfer and recovery are more manageable in a LAN network because backup files are
stored in a server.
The LAN network is a private network, it doesn’t own by any government bodies.
Uses of LAN:
LAN often use as a local network at home for sharing data as well as on-campus of a college
and school. Similarly, LAN is used as an intranet for business organizations via wifi.
Advantages of LAN
Resource Sharing: Unlimited data sharing via computer resources such as printers, DVD-
ROM, modems, drives, and hard disks with local area networks; this reduces costs.
Software Applications Sharing: It is cheaper for each client to use the same software on the
network instead of buying separately licensed software.
Easy and Cheap Communication: Communication will be handy and economical because data
and messages can be easily transferred to networked computers.
Centralized Data: All the data of users is saved on the server’s database, one should not worry
about losing the data and documents. Since there is a backup option to avoid such errors.
pg. 30
SAJEEVAN ANGEL NETWORK
Internet Sharing: Local area network facilitates the sharing of a single Internet connection
among all the users who are connected with the LAN.
Disadvantages of LAN
Setup Cost: Although LANs will save costs over time due to sharing computer resources, the
initial cost of establishing a local area network is a bit expensive.
LAN Maintenance: Local area networks require a LAN administrator for handling software
installation, wiring setup, hardware failures, or cable malfunctions.
Server Load: If the server is not very good, it cannot overload many computer connections,
which can cause damage.
Security: There is a risk of insecurity because hackers can enter the system. Similarly, viruses,
malware can also enter into a LAN it can damage all those that are connected.
Covers Limited Area: The local area network is limited covers only a small area such as a
home, an office, a building, or a cluster of nearby buildings.
2. MAN
The Full form of MAN is the ‘Metropolitan Area Network.’ The WAN is a superior version of
the LAN network, often used in cities and other locations covering a range of 5-60 km to
transfer data at high speed.
pg. 31
SAJEEVAN ANGEL NETWORK
Under this network of MAN, two or more local area networks are connected. That bridge is
called backbone lines which usually established by optical cable and twisted pair cables to
boost data transfer speed.
This network connects all the prominent colleges, schools, and government offices, business
organizations in the city. Thus, we can say that a MAN network is made up of multiple LANs.
The best example of a MAN is Cable TV situated in the middle of a city, as its cable spreads
throughout the city, and the user uses the service through the cable network.
A big business organization has its own MAN. Through which it connects to a different branch.
If such networks start being used on a college campus, they call it a CAN (campus area
network).
MAN can be considered as a group of one or more LAN networks connected together through
a single cable. RS-232, X-25, Frame Relay, and ATM are the common protocol practice for
communication in MAN.
Figure 4
https://digitalworld839.com/wp-content/uploads/2020/07/MAN-Metropolitan-Area-
Network-1-min.jpg
pg. 32
SAJEEVAN ANGEL NETWORK
Features of MAN:
The network coverage of MAN is more massive than LAN but smaller than WAN.
Uses of MAN:
MAN used in various government bodies, police stations, private firms that are situated within
a city. The officers, employees can easily communicate either with each other or between
their departments and branches in order to pass the important data and message quickly over
this network without any need for the Internet connection.
Thus it provides various resource sharing over a large distance in the city than the LAN
networks.
Advantages of MAN
This provides a good backbone for large networks and gives WANs more access.
It serves many towns and cities and thus provides great inter-connectivity in large areas at a
low cost.
The dual bus used in MAN helps in the transmission of data in both directions simultaneously.
Disadvantages of MAN
MAN needs more cables from joining connections from one place to another.
pg. 33
SAJEEVAN ANGEL NETWORK
Greater will be the cable length, the more will be the cost of establishing the MAN.
At such a big distance anyone can hack the network. One can’t put security at each point of
the network in the widespread areas, hence it becomes easier for unwanted people to access
it for their own benefits.
It is difficult for the system to protect from the graphical areas of hackers and industrial
espionage.
3. WAN
A WAN full-form is ‘Wide Area Network. ‘ A WAN is used to connect computers that are not
close to one another. It is the collection of many LANs with a much more extensive range than
LAN and MAN.
In LAN, WAN, and MAN, the WAN network’s geographical periphery is more widespread
such as a network of systems spread across the entire city, country, or even continent.
This network connects has similar structures, as LANs and MANs. Most WANs are public
networks, like the phone line and satellites, telephone systems, or leased lines.
Generally, fiber optic cable is used as a medium for transmission in WAN. This network works
on physical, data-link, and network layers of the OSI Reference Model.
Devices involved for the transmission of data, images, video, big database, and files in the
connection of WAN more diversified, ranging from routers to switches, bridges, firewall
modems, and so on.
Some of the most common WAN protocols in use today are Frame Relay, X-25, Integrated
Services Digital Network, or ISDN, and Point-to-Point Protocol, or PPP.
An example of the largest WAN is the Internet. Through the Internet, people can connect from
one place or other computers or users anywhere in the world. It is implemented by a public
broadcasting system.
pg. 34
SAJEEVAN ANGEL NETWORK
Figure 5
https://digitalworld839.com/wp-content/uploads/2020/07/WAN-Wide-Area-Network-
768x644.jpg
Features of WAN:
It is generally used for voice and data for mobile and landline phone applications.
A large number of people can communicate with one another in this single network.
Its data transmission speed fluctuating sometimes slow or even very fast.
The network range or coverage area of a WAN is more massive, from which we can transfer
the data across the world.
Uses of WAN:
The WAN networks are used for military services. There is a satellite method of transmission
is used in this setup. WAN is used in this field for the communication and operation of the
military with high security.
Airlines and Railways use WAN networks for booking tickets from anywhere in the country.
The is done because client nodes are situated all over the country and are connected to a
centralized server to one network.
Advantages of WAN
pg. 35
SAJEEVAN ANGEL NETWORK
It covers a large geographic area so that long-distance businesses and companies are able to
connect on a single network.
Shares software and resources with connecting workstations.
Messages can be sent very fast to someone else on the system, the rate of transmission is very
high even if we send large-sized files of more than 10 MB.
Everyone on the network can use the same data. This avoids problems where some users may
have older versions of information than others.
All clients associated through WAN will stay in synchronization with each other constantly,
accordingly, there will be no odds of a correspondence hole between them.
Disadvantages of WAN
A good firewall is needed to prevent anonymous hackers from hacking the data and disrupting
the network.
Setting up a network is very expensive, slow, and complicated. The more comprehensive the
system, the more expensive it.
There is a need to appoint technicians and supervisors for the full-time maintenance of
connections.
A personal area network (PAN) is a computer network organized around an individual for
personal use only. They typically used for connecting different devices like smartphones,
tablets, printers, computers, and other digital devices within the environment of an individual
user (typically within 10 meters or 33 feet).
Personal Area Network is used for a personal purpose like for data sharing among devices
within the personal area network range of 10 meters or 33 feet. For Example, If a computer is
connected with the printer, scanner, and digital camera within the range of 33 feet then it is
known as Personal Area Network.
pg. 36
SAJEEVAN ANGEL NETWORK
11. Reliable:
12. Secure:
pg. 37
SAJEEVAN ANGEL NETWORK
It is a dedicated high-speed network particularly used for data storage. This network is built
with servers, switches, fiber optic cables, and storage devices. In this system, the storage
devices are not directly connected to the servers.
Rather, storage devices are connected to the servers through switches. And, optical fibers are
used for the connection. Due to that, the data transfer speed of a SAN is very high. And for that
very reason, servers and the Operating System sees the hosted data or storage devices as local
disk drives.
It also implies that SAN provides access to only block-level operations and consolidated data
even though there are multiple storage devices and servers. And, like all the other data storage
solutions, SAN also has its good and bad sides. In this post, we will let you know what are the
benefits and drawbacks of using a SAN (Storage Area Network).
pg. 38
SAJEEVAN ANGEL NETWORK
https://907162.smushcdn.com/2195243/wp-content/uploads/2021/02/types-of-networks-
SAN-diagram-storage-area-network.jpg?lossy=0&strip=1&webp=1
1. Security
If you want to keep your data secure, then you should opt for using SAN. You can implement
various types of security measures on a SAN easily. For instance, you will be able to isolate
the users, organizations, or departments with the help of a virtual SAN.
You can also implement ACL (Access Control List) within the switches to make sure that only
the authenticated users can join. Other than these, there are a lot of other steps you can take for
securing the SAN. So, all of your data on the SAN are secured.
SAN offers automatic continuous network operation. It doesn’t matter if one or a few of the
servers go offline or fail. The automatic traffic rerouting function and built-in redundancy
would take over whenever a server failure happens. As a result, your storage network will be
always up. This dynamic failover protection comes in handy while you need to do maintenance
work on any of the servers.
pg. 39
SAJEEVAN ANGEL NETWORK
4. Centralized Backup
SAN stores data at the block level. And, all of the data in a SAN is centralized. That means,
the data will be automatically replicated and it will be stored on a central location. So, even if
a server disconnects or goes off in the network, then all the other servers take control and
stabilize the data load. As a result, the data transfer on the SAN stays uninterrupted.
result, you will always get access to the data and applications that are necessary for you or your
organization. SAN also uses the top-notch algorithm for data protection, so your data will
always be safe and consistent.
As all the servers are connected via switches, you don’t have to move storage devices from one
server to another physically, if you want to allocate new storage space from one server to
another. You can use a SAN as a single entity.
pg. 41
SAJEEVAN ANGEL NETWORK
In LAN based storage networks, the data are stored on the servers or storage disks. As a result,
you will face bandwidth bottlenecks while a huge amount of data is being transferred via LAN.
So, if your website gets a sudden spike on visitors, the servers will crash.
However, in the case of SAN, all the data are stored on the SAN. So, the resources of your
servers and storage devices are always available to the system. And, you will not face any
bandwidth bottlenecks in SAN.
Frankly, to run a decent storage Area Network system, you will need to spend a hefty amount
of money. It is because you are getting an industry-leading data storage and transfer facility.
So, if you don’t have a big business then you can avoid using SAN. Instead, you can look for
other affordable solutions.
It is not impossible to use SAN with only a few servers. However, it will be costly for you.
Whereas you could actually manage those servers yourself without spending too much. In that
regard, if you have dozens or hundreds of expensive servers, you can take advantage of using
SAN.
You should always take good measures to secure the SAN. Then again, implementing high-
end security measures to a SAN is expensive. So, a lot of users don’t use them. However, if
you don’t take all the necessary precautions, sensitive data might leak as all of the client
computers uses the same storage devices and servers in SAN. (Lee, 2021)
pg. 42
SAJEEVAN ANGEL NETWORK
With a campus area network (CAN), universities, colleges, and corporate campuses connect
different LANs from various departments sharing a common area. This transforms otherwise
scattered networks into a collective network that provides access to information at breathtaking
speeds while ensuring the necessary authentication to prevent privacy loopholes.
CANs are similar to LANs in operational approach, but differ in size to these types of networks.
Users who access a CAN with different devices often do so with Wi-Fi, hotspots, and Ethernet
technology.
Figure 8
https://907162.smushcdn.com/2195243/wp-content/uploads/2021/02/types-of-networks-
CAN-diagram.jpg?lossy=0&strip=1&webp=1
You have devices spread over campus that need to communicate directly with each other.
You have the ability to provide connectivity, wired or wireless, between each building.
pg. 43
SAJEEVAN ANGEL NETWORK
Cost is a primary requirement, as less costly solutions to connect sites may exist.
Devices to be connected are spread out over a larger geographic area, not isolated to just the
campus.
With an EPN, companies can choose to have a purpose-built network that’s fully private or a
hybrid integrated with a network Communications Service Provider (CSP). EPNs are
optimized with tunneling protocols, such as Layer 2 Tunneling Protocol (L2TP) and Internet
Protocol Security (IPsec) to ensure privacy across all network operations. Branches are
connected with MPLS technology.
Figure 9
https://907162.smushcdn.com/2195243/wp-content/uploads/2021/02/network-types-EPN-
diagram.jpg?lossy=0&strip=1&webp=1
pg. 44
SAJEEVAN ANGEL NETWORK
You need to facilitate secure communications between two locations but don’t have any direct
connectivity between the two locations.
You need to provide users spread across various locations consistent access to resources spread
across various locations.
There are requirements to scale and grow the network over time.
Your network team is resource-constrained. EPNs require additional time to set up, update, and
maintain.
Redundant links between locations aren’t possible, as this will introduce additional failure
points to the network.
1.1.3 The main IEEE Ethernet standards that can be used in above LAN and WLAN
design.
IEEE Ethernet standards
Ethernet is defined in a number of IEEE 802.3 standards. These standards define the physical
and data-link layer specifications for Ethernet. The most important 802.3 standards are:
pg. 45
SAJEEVAN ANGEL NETWORK
10Base-T (IEEE 802.3) – 10 Mbps with category 3 unshielded twisted pair (UTP) wiring, up
to 100 meters long.
100Base-TX (IEEE 802.3u) – known as Fast Ethernet, uses category 5, 5E, or 6 UTP wiring,
up to 100 meters long.
100Base-FX (IEEE 802.3u) – a version of Fast Ethernet that uses multi-mode optical fiber. Up
to 412 meters long.
1000Base-SX (IEEE 802.3z) – 1 Gigabit Ethernet running over multimode fiber-optic cable.
Notice how the first number in the name of the standard represents the speed of the network in
megabits per second. The word base refers to baseband, meaning that the signals are
transmitted without modulation. The last part of the standard name refers to the cabling used
to carry signals. For example, 1000Base-T means that the speed of the network is up to 1000
Mbps, baseband signaling is used, and the twisted-pair cabling will be used (T stands for
twisted-pair).
Stands for the "Institute of Electrical and Electronics Engineers" and is produced "I triple E."
The IEEE is a professional association that develops, defines, and reviews electronics and
computer science standards. Its mission is "to foster technological innovation and excellence
for the benefit of humanity."
The history of the IEEE dates back to the 1800s, when electricity started to influence society.
In 1884, the AIEE (American Institute of Electrical Engineers) was formed to support electrical
innovation. In 1912, the IRE (Institute of Radio Engineers) was created to develop wireless
telegraphy standards. In 1963, the two organizations merged to become a single entity – the
IEEE. Since then, the organization has established thousands of standards for consumer
electronics, computers, and telecommunications.
pg. 46
SAJEEVAN ANGEL NETWORK
pg. 47
SAJEEVAN ANGEL NETWORK
Discuss the importance and impact of network topologies and network protocol suites
while comparing the main network topologies and network protocol suites that are used
in network design using examples. Recommend suitable network topologies and network
protocol suites for above scenario and justify your answer with valid points.
No matter how identical two organizations are, no two networks are exactly alike. However,
many organizations are relying on well-established network topology models. Network
topologies outline how devices are connected together and how data is transmitted from one
node to another.
pg. 48
SAJEEVAN ANGEL NETWORK
A network topology map is a map that allows an administrator to see the physical network
layout of connected devices. Having the map of a network’s topology on hand is very useful
for understanding how devices connect to each other and the best techniques for
troubleshooting.
1.Bus Topology Simple layout and cheap but vulnerable to failure and only suitable for low
traffic volumes. Not used for office networks today, but can still be found within some
consumer products.
2.Ring Topology Easy to manage and with a low risk of collision but reliant on all nodes being
powered up and in full working order. Rarely used today.
3.Star Topology All devices are connected to a central switch, which makes it easy to add new
nodes without rebooting all currently connected devices. This topology makes efficient use of
cable and is easy to administer. On the other hand, the health of the switch is vital. This
topology requires monitoring and maintenance. However, it is a commonly encountered
topology.
4.Tree Topology A hierarchical layout that links together groups of nodes. Creates parent-child
dependencies between root nodes and regular nodes. This layout can be vulnerable to failure if
a root node has a problem. This topology is complicated and difficult to manage and it uses a
lot of cable.
5.Mesh Topology Each node is connected to every other mode with a direct link. This topology
creates a very reliable network, but requires a large amount of cable and is difficult to
administer. Wifi networks make this topology more feasible.
6.Hybrid Topology Combines two or more of the standard topologies. This can be a good
solution to create quickly link together different existing networks into a unified system. Don’t
pg. 49
SAJEEVAN ANGEL NETWORK
confuse the term “hybrid network topology” with “hybrid system” – a term that is applied to
the combination of onsite and cloud resources.
Bus Topology
https://cdn.comparitech.com/wp-content/uploads/2018/11/Bus-Topology.jpg
figure 10
Pros:
Easy installation
Fewer cables required than Mesh and star topology
Good for small businesses
Low cost
Easy to manage and expand
Cons:
pg. 50
SAJEEVAN ANGEL NETWORK
Bus topology is a network type where every device is connected to a single cable that runs from
one end of the network to the other. This type of network topology is often referred to as line
topology. In a bus topology, data is transmitted in one direction only. If the bus topology has
two endpoints then it is referred to as a linear bus topology.
Smaller networks with this type of topology use a coaxial or RJ45 cable to link devices
together. However, the bus topology layout is outdated and you’re unlikely to encounter a
company using a bus topology today.
Advantages
Bus topologies were often used in smaller networks. One of the main reasons is that they keep
the layout simple. All devices are connected to a single cable so you don’t need to manage a
complex topological setup.
The layout also helped make bus topologies cost-effective because they can be run with a single
cable. In the event that more devices need to be added then you could simply join your cable
to another cable.
Disadvantages
However, relying on one cable does mean that bus topologies have a single point of failure. If
the cable fails then the entire network will go down. A cable failure would cost organizations
a lot of time while they attempt to resume service. Further to this, high network traffic would
decrease network performance because all the data travels through one cable.
This limitation makes bus topologies suitable only for smaller networks. The primary reason
is that the more network nodes you have, the slower your transmission speeds are going to be.
It is also worth noting that bus topologies are limited in the sense that they are half-duplex,
which means that data can’t be transmitted in two opposite directions simultaneously.
pg. 51
SAJEEVAN ANGEL NETWORK
Ring Topology
Figure 11
https://cdn.comparitech.com/wp-content/uploads/2018/11/Ring-Topology.jpg
Pros:
Low cost
Suitable for small businesses
Dual ring option provides continuity through redundancy
Cons:
One faulty node will bring the entire network down
Requires extensive preventative maintenance and monitoring
pg. 52
SAJEEVAN ANGEL NETWORK
The first node is connected to the last node to link the loop together. As a consequence of being
laid out in this format packets need to travel through all network nodes on the way to their
destination.
Within this topology, one node is chosen to configure the network and monitor other devices.
Ring topologies are half-duplex but can also be made full-duplex. To make ring topologies full-
duplex you would need to have two connections between network nodes to form a Dual Ring
Topology.
Figure 12
https://cdn.comparitech.com/wp-content/uploads/2018/11/Dual-Ring-Topology.jpg
pg. 53
SAJEEVAN ANGEL NETWORK
As mentioned above, if ring topologies are configured to be bidirectional then they are referred
to as dual ring topologies. Dual ring topologies provide each node with two connections, one
in each direction. Thus, data can flow in a clockwise or counterclockwise direction.
Advantages
With ring topologies, the risk of packet collisions is very low due to the use of token-based
protocols, which only allow one station to transmit data at a given time. This is compounded
by the fact that data can move through network nodes at high speeds which can be expanded
on when more nodes are added.
Dual ring topologies provided an extra layer of protection because they were more resistant to
failures. For instance, if a ring goes down within a node then the other ring can step up and
back it up. Ring topologies were also low cost to install.
Disadvantages
One of the reasons why ring topologies were replaced is because they are very vulnerable to
failure. The failure of one node can take the entire network out of operation. This means that
ring topology networks need to be constantly managed to ensure that all network nodes are in
good health. However, even if the nodes were in good health your network could still be
knocked offline by a transmission line failure!
Ring topologies also raised scalability concerns. For instance, bandwidth is shared by all
devices within the network. In addition, the more devices that are added to a network the more
communication delay the network experiences. This means that the number of devices added
to a network topology needed to be monitored carefully to make sure that the network resources
weren’t stretched beyond their limit.
Making changes to a ring topology was also complicated because you need to shut down the
network to make changes to existing nodes or add new nodes. This is far from ideal as you’ll
need to factor in downtime every time you want to make a change to the topological structure!
pg. 54
SAJEEVAN ANGEL NETWORK
Star Topology
Figure 13
https://cdn.comparitech.com/wp-content/uploads/2018/11/star-Topology.jpg
Pros:
Cons:
Requires specialist network hardware (the switch)
Makes the network reliant on the switch’s performance
A finite number of switch ports limits the network’s size
A star topology is a topology where every node in the network is connected to one central
switch. Every device in the network is directly connected to the switch and indirectly connected
to every other node. The relationship between these elements is that the central network hub is
a server and other devices are treated as clients. The central node has the responsibility of
managing data transmissions across the whole network and acts as a repeater. With star
topologies, computers are connected with a coaxial cable, twisted pair, or optical fiber cable.
Advantages
pg. 55
SAJEEVAN ANGEL NETWORK
Star topologies are most commonly-used because you can manage the entire network from one
location: the central switch. As a consequence, if a node that isn’t the central node goes down
then the network will remain up. This gives star topologies a layer of protection against failures
that aren’t always present with other topology setups. Likewise, you can add new computers
without having to take the network offline like you would have to do with a ring topology.
In terms of physical network structure, star topologies require fewer cables than other topology
types. This makes them simple to set up and manage over the long-term. The simplicity of the
overall network design makes it much easier for administrators to run troubleshooting when
dealing with network performance faults.
Disadvantages
Though star topologies may be relatively safe from failure, if the central switch goes down then
the entire network will go down. As such, the administrator needs to manage the health of the
central node closely to make sure that it doesn’t go down. The performance of the network is
also tied to the central node’s configurations and performance. Star topologies are easy to
manage in most ways but they are far from cheap to set up and use.
Tree Topology
pg. 56
SAJEEVAN ANGEL NETWORK
Figure 14
https://cdn.comparitech.com/wp-content/uploads/2018/11/Tree-Topology.jpg
Pros:
Easy to manage
Easy to expand
Cons:
pg. 57
SAJEEVAN ANGEL NETWORK
The hierarchy is parent-child where there is only one mutual connection between two
connected nodes. As a general rule, a tree topology needs to have three levels to the hierarchy
to be classified this way. This form of topology is used within Wide Area Networks to sustain
lots of spread-out devices.
Advantages
The main reason why tree topologies are used is to extend bus and star topologies. Under this
hierarchical format, it is easy to add more nodes to the network when your organization grows
in size. This format also lends itself well to finding errors and troubleshooting because you can
check for network performance issues systematically throughout the tree.
Disadvantages
The most significant weakness of tree topology is the root node. If the root node fails then all
of its subtrees become partitioned. There will still be partial connectivity within the network
amongst other devices such as the failed node’s parent.
Maintaining the network system is not simple either because the more nodes you add, the more
difficult it becomes to manage the network. Another disadvantage of a tree topology is the
number of cables you need. Cables are required to connect every device throughout the
hierarchy which makes the network layout more complex when compared to a simpler
topology.
pg. 58
SAJEEVAN ANGEL NETWORK
Mesh Topology
Figure 15
https://cdn.comparitech.com/wp-content/uploads/2018/11/Mesh-Topology.jpg
Pros:
Very secure
Suitable for high-value networks for small to middle-sized networks
Easy to identify faulty equipment
Cons:
A mesh topology is a point-to-point connection where nodes are interconnected. In this form
of topology, data is transmitted via two methods: routing and flooding. Routing is where nodes
use routing logic to work out the shortest distance to the packet’s destination. In contrast,
pg. 59
SAJEEVAN ANGEL NETWORK
flooding is where data is sent to all nodes within the network. Flooding doesn’t require any
form of routing logic to work.
There are two forms of mesh topology: partial mesh topology and full mesh topology. With
partial mesh topology, most nodes are interconnected but there are a few which are only
connected to two or three other nodes. A full mesh topology is where every node is
interconnected.
Advantages
Mesh topologies are used first and foremost because they are reliable. The interconnectivity of
nodes makes them extremely resistant to failures. There is no single machine failure that could
bring down the entire network. The absence of a single point of failure is one of the reasons
why this is a popular topology choice. This setup is also secure from being compromised.
Disadvantages
However, mesh topologies are far from perfect. They require an immense amount of
configuration once they are deployed. The topological layout is more complex than many other
topologies and this is reflected by how long it takes to set up. You’ll need to accommodate a
whole host of new wiring which can add up to be quite expensive.
Hybrid Topology
pg. 60
SAJEEVAN ANGEL NETWORK
Figure 16
https://cdn.comparitech.com/wp-content/uploads/2018/11/Hybrid-Topology.jpg
Pros:
Very flexible
Suitable for middle-sized and large organizations
Infinitely extendible
Adaptable to optimize equipment us
Cons:
Requires professional management
Advantages
pg. 61
SAJEEVAN ANGEL NETWORK
There are many reasons why hybrid topologies are used but they all have one thing in common:
flexibility. There are few constraints on the network structure that a hybrid topology cannot
accommodate, and you can incorporate multiple topologies into one hybrid setup. As a
consequence, hybrid topologies are very scalable. The scalability of hybrid setups makes them
well-suited to larger networks.
Disadvantages
Unfortunately, hybrid topologies can be quite complex, depending on the topologies that you
decide to use. Each topology that is part of your hybrid topology will have to be managed
according to its unique network requirements. This makes administrators’ jobs more difficult
because they are going to have to attempt to manage multiple topologies rather than a single
one. In addition, setting up a hybrid topology can end up being quite costly.
Figure 17
https://lh3.googleusercontent.com/proxy/a5JXAunu-
g1MFBW1mjl_X615IJGj1hwAYTm5ae430pigUCTJGjbqMJ1DV2rvZ9Ma34563hEFJ9rK1Jtz4OLL
AGK4BUIBxv4FPjcEJQVaYJyrj6l2t5fHalH3beX8VVYkIiuZ
pg. 62
SAJEEVAN ANGEL NETWORK
The IEEE 802.3 standard is popularly called as Ethernet. It is a bus based broadcast network
with decentralized control. It can operate at 10 Mbps or 100 Mbps or above. Computers on an
Ethernet can transmit whenever they want to do so. If two or more machines transmit
simultaneously, then their packets collide. Then the transmitting computers just wait for an
arbitrary time and retransmit their signal. There are various technologies available in the LAN
market but the most popular one of them is Ethernet.
The Ethernet topology was developed at the University of Hawaii to connect computers on the
various Islands. It was radio based design. Ethernet is one of the most popular Computer
Network or LAN technologies in use today covering more than 85% of the computer networks.
Ethernet system consists of three basic elements:
1. The physical medium use to carry Ethernet signals between computers on the network
2. A set of rules (protocols) embedded in each Ethernet interface that will decide how
multiple computers on the network will have access to the data on the medium.
3. An Ethernet frame that consists of a standardized set of bits used to carry data over the
system.
The operation of Ethernet can be described in simple terms as follows:
Each computer on the Ethernet Network, also known as a node, operates independently of all
other nodes. All nodes attached to an Ethernet are connected to a shared medium over which
the Ethernet signals travel serially, one data bit at a time. o send data a station first listens to
the channel and when the channel is idle the station transmits its information in the form of an
Ethernet frame, or packet. The Ethernet rules (protocol) are defined in such a way that every
node gets a fair amount of frame transmission opportunity.
As each Ethernet frame is sent out on the shared medium, the Ethernet interfaces inside the
node look at the destination address. The interfaces compare the destination address of the
frame with their own address. The Ethernet interface with the same address as the destination
address in the frame will read the entire frame and all other network interfaces will ignore the
information. (Thakur, 2021)
pg. 63
SAJEEVAN ANGEL NETWORK
An Ethernet standard for 100-Mbps data transmission. Defined by the IEEE 802.3u
specification, Fast Ethernet is used for departmental backbones, connections to high-speed
servers, and connections to workstations running bandwidth-intensive software such as CAD
or multimedia applications.
Fast Ethernet uses the same Carrier Sense Multiple Access with Collision Detection
(CSMA/CD) media access control mechanism as traditional 10-Mbps Ethernet networks. Fast
Ethernet implementations are collectively known as 100BaseT technologies. They are
generally wired in a star topology using special Fast Ethernet hubs and switches. Fast Ethernet
can be implemented in three different transmission schemes or cabling options:
1. 100BASE-TX: The most popular Fast Ethernet implementation. 100BaseTX uses two
pairs of wires in Category 5 cabling; that is, the same cabling as the popular but lower-speed
10BaseT variety of Ethernet.
3. 100BASE-T4: Uses four pairs of wires and enables Fast Ethernet to be used over
category 3 cabling or higher.
The Fast Ethernet specification includes mechanisms for auto-negotiation of frame speed for
the media, enabling vendors to supply dual 10/100-Mbps networking devices for smoothly
incorporating Fast Ethernet into legacy 10BaseT networks.
Upgrading to Fast Ethernet is probably the easiest and cheapest way of upgrading your network
to meet increasing bandwidth needs. Advantages of upgrading 10-Mbps Ethernet networks to
Fast Ethernet include the following:
1. Fast Ethernet integrates easily into existing 10-Mbps Ethernet networks without
requiring reinvestment in new network-management and troubleshooting software.
2. Fast Ethernet can carry voice, data, and video at 100 Mbps, which is 10 times faster
than traditional 10-Mbps Ethernet.
3. Fast Ethernet can operate over the same installed media used for a traditional 10-Mbps
Ethernet network.
pg. 64
SAJEEVAN ANGEL NETWORK
4. The network can be migrated slowly to Fast Ethernet by using autosensing 10/100 hubs
and network interface cards
figure 18
https://networkencyclopedia.com/wp-content/uploads/2019/08/gigabit-ethernet.jpg
Since its inception at Xerox Corporation in the early 1970s, Ethernet has been the dominant
networking protocol. Of all current networking protocols, Ethernet has, by far, the highest
number of installed ports and provides the greatest cost performance relative to Token Ring,
Fiber Distributed Data Interface (FDDI), and Asynchronous Transfer Mode (ATM) for desktop
connectivity. Fast Ethernet, which increased Ethernet speed from 10 to 100 megabits per
second (Mbps), provided a simple, cost-effective option for backbone and server connectivity.
pg. 65
SAJEEVAN ANGEL NETWORK
Gigabit Ethernet builds on top of the Ethernet protocol, but increases speed tenfold over Fast
Ethernet to 1000 Mbps, or 1 gigabit per second (Gbps). This protocol, which was standardized
in June 1998, promises to be a dominant player in high-speed local area network backbones
and server connectivity. Since Gigabit Ethernet significantly leverages on Ethernet, customers
will be able to leverage their existing knowledge base to manage and maintain gigabit
networks.
The purpose of this technology brief is to provide a technical overview of Gigabit Ethernet.
This paper discusses:
1. The architecture of the Gigabit Ethernet protocol, including physical interfaces, 802.3x
flow control, and media connectivity options
2. The Gigabit Ethernet standards effort and the timing for Gigabit Ethernet
3. Comparison of Gigabit Ethernet and ATM technologies
4. Gigabit Ethernet topologies
5. Migration strategies to Gigabit Ethernet
Gigabit Ethernet Protocol Architecture
In order to accelerate speeds from 100 Mbps Fast Ethernet up to 1 Gbps, several changes need
to be made to the physical interface. It has been decided that Gigabit Ethernet will look identical
to Ethernet from the data link layer upward. The challenges involved in accelerating to 1 Gbps
have been resolved by merging two technologies together: IEEE 802.3 Ethernet and ANSI
X3T11 Fibre Channel.
pg. 66
SAJEEVAN ANGEL NETWORK
Figure 19
https://www.tutorialspoint.com/assets/questions/media/39932/virtual_lan_configuration.j
pg
VLANs (Virtual LANs) are logical grouping of devices in the same broadcast domain. VLANs
are usually configured on switches by placing some interfaces into one broadcast domain and
some interfaces into another. Each VLAN acts as a subgroup of the switch ports in an Ethernet
LAN.
VLANs can spread across multiple switches, with each VLAN being treated as its own subnet
or broadcast domain. This means that frames broadcasted onto the network will be switched
only between the ports within the same VLAN.
A VLAN acts like a physical LAN, but it allows hosts to be grouped together in the same
broadcast domain even if they are not connected to the same switch. Here are the main reasons
why VLANs are used:
1. VLANs increase the number of broadcast domains while decreasing their size.
pg. 67
SAJEEVAN ANGEL NETWORK
2. VLANs reduce security risks by reducing the number of hosts that receive copies of
frames that the switches flood.
3. you can keep hosts that hold sensitive data on a separate VLAN to improve security.
4. you can create more flexible network designs that group users by department instead of
by physical location.
5. network changes are achieved with ease by just configuring a port into the appropriate
VLAN.
Without VLANs, a broadcast sent from host A would reach all devices on the network. Each
device will receive and process broadcast frames, increasing the CPU overhead on each device
and reducing the overall security of the network.
Compare common networking principles and how protocols enable the effectiveness of
networked systems.
Network protocols
Network protocols are a set of rules, conventions, and data structures that dictate how devices
exchange data across networks. In other words, network protocols can be equated to languages
that two devices must understand for seamless communication of information, regardless of
their infrastructure and design disparities.
To understand the nuances of network protocols , it's imperative to know about the Open
Systems Interconnection (OSI) model first. Considered the primary architectural model for
internet working communications, the majority of network protocols used today are structurally
based on the OSI model.
pg. 68
SAJEEVAN ANGEL NETWORK
The OSI model splits the communication process between two network devices into 7 layers.
A task or group of tasks is assigned to each of these 7 layers. All the layers are self-contained,
and the tasks assigned to them can be executed independently.
To put this into context, here is a representation of the communication process between two
network devices following the OSI model:
Figure 21
https://www.manageengine.com/network-monitoring/images/network-protocols-osi.jpg
The seven layers in the OSI model can be divided into two groups: upper layers, including
layers 7, 6, and 5, and lower layers, including layers 4, 3, 2, and 1. The upper layers deal with
application issues, and the lower layers deal with data transport issues.
Network protocols divide the communication process into discrete tasks across every layer of
the OSI model. One or more network protocols operate at each layer in the communication
exchange.
pg. 69
SAJEEVAN ANGEL NETWORK
Following are the detailed descriptions of the functioning of network protocols in each layer
of the OSI model:
Layer 7: Application layer Provides standard services such as virtual terminal, file, and job
network protocols transfer and operations.
Layer 6: Presentation layer Masks the differences in data formats between dissimilar systems.
network protocols Encodes and decodes data, encrypts and decrypts data, and
compresses and decompresses data.
Layer 5: Session layer network Manages user sessions and dialogues.
protocols Establishes and terminates sessions between users.
Now that you know how the OSI model works, you can dive straight into the classification of
protocols. The following are some of the most prominent protocols used in network
communication.
pg. 70
SAJEEVAN ANGEL NETWORK
Tracking internet activity becomes tedious, as the same device can have multiple IP addresses
over a period of time.
Computers with DHCP cannot be used as servers, as their IPs change over time.
2. DNS: Domain Name System protocol
The DNS protocol helps in translating or mapping host names to IP addresses. DNS works on
a client-server model, and uses a distributed database over a hierarchy of name servers.
Hosts are identified based on their IP addresses, but memorizing an IP address is difficult due
to its complexity. IPs are also dynamic, making it all the more necessary to map domain names
to IP addresses. DNS helps resolve this issue by converting the domain names of websites into
numerical IP addresses.
Advantages
Disadvantages
DNS queries don't carry information pertaining to the client who initiated it. This is because
the DNS server only sees the IP from where the query came from, making the server susceptible
to manipulation from hackers.
DNS root servers, if compromised, could enable hackers to redirect to other pages for phishing
data.
3. FTP: File Transfer Protocol
File Transfer Protocol enables file sharing between hosts, both local and remote, and runs on
top of TCP. For file transfer, FTP creates two TCP connections: control and data connection.
The control connection is used to transfer control information like passwords, commands to
retrieve and store files, etc., and the data connection is used to transfer the actual file. Both of
these connections run in parallel during the entire file transfer process.
Advantages
Enables sharing large files and multiple directories at the same time.
Lets you resume file sharing if it was interrupted.
Disadvantages
FTP lacks security. Data, usernames, and passwords are transferred in plain text, making them
vulnerable to malicious actors.
FTP lacks encryption capabilities, making it non-compliant with industry standards.
4. HTTP: Hyper Text Transfer Protocol
HTTP is an application layer protocol used for distributed, collaborative, and hypermedia
information systems. It works on a client-server model, where the web browser acts as the
client. Data such as text, images, and other multimedia files are shared over the World Wide
Web using HTTP. As a request and response type protocol, the client sends a request to the
server, which is then processed by the server before sending a response back to the client.
pg. 72
SAJEEVAN ANGEL NETWORK
HTTP is a stateless protocol, meaning the client and server are only aware of each other while
the connection between them is intact. After that, both the client and server forget about each
other's existence. Due to this phenomenon, the client and server can't both retain information
between requests.
Advantages
Memory usage and CPU usage are low because of lesser concurrent connections.
Errors can be reported without closing connections.
Owing to lesser TCP connections, network congestion is reduced.
Disadvantages
Advantages
As the emails are stored on the mail server, local storage utilization is minimal.
In case of accidental deletion of emails or data, it is always possible to retrieve them as they
are stored on the mail server.
Disadvantages
pg. 73
SAJEEVAN ANGEL NETWORK
High utilization of emails by end users requires more mailbox storage, thereby augmenting
costs.
The Post Office Protocol is also an email protocol. Using this protocol, the end user can
download emails from the mail server to their own email client. Once the emails are
downloaded locally, they can be read without an internet connection. Also, once the emails are
moved locally, they get deleted from the mail server, freeing up space. POP3 is not designed
to perform extensive manipulations with the messages on the mail server, unlike IMAP4. POP3
is the latest version of the Post Office Protocol.
Advantages
The mail server need not have high storage capacity, as the emails get deleted when they're
moved locally.
Disadvantages
If the local device on which the emails were downloaded crashes or gets stolen, the emails are
lost.
7. SMTP: Simple Mail Transfer Protocol
SMTP is a protocol designed to transfer electronic mail reliably and efficiently. SMTP is a
push protocol and is used to send the email, whereas POP and IMAP are used to retrieve emails
on the end user's side. SMTP transfers emails between systems, and notifies on incoming
emails. Using SMTP, a client can transfer an email to another client on the same network or
another network through a relay or gateway access available to both networks.
Advantages
Ease of installation.
Connects to any system without any restriction.
It doesn't need any development from your side.
pg. 74
SAJEEVAN ANGEL NETWORK
Disadvantages
Back and forth conversations between servers can delay sending a message, and also increases
the chance of the message not being delivered.
Certain firewalls can block the ports used with SMTP.
Telnet is an application layer protocol that enables a user to communicate with a remote device.
A Telnet client is installed on the user's machine, which accesses the command line interface
of another remote machine that runs a Telnet server program.
Telnet is mostly used by network administrators to access and manage remote devices. To
access a remote device, a network admin needs to enter the IP or host name of the remote
device, after which they will be presented with a virtual terminal that can interact with the host.
Advantages
Disadvantages
Telnet lacks encryption capabilities and sends across critical information in clear text, making
it easier for malicious actors.
The SNMP agent resides on the managed device. The agent is a software module that has local
knowledge of management information, and translates that information into a form compatible
pg. 75
SAJEEVAN ANGEL NETWORK
with the SNMP manager. The SNMP manager presents the data obtained from the SNMP
agent, helping network admins manage nodes effectively.
Currently, there are three versions of SNMP: SNMP v1, SNMP v2, and SNMP v3. Both
versions 1 and 2 have many features in common, but SNMP v2 offers enhancements such as
additional protocol operations. SNMP version 3 (SNMP v3) adds security and remote
configuration capabilities to the previous versions.
Advantages
Disadvantages
pg. 76
SAJEEVAN ANGEL NETWORK
Advantages
TCP ensures three things: data reaches the destination, reaches it on time, and reaches it without
duplication.
TCP automatically breaks data into packets before transmission.
Disadvantages
Advantages
Disadvantages
pg. 77
SAJEEVAN ANGEL NETWORK
In UDP, it's possible that a packet may not be delivered, be delivered twice, or not be delivered
at all.
IPv4 is a network layer protocol that contains addressing and control information, which helps
packets be routed in a network. IP works in tandem with TCP to deliver data packets across the
network. Under IP, each host is assigned a 32-bit address comprised of two major parts: the
network number and host number. The network number identifies a network and is assigned
by the internet, while the host number identifies a host on the network and is assigned by a
network admin. The IP is only responsible for delivering the packets, and TCP helps puts them
back in the right order.
Advantages
Advantages
pg. 78
SAJEEVAN ANGEL NETWORK
Advantages
The Address Resolution Protocol helps map IP addresses to physical machine addresses (or a
MAC address for Ethernet) recognized in the local network. A table called an ARP cache is
used to maintain a correlation between each IP address and its corresponding MAC address.
ARP offers the rules to make these correlations, and helps convert addresses in both directions.
Advantages
MAC addresses need not be known or memorized, as the ARP cache contains all the MAC
addresses and maps them automatically with IPs.
Disadvantages
pg. 79
SAJEEVAN ANGEL NETWORK
When using ARP, sometimes a hacker might be able to stop the traffic altogether. This is also
known as ARP denial-of-services.
SLIP is used for point-to-point serial connections using TCP/IP. SLIP is used on dedicated
serial links, and sometimes for dial-up purposes. SLIP is useful for allowing mixes of hosts and
routers to communicate with one another; for example, host-host, host-router, and router-router
are all common SLIP network configurations. SLIP is merely a packet framing protocol: It
defines a sequence of characters that frame IP packets on a serial line. It does not provide
addressing, packet type identification, error detection or correction, or compression
mechanisms.
Advantages
SLIP doesn't support automatic setup of network connections in multiple OSI layers at the same
time.
SLIP does not support synchronous connections, such as a connection created through the
internet from a modem to an internet service provider (ISP).
pg. 80
SAJEEVAN ANGEL NETWORK
Activity 02
Discuss the operating principles of network devices (Ex: Router, Switch, Etc.) and server types
that can be used for above scenario while exploring different servers that are available in today’s
market with their specifications. Recommend server/servers for the above scenario and justify
your selection with valid points.
pg. 81
SAJEEVAN ANGEL NETWORK
1.Network Hub
2.Network Switch
3.Modem
4.Network Router
5.Bridge
6.Repeater
Network Hub
The network hub is one kind of networking device in a computer network, used to communicate
with various network hosts and also for data transferring. The transferring of data in a computer
network can be done in the form of packets. Whenever the data processing can be done from a
host to a network hub, then the data can transmit to all the connected ports. Similarly, all the
ports identify the data path which leads to inefficiencies & wastage. Because of this working,
a network hub cannot be so safe and secure. In addition, copying the data packets on all the
ports will make the hub slower which leads to the utilize of the network switch.
Figure 23
https://www.elprocus.com/wp-content/uploads/network-hub.jpg
Network hubs are classified into two types like active hub & passive hub.
pg. 82
SAJEEVAN ANGEL NETWORK
Active Hub
These hubs have their own power supply and these hubs are used to clean, increase & transmit
the signal using the network. It works as a wiring center & repeater. Active hubs play a key
role in extending the distance between nodes.
Passive Hub
These hubs collect wiring from the power supply and different nodes of an active hub. These
hubs transmit the signals over the network without improving & cleaning them. These hubs are
not suitable for extending the distance between nodes like an active hub.
Network Switch
Similar to a hub, this is also working at the layer in the LAN and a switch is more clever
compare with a hub. As the hub is used for data transferring, whereas a switch is used for
filtering & forwarding the data. So this is the more clever technique to deal with the data
packets.
Figure24
https://www.elprocus.com/wp-content/uploads/network-switch.jpg
pg. 83
SAJEEVAN ANGEL NETWORK
Whenever a data packet is obtained from the interfaces in the switch, then the data packet can
be filtered & transmits to the interface of the proposed receiver. Due to this reason, a switch
maintains a content addressable memory table to maintain system configuration as well as
memory.
Modem
A modem is the most important network device and it is used daily in our life. If we notice the
internet connection to homes was given with the help of a wire. then wire carries internet data
from one place to another. But, every computer gives digital or binary data in the form of zeros
& ones
Figure25
https://www.elprocus.com/wp-content/uploads/modem.jpg
The full form of the modem is a modulator and a demodulator. So it modulates as well as
demodulates the signal among the computer and a telephone line because the computer
generates digital data whereas the telephone line generates an analog signal.
Network Router
A network router is one kind of network device in a computer network and it is used for routing
traffic from one network to another. These two networks could be private to a public company
network. For example, here a router is considered as traffic police at the junction, he directs
dissimilar traffic networks to dissimilar directions.
pg. 84
SAJEEVAN ANGEL NETWORK
Figure26
https://www.elprocus.com/wp-content/uploads/router.jpg
Bridge
A Bridge in the computer network is used to unite two or more network segments. The main
function of a bridge in network architecture is to store as well as transmit frames among the
various segments. Bridges use MAC (Media Access Control) hardware for transferring frames.
Figure27
https://www.elprocus.com/wp-content/uploads/bridge.jpg
These are also used for connecting two physical local area networks to a larger logical local
area network. In the OSI model, bridges work at the data link & physical layers to divide the
networks from larger to smaller by controlling the data flow between the two. In recent years,
bridges are replaced by switches to provide more functionality.
Repeater
The operating of a repeater can be done at the physical layer. The main function of this device
is to reproduce the signal on a similar network before the signal gets weak otherwise damaged.
pg. 85
SAJEEVAN ANGEL NETWORK
The significant point to be noted regarding these devices is that they do not strengthen the
signal. Whenever the signal gets weak, then they reproduce it at the actual strength. A repeater
is a two-port device.
Figure28
https://www.elprocus.com/wp-content/uploads/repeater.jpg
Gateway
Generally, a gateway performs at the session & transport layers in the OSI model. Gateways
offer conversion between networking technologies like OSI (Open System Interconnection) &
TCP/IP. Because of this, these are connected to two or many autonomous networks, where
each network has its own domain name service, routing algorithm, topology, protocols, and
procedures of network administration & policies.
Figure29
https://www.elprocus.com/wp-content/uploads/gateway-device.jpg
pg. 86
SAJEEVAN ANGEL NETWORK
Gateways execute all the functions of routers. Actually, a router with additional conversion
functionality is a gateway, so the conversion between various network technologies is known
as a protocol converter
exploring different servers that are available in today’s market with their specifications.
Recommend server/servers for the above scenario and justify your selection with valid
points.
What is a server?
A server is a computer or system that provides resources, data, services, or programs to other
computers, known as clients, over a network. In theory, whenever computers share resources
with client machines they are considered servers. There are many types of servers, including
web servers, mail servers, and virtual servers.
An individual system can provide resources and use them from another system at the same
time. This means that a device could be both a server and a client at the same time.
Some of the first servers were mainframe computers or minicomputers. Minicomputers were
much smaller than mainframe computers, hence the name. However, as technology progressed,
they ended up becoming much larger than desktop computers, which made the term
microcomputer somewhat farcical.
Initially, such servers were connected to clients known as terminals that did not do any actual
computing. These terminals, referred to as dumb terminals, existed simply to accept input via
a keyboard or card reader and to return the results of any computations to a display screen or
printer. The actual computing was done on the server.
Later, servers were often single, powerful computers connected over a network to a set of less-
powerful client computers. This network architecture is often referred to as the client-server
pg. 87
SAJEEVAN ANGEL NETWORK
model, in which both the client computer and the server possess computing power, but certain
tasks are delegated to servers. In previous computing models, such as the mainframe-terminal
model, the mainframe did act as a server even though it wasn’t referred to by that name.
As technology has evolved, the definition of a server has evolved with it. These days, a server
may be nothing more than software running on one or more physical computing devices. Such
servers are often referred to as virtual servers. Originally, virtual servers were used to increase
the number of server functions a single hardware server could do. Today, virtual servers are
often run by a third-party on hardware across the Internet in an arrangement called cloud
computing.
A server may be designed to do a single task, such as a mail server, which accepts and stores
email and then provides it to a requesting client. Servers may also perform several tasks, such
as a file and print server, which both stores files and accepts print jobs from clients and then
sends them on to a network-attached printer.
Figure30
https://hlassets.paessler.com/common/files/graphics/illustration/server-14-one-forth.png
pg. 88
SAJEEVAN ANGEL NETWORK
For example, Microsoft’s Windows Server operating system provides the functionality to listen
to and respond to client requests. Additionally installed roles or services increase which kinds
of client requests the server can respond to. In another example, an Apache web server responds
to Internet browser requests via an additional application, Apache, installed on top of an
operating system.
When a client requires data or functionality from a server, it sends a request over the network.
The server receives this request and responds with the appropriate information. This is the
request and response model of client-server networking, also known as the call and response
model.
A server will often perform numerous additional tasks as part of a single request and response,
including verifying the identity of the requestor, ensuring that the client has permission to
access the data or resources requested, and properly formatting or returning the required
response in an expected way.
Types of servers
There are many types of servers that all perform different functions. Many networks contain
one or more of the common server types:
pg. 89
SAJEEVAN ANGEL NETWORK
File servers
File servers store and distribute files. Multiple clients or users may share files stored on a server.
In addition, centrally storing files offers easier backup or fault tolerance solutions than
attempting to provide security and integrity for files on every device in an organization. File
server hardware can be designed to maximize read and write speeds to improve performance.
Print servers
Print servers allow for the management and distribution of printing functionality. Rather than
attaching a printer to every workstation, a single print server can respond to printing requests
from numerous clients. Today, some larger and higher-end printers come with their own built-
in print server, which removes the need for an additional computer-based print server. This
internal print server also functions by responding to print requests from a client.
Application servers
Application servers run applications in lieu of client computers running applications locally.
Application servers often run resource-intensive applications that are shared by a large number
of users. Doing so removes the need for each client to have sufficient resources to run the
applications. It also removes the need to install and maintain software on many machines as
opposed to only one.
DNS servers
Domain Name System (DNS) servers are application servers that provide name resolution to
client computers by converting names easily understood by humans into machine-readable IP
addresses. The DNS system is a widely distributed database of names and other DNS servers,
each of which can be used to request an otherwise unknown computer name. When a client
needs the address of a system, it sends a DNS request with the name of the desired resource to
a DNS server. The DNS server responds with the necessary IP address from its table of names.
Mail servers
pg. 90
SAJEEVAN ANGEL NETWORK
Mail servers are a very common type of application server. Mail servers receive emails sent to
a user and store them until requested by a client on behalf of said user. Having an email server
allows for a single machine to be properly configured and attached to the network at all times.
It is then ready to send and receive messages rather than requiring every client machine to have
its own email subsystem continuously running.
Web servers
One of the most abundant types of servers in today’s market is a web server. A web server is a
special kind of application server that hosts programs and data requested by users across the
Internet or an intranet. Web servers respond to requests from browsers running on client
computers for web pages, or other web-based services. Common web servers include Apache
web servers, Microsoft Internet Information Services (IIS) servers and Nginx servers.
Figure 32
https://digitalworld839.com/wp-content/uploads/2020/07/Types-Of-servers--
e1594824415821.jpg
pg. 91
SAJEEVAN ANGEL NETWORK
Database servers
The amount of data used by companies, users, and other services is staggering. Much of that
data is stored in databases. Databases need to be accessible to multiple clients at any given time
and can require extraordinary amounts of disk space. Both of these needs lend themselves well
to locating such databases on servers. Database servers run database applications and respond
to numerous requests from clients. Common database server applications include Oracle,
Microsoft SQL Server, DB2, and Informix.
Virtual servers
Virtual servers are taking the server world by storm. Unlike traditional servers that are installed
as an operating system on machine hardware, virtual servers exist only as defined within
specialized software called hypervisor. Each hypervisor can run hundreds, or even thousands,
of virtual servers all at once. The hypervisor presents virtual hardware to the server as if it were
real physical hardware. The virtual server uses the virtual hardware as usual, and the hypervisor
passes the actual computation and storage needs onto the real hardware beneath, which is
shared among all the other virtual servers.
Proxy servers
A proxy server acts as an intermediary between a client and a server. Often used to isolate
either the clients or servers for security purposes, a proxy server takes the request from the
client. Instead of responding to the client, it passes the request on to another server or process.
The proxy server receives the response from the second server and then replies to the original
client as if it were replying on its own. In this way, neither the client nor the responding server
needs to directly connect to each other.
Some servers exist to monitor or manage other systems and clients. There are many types of
monitoring servers. Several of them listen to the network and receive every client request and
server response, but some do not request or respond to data themselves. In this way, the
monitoring server can keep track of all the traffic on the network, as well as the requests and
replies of clients and servers, without interfering with those operations. A monitoring server
pg. 92
SAJEEVAN ANGEL NETWORK
will respond to requests from monitoring clients such as those run by network administrators
watching the health of the network.
Server structures
The concept of servers is nearly as old as networking itself. After all, the point of a network is
to allow one computer to talk to another computer and distribute either work or resources.
Computing has evolved since then, resulting in several types of server structures and hardware.
You could say that the original servers, mainframe computers, and later, minicomputers,
handled almost all computing tasks except the interaction with the user through a screen and
keyboard, which was left to the client system.
The next major wave of servers included computer-based servers. In many respects, these
servers were nothing more than larger, more powerful desktop computers. Such servers were
generally more expensive and held far more memory and disk space than most client
computers. Each server was still a self-contained unit with its own motherboard, processor,
memory, disk drives, and power supply. Servers like this were often warehoused in air-
conditioned rooms called server rooms, and were later bolted into racks for better storage and
accessibility.
Blade servers
The original computer server hardware was large and stored in racks that could hold hundreds
of pounds. Over time, however, faster means of connecting hardware resulted in parts of the
server being extracted from a single self-contained device. By removing hard drives,
eliminating internal cooling, and the ongoing miniaturization of computing parts, servers were
eventually reduced to a single thin server known as a blade server. While still stored in racks
in server rooms, blade servers are smaller and can be replaced more easily.
pg. 93
SAJEEVAN ANGEL NETWORK
Combining servers
Even before virtualization, servers were being extracted from the standard model of a single
server operating system installed on a hardware machine. Technology, such as network-
attached storage, removed the need for a server to have its own storage. Other technologies,
such as mirroring and clustering, enabled pieces of hardware to be combined into larger, more
powerful servers. Such a server might consist of several blades, several attached storage
devices, and an external power supply, and each piece could be swapped out for another while
the server was still running.
Virtual servers
Virtual Servers still require hardware, but that hardware now runs a different process known
as a hypervisor. In some cases, such as Microsoft’s Hyper-V, a full operating system continues
to run on the hardware itself. In other cases, so-called bare-metal hypervisors can be installed
directly onto server hardware. In both instances, the hardware itself is often spread across an
array of blade servers, networked storage, and power supply, resulting in an environment where
it is impossible to tell where any individual server ends and another begins.
pg. 94
SAJEEVAN ANGEL NETWORK
The other major player in server operating systems is the Linux/Unix realm. There are multiple
versions and flavors of Linux/Unix including Red Hat Enterprise Linux, Debian, and CentOS.
As an open-source operating system, Linux is very popular as a web server, often with the
Apache web application server installed.
NetWare
Although no longer made, NetWare was a major player in the server software space as the
client-server era was ramping up. Eventually, NetWare moved its server operating system to a
Linux-based kernel and named it a Novell Open Enterprise Server (OES).
Cloud servers
Virtual servers hosted on a third-party infrastructure on an open network, such as the Internet,
are called cloud servers. There are numerous cloud server providers these days, including
Google’s Cloud Platform, Microsoft Azure, and IBM Cloud.
However, the main pioneer of corporate cloud computing was Amazon’s AWS platform. It
originally started using spare capacity of Amazon’s own servers and networks, but AWS now
allows customers to create a virtual server nearly instantly and then adjust the amount of
resources that server may use on the fly.
Today, a server can be nothing more than the data of physical hardware that consists of multiple
processors, disk drives, memory, and network connections. But, even now, a server is still just
a system that responds to a request from a client.
pg. 95
SAJEEVAN ANGEL NETWORK
preceding section. The following paragraphs describe the typical components of a server
computer:
Motherboard:
The motherboard is the computer's main electronic circuit board to which all the other
components of your computer are connected. More than any other component, the motherboard
is the computer. All other components attach to the motherboard.
The major components on the motherboard include the processor (or CPU), supporting
circuitry called the chipset, memory, expansion slots, a standard IDE hard drive controller, and
I/O ports for devices such as keyboards, mice, and printers. Some motherboards also include
additional built-in features such as a graphic adapter, SCSI disk controller, or a network
interface.
Processor:
The processor, or CPU, is the brain of the computer. Although the processor isn't the only
component that affects overall system performance, it is the one that most people think of first
when deciding what type of server to purchase. At the time of this writing, Intel had four
processor models, summarized in Table 3-1. Two of them - the Pentium 4 and Celeron - should
be used only for desktop or notebook computers. Server computers should have an Itanium 2
or a Xeon processor, or a comparable processor from one of Intel's competitors, such as AMD.
Each motherboard is designed to support a particular type of processor. CPUs come in two
basic mounting styles: slot or socket. However, you can choose from several types of slots and
sockets, so you have to make sure that the motherboard supports the specific slot or socket style
used by the CPU. Some server motherboards have two or more slots or sockets to hold two or
more CPUs.
The term clock speed refers to how fast the basic clock that drives the processor's operation
ticks. In theory, the faster the clock speed, the faster the processor. However, clock speed alone
is reliable only for comparing processors within the same family. In fact, the Xeon is
significantly faster than the Pentium 4 running at the same clock speed. That's because the
Xeon contains more advanced circuitry than the Pentium 4, so it's able to accomplish more
work than the Pentium 4 with each tick of the clock.
pg. 96
SAJEEVAN ANGEL NETWORK
Intel Processors
Processors Clock Speed Intended Usage
Itanium 2 1.30-1.60GHz Servers
Xeon 1.4-3.6GHz Servers
Itanium 4 3.2-3.73 Hz Desktops
Celeron 950MHz-3.06GHz Low-end desktop
Memory:
Don't scrimp on memory. People rarely complain about servers having too much memory.
Many different types of memory are available, so you have to pick the right type of memory to
match the memory supported by your motherboard. The total memory capacity of the server
depends on the motherboard. Most new servers can support at least 12GB of memory, and
some can handle up to 32GB.
Hard drives:
Most desktop computers use inexpensive hard drives called IDE drives (sometimes also called
ATA). These drives are adequate for individual users, but because performance is more
important for servers, another type of drive known as SCSI is usually used instead. For the best
performance, use the SCSI drives along with a highperformance SCSI controller card.
Network connection:
The network connection is one of the most important parts of any server. Many servers have
network adapters built into the motherboard. If your server isn't equipped as such, you'll need
to add a separate network adapter card. See the section, "Network Interface Cards," later in this
tutorial, for more information.
Video:
Fancy graphics aren't that important for a server computer. You can equip your servers with
inexpensive generic video cards and monitors without affecting network performance. (This is
one of the few areas where it's acceptable to cut costs on a server.)
pg. 97
SAJEEVAN ANGEL NETWORK
Power supply: Because a server usually has more devices than a typical desktop computer, it
requires a larger power supply (300 watts is typical). If the server houses a large number of
hard drives, it may require an even larger power supply.
A server operating system, also called a server OS, is an operating system specifically designed
to run on servers, which are specialized computers that operate within a client/server
architecture to serve the requests of client computers on the network.
Servers form the very core of any technology infrastructure. We'll take you through some of
the key factors to consider before you buy.
Once upon a time, when servers had all of the brains (mainframes) and user workstations were
dumb (terminals), servers had all of the glory. Then, along came the PC revolution and the
whole client-server paradigm of distributed computing power turned the computing world on
its head. Servers just weren't sexy anymore. Rather, it was pushing more computing power out
to the workstation that held most people's interest.
pg. 98
SAJEEVAN ANGEL NETWORK
But now the pendulum has swung back in the other direction. While workstations continue to
advance in terms of power and capability, the rise of the Web and the browser-based thin-client
interface has put renewed focus on having powerful, reliable, centralized servers to do most of
the heavy lifting. There's even been a resurgence of interest in modern versions of centralized
mainframe-like systems, for reasons of capability, scalability, and perhaps most of all, ease of
system administration and management. It's much easier to upgrade, apply security patches, or
control software licensing and distribution when you can do it all from a single place.
Dell PowerEdge R730 Xeon E5-2640 v4 32GB Dual 2TB SAS H330 Rack Server
Figure 33
https://img.router-
switch.com/media/catalog/product/cache/1/image/9df78eab33525d08d6e5fb8d27136e95/d/e/
dell-poweredge-r730xd-server-45-degree.jpg
pg. 99
SAJEEVAN ANGEL NETWORK
Dell PowerEdge R730 Xeon E5-2640 v4 32GB Dual 2TB SAS H330 Rack
Server Specification
pg. 100
SAJEEVAN ANGEL NETWORK
pg. 101
SAJEEVAN ANGEL NETWORK
Slot 6: Full Length, Full Height, PCIe Gen3 x16 (x16 connector)
Dedicated RAID card slot
Internal:
PERC S130
PERC H330
RAID Controllers PERC H730
PERC H730P
External:
PERC H830
pg. 102
SAJEEVAN ANGEL NETWORK
ECC memory
Hot-plug hard drives
Hot-plug redundant cooling
Hot-plug redundant power
iDRAC8
Internal Dual SD Module
Availability
Single Device Data Correction (SDDC)
Spare Rank
Tool-less chassis
Support for high availability clustering and virtualization
Proactive systems management alerts
iDRAC8 with Lifecycle Controller
pg. 103
SAJEEVAN ANGEL NETWORK
Dell PowerEdge R630 Xeon E5-2630 v4 16GB 1TB SAS H330 Rack Server
Dell PowerEdge R630 Server delivers accelerate enterprise applications with Dell's most
powerful server featuring highly scalable processing, memory and internal storage. This model
is the Dell PowerEdge R930 server with Dual Intel® Xeon® E7-4820 v4, Optional Operating
System, 64GB Memory, 1.2TB SAS H730P Hard Drive and a 3 Year Warranty.
Figure 34
https://img.router-
switch.com/media/catalog/product/cache/1/image/350x350/9df78eab33525d08d6e5fb8d2713
6e95/d/e/dell-poweredge-r630-server-45-degree_2.jpg
Dell PowerEdge R630 Xeon E5-2630 v4 16GB 1TB SAS H330 Rack Server Specification
pg. 104
SAJEEVAN ANGEL NETWORK
HDD: SAS, SATA, nearline SAS SSD: SAS, SATA, NVMe PCIe
24 x 1.8” SSD – up to 23TB via 0.96TB hot-plug SATA SSD
Storage
10 x 2.5” – up to 18TB via 1.8TB hot-plug SAS HDD
8 x 2.5” – up to 14TB via 1.8TB hot-plug SAS HDD
pg. 105
SAJEEVAN ANGEL NETWORK
2 CPUs, 3 slots
Slot 1: Half length, half height - PCIe 3.0 x16 (x16 connector)
Slot 2: Half length, half height - PCIe 3.0 x8 (x16 connector)
Slot 3: Half length, half height - PCIe 3.0 x16 (x16 connector)
2CPUs, 2 slots
Slot 1: Half length, half height - PCIe 3.0 x16 (x16 connector)
Slots
Slot 2: 3/4 length, full height - PCIe 3.0 x16 (x16 connector)
1CPU, 2 slots
Slot 1: Half length, half height - PCIe 3.0 x8 (x16 connector)
Slot 2: 3/4 length, full height - PCIe 3.0 x16 (x16 connector
Internal:
PERC S130 (SW RAID),
PERC H330
PERC H730
RAID Controllers PERC H730P
External:
PERC H830
External HBAs (non-RAID):
12Gbps SAS HBA
pg. 106
SAJEEVAN ANGEL NETWORK
ECC memory
Hot-plug hard drives
Availability Hot-plug redundant cooling
Hot-plug redundant power
Internal Dual SD Module
pg. 107
SAJEEVAN ANGEL NETWORK
Form Factor: 1U
H: 4.28 cm (1.68 in.) x W: 48.23 cm (18.98 in.) x D: 75.51 cm
(29.72 in.)
Chassis
Form Factor: 1U
H: 4.28 cm (1.68 in.) W: 48.23 cm (18.98 in.) D: 70.05 cm (27.57
in.)
Systems management:
IPMI 2.0 compliant;
Dell OpenManage Essentials; Dell OpenManage Mobile;
Dell OpenManage Power Center
pg. 108
SAJEEVAN ANGEL NETWORK
Remote management
iDRAC8 with Lifecycle Controller,
iDRAC8 Express (default)
iDRAC8 Enterprise (upgrade)
8GB vFlash media (upgrade)16GB vFlash media (upgrade)
iDRAC Quick Sync
Dell PowerEdge R930 Dual Xeon E7-4820 v4*2/ 64GB (4*16G) 1.2TB SAS H730P Rack
Server
Dell PowerEdge R930 Server delivers accelerate enterprise applications with Dell's most
powerful server featuring highly scalable processing, memory and internal storage. This model
is the Dell PowerEdge R930 server with Dual Intel® Xeon® E7-4820 v4, Optional Operating
System, 64GB Memory, 1.2TB SAS H730P Hard Drive and a 3 Year Warranty.
Figure 35
https://img.router-
switch.com/media/catalog/product/cache/1/image/350x350/9df78eab33525d08d6e5fb8d2713
6e95/d/e/dell-poweredge-r930-server-45-degree_1.jpg
pg. 109
SAJEEVAN ANGEL NETWORK
Dell PowerEdge R930 Dual Xeon E7-4820 v4*2/ 64GB (4*16G) 1.2TB SAS H730P Rack
Server Specification
Operating
No Operating System
System
Memory 64GB
pg. 110
SAJEEVAN ANGEL NETWORK
2.5” SATA/SAS SSD, SAS HDD (15K, 10K), nearline SAS HDD
Storage (7.2K)
2.5” Dell PowerEdge NVMe Express Flash PCIe SSD
Embedded NICs:
Broadcom® 5720 quad-port 1Gb NDC
Broadcom® 57800 2x10Gb DA/SFP+ + 2x1Gb BT NDC
Broadcom® 57800 2x10Gb BT + 2x1Gb BT N DC
Communications
Broadcom® 57840S quad-port 10Gb SFP+ Direct Attach Rack NDC
Intel® I350 quad-port 1GbE NDC
Intel® X520 dual-port 10Gb DA/SFP+, + I350 DP 1GbE, NDC
Intel® X540 10GbE BT dual-port + I350 1Gb BT DP NDC
Chassis 4U
pg. 111
SAJEEVAN ANGEL NETWORK
ReadyRails® II, the sliding rail system for the R930, provides tool-less
support for 4-post racks with square or unthreaded round mounting
Rack Support
holes, including all generations of Dell racks. The sliding rail system
also supports tooled mounting in 4-post threaded racks
CONCLUSION
Buying a server for business is a long term investment. It should be fulfil our need so we have
to consider all think such as specification, price, size, power consumption. I going to select
Dell PowerEdge R930 Dual Xeon E7-4820 GEN 10 server for SYNTAX SOLUTIONS
because it have 2x Intel Xeon E7-4820 v4 2.0GHz,25M Cache,6.4GT/s QPI 10C/20T,HT,No
Turbo 115W DDR4 1:1 MaxMem1866Hz threads and base frequency Its offer 4XNIC port it
helpful for add additional bandwidth. It best value for money.
pg. 112
SAJEEVAN ANGEL NETWORK
A network file server is a computer system used for the purpose of managing the file system,
the network printer, handling network communication, and other functions. A server may be
dedicated is such case all of its processing power is allocated to network function, or it may be
non- dedicated which means that a part of server functions allocated as a work stations or DOS
based system.
Network operating system: it is loaded into the servers’ hard disk along with the system
management tools and user utilities. When the system is started, NOS boots and other server
come under its control.
Workstations: workstations or nodes are attached to the server through the network interfaces
card and the cable; workstations are normally intelligence systems, such as the IBM pc. But
DUMV terminals are used in mainframe computers. The concept of distributed process
depends on the fact that personal computer are attached to the network performed their own
processing after loading programs and data from servers. Due to this a work station is called
an active device on the network. After processing, files are stored back on the server where
they can be used by others workstation.
Network interface card-every device connected to a LAN needs network interface card to plug
into the LAN. For example, a PC needs to have an Ethernet card installed in it to connect to an
Ethernet LAN.
Network cabling: once the server, workstations, and network interface cards are in place,
network cabling is used to network everything together. The most popular type of network
cables: Twisted pair wiring, Co-axial cable, Fiber optics cable.
pg. 113
SAJEEVAN ANGEL NETWORK
Workstation,
a high-performance computer system that is basically designed for a single user and has
advanced graphics capabilities, large storage capacity, and a powerful microprocessor (central
processing unit). A workstation is more capable than a personal computer (PC) but is less
advanced than a midrange computer (which can manage a large network of peripheral PCs or
workstations and handle immense data-processing and reporting tasks). The term workstation
is also sometimes ascribed to dumb terminals (i.e., without any processing capacity) that are
connected to mainframe computers. (Workstation | computer, 2021)
Network interface card
A network interface card (NIC) is a hardware component without which a computer cannot be
connected over a network. It is a circuit board installed in a computer that provides a dedicated
network connection to the computer. It is also called network interface controller, network
adapter or LAN adapter.
Purpose
1. NIC allows both wired and wireless communications.
2. NIC allows communications between computers connected via local area network
(LAN) as well as communications over large-scale network through Internet Protocol (IP).
3. NIC is both a physical layer and a data link layer device, i.e. it provides the necessary
hardware circuitry so that the physical layer processes and some data link layer processes can
run on it.
(What is network interface card (NIC)?, 2021)
Communication Medium
The Communication Medium plays an important role in Networks. If the medium works well
and properly, then the speed of transferring data is good but if the medium is not working
properly, then your data would be delayed or would not be sent or even can be lost during
transmission. In Computer Networks, we call this speed of transmitting data, as DATA RATE.
There are two types of networks that you can set-up.
1. Wired Network -Twisted Pair Wires, Coaxial Cables, Fibre Optics
2. Wireless Network – Radio Waves, Terrestrial ‘off air’ Feed, Communication Satellites
(Different Types Of Communication Mediums In Networks - hiTechMV, 2021)
Network Software
pg. 114
SAJEEVAN ANGEL NETWORK
Networking software is a foundational element for any network. It helps administrators deploy,
manage, and monitor a network. Traditional networks are made up of specialized hardware,
such as routers and switches, that bundle the networking software into the solution. Software-
defined networking (SDN) separates that software from the hardware, making it easier to
innovate and adapt the network to quickly meet changing network demands. The separation of
functions from hardware, such as firewalls or load balancing, is called network functions
virtualization (NFV).
Network software is not the same as software applications. The former exposes the inner-
workings of the network to administrators, while software applications enable end users to
perform specific tasks. Network software is “invisible” to end users — it is simply used to
facilitate the access those users have to network resources, in a seamless way.
The basic functionality includes both user management and file management. User
management enables administrators to add or remove users from the network. File management
allows administrators to define the location of data storage and user access to that data.
Network software allows multiple devices, such as desktops, laptops, mobile phones, tablets,
and other systems to connect to one another, as well as other networks. The internet is a prime
example of a globally connected system of servers and computers that relies on networking
software to ensure accessibility by end users. (What's Networking Software?, 2021)
Network operating system: NOS is a system that offers a shared platform for all the connected
computers that can run a shared application. Net and Novell Netware are popular examples of
network software.
Shared network: a networking software whose applications are centrally saved and each
individual computer can access the applications on their own. Oracle is an example of such
network software.
Client server network programs: one component of such applications are stored on client’s
system and the other one is stored on server. Both systems then communicate with each other
and utilizes their part of the component accordingly. For example Microsoft exchange.
Network file server
A file server is a central server in a computer network that provides file systems or at least parts
of a file system to connected clients. File servers therefore offer users a central storage place
for files on internal data media, which is accessible to all authorized clients. Here, the server
administrator defines strict rules regarding which users have which access rights: For instance,
pg. 115
SAJEEVAN ANGEL NETWORK
the configuration or file authorizations of the respective file system enable the admin to set
which files can be seen and opened by a certain user or user group, and whether data can only
be viewed or also added, edited, or deleted. (server, 2021)
For example - Windows File Server, Windows Fail over cluster, Windows Server Cluster
Network Operating System
Network Operating System is a computer operating system that facilitates to connect and
communicate various autonomous computers over a network. An Autonomous computer is an
independent computer that has its own local memory, hardware, and O.S. It is self-capable to
perform operations and processing for a single user. They can either run the same or different
O.S.
The Network O.S. mainly runs on a powerful computer, that runs the server program. It
facilitates the security and capability of managing the data, user, group, application, and other
network functionalities. The main advantage of using a network o.s. is that it facilitates the
sharing of resources and memory amongst the autonomous computers in the network. It can
also facilitate the client computers to access the shared memory and resources administered by
the Server computer. In other words, the Network O.S. is mainly designed to allow multiple
users to share files and resources over the network. (What is a Network Operating System?,
2021)
For example - Microsoft Windows Server, UNIX, Linux, Mac OS X, Novell NetWare, and
BSD
pg. 116
SAJEEVAN ANGEL NETWORK
Activity 03
Prepare a written network design plan to meet the above mentioned user requirements including
a blueprint drawn using a modeling tool. (Ex: Microsoft Visio, EdrawMax).
Support your answer by providing the VLAN and IP subnetting scheme for the above scenario
and the list of devices, network components and software used to design the network for above
scenario and while justifying your selections.
3.1 Prepare a written network design plan to meet the above mentioned user
requirements including a blueprint drawn using a modeling tool.
Project scope
The main aim of the project is provide reliable network for SYNTAX SOLUTIONS .here we
have to implement network design to new building which the management purchased in
Matara. there are 7 department and we have separate them through VLAN also sales and
Marketing Team need to connect using wifi connectivity.
pg. 117
SAJEEVAN ANGEL NETWORK
ERP and CRM systems need to be implement so we need to allocated one server for customer
care and one for legal, finance, HR
a. 16 port – 03
b. 24 port – 03
c. 48 port – 03
3. Servers 05
4. Routers 02
5. Wifi access point 01
Figure 36
Support your answer by providing the VLAN and IP subnetting scheme for the above scenario
and the list of devices, network components and software used to design the network for above
scenario and while justifying your selections.
pg. 118
SAJEEVAN ANGEL NETWORK
2. Switches
4. Servers
5. PCs
6. Transmission Media(UTP)
Software Components
7. Networking Operating System(Windows server)
8. Protocol Suite(TCP/IP)
pg. 119
SAJEEVAN ANGEL NETWORK
pg. 120
SAJEEVAN ANGEL NETWORK
Test and evaluate the proposed design to meet the requirements and analyse user
feedback by using a User feedback form.
Figure 37
pg. 121
SAJEEVAN ANGEL NETWORK
Figure 38
pg. 122
SAJEEVAN ANGEL NETWORK
Figure39
pg. 123
SAJEEVAN ANGEL NETWORK
Responses
Figure 40
pg. 124
SAJEEVAN ANGEL NETWORK
Figure 41
Figure 42
pg. 125
SAJEEVAN ANGEL NETWORK
Install and configure Network services, devices and applications (Ex: VLAN, DHCP,
DNS, Proxy, Web, Etc.) according to the proposed design to accomplish the user
requirements and design a detailed Maintenance schedule for above Network
Configure VLAN
Figure 43
pg. 126
SAJEEVAN ANGEL NETWORK
Figure 44
pg. 127
SAJEEVAN ANGEL NETWORK
VLAN 2
Figure 45
pg. 128
SAJEEVAN ANGEL NETWORK
VLAN IP ADRESS
Figure 46
pg. 129
SAJEEVAN ANGEL NETWORK
Figure 47
pg. 130
SAJEEVAN ANGEL NETWORK
Configure Telnet
Figure 48
pg. 131
SAJEEVAN ANGEL NETWORK
Configure SSH
Figure 49
pg. 132
SAJEEVAN ANGEL NETWORK
Figure 50
pg. 133
SAJEEVAN ANGEL NETWORK
Figure 51
Figure 52
pg. 134
SAJEEVAN ANGEL NETWORK
Figure 53
Figure 54
pg. 135
SAJEEVAN ANGEL NETWORK
Figure 55
Figure 56
pg. 136
SAJEEVAN ANGEL NETWORK
Figure 57
Figure 58
pg. 137
SAJEEVAN ANGEL NETWORK
Figure 59
Figure 60
pg. 138
SAJEEVAN ANGEL NETWORK
Figure 61
Figure 62
pg. 139
SAJEEVAN ANGEL NETWORK
Figure 63
pg. 140
SAJEEVAN ANGEL NETWORK
Figure 64
Figure 65
pg. 141
SAJEEVAN ANGEL NETWORK
Maintenance schedule
Systems
Server Maintenance
Server Maintenance is the process of keeping the server updated and running to ensure that the
organization’s computer network is operating smoothly. The network administrator usually
does this, and it is crucial to the performance of the business. Without a proper IT service plan,
the application software will never run as expected. In severe cases, the network can even
experience partial or total failure leading to severe losses to your business.
Server statistics
Think of server maintenance as putting gas in your car. You wouldn’t wait until you completely
run out of gas to go buy some more, because at that point you wouldn’t be able to drive any
further. No, you want to fill your car up with gas before your car is on empty.
You fill up your car as you need, but you also think ahead and put in extra for the longer trips.
Server maintenance is no different. You want to take care of your server before it’s too late,
maintaining current needs, while also looking to the future
You might still be wondering, what does server maintenance have to do with you?
Regular server maintenance is crucial to your business.
If you are a small (or large) company, chances are high that you have multiple servers on your
network. In order to keep your business’ computer network in optimal and reliable condition,
you need to have regular server updates, installation of patches, and diagnostics
Taking proper care of your servers will increase their life spans while saving you time and
money. This upkeep will spare you having to buy a new server and moving all of your data
from its original home prematurely (yeah, server failure is not fun).
pg. 142
SAJEEVAN ANGEL NETWORK
But with regular maintenance, your business’ precious hardware and software will have a
greater chance of serving you for a long time.
Good server maintenance also boosts server productivity which, in turn, boosts your overall
business productivity. Routine server maintenance will keep your server functioning at top
speed. This will not only save you time, but also increase your work efficiency.
Properly monitored servers also give you the assurance that if anything goes wrong, you will
be able to easily recover any lost or damaged data. This way, you can get your systems back
and working before your clients even have the chance to notice there was an issue.
Server Maintenance
Before making any changes to your production system, be sure that your backups are working.
You may even want to run some test recoveries if you are going to delete critical data. While
focused on backups, you may want to make sure you have selected the right backup location.
Don’t use your production system as an archival system. Delete old logs, emails, and software
versions no longer used. Keeping your system free of old software limits security issues. A
pg. 143
SAJEEVAN ANGEL NETWORK
smaller data footprint means faster recovery. If your usage is exceeding 90% of disk capacity,
either reduce usage or add more storage. If your partition reaches 100%, your server may stop
responding, database tables can corrupt and data may be lost.
All production servers should use RAID. More importantly, you should be monitoring your
RAID status. In our decade plus in business, we have worked on countless systems where the
RAID failed. As a result, a single disk failure caused a complete system failure. At rackAID,
we either use providers that monitor our RAID for us or we have setup direct RAID monitoring.
Roughly I estimate that RAID fails in about 1% of servers per year. One percent may seem
small, but a complete server failure can turn a simple drive replacement into a multi-hour
disaster recovery scenario.
Updates for Linux systems are release frequently. Staying on top of these updates can be
challenging. This is why we use automated patch management tools and have monitoring in
place to alert us when a system is out of date. If you are updating your server manually (or not
at all), you may miss important security updates. Hackers often scan for vulnerably systems
within hours of a issue being disclosed. So rapid response is key. If you cannot automate your
updates, then create a schedule to update your system. I recommend weekly at a minimum for
current versions and perhaps monthly for older OS versions. I would also monitor release
notices from your distribution so you are aware of any major security threats and can respond
quickly.
If you are using a hosting or server control panel, be sure to update it as well. Sometimes this
means updating not only the control panel itself, but also software it controls. For example,
with WHM/cPanel, you must manually update PHP versions to fix known issues. Simply
updating the control panel does not also update the underlying Apache and PHP versions used
by your OS.
pg. 144
SAJEEVAN ANGEL NETWORK
I recommend changing passwords every 6 to 12 months, especially if you have given out
passwords to others for maintenance.
pg. 145
SAJEEVAN ANGEL NETWORK
SYSTEM MAINTANCE
Systems are effective and efficient or otherwise. The process of monitoring, evaluating, and
modifying of existing information systems to make required or desirable improvements may
be termed as System Maintenance.
System maintenance is an ongoing activity, which covers a wide variety of activities, including
removing program and design errors, updating documentation and test data and updating user
support. For the purpose of convenience, maintenance may be categorized into three classes,
namely:
i) Corrective Maintenance: This type of maintenance implies removing errors in a program,
which might have crept in the system due to faulty design or wrong assumptions. Thus, in
corrective maintenance, processing or performance failures are repaired.
ii) Adaptive Maintenance: In adaptive maintenance, program functions are changed to enable
the information system to satisfy the information needs of the user. This type of maintenance
may become necessary because of organizational chan
Network Maintenance
Network maintenance basically means you have to do what it takes in order to keep a network
up and running and it includes a number of tasks:
pg. 146
SAJEEVAN ANGEL NETWORK
Structured tasks.
Interrupt-driven tasks.
Structured means you have a pre-defined plan for network maintenance that will make sure
that problems are solved before they occur. As a network engineer this will also make your life
a whole lot easier. Interrupt-driven means you just wait for trouble to occur and then fix it as
fast as you can. Interrupt-driven is more like the “fireman” approach…you wait for trouble to
happen and then you try to fix the problem as fast as you can. A structured approach where you
have a network maintenance strategy and plan reduces downtime and it’s more cost effective.
Of course you can never completely get rid of interrupt-driven tasks because sometimes things
“just go wrong” but with a good plan we can reduce the number of interrupt-driven tasks for
sure.
You don’t have to think of a complete network maintenance model yourself; there are a number
of well-known network maintenance models that we use. It’s best to use one of the models that
is best suited for your organization and adjustments if needed.
Choosing which network maintenance model you will use depends on your network and the
business. You can also use them as a template to create your own network maintenance model.
To give you an idea what a network maintenance model is about and what it looks like, here’s
an example for FCAPS:
pg. 147
SAJEEVAN ANGEL NETWORK
Fault management: we will configure our network devices (routers, switches, firewalls, servers,
etc.) to capture logging messages and send them to an external server. Whenever an interface
goes down or the CPU goes above 80% we want to receive an e-mail so we can see what is
going on.
Configuration management: Any changes made to the network have to be logged. We will use
a change management so relevant personnel will be notified of planned network changes.
Changes to network devices have to be reported and acknowledged before they are
implemented.
Accounting management: We will charge (guest) users for usage of the wireless network so
they’ll pay for each 100MB of data or something. It’s also commonly used to charge people
for long distance VoIP calls.
Performance management: Network performance will be monitored on all LAN and WAN
links so we know when things go wrong. QoS (Quality of Service) will be configured on the
appropiate interfaces.
Security management: We will create a security policy and implement it by using firewalls,
VPNs, intrusion prevention systems and use AAA (Authorization, Authentication and
Accounting) servers to validate user credentials. Network breaches have to be logged and a
appropiate response has to be made.
pg. 148
SAJEEVAN ANGEL NETWORK
Activity 04
Implement a networked system based on your prepared design with valid evidences and recommend
potential future enhancements for the networked system with valid justifications to your
recommendations. Use critical reflection to critically evaluate the design, plan, configuration, and
testing of your network while justifying with valid conclusions.
Figure 66
pg. 149
SAJEEVAN ANGEL NETWORK
ping
pg. 150
SAJEEVAN ANGEL NETWORK
Figure 68
pg. 151
SAJEEVAN ANGEL NETWORK
trace
Figure 69
telnet
Figure 70
pg. 152
SAJEEVAN ANGEL NETWORK
SSH
Figure 71
Test report
pg. 153
SAJEEVAN ANGEL NETWORK
Conclusion
In this chapter I learned definitions of network analysis, architecture, and design; the
importance of network analysis in understanding the system and providing a defensible
architecture and design; and the model for the network analysis, architecture, and design
processes.
You have also learned that networks are not independent entities but rather a part of the system
and that the delivery of network services is a goal of the system. Network services consist of
performance and function and are offered to users, applications, and devices so that they can
accomplish their work on the system. In order to architect and design a network to support
services, you need to know what they are, how they work together, and how to characterize
them. Once you do this, you will have a broad view of what the network will need to support,
which you can take to the next levels of detail as you proceed with the network analysis.
By describing the system as a set of components (e.g., user, application, device, network), you
can apply interfaces between these components to help understand the relationships, inputs,
and outputs between each of the components.
You have also learned about different types of services, from best-effort, unpredictable, and
unreliable service to predictable, bounded, and somewhat predictable service, to guaranteed
services with accountability.
To go to a level deeper in the discussion about services, we considered the service performance
characteristics capacity, delay, and RMA (reliability, maintainability, and availability). These
characteristics will be useful only if we can measure and verify their values in the system. We
discussed these values, as well as service metrics, thresholds, and boundaries. We learned that
performance characteristics could be combined into a performance envelope.
Having thought about systems, services, and their characteristics, we are now ready to quantify
what we want from our networks. To do this, we first need to gather, analyze, and understand
pg. 154
SAJEEVAN ANGEL NETWORK
the requirements from the system. This is requirements analysis, the next step in the network
analysis process.
References
Comparitech. 2021. 6 Best Network Topologies Explained - Pros & Cons [Including
Diagrams]. [online] Available at: <https://www.comparitech.com/net-admin/network-
topologies-advantages-disadvantages/> [Accessed 20 May 2021].
Arcelect.com. 2021. Ethernet Topologies Gigabit LAN Standards Gigabit Ethernet Leads the
Way Over Fiber. [online] Available at: <https://arcelect.com/ethernet.htm> [Accessed 20 May
2021].
Interserver Tips. 2021. Common Network Protocols and Their Ports - Interserver Tips. [online]
Available at: <https://www.interserver.net/tips/kb/common-network-protocols-ports/>
[Accessed 12 May 2021].
pg. 155
SAJEEVAN ANGEL NETWORK
Protocols, W., 2021. What Is Networking Protocols | How Networking Protocol works?.
[online] EDUCBA. Available at: <https://www.educba.com/what-is-networking-protocols/>
[Accessed 12 May 2021].
Thakur, D., 2021. Ethernet topology - What is an Ethernet topology? How an Ethernet
Worked? - Computer Notes. [online] Computer Notes. Available at:
<https://ecomputernotes.com/computernetworkingnotes/computer-network/what-is-an-
ethernet-topology-how-an-ethernet-worked> [Accessed 12 May 2021].
pg. 156
SAJEEVAN ANGEL NETWORK