You are on page 1of 110

INTERNAL VERIFICATION – ASSIGNMENT BRIEF

Programme Title: HND in Computing

Assessor Name: Ms. Ama Kulathilake

Internal Verifier Name:

Unit or Component Number and


Title:
Unit 02 - Networking

Assignment title: LAN Design & Implementation for Alliance Health


Assessment criteria targeted by
this assignment brief:
LO1, LO2, LO3, LO4

Is this an Authorised Assignment N/A


Brief published by Pearson? If so,
has it been amended by the
Assessor in any way? Please give
details.
(If using the Authorised Assignment Brief
‘off the shelf’ with no amendments, please
answer the question marked * in the
checklist only)

Has this assignment been Yes No


submitted to the Assignment
Checking Service? √
(If yes, please keep a copy of the ACS
feedback with this form)

INTERNAL VERIFIER CHECKLIST Y/N

Are the programme and unit details accurate? Y

*Are clear deadlines for assessment given? TBC

Is the time frame of an appropriate duration? Y

Is there a suitable vocational scenario or context? Y

Are the assessment criteria to be addressed stated accurately? Y

Does each task show which criteria are being addressed? Y

Do the tasks meet the assessment requirements of the unit/s? Y

Is it clear what evidence the learner needs to generate? Y

Is it likely to generate evidence that is valid and sufficient? Y

Overall, is the Assignment fit for purpose? Yes √ No

*If ‘No’ is recorded the Internal Verifier must recommend actions detailing the issues to be addressed. The Assessor and
the Internal Verifier must then confirm that the action has been undertaken and that the Assignment Brief is authorised

M.K.Kawzar (00180822) NETWORKING – 01 1


for use before being issued to learners.

M.K.Kawzar (00180822) NETWORKING – 01 2


Target Date Date
Action required:
for Action
(If none then please state n/a)
Completion Completed

General Comments (if appropriate)

Assignment Brief Authorised for Use:

Internal Verifier signature Date

Assessor signature
Date

Lead Internal Verifier signature (if


appropriate)
oshada@esoft.lk Date 2022/06/13

M.K.Kawzar (00180822) NETWORKING – 01 3


Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)
INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Programme title BTEC Higher National Diploma in Computing

Ms. Ama Kulathilake


Assessor Internal Verifier
Unit 02: Networking
Unit(s)
LAN Design & Implementation for Alliance Health
Assignment title
M.K Kawzar
Student’s name
List which assessment criteria Pass Merit Distinction
the Assessor has awarded.

INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded match


those shown in the assignment brief? Y/N

Is the Pass/Merit/Distinction grade awarded


justified by the assessor’s comments on the Y/N
student work?
Has the work been assessed Y/N
accurately?
Is the feedback to the student:
Give details:
• Constructive? Y/N
• Linked to relevant assessment criteria? Y/N
Y/N
• Identifying opportunities for
improved performance?
Y/N
• Agreeing actions?
Does the assessment decision need Y/N
amending?

Assessor signature Date

Internal Verifier signature Date


Programme Leader signature (if required)
Date
Confirm action completed
Remedial action taken
Give details:

Assessor signature Date


Internal Verifier
signature Date

M.K.Kawzar (00180822) NETWORKING – 01 4


Programme Leader
signature (if required) Date

M.K.Kawzar (00180822) NETWORKING – 01 5


Higher Nationals - Summative Assignment Feedback Form
Student Name/ID M.K. Kawzar / COL00180822
Unit 02: Networking
Unit Title
Assignment Number 1 Assessor
09/08/2023 Date Received
Submission Date 1st submission
Date Received 2nd
Re-submission Date submission

Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction P1 P2 M1 D1
Descripts

LO2 Explain networking devices and operations.


Pass, Merit & Distinction P3 P4 M2
Descripts

LO3 Design efficient networked systems.


Pass, Merit & Distinction P5 P6 M3 D2
Descripts

LO4 Implement and diagnose networked systems.


Pass, Merit & Distinction P7 P8 M4
Descripts

Grade: Assessor Signature: Date:

Resubmission Feedback:

Grade: Assessor Signature: Date:

Internal Verifier’s Comments:

Signature & Date:

* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.

Assignment Feedback

M.K.Kawzar (00180822) NETWORKING – 01 6


Formative Feedback: Assessor to Student

Action Plan

Summative feedback

Feedback: Student to Assessor

Assessor Date
signature
M.K. Kawzar 09/08/2023
Student mkawzar@gmai.com Date
signature

M.K.Kawzar (00180822) NETWORKING – 01 7


Pearson Higher Nationals in
Computing
Unit 02: Networking
Assignment 01
M.K. Kawzar – COL00180822

General Guidelines

M.K.Kawzar (00180822) NETWORKING – 01 8


1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.

Word Processing Rules

1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.

Important Points:

1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body
except for the before mentioned compulsory information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and
a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course

M.K.Kawzar (00180822) NETWORKING – 01 9


Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct form. I further understand what it means to
copy another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of Pearson UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my
own, and where I have made use of another’s work, I will attribute the source in the correct
way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Pearson, UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.

mkawzar@gmail.com 09/08/2023
Student’s Signature: Date:
(Provide E-mail ID) (Provide Submission Date)

M.K.Kawzar (00180822) NETWORKING – 01 10


Higher National Diploma in Computing
Assignment Brief
Student Name /ID Number M.K. Kawzar / COL00180822

Unit Number and Title Unit 2: Networking

Academic Year 2022/23

Unit Tutor

Assignment Title LAN Design & Implementation for Alliance Health

Issue Date

Submission Date

IV Name & Date

Submission format

The submission should be in the form of an individual report written in a concise, formal business style
using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using Harvard
referencing system. Please also provide an end list of references using the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures, although
you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:

LO1 Examine networking principles and their protocols.

LO2 Explain networking devices and operations.

LO3 Design efficient networked systems.

LO4 Implement and diagnose networked systems.

Assignment Brief and Guidance:

M.K.Kawzar (00180822) NETWORKING – 01 11


Scenario

Alliance Health is a technology-enabled solutions company that optimizes the revenue cycle of the US
healthcare industry where its global delivery center is located in Colombo. The company is planning to
expand their business operations with their latest branch at Matara and wants it to be one of the
state-of-the-art companies in Matara with the latest facilities.

Assume you have been appointed as the new network analyst of Alliance Health to plan, design and
restructure the existing network. Prepare a network architectural design and implement it with your
suggestions and recommendations to meet the company requirements.
The floor plan of the head office in Colombo is as follows:
Floor 1:
 Reception area
 Sales & Marketing Department (10 employees)
 Customer Services Area – with Wi-Fi facilities

Floor 2:
 Administration Department (30 Employees)
 HR Department (20 employees)
 Accounting & Finance Department (15 employees)
 Audit Department (5 employees)
 Business Development Department (5 employees)

Floor 3
 Video conferencing room
 IT Department (60 employees)
 The Server Room

M.K.Kawzar (00180822) NETWORKING – 01 12


The floor plan of the branch in Matara is as follows:
Floor 1:
 Reception area
 Customer Services Area– with Wi-Fi facilities

Floor 2:
 Administration Department (10 Employees)
 HR Department (7 employees)
 Accounting & Finance Department (8 employees)
 IT Department (50 employees)

Following requirements are given by the Management.


 All the departments must be separated with unique subnet .

 The conferencing room of the head office and Customer Services Areas of each
branch are to be equipped with Wi-Fi connections .

 Connectivity between two branches (Head Office and Matara) would allow the intra
branch connectivity between departments. (Use of VPN is not compulsory)

 The necessary IP address classes and ranges must be decided by the network
designer and should be used for all the departments except the server room .

 Number of servers required for the Server room need to be decided by the
Network designer and should be assigned with 10.254.10.0/24 subnet. (Uses static
IPs )

 Sales and Marketing Team also needs to access Network resources using WIFI
connectivity.

(Note: Clearly state your assumptions. You are allowed to design the network according to your
assumptions, but main requirements should not be violated)

M.K.Kawzar (00180822) NETWORKING – 01 13


Activity 01
 Discuss the benefits and constraints of different network system types that can be
implemented in the Matara branch and the main IEEE Ethernet standards that can
be used in above LAN and WLAN design.

 Discuss the importance and impact of network topologies and assess the main
network protocol suites that are used in network design using examples.
Recommend suitable network topology and network protocols for above scenario
and evaluate with valid points how the recommended topology demonstrates the
efficient utilization of the networking system of Matara branch.

Activity 02
 Discuss the operating principles of network devices (Ex: Router, Switch, Etc.) and
server types that can be used for above scenario while exploring different servers
that are available in today’s market with their specifications. Recommend
server/servers for the above scenario and justify your selection with valid points.

 Discuss the inter-dependence of workstation hardware and networking software


and provide examples for networking software that can be used in above network
design.

Activity 03
 Prepare a written network design plan to meet the above-mentioned user
requirements including a blueprint drawn using a modeling tool (Ex: Microsoft Visio,
EdrawMax) .T est and evaluate the proposed design by analyzing user feedback with
the aim of optimizing your design and improving efficiency.

(Support your answer by providing the VLAN and IP subnetting scheme for the above
scenario and the list of devices, network components and software used to design the

M.K.Kawzar (00180822) NETWORKING – 01 14


network for above scenario and while justifying your selections.)

 Install and configure Network services, devices and applications (Ex: VLAN,WiFi,
DNS,Proxy, Web, Etc.) according to the proposed design to accomplish the user
requirements and design a detailed Maintenance schedule for above Network.

*Note: - Screen shots of Configuration scripts should be presented.

Activity 04
 Implement a networked system based on your prepared design with valid evidences.

 Develop test cases and conduct verification (Ex: Ping, extended ping, trace route,
telnet, SSH, etc.) to test the above Network and analyse the test results against the
expected results. Recommend potential future enhancements for the networked
system with valid justifications and critically reflect on the implemented network,
including the plan, design, configurations, tests and the decisions made to enhance
the system.

M.K.Kawzar (00180822) NETWORKING – 01 15


M.K.Kawzar (00180822) NETWORKING – 01 16
Grading Rubric

Grading Criteria Achieved Feedback

LO1 : Examine networking principles and their protocols.

P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Assess common networking principles and how protocols enable
the effectiveness of networked systems.

LO2 : Explain networking devices and operations

P3
Discuss the operating principles of networking devices and
server types.
P4

M.K.Kawzar (00180822) NETWORKING – 01 17


Discuss the interdependence of workstation hardware and
relevant networking software
M2
Explore a range of server types and justify the selection of a
server for a given scenario, regarding cost and performance
optimisation

LO 1 & LO2
D1 Evaluate the topology protocol selected for a given scenario and
how it demonstrates the efficient utilisation of a networking system.
LO3 : Design efficient networked systems

P5
Design a networked system to meet a given specification.
P6
Design a maintenance schedule to support the networked
system.

M3
Analyse user feedback on your designs with the aim of

M.K.Kawzar (00180822) NETWORKING – 01 18


optimising your design and improving efficiency.
D2
Critically reflect on the implemented network, including the
design and decisions made to enhance the system.
LO4 : Implement and diagnose networked systems

P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D2 Critically reflect on the implemented network, including the
design and decisions made to enhance the system.

M.K.Kawzar (00180822) NETWORKING – 01 19


Acknowledgement
First of all, I would like to thank Miss Ama, Our Networking Lecturer for guiding us
through this lessons. Beside I would like to thank my friends for helping me with this
subject. And also, I finally thank ESOFT Metro Campus for this valuable opportunity.

M.K.Kawzar (00180822) NETWORKING – 01 20


Table of Contents
Acknowledgement..................................................................................................................20
Table Of Figure....................................................................................................................... 24
List Of Table............................................................................................................................25
Activity 1.................................................................................................................................26
1. Computer Network.........................................................................................................26
1.1 What is a Computer Network...................................................................................26
1.2 Uses of Computer Networks.....................................................................................26
2. Network System Types...................................................................................................27
2.1 Peer-to-Peer Network...............................................................................................27
2.2 Client Server............................................................................................................. 28
2.3 Cloud............................................................................................................................ 29
2.4 Cluster...................................................................................................................... 32
2.5. Centralized...............................................................................................................33
2.6 Virtualized.................................................................................................................34
3. Computer Network Designs............................................................................................35
3.1 Local Area Network (LAN).........................................................................................35
3.2 Wide Area Network (WAN).......................................................................................37
3.3 Metropolitan Area Network (MAN)..........................................................................38
3.4 Storage Area Network..............................................................................................39
3.5 Controller Area Network.......................................................................................... 40
3.6 Personal Area Network (PAN)...................................................................................41
3.7 Virtual Private Network (VPN)..................................................................................42
3.8 Intranet.....................................................................................................................44
3.9 Extranet.................................................................................................................... 45
4. Network Topologies........................................................................................................46
4.1 Point-to-Point Connection........................................................................................47
4.2 Bus Topology............................................................................................................ 48
4.3 Ring Topology........................................................................................................... 49
4.4 Dual Ring Topology...................................................................................................50
4.5 Star Topology............................................................................................................50
4.6 Extended Star Topology............................................................................................52
4.7 Tree Topology...........................................................................................................52
4.8 Mesh Topology......................................................................................................... 53

M.K.Kawzar (00180822) NETWORKING – 01 21


4.9 Partial Mesh Topology..............................................................................................54
4.10 Hybrid Topology..................................................................................................... 55
Recommended Network Topology for Alliance Health...................................................56
Logical.............................................................................................................................56
Physical........................................................................................................................... 56
5. Network Related Standards............................................................................................56
Introduction....................................................................................................................56
5.1 ANSI (American National Standards Institute)..........................................................57
5.2 ITU – T (International Telecommunication Union)....................................................58
5.3 IEEE (Institute of Electrical and Electronics Engineering)..........................................59
6. Network Models.............................................................................................................61
1. OSI MODEL................................................................................................................. 61
1.1 Application Layer (Layer 7).......................................................................................62
1.2 Presentation Layer (Layer 6).....................................................................................62
1.3 Session Layer (Layer 5)..............................................................................................62
1.4 Transport Layer (Layer 4)..........................................................................................63
1.5 Network Layer (Layer 3)............................................................................................63
1.6 Data Link Layer (Layer 2)...........................................................................................63
1.7 Application Layer (Layer 1).......................................................................................63
2. TCP/ IP MODEL........................................................................................................... 64
7. Network Protocol........................................................................................................... 65
7.1 Application Layer Protocol........................................................................................66
7.1.1 File Transfer Protocol (FTP)....................................................................................66
7.1.2 Telnet.....................................................................................................................66
7.1.3 Secure Shell (SSH)..................................................................................................66
7.1.4 Simple Mail Transfer Protocol (SMTP)...................................................................66
7.1.5 Hyper Text Transfer Protocol (HTTP).....................................................................67
7.1.6 Domain Name Service (DNS).................................................................................68
7.1.7 Hyper Text Transfer Protocol Secure (HTTPS)........................................................68
7.1.8 Dynamic Host Configuration Protocol (DHCP).......................................................68
7.1.9 Simple Network Management Protocol (SNMP)...................................................68
7.2 Transport Layer Protocol..........................................................................................69
7.2.1 Transmission Control Protocol (TCP).....................................................................69
7.2.2 User Diagram Protocol (UDP)................................................................................70
7.3 Internet Layer Protocol.............................................................................................71

M.K.Kawzar (00180822) NETWORKING – 01 22


7.3.2 Address Resolution Protocol (ARP)........................................................................72
7.3.3 Reverse Address Resolution Protocol (RARP)........................................................72
7.3.4 Internet Protocol (IP).............................................................................................72
Activity 2.................................................................................................................................74
8. Operating Principles of Network Devices and Servers...................................................74
8.1 Network Devices.......................................................................................................74
8.2 Servers...................................................................................................................... 75
9. Inter-dependence of workstation hardware with networking software........................78
9.1 Workstation Hardware.............................................................................................78
9.2 Networking Software................................................................................................78
9.3 Explain the inter-dependencies of workstation hardware with networking software.
....................................................................................................................................... 79
Activity 3.................................................................................................................................80
10. Network Blueprint for Alliance Health.....................................................................80
11. VLAN and IP Subnetting Scheme for Alliance Health....................................................81
12. List of devices, network components and software used for Allience Health..............81
Hardware Components For Colombo.............................................................................81
Hardware Components For Matara................................................................................82
Software Components....................................................................................................82
Test and evaluate the proposed design to meet the requirements and analyse user feedback
by using a User feedback form...............................................................................................83
Install and configure Network services, devices and applications..........................................85
VLAN configuration.........................................................................................................86
Design a detailed Maintenance schedule for Syntax Solutions..............................................92
13. NETWORK MAINTANCE SCHEDULE...............................................................................92
Activity 04...............................................................................................................................94
Develop test cases and conduct verification..........................................................................94
TEST NO 1 Ping within a VLAN........................................................................................94
TEST NO 2 Ping Among the VLAN...................................................................................95
TEST NO 3....................................................................................................................... 95
TEST NO 4....................................................................................................................... 96
Recommend potential future enhancements for Allience Health..........................................97
14. FUTURE ENHANCEMENT OF THE NETWORK................................................................98
14.1 Upgrading Network Quality....................................................................................98
14.2 Upgrading the Network Security............................................................................98

M.K.Kawzar (00180822) NETWORKING – 01 23


14.3 Upgrading or Replacing the Cables in the Network................................................99
CONCLUSION........................................................................................................................ 100
References............................................................................................................................101

Table Of Figure
Figure 1 Figure 1 Peer-to-Peer Network System....................................................................27
Figure 3 Cloud Computing......................................................................................................30
Figure 4 Cluster Network System...........................................................................................32
Figure 5 Centralized Network System.................................................................................... 33
Figure 6 Virtualization............................................................................................................ 34
Figure 7 Local Area Network.................................................................................................. 36
Figure 8 Wide Area Network..................................................................................................37
Figure 9 Metropolitan Area Network.....................................................................................38
Figure 10 Storage Area Network............................................................................................ 39
Figure 11 Controller Area Network........................................................................................ 40
Figure 12 Personal Area Network...........................................................................................41
Figure 13 Virtual Private Network..........................................................................................42
Figure 14 Intranet...................................................................................................................44
Figure 15 Extranet.................................................................................................................. 45
Figure 16 Point-to-Point Topology..........................................................................................47
Figure 17 Bus Topology.......................................................................................................... 48
Figure 18 Ring Topology.........................................................................................................49
Figure 19 Dual Ring Topology.................................................................................................50
Figure 20 Star Topology..........................................................................................................51
Figure 21 Extended Ring Topology.........................................................................................52
Figure 22 Tree Topology.........................................................................................................52
Figure 23 Mesh Topology.......................................................................................................53
Figure 24 Mesh Designs..........................................................................................................54
Figure 25 Hybrid Topology..................................................................................................... 55
Figure 26 American National Standards Institute...................................................................57
Figure 27 International Telecommunication Union................................................................58
Figure 28 Institute of Electrical and Electronics Engineering..................................................59
Figure 29 Layers and Functions of OSI Model.........................................................................62
Figure 30 The Comparison between OSI Model and TCP/IP Model.......................................64
Figure 31 Other Application Layer Protocol............................................................................69
Figure 32 TCP Header............................................................................................................. 70
Figure 33 UPD Header............................................................................................................ 70
Figure 34 ICMP Error Message Service...................................................................................72
Figure 35 Router.....................................................................................................................74
Figure 36 Switches..................................................................................................................75
Figure 37 Servers....................................................................................................................75
Figure 38 Allience Health Blueprint Colombo.........................................................................80

M.K.Kawzar (00180822) NETWORKING – 01 24


Figure 38 Allience Health Blueprint Matara...........................................................................80
Figure 38 IP Allocation for Allience Health Colombo............................................................81
Figure 38 IP Allocation for Allience Health Matara...............................................................81
Figure 39 Feedback Form....................................................................................................... 83
Figure 39 Reponses 1..............................................................................................................84
Figure 39 Reponses 2..............................................................................................................84
Figure 39 Reponses 3..............................................................................................................84
Figure 39 Reponses 4..............................................................................................................84
Figure 39 Installing Windows 1...............................................................................................85
Figure 39 Installing Windows 2...............................................................................................85
Figure 42 Cisco Packet Tracer Network Prototype 1..............................................................86
Figure 42 Cisco Packet Tracer Network Prototype 2..............................................................86
Figure 44 VLAN SWITCHPORT Configuration..........................................................................87
Figure 48 Router IP Address Configuration............................................................................88
Figure 48 Router show run Configuration 1...........................................................................89
Figure 48 Router show run Configuration 2...........................................................................90
Figure 48 Router show run Configuration 3...........................................................................91
Figure 48 Router show run Configuration 4...........................................................................92
Figure 49 Test No 1.................................................................................................................94
Figure 50 Test No 2.................................................................................................................95
Figure 51 Test No 3.................................................................................................................96
Figure 52 Test No 4.................................................................................................................97
Figure 54 Network Security (facial Recognition).....................................................................98

List Of Table
Table 1 Table 1 P2P Advantages and Disadvantages..............................................................28
Table 2 Client server...............................................................................................................29
Table 3 Table 3 Client Server Advantages and Disadvantages................................................29
Table 4 Difference between Peer-to-Peer and Client-Server..................................................30
Table 5 Advantages and Disadvantages of Cloud Computing.................................................31
Table 6 Advantages and Disadvantages of Cluster Computing...............................................34
Table 7 Advantages and Disadvantages of Cluster Computing...............................................35
Table 8 Advantages and Disadvantages of Centralized Network System...............................35
Table 9 Advantages and Disadvantages of Virtualization.......................................................36
Table 10 Advantages and Disadvantages of LAN....................................................................37
Table 11 Advantages and Disadvantages of WAN..................................................................38
Table 12 Advantages and Disadvantages of MAN..................................................................40
Table 13 Advantages and Disadvantages of SAN....................................................................41
Table 14 Advantages and Disadvantages of CAN....................................................................42
Table 15 Advantages and Disadvantages of PAN....................................................................43
Table 16 Advantages and Disadvantages of VPN....................................................................44
Table 17 Advantages and Disadvantages of Intranet.............................................................45
Table 18 Advantages and Disadvantages of Extranet.............................................................47

M.K.Kawzar (00180822) NETWORKING – 01 25


Table 19 Comparison between Intranet and Extranet............................................................47
Table 20 Advantages and Disadvantages P2P Topology.........................................................49
Table 21 Advantages and Disadvantages of Bus Topology.....................................................49
Table 22 Advantages and Disadvantages of Ring Topology....................................................50
Table 23 Advantages and Disadvantages of Star Topology....................................................52
Table 24 Advantages and Disadvantages of Tree Topology....................................................54
Table 25 Advantages and Disadvantages of Mesh Topology..................................................55
Table 26 Advantages and Disadvantages of Hybrid Topology................................................56
Table 27 Network Maintenance Schedule..............................................................................93
Table 28 Test No 1..................................................................................................................95
Table 29 Test No 2..................................................................................................................96
Table 30 Test No 3..................................................................................................................96
Table 31 Test No 4..................................................................................................................97
Table 32 Fiber Optic Cable....................................................................................................100

M.K.Kawzar (00180822) NETWORKING – 01 26


Activity 1
1. Computer Network

1.1 What is a Computer Network

A computer network is a collection of interconnected nodes capable of sending,


receiving, and exchanging data. Servers and routers are two instances of nodes. These
computer networks will enable end device users to share data and communicate with one
another. These networks are often used in many sorts of companies and houses, among
other places. By using a computer network, we may communicate data quickly and without
any biological barriers.

1.2 Uses of Computer Networks


 File Sharing – This allows users to send and receive data.
 Hardware Sharing – This allows users to share devices such as printers,
scanners, hard drives etc.
 Application Sharing - This allows user to share an application through
computer network
 Client- Server – This allows user to store and retrieve data in a server.
 E-Commerce – This allows user to buy sell any products through the internet

 Communication – This allows user to communicate to another user through


video or audio

M.K.Kawzar (00180822) NETWORKING – 01 27


2. Network System Types
2.1 Peer-to-Peer Network

Figure 1 Figure 1 Peer-to-Peer Network System

Peer-to-peer networks are sometimes known as P2P networks. Without the aid of a
centralized server, end devices in this network can communicate with one another and send
and receive data. In this kind of network, end devices serve as both the server and the client.
A regular internet connection and P2P software (such as Kazaa, Lime ware, and BearShare,
etc.) are the only requirements for this network. (techterms, 2019)

Advantages and Disadvantages


Table 1 Table 1 P2P Advantages and Disadvantages

Advantages Disadvantages
Low Latency – Better reaction time, the Security Concerns – When exchanging
path between peers is decreased, making data and applications, there is a high risk
the network quicker due to fewer of introducing Malware and Viruses.
impediments along the path
Low Cost – Because there is no central Scalability – It is difficult to add users
server in this arrangement, no server while maintaining network performance.
charges are necessary.
High Security – Because a P2P network
lacks a central server, even if a node
goes offline, the network continues to
function.

M.K.Kawzar (00180822) NETWORKING – 01 28


Decentralizations – In P2P network the
users control their own data
High Bandwidth – Because there is no
central server, you will have a lot of
bandwidth. This allows us to connect a
large number of people without
compromising speed.

2.2 Client Server

Table 2 Client server

A Client Server is a type of central computer known as a Server. This is intended for end
users to access stored data, music, movies, and apps, among other things. The server's
primary function is to serve its clients.
The client connects to and communicates with the server over the network. The
client utilizes the network to send and receive communications regarding its request. The
server will accept the request and verify that it is authentic. If all seems good, the server will
retrieve the request and serve the client. (Study.com, 2019)

Advantages and Disadvantages


Table 3 Table 3 Client Server Advantages and Disadvantages

Advantages Disadvantages
The network's peripherals are managed The system must be operated by an
centrally. expert.
Backup and network security are Very expensive
managed centralized.
The user has access to shared data that If any element of the network fails, a large
is centrally controlled and stored. amount of harm might ensue.

M.K.Kawzar (00180822) NETWORKING – 01 29


All files are stored in a central location

Comparison between Peer-to-Peer and Client-Server Network Systems


(IntelliMax Blog, 2021)

Table 4 Difference between Peer-to-Peer and Client-Server

Peer-to-Peer Client-Server Parameters


Less Expensive More Expensive Cost
Each peer has its own data The data stored in the server Data
Lacks performance when Client-Server architecture is Stability
users increase more stable and scalable.
Connectivity Sharing Data Focus
As the number of increase the `Server can authenticate the Security
network become less secure clients access to the server
and vulnerable
Performance does get reduced Doesn’t affect the Performance
when the increase of users performance because the
server carries all the data
Each node in this network has When a client submits a Service
the ability to both request and request for precise data, the
reply to services. server replies by providing a
service.
No Server Needed Requires a Server/ PC with Difference
server Operating System
Networks with less than 10 No limit to numerous
computers computer connections
Setup is Easy Difficult to Setup

2.3 Cloud

M.K.Kawzar (00180822) NETWORKING – 01 30


Figure 2 Cloud Computing

Cloud computing is the Internet-based deployment of computer services such as servers,


storage, databases, networking, and software, etc. over the internet (Cloud). You generally
pay simply for the cloud services that you use, which allows you to reduce operational
expenses, and manage your system more effectively.

Uses of Cloud Computing

 File Storage
 Data Backup and Recovery
 Hosting Web Sites
 Hosting Apps and Services

Advantages and Disadvantages of Cloud Computing

Table 5 Advantages and Disadvantages of Cloud Computing

Advantages Disadvantages
Low Cost Downtime – You can't do anything with the cloud as
long as your Internet connection is down.
Accessibility – You may view your data from Security – Your data may be hijacked if you do not
anywhere at any time if you have an internet have a strong security system in place.

M.K.Kawzar (00180822) NETWORKING – 01 31


connection.
No Hardware Required – Because everything will Technical Issues- If you run into any computer
be housed on the Cloud, physical storage devices are difficulties, you have no option but to contact your
no longer required. hosted provider's technical assistance.
Reliability – Because your files are saved in various Loss Control – your data will be available for your
server locations, your data will not be erased in the cloud service provider.
event of a server failure.
Productivity – will get regular updates
Speed
Security

Types of Cloud Services

1. Software – as – a – Service (SaaS)


As Software a Service, a run of administrations is advertised, including file storage, backup,
web-based e-mail, and venture administration instruments. Clients can get to, share, store,
and protect data on the cloud by utilizing one of these apps.

Example: Dropbox, Office 365 etc.

2. Platform – as – a – Service (PaaS)


Platform as a service is a cloud environment in which developers may build and deploy
applications. (PaaS) offers the database and operating system required for the development of
cloud-based apps.

Example: `Windows Azure, Google App Engine, OpenShift

3. Infrastructure – as – a – Service (IaaS)


Infrastructure as a service (IaaS) offers the infrastructure required to manage SaaS products,
such as servers, storage, and networking resources.

The storage servers and networking infrastructure would be managed by the cloud provider,
who may also provide other services such as load balancing and firewalls.

2.4 Cluster

M.K.Kawzar (00180822) NETWORKING – 01 32


Figure 3 Cluster Network System

A cluster network is made up of two or more computers (nodes) that are connected on the
same network (LAN), and they perform like single computer. Cluster computing provides
answers to complex issues by increasing processing speed and data security.

A computer cluster is described as the inclusion of processes for delivering large-scale


processing in order to decrease downtime and provide more storage capacity than other
desktop machines or computers.

Types of Cluster Computing

1. Cluster Load Balancing


Incoming requests for data are dispersed across numerous nodes that are running comparable
applications or have similar information. This prevents any single node from getting an
abnormally large number of tasks.

2. High Availability Cluster (HA)


High Availability clusters are focused on maintaining redundant nodes that can serve as
backup systems in the event of a breakdown.

3. High Performance Clusters (HP)

M.K.Kawzar (00180822) NETWORKING – 01 33


High Performance clusters handle advanced computing problems by combining computer
clusters and supercomputers. They are utilized to executing activities that necessitate node
communication as they go about their job. They are intended to take use of the parallel
processing capabilities of several nodes.(GeeksforGeeks, 2021)

Advantages and Disadvantages of Cluster Computing

Table 6 Advantages and Disadvantages of Cluster Computing

Advantages Disadvantages
Low Cost – When compared to mainframe Space – Taking up a lot of physical area
computers, connecting a bunch of computers as a
computer cluster is cheaper.
High Availability - If a node in a computer cluster Difficulty in locating the source of the problem in an
fails, another node within the cluster continues to event of a breakdown
offer uninterrupted functionality.
Bandwidth - Cluster computing may be simply
expanded by connecting more desktop workstations
to the network.
Speed - The processing speed of a computer cluster
is similar to that of a mainframe computer.

2.5. Centralized

Figure 4 Centralized Network System

M.K.Kawzar (00180822) NETWORKING – 01 34


Centralized network systems employ a client/server design in which one or more client
nodes are directly linked to a central server. This is the most frequent sort of system in
many firms, in which a client transmits a request to a server and receives a response.

Advantages and Disadvantages of Centralized Network System

Table 7 Advantages and Disadvantages of Cluster Computing

Advantages Disadvantages
You may easily add and delete client systems, users, A single point of failure in the server brings the
and other servers entire network system to a shutdown.
Centralized networks are relatively economical since Because all of the files are hosted on a single
they employ a restricted number of servers, which server, hackers may get access to your system and
means purchasing less hardware and fewer licenses. steal your vital data.
A single central server is quick and simple to deploy Because there is a limit to how much processing
since you only need to maintain one configuration power can be added to a single server, centralized
without load balancing or monitoring. networks are difficult to expand. When your
network traffic exceeds the capabilities of a single
node, a central server might cause delays.
Table 8 Advantages and Disadvantages of Centralized Network System

2.6 Virtualized

Figure 5 Virtualization

M.K.Kawzar (00180822) NETWORKING – 01 35


Virtualization makes use of computer software to create a mirrored layer over computer
hardware, allowing the actual components of a single computer—processors, memory,
capacity, and so on—to be divided into a number of virtual computers, also known as
virtual machines (VMs). Each VM has its own operating system (OS) and functions as an
independent computer, despite the fact that it is only running on a portion of the actual core
computer hardware. (IBM Cloud Education, 2019)

Advantages and Disadvantages of Virtualization

Table 9 Advantages and Disadvantages of Virtualization

Advantages Disadvantages
Cost Effective – It uses the local hardware of your Reduced Performance - single system has lots of
device resources, but when numerous virtual machines
operate in parallel on a physical computer, the greater
the capacity utilization of the real machine resources,
the more significantly the virtual machine's
performance declines.
Efficient - Virtualization also allows you to Security - Working with virtual machines on shared
automatically upgrade your hardware and software hardware resources necessitates that your data is
by downloading it from a third-party service. stored on a third-party resource. It may expose your
data to attackers or unauthorized access.
Disaster Recovery - Disaster recovery is quite Limitations - Virtualization is incompatible with
simple when servers are virtualized. With up-to-date every server and application available.
backups of your virtual machines, you will quickly
be back online.
Deployment - Deploying services is much faster Scalability - Having to guarantee all of the necessary
when virtualization technologies are used. It is software, security, proper storage, and resource
possible to significantly reduce the amount of time availability may be a time-consuming effort with
spent on constructing local networks or configuring virtualization. Because a third-party source is
physical devices. engaged, it takes longer than expected. Furthermore,
the greater expense related with increasing
Saves Energy - Virtualization is a low-energy
technique for both individuals and businesses.
Because no local hardware or software is needed,
energy consumption may be kept to a minimum.

3. Computer Network Designs


3.1 Local Area Network (LAN)

M.K.Kawzar (00180822) NETWORKING – 01 36


Figure 6 Local Area Network

A local area network (LAN) is a group of devices that are linked together in a limited area,
such as a building, business, or house. Privately owned and delivers high data rates
(Ethernet) is the most widely used LAN protocol. (Cisco, 2019)

Characteristics of Local Area Network (LAN)


 LANs have a more limited geographic range (office, campus, school, and home area).

 LANs have faster data transfer rates.

 Internet connectivity is not required for LANs.

 Physically Adjacent Devices Are Connected Using LANs (Hubs, Switches, Repeaters,
Bridges)

Advantages and Disadvantages of Local Area Network (LAN)

Table 10 Advantages and Disadvantages of LAN

Advantages Disadvantages
Hardware Sharing – Printer, Scanners, Hard Covers Limited Area – Can be used in a single
Drives, Drivers and Modems etc. building
Data Sharing – Videos, Audios, and Files etc. Data Security Threat – Unauthorized users can
access the data is the server hard drive is not secured
Data Centralization – All data is saved on a server Technical Issues – Hardware Failure, Program
computer, and any computer in the network may Faults
access the needed data.
Security – Because the data is saved on a server High Setup Cost – Requires a special server
computer, it can be readily maintained and software license and LAN network devices are costly
safeguarded. (Hubs, Switches and Router etc.)

M.K.Kawzar (00180822) NETWORKING – 01 37


Internet Sharing – Internet sharing among the Violations of Privacy – LAN admin can view all the
devices connected to the network data of the users in the network

3.2 Wide Area Network (WAN)

Figure 7 Wide Area Network

A wide-area network (WAN) which covers a very large-scale geographical area such as
country, continent or a city. It provides a long-distance communication of data or
information

Characteristics of Wide Area Network (WAN)

 WANs have low data transfer rate and a network latency.

 WANs connect devices separated by a greater geographical distance than a LAN

 WANs have a great capacity, linking a big number of computers over a vast region, and are
expandable by nature

Advantages and Disadvantages of Wide Area Network (WAN)

Table 11 Advantages and Disadvantages of WAN

Advantages Disadvantages
Coverage – covers a large area such as 1000 km
Security – Combination of different
technology creates a security gap
Centralized Data – can share the data for the
devices in the respective network High Setup Cost – Cost of Network
Devices are high

M.K.Kawzar (00180822) NETWORKING – 01 38


Update Files – Files will be updated regularly
Server Down and Disconnection – due to
electrical supply and bad line structures
Increased Bandwidth – using leased lines which
means a higher bandwidth than standard broadband Troubleshooting Problems – Due to
connection WAN wires a travelling through deep sea
and to maintain the WAN full time staff
needed
Assured Uptime – Offers guaranteed uptime
weekly, quarterly, annually for any industry

3.3 Metropolitan Area Network (MAN)

Figure 8 Metropolitan Area Network

Metropolitan Area Network (MAN) is a network that spans a medium-sized geographical


area, such as a town or city, and serves as a high-speed Internet service provider (ISP).
It also enables internet access through DSL/ADSL and other connections via TV lines.

Characteristics of Metropolitan Area Network (MAN)


 The size of a network typically ranges from 5 to 50 kilometers. It might be as little as
a cluster of buildings on campus or as huge as the entire city.

 Data rates range from moderate to high.

 It makes it easier to share regional resources.

 They offer uplinks that connect LANs to WANs and the Internet.

M.K.Kawzar (00180822) NETWORKING – 01 39


Advantages and Disadvantages of Metropolitan Area Network (MAN)

Table 12 Advantages and Disadvantages of MAN

Advantages Disadvantages
Less Expensive – Its less expensive to attach to Difficult to Manage – When a MAN grows bigger, it
WAN becomes tough to handle due to security issues and
additional settings.
High Speed Than WAN – MAN uses fiber optics Hackers Attack – higher chances of hacking than
for internet and data transfer LAN
Sharing of Internet – Multiple people can get Wire Requirement – Need Wires more than LAN
internet in the same speed network
High Security – Higher security level than WAN Internet Speed - Copper wire affects the internet
speed, higher cost need for fiber optics

3.4 Storage Area Network

Figure 9 Storage Area Network

M.K.Kawzar (00180822) NETWORKING – 01 40


A storage area network (SAN) is a specialized high-speed network that links and provides
shared pools of storage devices to many servers.
A SAN is a type of block-based storage that uses a high-speed architecture to connect servers
to their logical disk units. (What is a Storage Area Network (SAN, 2019)

Advantages and Disadvantages of Storage Area Network (SAN)

Table 13 Advantages and Disadvantages of SAN

Advantages Disadvantages
Speed – SAN includes fiber optic which have a Cost – Purchasing and Maintaining Storage and High
higher transfer rate even the storage device becomes cost for fiber optics
slow
Data Backups – SAN uses a centralized method; it Maintenance – SAN is used to managed large
takes less time back up amount of expensive servers, maintaining few servers
may cost extra expense
Reliability – SAN has an inbuilt redundancy which Effectiveness – SAN takes lot of time to show its
make sure network continues operates even a server effectiveness
or switch fails by rerouting the path
Security – SAN has a default algorithm which Privacy – Even though SAN has many security
protects the data in every way. Authorized users can algorithms, sometimes there can be data leaks due to
access the files its shared storage environment
Scalability – SAN can allows expanding the storage
by the users on their choice

3.5 Controller Area Network

Figure 10 Controller Area Network

M.K.Kawzar (00180822) NETWORKING – 01 41


The CAN bus protocol, commonly known as the control area network protocol, is a half-
duplex high-speed serial network technology invented by Bosch in the 1980s. This protocol is
primarily used to communicate between network devices in a low radius zone in order to
decrease cable wiring. This protocol is intended to provide reliable and adaptable
performance in severe settings and applications.

Advantages and Disadvantages of Controller Area Network (CAN)

Table 14 Advantages and Disadvantages of CAN

Advantages Disadvantages
Less Wiring Excessive Software Costs and Maintenance
Easy to implement changes The network should be connected in a way that
minimizes gaps as much as possible.
Additional elements are easy to integrate Unwanted interaction is more likely between
nodes.
More Reliable – Connectors which cause problems
are low

3.6 Personal Area Network (PAN)

Figure 11 Personal Area Network

A personal area network (PAN) is a computer network that connects computers and devices
that are within a short range (10m) of each other and may be utilized by a single user. A PAN
often includes a computer, phone, tablet, printer, PDA, and additional devices such as
speakers, video game consoles, and so on that may be linked wired or wirelessly. Because of

M.K.Kawzar (00180822) NETWORKING – 01 42


its great performance in terms of flexibility and efficiency, it is highly beneficial in homes,
offices, and small network regions. (GeeksforGeeks, 2020)

Characteristics of Personal Area Network (PAN)


 Transmission Rate is 2.4 GHz

 Supported Medium : Bluetooth, Infrared, Wireless Fidelity (Wi-Fi),

 Low Cost : Easy installation , Maintenance

Advantages and Disadvantages of Personal Area Network (PAN)

Table 15 Advantages and Disadvantages of PAN

Advantages Disadvantages
Energy Consumption is very low Limited Distance Coverage
Low Cost Data rates are restricted to relatively low amounts.
Portable Devices are incompatible with one another.
(Expensive devices like Smartphones, laptops are
needed)
It is easier to operate and requires less technical
knowledge.
It must be simple to set up.

3.7 Virtual Private Network (VPN)

Figure 12 Virtual Private Network

M.K.Kawzar (00180822) NETWORKING – 01 43


A virtual private network (VPN) is a system that establishes a secure connection across an
insecure network (internet). The main purpose of VPN is to ensure that sensitive data is
transmitted securely. VPN prevents unauthorized access from public network traffic and
allows the user to work remotely.
The main benefit of using VPN, using this the user can securely access their business
information without exposing directly to the internet (GeeksforGeeks, 2017)

Characteristics of Virtual Private Network (VPN)

 Contains Servers around the world

 Point to Point Connectivity

 Works for any devices and application

 Encrypted Data traffic

Advantages and Disadvantages of Virtual Private Network (VPN)

Table 16 Advantages and Disadvantages of VPN

Advantages Disadvantages
Provides Anonymity – Hides IP address and Slow Data Speed – due to data encryption, it has to
Encrypts data travel more than usual.
Avoid Geo Restriction – Can access restricted web High Cost – Paid VPN provides better secured than
sites from a different location from VPN the free VPN
Work on any platform Legal Issue – Most of the countries ban the usage of
VPN
Affordable Connection of more devices drops down the
performance
Security – VPN uses many protocols to protect your
internet usage

M.K.Kawzar (00180822) NETWORKING – 01 44


3.8 Intranet

Figure 13 Intranet

An intranet is a private network that is utilized by a company. Its major objective is to assist
employees in privately communicating with one another, gathering data, and collaborating.

Uses of Intranet
 Share Files
 Build Web Pages
 Instant Messaging
 Automating Forms
 Training Material (Employees, Clients)

Advantages and Disadvantages of Intranet

Table 17 Advantages and Disadvantages of Intranet

Advantages Disadvantages
Low Cost Usage – The expense for intranet is high (intranet
arrangement , clients)
Accessibility – Can access data anywhere at any Security – there are many security algorithms,
time sometimes there can be data hacked without firewalls
Time Saving – Provides the relevant data on time Data Overload

M.K.Kawzar (00180822) NETWORKING – 01 45


Dynamic – Admins will have the options settle Management – have an issue in self-managing. User
better choices form the shared information and needed manage it regularly
thoughts
Coordinated effort – Each Users can in various Complexity – Due to its complexity the users feel
division can collaborate together and share important unwilling to use
data

3.9 Extranet

Figure 14 Extranet

Extranet is just a highly secure private network that is particularly built to provide these users
access to your organization's virtual communication system. Extranet use internet technology
and public telecommunication system to share data / information over a secure system for the
customers, users etc.
An extranet is frequently seen as an extension of intranet to authorized users outside of the
enterprise.

Uses of Extranet (Organizations)


 Employee Training

 Customer Services

 Communicating and interacting with clients in a more protected environment

M.K.Kawzar (00180822) NETWORKING – 01 46


 Standardizing project management duties by offering a location where teams could
access shared online documents.

Advantages and Disadvantages of Extranet (Organizations)


Table 18 Advantages and Disadvantages of Extranet

Advantages Disadvantages
Communication over a secure network to an High cost for purchasing and installing of network
anywhere devices, maintenance cost
Anytime access to the System Commutations delay may happen (Video , Audio
Conference)
Customer access to their order history to verify Cannot use without proper training
payments and balance, Process orders from suppliers
Most of the time, unauthorized access is prevented. Negative impact on company due to network fails
(Emails)
Users may work remotely and be more portable The system can be misused by leakage of id and
password (Sensitive information)

Comparison between Intranet and Extranet

Table 19 Comparison between Intranet and Extranet

Intranet Extranet
Privates Owned Privately Owned
Used by Employees , Internal Departments Used by Distributors, Clients, Business Partners
Used for internal communication of employees Used for Email, Access Data, Orders
Highly secured environment (100 levels of firewalls) VPN is used for secure communication over internet
Managed by an organization Managed by multiple organization
Owned by a single organization Owned by multiple organizations

4. Network Topologies

A network topology is a physical or logical network configuration. It determines the pattern


of the various nodes that are positioned and linked with one another. A network's topology
specifies how data flows from one node to another.

M.K.Kawzar (00180822) NETWORKING – 01 47


Types of network topologies

Physical Topology - This network is a physical architecture of computer wires and other
network devices.
Logical Topology – This provides information about the physical design of a network.

1. Point-to-Point Connection
2. Bus Topology
3. Ring Topology`
4. Dual Ring Topology
5. Star Topology
6. Extended Star Topology
7. Tree Topology
8. Mesh Topology
9. Partial Mesh Topology
10. Hybrid Topology

4.1 Point-to-Point Connection

Figure 15 Point-to-Point Topology

Point-to-Point topology is the simplest topology, this topology has dedicated network line
between 2 nodes.
Example: Telephone Connection

M.K.Kawzar (00180822) NETWORKING – 01 48


Table 20 Advantages and Disadvantages P2P Topology

Advantages Disadvantages
Simple Topology Cannot back up data centrally
Easy installation and Maintenance No security than permissions
Fast and Reliable due to direct connection Can be used in small areas
No need of expensive servers

4.2 Bus Topology

Figure 16 Bus Topology

Bus Topology consists of a single cable, also known as a spine, to which all nodes are linked
through interface connections. A terminator absorbs the signal as it reaches the end of the
line, preventing signal bounce.
The nodes: Laptops, Printers and Servers etc.
In this architecture, the signal will only flow in one way through the spine. In this case, the
device will verify the MAC and IP, and if they do not match, the signal will be refused. The
signal will be received by devices with matching MAC and IP addresses.

Advantages and Disadvantages of Bus Topology


Table 21 Advantages and Disadvantages of Bus Topology

Advantages Disadvantages
Easy maintenance and installation `Not suitable for large networks
Requires Less Cables Performance gets reduced when more devices get

M.K.Kawzar (00180822) NETWORKING – 01 49


connected
Cost is efficient than other topologies Limited length of Cable
When a network installation is small, this method is In case spine fails the whole system fails
commonly employed.

4.3 Ring Topology

Figure 17 Ring Topology

This topology forms the shape of ring when the nodes are connected to a network. Each node
has precisely two peers, and data goes in one way across the ring, passing via each
intermediary node until it reaches the destination node.
An electrical "token" flows through the network in a ring topology. If someone wishes to
communicate data in a ring topology with 10 nodes, the data must flow past 9 nodes before
reaching the 10th node.

Advantages and Disadvantages of Ring Topology

Table 22 Advantages and Disadvantages of Ring Topology

Advantages Disadvantages
Cost-effective, and installation is reasonably priced Failure of one node affects the whole network
Because of the detailed node-to-node Adding or disconnecting nodes requires taking the
communication, detecting and troubleshooting are entire network offline.
simplified.
Data Collision is minimized Because the network bandwidth is shared by all
devices in large ring networks, transmission is
delayed.

M.K.Kawzar (00180822) NETWORKING – 01 50


No Central Server Required Network can be overloaded

4.4 Dual Ring Topology

Figure 18 Dual Ring Topology

This topology is a variant of Ring Topology. This topology divides the network into two
rings. The purpose of this secondary ring is to function as a backup if the primary ring fails,
and it also allows data to go in the opposite way.

4.5 Star Topology

M.K.Kawzar (00180822) NETWORKING – 01 51


Figure 19 Star Topology

In Star topology, all the Nodes in the network connect to a Central Node. This topology
mainly fits for Local Area Network (LAN). In here the central node acts a server and the
connected nodes as clients.
The transmission of a signal from one node in the same network to another in this
architecture. When a node sends a signal, it is routed to the hub/switch (Server), which
determines the precise address to route the signal to the receiver (node)

Advantages and Disadvantages of Star Topology

Table 23 Advantages and Disadvantages of Star Topology

Advantages Disadvantages
Easy to install and maintain Requires more cabling
Easy to manage using a centralized Installation cost is high
server(switch/hub)
If one link fails other, it won’t affect other links Performance depends on the capacity of the central
node
Easy Fault identification If the central device fails, the whole network is down
Easy to Expand the network

M.K.Kawzar (00180822) NETWORKING – 01 52


4.6 Extended Star Topology

Figure 20 Extended Ring Topology

This is a variation star topology with an extended version. It is created simply by joining all
of the different star topologies. In a star topology, one primary switch/hub links to additional
switches/hubs. This upgrade provides a larger connection area than a single star topology.

4.7 Tree Topology

Figure 21 Tree Topology

A tree topology is a hybrid network that is created by combining a bus topology with a star
topology. The structure of tree topology is similar to that of a tree, with bus topology serving
as the trunk and start topology serving as the branches.

M.K.Kawzar (00180822) NETWORKING – 01 53


This topology is mostly used in cooperative networks to organize its devices. There can only
be one link between any two connected nodes in this structure. This topology is often referred
to as "Hierarchical Topology."

Advantages and Disadvantages of Tree Topology

Table 24 Advantages and Disadvantages of Tree Topology

Advantages Disadvantages
It is simple to expand the network and add more It might be complex to configure due to the
nodes. hierarchical structure.
Troubleshooting is simplified since each network The entire network fails if the main cable (trunk) is
branch may be analyzed individually. damaged.
It is easy to manage and maintain Expensive because, it is a topology with a large
number of cables.
The failure of a single node has no effect on the
remaining nodes of the network.

4.8 Mesh Topology

Figure 22 Mesh Topology

A mesh topology is one in which nodes connect to numerous other nodes directly. It
establishes a P2P (point-to-point) connection between all network nodes. Even if one network
cable breaks, data can still reach its destination through an alternate way.
A partial mesh topology, in which some nodes have two or more connections, or a full mesh
topology, in which all nodes are entirely linked to every other node, are both possible.

M.K.Kawzar (00180822) NETWORKING – 01 54


Advantages and Disadvantages of Mesh Topology

Table 25 Advantages and Disadvantages of Mesh Topology

Advantages Disadvantages
The most stable and dependable topology The usage of extra wires makes it more costly.
There are no traffic issues because each node has its It necessitates additional room for specialized
own dedicated link. connections.
P2P links simplify the fault discovery and isolation Because every node is linked to every other node,
procedure. installation is complicated.
Even if one or two nodes fail, the network will not Installation is difficult.
be disrupted.
Every system has its own level of privacy and
security.
Mesh topologies are strong.

4.9 Partial Mesh Topology

Figure 23 Mesh Designs

At least two of the machines in the network have connections to numerous additional
computers in a partial mesh topology. In general, partial mesh topologies are utilized in
peripheral networks that connect to a fully meshed backbone.

M.K.Kawzar (00180822) NETWORKING – 01 55


4.10 Hybrid Topology

Figure 24 Hybrid Topology

A Hybrid Topology is a combination of two or more topologies (bus, ring, star, mesh and tree
topology). In other words, this topology may connect numerous connections and nodes that
communicate with one another in order to transmit data. In larger companies, hybrid
topologies are widespread since separate departments may have customized network
topologies based on their demands and network requirements.
It is simple to give the reliability and speed of the data connection or bandwidth. Depending
on the situation, the k topology can be wired or wireless.

Advantages and Disadvantages of Hybrid Topology

Table 26 Advantages and Disadvantages of Hybrid Topology

Advantages Disadvantages
Provides the simplest way for discovering and The network's implementation is quite complex.
troubleshooting errors
Topology for highly effective and adaptable High Cost
networking
It is very easy to expand the network Complex Design, Requires lot of cables

M.K.Kawzar (00180822) NETWORKING – 01 56


Recommended Network Topology for Alliance Health

Logical
According to Alliance Health scenario, the company has three levels and many departments.
Because the firm is expanding, each of the divisions should have the best network
performance possible. It should also be a cost-effective and efficient network.

As the network consultant in this circumstance, I propose the Hybrid Topology since it is the
most reliable solution for this network. There are 11 departments in this organization, and
none of them should communicate with one another unless there is a specific reason. The key
benefits of employing this architecture are its expandability and ease of maintenance. This
network employs a hybrid of star topology and point-to-point topology. The network can
handle increased network traffic when utilizing a star architecture, and more nodes may be
simply added. For the given circumstance, the best answer has been provided.

Physical
According to Alliance Health scenario, the company has three levels and many departments.
Because the firm is expanding, each of the divisions should have the best network
performance possible. It should also be a cost-effective and efficient network.

As the network consultant in this circumstance, I propose VLAN since it is the most reliable
solution for this network. There are 11 departments in this organization, and none of them
should communicate with one another unless there is a specific reason. The key benefits of
employing this architecture are its expandability and ease of maintenance. The network can
handle increased network traffic when utilizing an architecture, and more nodes may be
simply added. For the given circumstance, the best answer has been provided.

5. Network Related Standards

Introduction
Standards are a set of guidelines for data transmission that must be followed in order for
information to be sent between devices. It is critical to follow Standards established by

M.K.Kawzar (00180822) NETWORKING – 01 57


various Standard Organizations. Some companies provide specific features that can only be
configured and utilized on their equipment; these are referred to as proprietary features.
A proprietary feature implementation might be limited in its use and so is not always an
appealing option when establishing a network.
There are numerous standards are available today

There are Three Primary Standards


1. ANSI (American National Standards Institute)
2. ITU – T (International Telecommunication Union)
3. IEEE (Institute of Electrical and Electronics Engineering)

5.1 ANSI (American National Standards Institute)

Figure 25 American National Standards Institute

The American National Standards Institute (ANSI) is a non-profit organization tasked with
advancing US business competition across the world by permitting and promoting conformity
assessment methodologies and intended agreement rules.

The American National Measures Organization (ANSI) is the United States' sole agent and
dues-paying member of the Universal Organization for Standardization (ISO). As a founding
member of ISO, ANSI also plays an active role in its governance.

Each ISO member country is represented by a national organization known as a "member


body." Each member body has a framework in place to identify concerns and reach a national

M.K.Kawzar (00180822) NETWORKING – 01 58


agreement on the activities of ISO Technical Committees (TC). Different nations are
represented on several committees. (Asq.org, 2015)

5.2 ITU – T (International Telecommunication Union)

Figure 26 International Telecommunication Union

It is a specialized United Nations organization established to promote international


collaboration in all types of communications. Its tasks include keeping radio frequency
allocations in order, defining technical and operational standards, and supporting nations in
developing their own telecommunications networks. It was previously known as the
CCITT. Its headquarters are in Geneva, Switzerland.

The ITU – T is the worldwide standards body, as the name indicates, and may be reached on
the World Wide Web at www.itu.int/ITU-T/. The ITU's telecommunication standardization
sector study group brings together experts from across the globe to produce worldwide
standards known as "ITU-T Recommendations," which serve as defining features in the
global ICT infrastructure.
(International Telecommunication Union | UN agency, 2019)

M.K.Kawzar (00180822) NETWORKING – 01 59


5.3 IEEE (Institute of Electrical and Electronics Engineering)

Figure 27 Institute of Electrical and Electronics Engineering

The Institute of Electrical and Electronic Engineers (IEEE) is a global professional


association and organization dedicated to the creation, implementation, and support of
technology-based goods and services.

Every year, the IEEE publishes over one-third of the world's technical literature in fields such
as electrical engineering, computer science, and electronics. Many of these articles are
concerned with safety problems in these domains.

The National Electrical Safety Code, the Standard for Safety Levels with Respect to Human
Exposure to Radio Frequency Electromagnetic Fields, and the IEEE Standard Criteria for
Safety Systems for Nuclear Power Generating Stations are among the IEEE's safety
standards.
IEEE is well-known in computing for developing standards for computer networking and its
range of services. IEEE creates a wide range of standards, including IEEE 802 and IEEE
802.11 (often known as Wi-Fi), and offers continuous innovation, revisions, and maintenance
services for these standards.
(Techopedia.com, 2019)

5.3.1 Ethernet (IEEE 802.3)


IEEE 802.3 is a series of standards developed by the Institute of Electrical and Electronics
Engineers (IEEE) that specify Ethernet-based networks (Local Area Networks).
IEEE 802.3, often known as the Ethernet standard, specifies the physical layer and the media
access control (MAC) of the information link layer for wired Ethernet systems, which are
frequently used as neighborhood area networks (LANs). (Cisco, 2012)

M.K.Kawzar (00180822) NETWORKING – 01 60


5.3.2 Metropolitan Area Network (IEE 802.6)
A MAN (Metropolitan Area Network) protocol is defined under the IEEE 802.6 standard. It
is a high-speed shared medium access control protocol that operates on a bus network. It
features two unidirectional buses for control reasons, and the bus may transfer data, video,
and audio through a network with bandwidth assigned according to time periods. The paired
bus has the advantage of being utilized to address failure configuration. It may be extended
for up to 30 kilometers at a speed of 34-55 Mbps.

5.3.3 Wireless Fidelity (IEEE 802.11)


IEEE 802.11 refers to a collection of standards that specify wireless LAN communication
(wireless local area networks, or WLANs). Consumers refer to the technology underpinning
802.11 as Wi-Fi.
802.11 is a collection of (MAC) media access control and physical layer protocols. A WLAN
may be constructed using a variety of network protocols.

5.3.4 Wireless Personal Area Network (IEEE 802.15)


A WPAN (wireless personal area network) is a wireless personal area network, which is a
network for linking devices centered on a single person's workspace. A wireless personal area
network often employs a technology that allows communication within about 10 meters - in
other words, a very limited range. Bluetooth is one such technology, and it served as the
foundation for a new standard, IEEE 802.15.

5.3.5 Other IEEE Network Standards


 802.1 Bridging and Architecture – generally the top of the link layer

 802.3 Ethernet

 802.11 Wireless LAN (WLAN)

 802.15 Wireless Specialty Network (WSN)

 802.16 Broadband Wireless Access (BWA)

 802.18 Radio Regulatory TAG

 802.21 Media Independent Handover

M.K.Kawzar (00180822) NETWORKING – 01 61


 802.22 Wireless Regional Area Networks (WRAN)

 802.24 Vertical Applications TAG

6. Network Models

A network model is a representation of a design or architecture for communicating across


different systems. Network stacks and protocol suites are other terms for network models.
A network model is often composed of layers. Each layer of a model reflects a distinct set of
functionalities. Protocols are often provided inside a model's layers to accomplish certain
tasks. A protocol can be viewed as a set of rules or as a language. As a result, a layer is
typically made-up of multiple protocols.
(Mann, 2001)

The Primary Network Models.


1. OSI Model
2. TCP / IP Model

1. OSI MODEL

OSI stands for Open Systems Interconnection. It has been developed by the International
Standard Organization (ISO) in 1984. Protocols that may be used to create a network
architecture are included in the OSI model. It is a seven-layer design, with each layer
performing a unique function.

The primary goal of this model is to standardize data networking protocols so that all
networking devices on the earth can communicate with one another. Because it is a seven-
layer architecture, layers 1 to 4 four are considered the bottom layers and are the most
involved with moving data around. Layers five through seven, include application-level data.

The Main Functions of Seven Layers of OSI Model

M.K.Kawzar (00180822) NETWORKING – 01 62


Figure 28 Layers and Functions of OSI Model

1.1 Application Layer (Layer 7)

Both the end user and the application layer interact directly with the software application at
this layer. The PDU of this layer is Data. This layer contains programs such as file sharing,
texting, web surfing, and others (Google Chrome, Email Clients, Outlook, Thunderbird and
Lotus etc.)

1.2 Presentation Layer (Layer 6)

The presentation layer is also known as the Translation layer. Data is the PDU for this layer
(Formatted Data). This layer can also manage the application layer's data encryption and
decryption. This layer is also used to show data such as (.jpeg,.zip,.gif,.mp4 and.mp3) and
reduces the number of bits that must be transferred over the network.

1.3 Session Layer (Layer 5)

M.K.Kawzar (00180822) NETWORKING – 01 63


This layer is in charge of establishing connections, maintaining sessions, authenticating users,
and ensuring security. Data is the PDU for this layer. This layer separates data. (Sessions in
Parallel) Keeps logical connections between systems.

1.4 Transport Layer (Layer 4)

The transport layer provides services to the application layer and receives services from the
network layer. The PDU of this network is Segment. This layer is in charge of delivering the
entire message from beginning to end. The transport layer also acknowledges successful data
transfer and re-transmits data if an error is detected.

1.5 Network Layer (Layer 3)

The network layer is responsible for data transfer from one host to another located in separate
networks. This layer is responsible for determining the IP address of a packet. It transfers
packets between networks using network layer 3 device addresses (Layer 3 routers and
switches). Packets is the PDU for this layer.

1.6 Data Link Layer (Layer 2)

Data transfer from node to node is handled by the data link layer. The data connection layer
corrects any errors that may have occurred at the physical layer. This layer is divided into two
sub-layers. Media access control (MAC) monitors and enables device connections over a
network. The flow and faults on physical devices are controlled by the logical link control
(LLC). This layer's PDU is Frames.

1.7 Application Layer (Layer 1)

The physical layer is the lowest layer of the OSI model. This layer is in charge of the physical
connection between the devices. This layer deals with electrically or optically conveying
raw data bits over a network from the sending device's physical layer to the receiving device's
physical layer. Light, electricity, infrared, and radio waves are all examples of
electromagnetic transmission in this layer. In this layer, data is converted into transmittable

M.K.Kawzar (00180822) NETWORKING – 01 64


signals and placed on network media (cables) to flow throughout the network. The PDU of
this layer is Bits.

2. TCP/ IP MODEL

The TCP/IP Model was created and developed in the 1960s by the Department of Défense
(DoD) and is based on standard protocols. TCP/IP is stands for Transmission Control
Protocol / Internet Protocol. (TCP/IP) is the language that a computer employs to connect to
the internet. It comprises of a set of protocols meant to create a network of networks that
allows a node to connect to the internet.

TCP/IP has four layers, which are slightly different from the OSI Model. According to the
DoD model, the layer will be classified into seven layers of the OSI Model, which will be
divided into four primary layers.

The Comparison between OSI Model and TCP/IP Model

Figure 29 The Comparison between OSI Model and TCP/IP Model

M.K.Kawzar (00180822) NETWORKING – 01 65


7. Network Protocol

Network Protocols are formal standards and regulations made from rules, processes, and
codecs that specify communication between two or more devices through a network.
Network protocols can be implemented into hardware or software program, and they're so
essential that every network uses them for communication between network devices.
Standardized protocols are parallel to a standard language that computers can understand. If
one computer and another computer both use the Internet Protocol (IP), they will be able to
interact.

Application Layer Protocol

1. File Transfer Protocol (FTP)


2. Telnet
3. Secure Shell (SSH)
4. Simple Mail Transfer Protocol (SMTP)
5. Hyper Text Transfer Protocol (HTTP)
6. Domain Name Service (DNS)
7. Hyper Text Transfer Protocol Secure (HTTPS)
8. Dynamic Host Configuration Protocol (DHCP)
9. Simple Network Management Protocol (SNMP)

Transport Layer Protocol

1. Transmission Control Protocol (TCP)


2. User Diagram Protocol (UDP)

Internet Layer Protocol

1. Internet Control Message Protocol (ICMP)


2. Address Resolution Protocol (ARP)
3. Reverse Address Resolution Protocol (RARP)
4. IP

M.K.Kawzar (00180822) NETWORKING – 01 66


7.1 Application Layer Protocol

An application layer protocol specifies how application processes on clients and servers on
various end systems communicate with one another.

7.1.1 File Transfer Protocol (FTP)

The File Transfer Protocol (FTP) is the most widely used protocol. FTP is used to transfer files
between devices over a network using the internet. Users can communicate and transfer data between
two physical devices using this protocol. FileZilla Client, Coffee Cup, WinSCP, and Core FTP are
some of the most popular FTP clients. The FTP port number is 21.

7.1.2 Telnet

Telnet is a networking protocol and software program that connects users to remote
computers and terminals over the Internet. A user can get access to secured functions on a
remote system by inputting the necessary login and sign-in credentials. Telnet provides all
messages in clear text and without any security features. The Telnet port number is 23.

7.1.3 Secure Shell (SSH)

Secure Shell is a protocol that allows two remotely connected users to communicate and
execute other services on top of an unprotected network. SSH, in other words, is a protocol
that establishes a secure connection to the administrator in order to get access to a remote
machine. It is also regarded as a secure alternative to Telnet. The Secure Shell (SSH) port
number is 22.

7.1.4 Simple Mail Transfer Protocol (SMTP)

Simple Mail Transfer Protocol (SMTP) is one of the most widely used protocols for email
communication over the Internet. SMTP employs a procedure known as "store and forward"
to transport and transfer your email across networks.

M.K.Kawzar (00180822) NETWORKING – 01 67


In most cases, SMTP is incorporated into an email client software. An email client software
is composed with 4 components
 Mail User Agent (MUA) – Application User
 Main Submission Agent (MSA) – Server
 Mail Transfer Agent (MTA)
 Mail Delivery Agent (MDA)
And also, SMTP operates by establishing a session between the user and the server. Simple
Mail Transfer Protocol (SMTP) port number is 25.

7.1.5 Hyper Text Transfer Protocol (HTTP)

The World Wide Web's (w.w.w) foundation is the Hypertext Transfer Protocol (HTTP). It is
also used to manage data movement to and from a hosting server while communicating with
a web browser such as Google Chrome, Opera and Safari etc. The port number for Hyper
Text Transfer Protocol (HTTP) is 80.

M.K.Kawzar (00180822) NETWORKING – 01 68


7.1.6 Domain Name Service (DNS)

Domain Name Service is a protocol that is used in ever internet related devices, and it
converts domain names to IP addresses for the network access. The used port number for
Domain Name Service is 53.

7.1.7 Hyper Text Transfer Protocol Secure (HTTPS)

The Hyper Text Transfer Protocol Secure (HTTPS) protocol is a fortified version of the
common online transport protocol (HTTP). The distinction between both protocols is that
HTTPS enables encrypted communication and a secure connection between a remote user
and the central web server. Facebook, bank online portals, PayPal, and other sites for safe
surfing are examples. The Port number used Hyper Text Transfer Protocol Secure (HTTPS)
number is 443.

7.1.8 Dynamic Host Configuration Protocol (DHCP)

The Dynamic Host Configuration Protocol (DHCP) is a network management protocol that
assigns an IP address, subnet mask, default-gateway and DNS to every new device that joins
the network. DHCP is also known as RFC 2131. The defined port number for DHCP is 123.

7.1.9 Simple Network Management Protocol (SNMP)

The Simple Network Management Protocol (SNMP) is a collection of protocols used for
network control and monitoring. Many common network equipment, such as routers, hubs,
bridges, switches, servers, workstations, printers, modem racks, and other network
components and devices, support these protocols. The port used for Simple Network
Management Protocol (SNMP) is 161/162.

Some of the other Application Layer Protocol

M.K.Kawzar (00180822) NETWORKING – 01 69


Figure 30 Other Application Layer Protocol

7.2 Transport Layer Protocol

The transport layer's responsibilities include error correction as well as data segmentation and
DE segmentation before and after it is transported across the network. This layer is also in
charge of glide management and ensuring that segmented data is transmitted over the
network in a proper way. A transport layer can be categorized into two sub protocols

Types of Transport Layer Protocols

1. Transmission Control Protocol (TCP)


2. User Diagram Protocol (UDP)

7.2.1 Transmission Control Protocol (TCP)

TCP (Transmission Layer Protocol) is a network communication protocol that may be used
to transmit data through networks and verify that it is delivered to the proper path. TCP
coordinates with the Internet Protocol (IP), which specifies the virtual location of the remote
node. TCP establishes a connection between the source and destination nodes before
transferring data and maintains it till the communication is involved.

M.K.Kawzar (00180822) NETWORKING – 01 70


Figure 31 TCP Header

7.2.2 User Diagram Protocol (UDP)

User Datagram Protocol (UDP) is an Internet Protocol that is used by applications that run on
numerous nodes in a network. UDP was created by David P. Reed and is officially described
in RFC 768. In 1980, UPD was introduced. It is an unreliable and connectionless protocol.
For improved speed, UDP permits packets to be discarded instead of processing delayed
ones. UDP saves bandwidth because it does not do error checking. Datagrams are used in
UDP communication. The first eight bytes include the header information, while the
remaining bytes contain the contents.

Figure 32 UPD Header

M.K.Kawzar (00180822) NETWORKING – 01 71


7.3 Internet Layer Protocol

This layer is also known as the network layer, and it is the TCP/IP Model's second lowest
layer. It is the responsibility of data transport between the source and destination computers.
The Internet layer receives data from the Transport layer and forwards it to the Network
Interface layer.

Types of Internet Layer Protocols


1. Internet Control Message Protocol (ICMP)
2. Address Resolution Protocol (ARP)
3. Reverse Address Resolution Protocol (RARP)
4. IP

7.3.1 Internet Control Message Protocol (ICMP)

The Internet Control Message Protocol (ICMP) is a protocol that offers debugging,
management, and error message services. It transmits control messages such as destination
network unavailable, source route failed. It employs a data packet format that includes an 8-
byte header and a variable-size data body. The ICMP protocol is commonly used on network
devices such as routers.
The four bytes of the header are.

 ICMP Type
 ICMP Code
 Checksum of the entire ICMP message
 Checksum of the entire ICMP message

The below picture is an example for ping error message (ICMP error message service)

M.K.Kawzar (00180822) NETWORKING – 01 72


Figure 33 ICMP Error Message Service

7.3.2 Address Resolution Protocol (ARP)

The Address Resolution Protocol (ARP) is a low-level network protocol that is used to
translate Internet Address Protocol (IP) into link layer addresses such as Media Access
Control (MAC) or the Physical Address. In order to work effectively, Ethernet and Wireless
Fidelity devices primarily require an Address Resolution Protocol (ARP).

7.3.3 Reverse Address Resolution Protocol (RARP)

The Reverse Address Resolution Protocol (RARP) is somewhat similar to ARP but it works
in an opposite way. This protocol's job is to convert the MAC address to the given internet
protocol address.

7.3.4 Internet Protocol (IP)

The Internet Protocol (IP) is the primary communication protocol. It is a collection of rules
for transferring data between computers via a single network or a network stack. IP is used to
address hosts and route data to specified network hosts across numerous other networks.

M.K.Kawzar (00180822) NETWORKING – 01 73


Recommended Protocols for Alliance Health

According to the Alliance Health scenario. As a developing firm, it necessitates the use of
several essential Network Protocols to ensure the network's efficacy. Because this
organization has seven departments, each department's users demand file sharing, hence
FTP (File Transfer Protocol) may be used. SSH (Secure Shell Protocol) may be used to
ensure excellent network security and data encryption while connecting to remote servers.
SMPT (Basic Mail Transfer Protocol) may be used to send simple emails as required by the
firm. HTTPS (Hyper Text Transfer Protocol Secure) can be installed for the company's
secure surfing. The Domain Name Service (DNS) is a critical system for preserving a
company's domain name; it defines domain names and transforms them to IP addresses.
HTTP (Hyper Text Transfer Protocol) may be used by users for typical online surfing.
DHCP (Dynamic Host Configuration Protocol) can be used as a method for providing IP
addresses to End Devices Automatically, which is required for device-to-device
communication. A well-functioning network system should be monitored 24 hours a day,
seven days a week. Network functions and activities may be easily monitored utilizing the
SMTP (Simple Network Management Protocol).If these protocols are utilized correctly and
efficiently to build the company's network. For the provided case, there will be a successful
solution for this network.

M.K.Kawzar (00180822) NETWORKING – 01 74


Activity 2

8. Operating Principles of Network Devices and Servers


To provide a communication and interaction between nodes/hosts or among devices of a
computer network, network devices (hardware devices) are needed. These units are
network-connected and quickly, accurately, and reliably transfer data over the network.
Some NIC cards and RJ45 connectors are mounted to the connected devices, while other
devices lack these. Switches are an element of the network, just as routers.

8.1 Network Devices


Network devices are hardware devices that link computers, printers, fax machines, and other
electronic devices to a network.

8.1.1 Routers

Figure 34 Router

A device of networking hardware known as a router joins two or more packet-switched


networks or sub-networks. The router's main responsibility is to regulate data traffic
between networks by sending information to the correct IP address and enabling several
devices to share a single internet connection. There are a few more routers, however they
are mostly used for LAN (Local Area Network) and WAN (Wide Area Network) networks.
A LAN only needs one router, whereas a WAN needs many because of its wider geographic
coverage.

M.K.Kawzar (00180822) NETWORKING – 01 75


8.1.2 Switches

Figure 35 Switches

On a Local Area Network (LAN), a switch is a fast device that accepts incoming data
packets and directs them to the user's computer or another switch, router, or other device on
the same network, depending on the circumstances. The most typical connection method for
networks' devices is using Ethernet connections.

There are 2 types of switches


1. Layer 2 Switch - switches that route data to end-devices depending on their MAC
addresses
2. Layer 3 Switch - switches that forward data based on the end device's destination IP
address (Some switches do support MAC and IP in the same time)

M.K.Kawzar (00180822) NETWORKING – 01 76


8.2 Servers

Figure 36 Servers

A server is a computer or piece of software that provides resources, information, services, or


applications to clients, or other computers, across a network. All network PCs can access
the server's features and services, such as viewing websites and reading emails, via its
connection to a switch or router.

Types of Servers
 Application Server – Provide an environment in which all of the criteria for
executing or building an application. An Application Server's primary function is to
minimize the size and complexity of customer applications, to cache and manage
data flow in order to increase speed and to establish data and end-user traffic
security. Today's application servers include JBoss, Glassfish, Oracle OC4J,
WebLogic, and Apache Geronimo.

 Database Server – A database server enables other computers to connect to a


database and retrieve or submit data. The database server can be accessed via either
the client PC's "front end" or the database server's "back end." Oracle RDBMS,
MySQL, Microsoft Access, Microsoft SQL Server, phpMyAdmin, and File Maker
are examples of database servers.

 Web Server – A Web Server host webs sites and blogs. SMTP (Simple Mail
Transfer Protocol) and FTP (File Transfer Protocol) are also supported by web
servers and are used for email, file transfer, and storage. Apache HTTP Server,

M.K.Kawzar (00180822) NETWORKING – 01 77


Microsoft Internet Information Services (IIS), Sun Java System Web Server are
some of the commonly used web servers today.

 Mail Servers – Emails are saved and sorted on this type of server before being sent
to users on demand. A client-server application model is used to send and receive
emails over the Simple Mail Transfer Protocol (SMTP). Some of the major mail
servers used nowadays are Apache James, Zimbra, Mail Server, Mail Enable, and
some others.

 Proxy Servers – Any system that converts traffic between networks or protocols is
referred to as a proxy server. To filter queries, increase speed, and share
connections, a proxy server sits between a client program (Web browser) and an
external server (Web Server). There are some of the benefits which can be gained
using a proxy server such as privacy benefits, improved performance and bandwidth,
control of internet usage and security. Free Proxy, Nginx, Safe Squid and Apache
Traffic Server are some of the most used proxy servers

 Telnet Server – A Telnet server allows clients to connect to a host computer and
conduct functions as if they were on the remote computer.

 FTP Server – An FTP server is a device that provides files for distribution using the
FTP protocol, and it is a typical option for facilitating remote data exchange between
computers. An FTP server is a computer that provides files for distribution using the
FTP protocol, and it is a prominent option for facilitating remote data exchange
between computers. FTP is a protocol that allows files to be sent over the internet
between a server (sender) and a client (receiver).

 Virtual Servers – A virtual server is a computer that emulates the functions of a real
server. On a single physical server, many virtual servers, each with their own
operating system, may be installed. Virtual servers provide several advantages,
including low cost, low energy usage, and low space utilization. Some of the Virtual
Server Software that may be installed on a server are VirtualBox, VMware,
Microsoft Virtual Server, and Hyper V.

M.K.Kawzar (00180822) NETWORKING – 01 78


The above-mentioned servers are some of the primarily used servers.

Recommended Servers for Alliance Health


According to the particular instance, the alliance health has 11 different departments, each
with their own needs. Dependability and network stability are crucial. As a network
consultant for this network system, I advise one main router and 11 switches for each
department because the number of users in each department differs from the number in the
other department. These recommendations also make it simple to add new end devices and
troubleshoot issues, ensure that a network failure in one department doesn't affect the other
departments, and ensure that the network as a whole operates with equal performance and
stability.

In this instance, though, this organization demands a server that can meet a variety of needs.
As a network consultant, I suggest a simple server for this case. A primary server is required
for this enterprise network. There are several servers available on the market today; from
that server, I propose the virtual server that can be used for a variety of purposes, such as
installing a Mail Server Software, FTP Server Software, Application Server Software, Web
Server Software, and Database Server Software. A virtual server may save a lot of money
over buying several servers, it takes up little space, and it is simple to operate for the
administrator.

Comparison of 2 server brands


HPE server :

M.K.Kawzar (00180822) NETWORKING – 01 79


Figure 37 HPE server

The dependability and robustness of HPE servers make them a great option for mission-
critical applications. From tiny businesses to giant corporations, HPE offers servers to fulfil
a variety of scalability needs. HPE servers could also be more expensive than average due
to their reputation for dependability. By providing efficient remote management, HPE's
Integrated Lights-Out (iLO) management solution improves server administration and
troubleshooting.

Dell server:

Figure 38 Dell server

Dell offers a wide range of customized server configurations, allowing businesses to choose
the parts and specifications that best suit their specific needs. Enterprises searching for end-

M.K.Kawzar (00180822) NETWORKING – 01 80


to-end solutions may find Dell's entire lifecycle management services, which include
deployment, support, and maintenance, useful. Although Dell servers are known for their
high quality, they could be much more expensive than alternatives. The many customization
options could make decision-making and maintenance more difficult.

Recommended for Alliance Health


For the Alliance Health company, I would choose HPE brand servers since they meet a wide
range of scalability needs, work well for both large and small businesses, and are more
efficient in terms of both cost and performance than other servers. It aids in better problem
solving than others. And simple to control. Therefore, I can without a doubt suggest this
brand to any company.

9. Inter-dependence of workstation hardware with networking


software
9.1 Workstation Hardware
A workstation is a powerful computer designed specifically for each user or group of users
who are working on a project together. A workstation has many HD screens and a more
potent processor than a personal computer. A workstation's multiple RAM (Random Access
Memory) drives, additional storage drives, and powerful graphics card (GPU) enable it to
multitask more fluidly. Additionally, it has more peripherals connected to it. The
workstation on a Local Area Network (LAN) is also known as a mainframe computer.
These workstations may share network resources with one or more large client PCs and
network servers.

A low-cost workstation uses Intel Pentium 4 or AMD Athlon 64 CPUs, but a high-cost
workstation requires powerful processors on the market, such as IBM Power, AMD
Opteron, and Sun UltraSPARC, which may be utilized for complex tasks such as Image
rendering and editing, animations, and mathematical graphs are a few examples

9.2 Networking Software


Network software contains programs for interconnecting computer equipment as well as
applications required for computer networks. The applications let computers communicate
with one another and share resources (software and hardware). It is the most widely used

M.K.Kawzar (00180822) NETWORKING – 01 81


program on the planet. It combines cutting-edge technology, critical business services, and
wide hardware platforms.

9.3 Explain the inter-dependencies of workstation hardware with


networking software.
In this situation, all departments may be required to interface with all peripheral equipment
such as printers, scanners, and central storage, among others. The data traffic in the network
is maintained by using a server on behalf of the workstations (PCs in the Departments).
However, the server must be linked to all of the network's peripherals that each department
may access. Every peripheral device driver has previously been installed on the server
program for this purpose (OS). Furthermore, the server components, such as the hard drive,
should be connected to all workstation PCs, which will help increase the network's
hardware and software interdependence.

M.K.Kawzar (00180822) NETWORKING – 01 82


Activity 3

10. Network Blueprint for Alliance Health


In this scenario, Alliance Health is a technology-enabled solutions company , and it has
many departments. According to the specifications, each of the departments is divided by
VLANs, and each department's devices are linked to their own switch, which is connected
to a central router. Finally, the router is linked to the main server. The blueprint of the
network according to the above requirements is given below.

Figure 39 Alliance Health Blueprint Colombo

M.K.Kawzar (00180822) NETWORKING – 01 83


Figure 40 Alliance Health Blueprint Matara

The Alliance Health networking design was created using EdrawMax. With the help of the
all-in-one design programme EdrawMax, you can quickly create a variety of striking
designs. These consist of floor layouts, mind maps, infographics, network diagrams, flow
charts, and organizational diagrams. With the help of EdrawMax's abundance of templates
and symbols, you can quickly create the pictures you need for any purpose, be it
instructional, commercial, or social. EdrawMax can import and export files in a variety of
formats, including Word, PDF, Visio, HTML, PPT, and JPEG, making it flexible and
dynamic. This makes it simple for you to collaborate and distribute your graphics across to
your colleagues. Your team members can access the files you keep in the cloud at any time
and on any device.

11. VLAN and IP Subnetting Scheme for Alliance Health

Figure 41 IP Allocation for Alliance Health Colombo

M.K.Kawzar (00180822) NETWORKING – 01 84


Figure 42 IP Allocation for Alliance Health Matara

12. List of devices, network components and software used for


Alliance Health
Hardware Components for Colombo
 Main Server
 Router – 1
 Switches – 10
 RJ45 Cables
 Wi – Fi
 PCs

Hardware Components for Matara


 Main Server
 Router – 1
 Switches – 5
 RJ45 Cables
 Wi – Fi
 PCs

Software Components
 Operating System (Windows/Linux)
 Protocols (TCP/IP)
Due of the geographical location, I employed numerous hardware and software components
on the Alliance Health in this case. As noted previously, Alliance Health is a technology-
enabled solutions company structure and is divided into many departments: Administration ,
Account & Finance, Sales , Customer Service , HR , IT department , Audit , Business
department , Reception , and Video conference. The communication between these
departments in this network should be more dependable, quick, and secure. I utilized many

M.K.Kawzar (00180822) NETWORKING – 01 85


switches for this, one for each department, to provide more steady connectivity and
reliability when an issue occurs in one department and does not affect other departments. A
primary router is used to link all of the switches. It is also used for departmental
communication. Finally, a Main Server is linked to this network for storage, network
application installation, and so on.

M.K.Kawzar (00180822) NETWORKING – 01 86


Test and evaluate the proposed design to meet the
requirements and analyse user feedback by using a user
feedback form.

Figure 43 Feedback Form

M.K.Kawzar (00180822) NETWORKING – 01 87


Figure 44 Reponses 1

Figure 45 Reponses 2

Figure 46 Reponses 3

Figure 47 Reponses 4

M.K.Kawzar (00180822) NETWORKING – 01 88


Install and configure Network services, devices and
applications

Figure 48 Installing Windows 1

Figure 49 Installing Windows 2

M.K.Kawzar (00180822) NETWORKING – 01 89


The network prototype was created by Cisco Packet Tracer based on the user requirements.

Figure 50 Cisco Packet Tracer Network Prototype 1

Figure 51 Cisco Packet Tracer Network Prototype 2

VLAN configuration
VLANs should be configured in all switches in the following manner.

M.K.Kawzar (00180822) NETWORKING – 01 90


Figure 52 VLAN SWITCHPORT Configuration

M.K.Kawzar (00180822) NETWORKING – 01 91


Figure 53 Router IP Address Configuration

M.K.Kawzar (00180822) NETWORKING – 01 92


Figure 54 Router show run Configuration 1

M.K.Kawzar (00180822) NETWORKING – 01 93


Figure 55 Router show run Configuration 2

M.K.Kawzar (00180822) NETWORKING – 01 94


Figure 56 Router show run Configuration 3

M.K.Kawzar (00180822) NETWORKING – 01 95


Figure 57 Router show run Configuration 4

Design a detailed Maintenance schedule for Syntax


Solutions

13. NETWORK MAINTANCE SCHEDULE


A network needs a network maintenance task to check for any issues that can arise on a
daily basis. Potential problems should be foreseen through an efficient maintenance plan,
and suitable precautions should be taken. This minimizes downtime and safeguards the
network of your business.

Table 27 Network Maintenance Schedule

SYNTAX SOLUTIONS NETWORK MAINTANANCE SCHEDULE


TASK WEEKLY EVERY 2 WEEKS MONTHLY
NETWORK DEVICE MAINTANANCE
Checking Router (Protocols/Hardware) 
Checking Switches 
Checking Cables 
Checking Wireless Devices 
Checking Printers/Scanners etc. 
SERVER MAINTANACE

M.K.Kawzar (00180822) NETWORKING – 01 96


Checking Server Updates 
Checking Server Hard Disk 
Checking Server Firewall 
Checking Server Log Files 
Deleting Server Temp Files 
Checking Server Antivirus Program 
END DEVICE MAINTANANCE
Checking End Device Updates 
Checking End Device Antivirus Program 
Checking End Device Firewall 
Deleting End Device Temp Files 
Checking End Device Hard Disks 

M.K.Kawzar (00180822) NETWORKING – 01 97


Activity 04

Develop test cases and conduct verification


TEST NO 1 Ping within a VLAN
Table 28 Test No 1

Executed Date : Time: 08:00 Test Type :


By: Admin 05/08/2023 PM Ping

Test Description Expected Received Pass/Fail


Output Output
Pining from 192.168.10.130 Replies from Got Replies Pass
HR to Audit (PC9) to 192.168.10.209 192.168.10.209
192.168.10.209

Figure 58 Test No 1

M.K.Kawzar (00180822) NETWORKING – 01 98


TEST NO 2 Ping Among the VLAN
Table 29 Test No 2

Executed By: Date : Time: 08:10 Test Type :


Admin 05/08/2023 PM Extended
Ping

Test Description Expected Received Pass/Fail


Output Output
Pining to HR (PC9) to Continuous Got Replies Pass
192.168.10.1 192.168.10.2 Replies from 192.168.10.2
192.168.10.2

Figure 59 Test No 2

TEST NO 3
Table 30 Test No 3

Executed By: Date : Time: 08:23 Test Type :


Admin 05/08/2023 PM Trace

Test Description Expected Received Pass/Fail


Output Output
Trace to HR (PC9) to Replies from Got Replies Pass

M.K.Kawzar (00180822) NETWORKING – 01 99


192.168.10.191 192.168.10.191 192.168.10.191 192.168.10.191

Figure 60 Test No 3

TEST NO 4

Table 31 Test No 4

Executed Date : Time: 08:23 Test Type : IP


By: Admin 05/08/2023 PM Configuration

Test Description Expected Received Pass/Fail


Output Output
Ping to HR (PC9) to Replies from Got Replies Pass
Default 192.168.10.161 192.168.10.161 192.168.10.161
Gateway

M.K.Kawzar (00180822) NETWORKING – 01 100


Figure 61 Test No 4

Recommend potential future enhancements for Alliance


Health

Technology is one of the world's most quickly expanding sectors nowadays. Every day, new
technologies are being released at a rapid speed. As technology progresses, businesses, in
particular, can acquire a competitive advantage in terms of productivity and efficiency.
Based on the network solution given in Syntax Solution, the technologies employed in the
network may become outdated due to technological advancements in the near future. As a
network consultant, I propose that you improve your network system in the near future. By
upgrading and updating these technologies, you may anticipate a more productive
networking solution.

M.K.Kawzar (00180822) NETWORKING – 01 101


14. FUTURE ENHANCEMENT OF THE NETWORK
14.1 Upgrading Network Quality.
As previously said, technology is growing at a rapid pace. You may achieve a high-
performance network in Alliance Health by employing high-quality items that are up to
date. As an example, choose high-quality hardware components. In Alliance Health,
existing hardware may be modified to improve network performance. Replacing outdated
routers with more powerful ones and updating servers can assist to boost network
efficiency. A good network schedule may be employed with these updates to ensure an
error-free network infrastructure.

14.2 Upgrading the Network Security


Security is a crucial consideration in a network system. In the network system of Alliance
Health. There are several departments that could be better guarded. For example, the
Finance Department and the Legal Department. The data and information maintained in
these departments are very sensitive and should be protected from being accessed by
society's hackers. A proper network security can be more beneficial in safeguarding the
network system's data and information.
As the Alliance Health’s network consultant, I offer several security steps that may be
employed to protect the network from illegal access. Firewalls are used to manage network
incoming and outgoing traffic. As previously stated, the department can utilize Facial
Recognition and Biometric Locks to ensure the physical security of the Syntax Solutions
network.

Figure 62 Network Security (facial Recognition)

M.K.Kawzar (00180822) NETWORKING – 01 102


14.3 Upgrading or Replacing the Cables in the Network.
Cables play an important part in Syntax Solution since they carry all network traffic in the
network system. Coaxial cables are now utilized in the network to carry data. Because of
technological advancements, the cables need be replaced or upgraded to newer versions. As
a network consultant for the syntax solution, I recommend Fiber Optics connections for
better data transfer rates and network dependability.

Table 32 Fiber Optic Cable

M.K.Kawzar (00180822) NETWORKING – 01 103


CONCLUSION

Finally, the writer has secured all of the ranges that are required for the creation of a
successful computer network. The author gathered a lot of expertise by developing and
failing a number of networks before achieving success through failures. By reading this
report, the reader will be able to effectively identify the user needs of a specific network and
design a network system based on the requirements. In this scenario, it provided a
significant boost for the author's future career. This report is essential for an inexperienced
networker trying to start a profession. The author has beautifully defined so many aspects of
networking in this report that any reader may learn something and take a step toward
becoming a future network industry professional.

M.K.Kawzar (00180822) NETWORKING – 01 104


References

(Computer Network)
Search Networking. (n.d.). What is a Computer Network? [online] Available at:
https://www.techtarget.com/searchnetworking/definition/network. [Accessed 25
Jul. 2023].

(‌ P2P Network)
Techterms.com. (2019). P2P (Peer to Peer) Definition. [online] Available at:
https://techterms.com/definition/p2p. [Accessed 25 Jul. 2023].

(Client Server)
Study.com. (2019). What Is a Client-Server Network? - Definition, Advantages &
Disadvantages - Video & Lesson Transcript | Study.com. [online] Available at:
https://study.com/academy/lesson/what-is-a-client-server-network-definition-
advantages-disadvantages.html. [Accessed 25 Jul. 2023].

IntelliMax Blog. (2021). Difference Between Peer-to-Peer Network and Client


Server Network. [online] Available at: https://intellipaat.com/blog/difference-
between-peer-to-peer-and-client-server-network/ [Accessed 25 Jul. 2023].

(Cloud Computing)
azure.microsoft.com. (n.d.). What Is Cloud Computing? A Beginner’s Guide |
Microsoft Azure. [online] Available at:
https://azure.microsoft.com/en-us/overview/what-is-cloud-computing/#benefits.
[Accessed 27 Jul. 2023].

‌www.knowledgehut.com. (n.d.). What Are the Advantages and Disadvantages of


Cloud Computing? [online] Available at:
https://www.knowledgehut.com/blog/cloud-computing/benefits-of-cloud-
computing/ [Accessed 27 Jul. 2023].

(Cluster Computing)
‌WatElectronics.com. (2020). Cluster Computing : Definition, Types, Advantages &
Applications. [online] Available at: https://www.watelectronics.com/cluster-
computing-architecture-its-types/. [Accessed 27 Jul. 2023].

M.K.Kawzar (00180822) NETWORKING – 01 105


GeeksforGeeks. (2021). An Overview of Cluster Computing. [online] Available at:
https://www.geeksforgeeks.org/an-overview-of-cluster-computing/. [Accessed 27
Jul. 2023].

(Centralized Network)

GeeksforGeeks. (2018). Comparison - Centralized, Decentralized and Distributed


Systems. [online] Available at: https://www.geeksforgeeks.org/comparison-
centralized-decentralized-and-distributed-systems/. [Accessed 27 Jul. 2023].

‌(Virtualized)

IBM Cloud Education (2019). us-en_cloud_learnhub_virtualization. [online]


www.ibm.com. Available at: https://www.ibm.com/cloud/learn/virtualization-a-
complete-guide. [Accessed 27 Jul. 2023].

‌(Local Area Network)

Cisco (2019). What is a LAN? Local Area Network. [online] Cisco. Available at:
https://www.cisco.com/c/en/us/products/switches/what-is-a-lan-local-area-
network.html. [Accessed 27 Jul. 2023].

‌sohailanwar (2019). Local Area Network | Advantages and Disadvantages of LAN


(2019). [online] Computer Network Topology. Available at:
https://computernetworktopology.com/local-area-network/. [Accessed 27 Jul.
2023].

(Wide Area Network)


Cisco (n.d.). What Is a WAN? Wide-Area Network. [online] Cisco. Available at:
https://www.cisco.com/c/en/us/products/switches/what-is-a-wan-wide-area-
network.html. [Accessed 27 Jul. 2023].

(Metropolitan Area Network)


Arsal Jahejo (2019). Metropolitan Area Network (MAN Network) | Computer
Network Topology. [online] Computer Network Topology. Available at:
https://computernetworktopology.com/metropolitan-area-network/. [Accessed
27 Jul. 2023].

(Storage Area Network)

M.K.Kawzar (00180822) NETWORKING – 01 106


www.hitechwhizz.com. (n.d.). 5 Advantages and Disadvantages of SAN |
Drawbacks & Benefits of SAN. [online] Available at:
https://www.hitechwhizz.com/2021/06/5-advantages-and-disadvantages-
drawbacks-benefits-of-san.html. [Accessed 27 Jul. 2023].

What is a Storage Area Network (SAN (2019). What is a Storage Area Network
(SAN)? [online] SearchStorage. Available at:
https://searchstorage.techtarget.com/definition/storage-area-network-SAN.
[Accessed 27 Jul. 2023].
(Private Area Network)
GeeksforGeeks. (2020). Overview of Personal Area Network (PAN). [online]
Available at: https://www.geeksforgeeks.org/overview-of-personal-area-network-
pan/. [Accessed 27 Jul. 2023].

(Virtual Private Network)


GeeksforGeeks. (2017). Virtual Private Network (VPN) | An Introduction. [online]
Available at: https://www.geeksforgeeks.org/virtual-private-network-vpn-
introduction/.

www.hitechwhizz.com. (n.d.). 7 Advantages and Disadvantages of VPN | Risks &


Benefits of VPN. [online] Available at: https://www.hitechwhizz.com/2020/02/7-
advantages-and-disadvantages-risks-benefits-of-vpn.html.

(Intranet)
Happeo - The digital workplace and social intranet solution, built for G-Apps.
(2020). What is intranet: definition and benefits? | Happeo. [online] Available at:
https://www.happeo.com/what-is-intranet. [Accessed 28 Jul. 2023].

www.hitechwhizz.com. (n.d.). 10 Advantages and Disadvantages of Intranet |


Drawbacks & Benefits of Intranet. [online] Available at:
https://www.hitechwhizz.com/2020/10/10-advantages-and-disadvantages-
drawbacks-benefits-of-intranet.html. . [Accessed 28 Jul. 2023].

(Extranet)
INVID. (2019). What is an Extranet? - INVID. [online] Available at:
https://invidgroup.com/what-is-an-extranet/. . [Accessed 28 Jul. 2023].

www.hitechwhizz.com. (n.d.). 6 Advantages and Disadvantages of Extranet |


Drawbacks & Benefits of Extranet. [online] Available at:

M.K.Kawzar (00180822) NETWORKING – 01 107


https://www.hitechwhizz.com/2020/10/6-advantages-and-disadvantages-
drawbacks-benefits-of-extranet.html. [Accessed 28 Jul. 2023].

(Network Topologies)
Jones IT | Managed IT Services, IT Support, IT Consulting. (n.d.). How To Design a
Network Topology | Jones IT. [online] Available at:
https://www.itjones.com/blogs/2020/11/22/a-guide-to-network-topology.
[Accessed 28 Jul. 2023].

Williams, L. (2021). Type of Network Topology: Bus, Ring, Star, Mesh, Tree, P2P,
Hybrid. [online] www.guru99.com. Available at: https://www.guru99.com/type-
of-network-topology.html. [Accessed 28 Jul. 2023].

(ANSI)
Techopedia.com. (n.d.). What is the American National Standards Institute
(ANSI)? - Definition from Techopedia. [online] Available at:
https://www.techopedia.com/definition/4563/american-national-standards-
institute-ansi [Accessed 28 Jul. 2023].

Asq.org. (2015). ANSI Standards List - American National Standards Institute |


ASQ. [online] Available at: https://asq.org/quality-resources/ansi-standards.
[Accessed 28 Jul. 2023].

(ITU-T)
International Telecommunication Union | UN agency. (2019). In: Encyclopædia
Britannica. [online] Available at: https://www.britannica.com/topic/International-
Telecommunication-Union. [Accessed 28 Jul. 2023].

(IEEE)
Techopedia.com. (2019). What is the IEEE? - Definition from Techopedia. [online]
Available at: https://www.techopedia.com/definition/4575/institute-of-electrical-
and-electronics-engineers-ieee. [Accessed 28 Jul. 2023].

(IEEE 802.3)
Cisco. (n.d.). Ethernet (IEEE 802.3). [online] Available at:
https://www.cisco.com/c/en/us/td/docs/net_mgmt/prime/network/3-8/referenc
e/guide/ethrnt.html [Accessed 28 Jul. 2023].

M.K.Kawzar (00180822) NETWORKING – 01 108


(IEEE 802.6)
GeeksforGeeks. (2020). IEEE 802.6 (DQDB). [online] Available at:
https://www.geeksforgeeks.org/ieee-802-6-dqdb/ [Accessed 28 Jul. 2023].

(IEEE 802.11)

Techopedia.com. (n.d.). What is IEEE 802.11? - Definition from Techopedia.


[online] Available at: https://www.techopedia.com/definition/24967/ieee-
80211#:~:text=IEEE%20802.11%20refers%20to%20the. [Accessed 28 Jul. 2023].

(Network Models)

Mann, S. (2001). An Introduction to TCP/IP. [online] informIT database. Available


at: https://www.informit.com/articles/article.aspx?p=23987&seqNum=4.
[Accessed 29 Jul. 2023].

GeeksforGeeks. (2019). Layers of OSI Model - GeeksforGeeks. [online] Available at:


https://www.geeksforgeeks.org/layers-of-osi-model/. [Accessed 29 Jul. 2023].

‌(Network Protocols)

What is a protocol? | Network protocol definition | Cloudflare. (n.d.). Cloudflare.


[online] Available at: https://www.cloudflare.com/learning/network-layer/what-
is-a-protocol/. [Accessed 29 Jul. 2023].

GeeksforGeeks. (2017). Protocols in Application Layer - GeeksforGeeks. [online]


Available at: https://www.geeksforgeeks.org/protocols-application-layer/.
[Accessed 29 Jul. 2023].

SearchNetworking. (n.d.). What is transport layer? - Definition from WhatIs.com.


[online] Available at:
https://www.techtarget.com/searchnetworking/definition/Transport-layer
[Accessed 29 Jul. 2023

GeeksforGeeks. (2017). User Datagram Protocol (UDP) - GeeksforGeeks. [online]


Available at: https://www.geeksforgeeks.org/user-datagram-protocol-udp/.
[Accessed 29 Jul. 2023].

M.K.Kawzar (00180822) NETWORKING – 01 109


Techopedia.com. (2019). What is Internet Control Message Protocol (ICMP)? -
Definition from Techopedia. [online] Available at:
https://www.techopedia.com/definition/5362/internet-control-message-
protocol-icmp. [Accessed 29 Jul. 2023].

GeeksforGeeks (2017). How Address Resolution Protocol (ARP) works? [online]


GeeksforGeeks. Available at: https://www.geeksforgeeks.org/how-address-
resolution-protocol-arp-works/. [Accessed 29 Jul. 2023].

M.K.Kawzar (00180822) NETWORKING – 01 110

You might also like