You are on page 1of 167

INTERNAL VERIFICATION – ASSIGNMENT BRIEF

Programme Title: HND in Computing

Assessor Name:

Internal Verifier Name:

Unit or Component Number and


Unit 02 - Networking
Title:

Assignment title: LAN Design & Implementation for Alliance Health

Assessment criteria targeted by


LO1, LO2, LO3, LO4
this assignment brief:

Is this an Authorised Assignment N/A


Brief published by Pearson? If so,

has it been amended by the

Assessor in any way? Please give

details.

(If using the Authorised Assignment Brief

‘off the shelf’ with no amendments, please

answer the question marked * in the

checklist only)

Has this assignment been Yes No


submitted to the Assignment

Checking Service? √
(If Yes, please keep a copy of the ACS

feedback with this form)

INTERNAL VERIFIER CHECKLIST Y/N

Are the programme and unit details accurate? Y

*Are clear deadlines for assessment given? TBC

Is the time frame of an appropriate duration? Y

Is there a suitable vocational scenario or context? Y


Are the assessment criteria to be addressed stated accurately? Y

Does each task show which criteria are being addressed? Y

Do the tasks meet the assessment requirements of the unit/s? Y

Is it clear what evidence the learner needs to generate? Y

Is it likely to generate evidence that is valid and sufficient? Y

Overall, is the Assignment fit for purpose? Yes √ No

*If ‘No’ is recorded the Internal Verifier must recommend actions detailing the issues to be addressed. The Assessor and

the Internal Verifier must then confirm that the action has been undertaken and that the Assignment Brief is authorised

for use before being issued to learners.


Target Date Date
Action required:
for Action
(If none then please state n/a)
Completion Completed

General Comments (if appropriate)

Assignment Brief Authorised for Use:

Internal Verifier signature Date

Assessor signature
Date

Lead Internal Verifier signature (if


Date 2022/06/13
appropriate)
Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)

INTERNAL VERIFICATION – ASSESSMENT DECISIONS


Programme title BTEC Higher National Diploma in Computing

Assessor Ms. Haseena Musadeek Internal Verifier

Unit(s) Unit 02: Networking

Assignment title LAN Design & Implementation for Alliance Health

Student’s name
List which assessment criteria Pass Merit Distinction
the Assessor has awarded.

INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded match


those shown in the assignment brief? Y/N

Is the Pass/Merit/Distinction grade awarded


justified by the assessor’s comments on the Y/N
student work?

Has the work been assessed Y/N


accurately?
Is the feedback to the student:
Give details:
• Constructive? Y/N
• Linked to relevant assessment criteria? Y/N
Y/N
• Identifying opportunities for
improved performance?
Y/N
• Agreeing actions?
Does the assessment decision need Y/N
amending?
Assessor signature Date

Internal Verifier signature Date

Programme Leader signature (if required) Date

Confirm action completed


Remedial action taken
Give details:

Assessor signature Date

Internal Verifier Date


signature
Programme Leader Date
signature (if required)
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID M.I.P.P. Pamod
Unit 02: Networking
Unit Title
Assignment Number 1 Assessor Ms. Haseena
Musadeek

Submission Date Date Received


1st submission

Re-submission Date Date Received 2nd


submission

Assessor Feedback:
LO1 Examine networking principles and their protocols.

Pass, Merit & DistinctionP1 P2 M1 D1


Descripts

LO2 Explain networking devices and operations.

Pass, Merit & DistinctionP3 P4 M2


Descripts

LO3 Design efficient networked systems.


Pass, Merit & DistinctionP5 P6 M3 D2
Descripts

LO4 Implement and diagnose networked systems.


Pass, Merit & DistinctionP7 P8 M4
Descripts

Grade: Assessor Signature: Date:

Resubmission Feedback:
Grade: Assessor Signature: Date:

Internal Verifier’s Comments:

Signature & Date:

* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.

Assignment Feedback
Formative Feedback: Assessor to Student

Action Plan

Summative feedback

Feedback: Student to Assessor


Assessor Date
signature
Pamodpasan0982gmail.com 09/02/2024
Student Date
signature

Pearson Higher Nationals in


Computing
Unit 02: Networking
Assignment 01
General Guidelines

1. A Cover page or title page – You should always attach a title page to your assignment. Use the
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom, right margins and 1.25” for the left margin of each page.

Word Processing Rules


1. The font size should be 12 point and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.

Important Points:

1. It is strictly prohibited to use textboxes to add texts in the assignments, except for compulsory
information. eg: Figures, tables of comparison etc. Adding text boxes to the body except for the
before mentioned compulsory information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade.
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You must provide both in-text citation and a
reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course.
Student Declaration

I hereby, declare that I know what plagiarism entails, namely, to use another’s work and to present it
as my own without attributing the sources in the correct form. I further understand what it means to
copy another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of Pearson UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my
own, and where I have made use of another’s work, I will attribute the source in the correct
way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Pearson, UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.

Student’s Signature: Date:


(Provide E-mail ID) (Provide Submission Date)
Higher National Diploma in Computing
Assignment Brief
Student Name /ID Number M.I.P. Pamod

Unit Number and Title Unit 2: Networking

Academic Year 2022/23

Unit Tutor

Assignment Title LAN Design & Implementation for Alliance Health

Issue Date

Submission Date

IV Name & Date

Submission format

The submission should be in the form of an individual report written in a concise, formal business style
using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using Harvard
referencing system. Please also provide an end list of references using the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures, although
you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:

LO1 Examine networking principles and their protocols.

LO2 Explain networking devices and operations.

LO3 Design efficient networked systems.

LO4 Implement and diagnose networked systems.


Assignment Brief and Guidance:

Scenario

Alliance Health is a technology-enabled solutions company that optimizes the revenue cycle of the US
healthcare industry where its global delivery center is located in Colombo. The company is planning to
expand their business operations with their latest branch at Matara and wants it to be one of the
state-of-the-art companies in Matara with the latest facilities.

Assume you have been appointed as the new network analyst of Alliance Health to plan, design and
restructure the existing network. Prepare a network architectural design and implement it with your
suggestions and recommendations to meet the company requirements.
The floor plan of the head office in Colombo is as follows:
Floor 1:
 Reception area
 Sales & Marketing Department (10 employees)
 Customer Services Area – with Wi-Fi facilities

Floor 2:
 Administration Department (30 Employees)
 HR Department (20 employees)
 Accounting & Finance Department (15 employees)
 Audit Department (5 employees)
 Business Development Department (5 employees)

Floor 3
 Video conferencing room
 IT Department (60 employees)
 The Server Room

The floor plan of the branch in Matara is as follows:


Floor 1:
 Reception area
 Customer Services Area– with Wi-Fi facilities

Floor 2:
 Administration Department (10 Employees)
 HR Department (7 employees)
 Accounting & Finance Department (8 employees)
 IT Department (50 employees)

Following requirements are given by the Management.


 All the departments must be separated with unique subnet .

 The conferencing room of the head office and Customer Services Areas of each
branch are to be equipped with Wi-Fi connections .

 Connectivity between two branches (Head Office and Matara) would allow the intra
branch connectivity between departments. (Use of VPN is not compulsory)

 The necessary IP address classes and ranges must be decided by the network
designer and should be used for all the departments except the server room .

 Number of servers required for the Server room need to be decided by the
Network designer and should be assigned with 10.254.10.0/24 subnet. (Uses static
IPs )

 Sales and Marketing Team also needs to access Network resources using WIFI
connectivity.
(Note: Clearly state your assumptions. You are allowed to design the network according to your
assumptions, but main requirements should not be violated)

Activity 01
 Discuss the benefits and constraints of different network system types that can be
implemented in the Matara branch and the main IEEE Ethernet standards that can
be used in above LAN and WLAN design.

 Discuss the importance and impact of network topologies and assess the main
network protocol suites that are used in network design using examples.
Recommend suitable network topology and network protocols for above scenario
and evaluate with valid points how the recommended topology demonstrates the
efficient utilization of the networking system of Matara branch.

Activity 02
 Discuss the operating principles of network devices (Ex: Router, Switch, Etc.) and
server types that can be used for above scenario while exploring different servers
that are available in today’s market with their specifications. Recommend
server/servers for the above scenario and justify your selection with valid points.

 Discuss the inter-dependence of workstation hardware and networking software


and provide examples for networking software that can be used in above network
design.

Activity 03
 Prepare a written network design plan to meet the above-mentioned user
requirements including a blueprint drawn using a modeling tool (Ex: Microsoft Visio,
EdrawMax) .T est and evaluate the proposed design by analyzing user feedback with
the aim of optimizing your design and improving efficiency.

(Support your answer by providing the VLAN and IP subnetting scheme for the above
scenario and the list of devices, network components and software used to design the
network for above scenario and while justifying your selections.)

 Install and configure Network services, devices and applications (Ex: VLAN,WiFi,
DNS,Proxy, Web, Etc.) according to the proposed design to accomplish the user
requirements and design a detailed Maintenance schedule for above Network.

*Note: - Screen shots of Configuration scripts should be presented.

Activity 04
 Implement a networked system based on your prepared design with valid evidences.

 Develop test cases and conduct verification (Ex: Ping, extended ping, trace route,
telnet, SSH, etc.) to test the above Network and analyse the test results against the
expected results. Recommend potential future enhancements for the networked
system with valid justifications and critically reflect on the implemented network,
including the plan, design, configurations, tests and the decisions made to enhance
the system.
Grading Rubric

Grading Criteria Achieved Feedback

LO1 : Examine networking principles and their protocols.

P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication, and
bandwidth requirements.
M1
Assess common networking principles and how protocols enable
the effectiveness of networked systems.

LO2 : Explain networking devices and operations

P3
Discuss the operating principles of networking devices and
server types.
P4
Discuss the interdependence of workstation hardware and
relevant networking software
M2
Explore a range of server types and justify the selection of a
server for a given scenario, regarding cost and performance
optimization

LO 1 & LO2
D1 Evaluate the topology protocol selected for a given scenario and
how it demonstrates the efficient utilization of a networking system.

LO3 : Design efficient networked systems

P5
Design a networked system to meet a given specification.
P6
Design a maintenance schedule to support the networked
system.

M3
Analyze user feedback on your designs with the aim of
optimizing your design and improving efficiency.
D2
Critically reflect on the implemented network, including the
design and decisions made to enhance the system.
LO4 : Implement and diagnose networked systems

P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.

M4
Recommend potential enhancements for the networked
systems.
D2 Critically reflect on the implemented network, including the
design and decisions made to enhance the system.
Acknowledgement
I would like to express my special gratitude to our subject Lecture Ms. Haseena
Musadeek & all other individuals who have contributed to the successful
completion of this assignment. Thank you for your guidance, encouragement,
and support throughout this academic endeavour. Your assistance has been
invaluable, and I am truly appreciative of your efforts.

M.I.P Pamod
1 Table of Contents
1. Task 01...............................................................................................................................1

1.1 Network System Types..............................................................................................1

1.1.1 Brief introduction about computer network systems.............................................1

1.1.2 Advantages and Disadvantages of a Computer Network.......................................1

1.1.3 Model of the Network............................................................................................2

1.1.4 Network Types.......................................................................................................5

1.2 Data communication................................................................................................15

1.3 Network Standards...................................................................................................16

1.3.1 IEEE Ethernet Standards......................................................................................17

1.4 Network Topology...................................................................................................18

1.4.1 Types Of Network Topology...............................................................................19

1.4.2 Importance of Network topology.........................................................................30

1.5 Common Networking principals..............................................................................31

1.6 Network protocol.....................................................................................................31

1.6.1 Network protocol Types.......................................................................................32

1.7 TCP/IP and OSI model.............................................................................................36

1.7.1 OSI model............................................................................................................36

1.7.2 TCP/IP Model......................................................................................................38

1.7.3 Differences between the OSI and TCP/IP model.................................................40

1.8 Discuss suitable network system for Matara branch................................................40

1.8.1 Suitable network model........................................................................................40

1.8.2 Suitable network Types........................................................................................40

1.8.3 Suitable topology to above network type.............................................................41

1.8.4 Suitable IEEE standards for above LAN and WLAN network type....................41

1.8.5 Suitable network protocol to Matara branch........................................................42

1 | Page
NETWORK
2 Task 02.............................................................................................................................43

2.1 Network devices.......................................................................................................43

2.1.1 Types of network devices.....................................................................................43

2.1.2 Suitable network devices to above scenario.........................................................60

2.2 Server Types.............................................................................................................60

2.2.1 Types of Servers in Today's Market.....................................................................63

2.2.2 Suitable server Types to above scenario..............................................................63

2.2.3 Server in Today’s market.....................................................................................64

2.2.4 Selection of Server Types for Cost and Performance Optimization in each
Scenario............................................................................................................................68

2.2.5 Importance of servers...........................................................................................69

2.3 Interdependence of Workstation Hardware and Networking Software...................69

2.3.1 Networking Software...........................................................................................70

2.3.2 Types of networking Software.............................................................................71

2.3.3 Network Software Function.................................................................................75

2.3.4 Networking software can be used for above network design..............................76

2.3.5 Network design tools............................................................................................77

2.4 Topology Protocol Efficiency in Networking Systems for given scenario..............77

3 Task 03.............................................................................................................................79

3.1 Network Diagram Alliance Health Company..........................................................79

3.1.1 Using EdrawMax for Network System Design....................................................79

3.1.2 Explain the Edrawmax image..............................................................................79

3.2 Virtual LAN (VLAN)..............................................................................................81

3.2.1 Benefit of VLANs................................................................................................81

3.2.2 VLAN ranges:......................................................................................................82

3.2.3 VLAN and IP Subnetting.....................................................................................82

3.3 Network software.....................................................................................................83


2 | Page
NETWORK
3.3.1 Using this software for Alliance Health company...............................................84

3.4 Blueprint of the network system..............................................................................84

3.5 User Feedback for above Network System..............................................................85

3.5.1 Response..............................................................................................................87

3.6 Network maintenance...............................................................................................90

3.6.1 Network maintenance schedule for above network system.................................90

3.7 Network Services and Application...........................................................................90

3.7.1 Windows Server OS Install..................................................................................91

3.7.2 Active Directly...................................................................................................105

3.7.3 Create User Account..........................................................................................120

4 Task 04...........................................................................................................................124

4.1 Implement the Network System by Cisco Packet Tracker.....................................124

4.2 IP Subnetting Scheme for the Alliance Health Network.......................................124

4.3 Document and analyze test results against expected results..................................125

4.4 Test Results Table for Alliance Health Network...................................................126

4.5 Recommendations for Network Enhancements.....................................................127

4.6 Critical Evolution of Implement Network Design at Alliance Health...................128

References..............................................................................................................................129

Table 1 Network Advantage and Disadvantage (Author Developed)........................................4


Table 2 Peer to peer (Teach, 2023)............................................................................................7
Table 3 client server (Author Developed)..................................................................................8
Table 4 Advantage and Disadvantage in PAN (Author Developed)..........................................9
Table 5 Local area network (Author Developed).....................................................................11
Table 6 Advantage and Disadvantage in MAN (Author Developed)......................................12
Table 7 Advantage and Disadvantage in WAN (Author Developed)......................................13
Table 8 advantage and disadvantage in VPN (author developed)............................................14
Table 9 WLAN (Author Developed)........................................................................................16
Table 10 Data communication (GeeksForGeeks, 2023)..........................................................19
3 | Page
NETWORK
Table 11 IEEE 802 Standards (Sushant, 2023)........................................................................20
Table 12 Point to point topology (Ashtari, 2023)....................................................................24
Table 13 Bus topology (Ashtari, 2023)....................................................................................25
Table 14 Ring topology (Ashtari, 2023)..................................................................................27
Table 15 Star topology (Ashtari, 2023)....................................................................................29
Table 16 Tree topology (Ashtari, 2023)...................................................................................30
Table 17 Mesh topology (Ashtari, 2023).................................................................................32
Table 18 Hybrid topology (Ashtari, 2023)...............................................................................33
Table 19 Differences Between the OSI and TCP/IP model (GeeksForGeeks, 2023)..............44
Table 20 Author developed\...................................................................................................128

Figure 1 peer to peer (NETWORKS TRAINING,2023)...........................................................9


Figure 2client sever (KITRUM,2023)......................................................................................11
Figure 3 Personal Area Network(geeksforgeeks,2023)...........................................................12
Figure 4 Local Area Network (geeksforgeeks,2023)...............................................................13
Figure 5 Metropolitan Area Network (GeeksforGeeks,2023)..................................................15
Figure 6 Wide area network (GeeksfodGeeks,2023)...............................................................16
Figure 7 Virtual private network (tp-link,2022).......................................................................17
Figure 8 WLAN(Huawei,2023)...............................................................................................18
Figure 9 CAN (GeeksforGeeks,2023)......................................................................................20
Figure 10 CAN (Author Developed)........................................................................................20
Figure 11 Intranet (FinePROXY,2023)....................................................................................21
Figure 12 Network topology Types (STL Tech,2023).............................................................26
Figure 13 Point to point topology (Ashtari, 2023)...................................................................27
Figure 14 Bus Topology (Ashtari, 2023).................................................................................28
Figure 15 Ring Topology (Ashtari, 2023)................................................................................30
Figure 16 Star Topology (Ashtari, 2023).................................................................................31
Figure 17 Tree Topology (Ashtari, 2023)................................................................................33
Figure 18 Mesh Topology (Ashtari, 2023)...............................................................................34
Figure 19 Hybrid Topology (Ashtari, 2023)............................................................................36
Figure 20 OSI Model (Woojae, 2023)......................................................................................43
Figure 21 TCP/IP layer (LearnLoner, 2023)............................................................................46

4 | Page
NETWORK
Figure 22 Hubs (Labs, 2023)....................................................................................................50
Figure 23 Switch (Labs, 2023).................................................................................................52
Figure 24 Router (Labs, 2023).................................................................................................53
Figure 25 Bridge (Labs, 2023).................................................................................................56
Figure 26 Gateway (Labs, 2023)..............................................................................................57
Figure 27 Modem (Labs, 2023)................................................................................................58
Figure 28 Repeater (Labs, 2023)..............................................................................................59
Figure 29 Access Point (Labs, 2023).......................................................................................61
Figure 30 Network Interface Card (Labs, 2023)......................................................................64
Figure 31 Firewall (Labs, 2023)...............................................................................................65
Figure 32 Rack server (superrask, 2023)..................................................................................72
Figure 33Tower server (Ingalls, 2023).....................................................................................73
Figure 34 Blade server (wikipedia, 2014)................................................................................73
Figure 35 Mainframe (IBM, 2023)...........................................................................................74
Figure 36 Micro server (Kennedy, 2019).................................................................................75
Figure 37 network software types (Ramya, 2023)...................................................................78
Figure 38 network system design (Author developed)............................................................86
Figure 39 Network system design............................................................................................91
Figure 40 Feedback Form (Author Developed).......................................................................92
Figure 41 Feedback Form (Author Developed).......................................................................93
Figure 42 Feedback Form (Author Developed).......................................................................94
Figure 43Responses (Author Developed)................................................................................94
Figure 44 Responses (Author Developed)...............................................................................95
Figure 45 Responses (Author Developed)...............................................................................96
Figure 46 setep01.....................................................................................................................98
Figure 47 Language Choose.....................................................................................................99
Figure 48 Install Windows.....................................................................................................100
Figure 49 Active windows.....................................................................................................101
Figure 50 Choosing OS..........................................................................................................102
Figure 51step06......................................................................................................................103
Figure 52step07......................................................................................................................104
Figure 53Step08.....................................................................................................................105
Figure 54Step09.....................................................................................................................106

5 | Page
NETWORK
Figure 55step10......................................................................................................................107
Figure 56Step10.....................................................................................................................107
Figure 57 restart......................................................................................................................108
Figure 58 Restarting...............................................................................................................108
Figure 59 Getting Ready........................................................................................................109
Figure 60 Local session Manager...........................................................................................110
Figure 61 Login......................................................................................................................111
Figure 62 Server is ready........................................................................................................112
Figure 63 Step 1.....................................................................................................................113
Figure 64 Step 02...................................................................................................................114
Figure 65 Step 3.....................................................................................................................115
Figure 66 Step 4.....................................................................................................................116
Figure 67 Step 5.....................................................................................................................116
Figure 68 Step 06...................................................................................................................117
Figure 69 Step 07...................................................................................................................117
Figure 70 Step 08...................................................................................................................118
Figure 71 Step 09...................................................................................................................118
Figure 72 Step 10...................................................................................................................119
Figure 73 Step 11...................................................................................................................119
Figure 74 Step 12...................................................................................................................120
Figure 75 Step 13...................................................................................................................120
Figure 76 Step 15...................................................................................................................121
Figure 77 Step 15...................................................................................................................121
Figure 78 Step 16...................................................................................................................122
Figure 79 Step 17...................................................................................................................122
Figure 80 Step 18...................................................................................................................123
Figure 81 Step 19...................................................................................................................123
Figure 82 Step 20...................................................................................................................124
Figure 83step 21.....................................................................................................................124
Figure 84Step 22....................................................................................................................125
Figure 85step 23.....................................................................................................................125
Figure 86Step 24....................................................................................................................126
Figure 87 Step 25...................................................................................................................126

6 | Page
NETWORK
Figure 88 step1.......................................................................................................................127
Figure 89 step02.....................................................................................................................127
Figure 90step3........................................................................................................................128
Figure 91step 4.......................................................................................................................128
Figure 92 step5.......................................................................................................................129
Figure 93 Step6......................................................................................................................129
Figure 94step7........................................................................................................................130
Figure 95 step8.......................................................................................................................130
Figure 96 Implement the Network System by Cisco Packet Tracker (Author developed)....131

7 | Page
NETWORK
1. Task 01
1.1 Network System Types

1.1.1 Brief introduction about computer network systems


A computer network is a system that links many separate computers together to exchange
resources and data. Communication between users is made easier by the integration of
computers and other technologies.
A grouping of two or more interconnected computer systems is called a computer network.
Wireless or cable media can be used to create a network connection. Computers and tools
are connected to any network using hardware and software.
A network of computers is made up of several types of nodes. Nodes in a computer network
can include servers, networking devices, personal computers, and other types of hosts,
whether they are used for specific purposes or not. They are identified by their network
addresses and host names. (Ramya, 2023)

1.1.2 Advantages and Disadvantages of a Computer Network


Table 1 Network Advantage and Disadvantage (Author Developed)

Advantages Disadvantages

Users can exchange files. Increased danger to data security

Users have access to files from any networkedViruses and malware transmit quickly
computer. between computers.
Servers can manage data backup, softwareComputers connected to the server may not.
updates, and security. function if it fails.
Use social networking or email to Because there is more data going across the
communicate with others. network, the computer will operate.
slower.

In the context of computer networks, various types of networks serve different purposes.
Here are some common network types in the realm of computing:
 PAN (Personal Area Network)

8 | Page
NETWORK
 LAN (Local Area Network)
 MAN (Metropolitan Area Network)
 WAN (Wide Area Network)
 VPN (Virtual Private Network)
 CAN (Campus Area Network)
 WLAN (Wireless Local Area Network)
 Virtual Local Area Network (VLAN)
 Intranet
 Extranet

1.1.3 Model of the Network


The term computer network model describes the categorization of a computer network.
Networks are divided into two types:

1.1.3.1 Peer -to -Peer (P2P)

Figure 1 peer to peer (NETWORKS TRAINING,2023)

A distributed application framework known as peer-to-peer (P2P) network or peer-to-peer


(P2P) computing distributes workloads or tasks across peers. Peers are members of the
network who are equally privileged and equipotent, establishing a peer-to-peer network of
nodes.

9 | Page
NETWORK
Without the requirement for centralized coordination by servers or reliable hosts, peers
make a portion of their resources, such as processing power, disk storage, or network
bandwidth, directly available to other network users. Unlike the traditional client-server
architecture, which divides resource consumption and supply, peers are both suppliers and
consumers of resources.

Although P2P systems were previously employed in a wide range of application areas,
Napster, a file sharing service that debuted in 1999, is credited with popularizing
architecture. In several spheres of human interaction, the idea has spawned novel
frameworks and ideologies. Peer-to-peer, as a meme in these kinds of social situations,
alludes to the egalitarian social networking that has proliferated across society, made
possible by Internet technology in general. (Kanade, 2023)
Table 2 Peer to peer (Teach, 2023)

Advantage Disadvantage
No need for a network operating system Because each computer might be being
accessed by others it can slow down the
performance for the user
Does not need an expensive server becauseFiles and folders cannot be centrally backed
individual workstations are used to access theup
files
No need for specialist staff such as network Files and resources are not centrally
technicians because each user sets their own organized into a specific 'shared area'. They
permissions as to which files, they are willingare stored on individual computers and might
to share. be difficult to locate if the computer's owner
doesn't have a logical filing system.
Much easier to set up than a client-server Ensuring that viruses are not introduced to the
network - does not need specialist knowledge network is the responsibility of each
individual user

10 | Page
NETWORK
1.1.3.2 Client server.
A client-server relationship is one in which a software asks another program, the server, for
a resource or service. In the past, the term "client-server" was used to differentiate between
the monolithic, centralized computing approach employed by mainframes and distributed
computing by PCs.

Computer transactions where a server responds to a client request are quite popular these
days. These days, one of the main concepts of network computing is the client-server
architecture. In this scenario, a LAN or WAN, such the internet, is used by the client to
connect to the server.

The connection ends when the server satisfies the client's request. When more than one
client software uses the same server program, a special server known as a daemon may start
up to wait for requests from clients.

Most of the network traffic in the early days of the internet flowed through what is referred
to as north-south traffic. This is the process by which data is sent between servers in data
centers that host the web content and distant clients that request it. Today, with the
maturation of virtualization and cloud computing, network traffic is increasingly likely to
travel server-to-server - a pattern known as east-west traffic.

As a result, network management now prioritizes decentralized security models that regulate
user access to services and data rather than centralized security models that guard the
network perimeter. Additionally, network experts evaluate network activity to make sure
rules and laws are being followed.

11 | Page
NETWORK
Figure 2client sever (KITRUM,2023)

Table 3 client server (Author Developed)

Advantage Disadvantage
All files are stored in a central location A specialist network operating system is
needed
Network peripherals are controlled centrally The server is expensive to purchase
Backups and network security is controlledSpecialist staff such as a network manager is
centrally needed
Users can access shared data which is If any part of the network fails a lot of
centrally controlled disruption can occur

1.1.4 Network Types

1.1.4.1 PAN (Personal Area Network)


The most basic type of computer network is a PAN. This network is limited to a single user;
that is, all computing device communication takes place within that user's workspace. PAN
provides a network range of one to one hundred meters for communication between a person
and a device. Its transmission speed is quite fast, and it is inexpensive and easy to maintain.
Technology used in this includes Bluetooth, IrDA, and Zigbee.

12 | Page
NETWORK
Figure 3 Personal Area Network(geeksforgeeks,2023)

Advantage and Disadvantage in PAN (Personal Area Network)

Table 4 Advantage and Disadvantage in PAN (Author Developed)

Advantage Disadvantage

Cost-effective Restricted to relatively modest data transfer


rates
Simplicity Insufficient network coverage region or
range
Data Protection Interference with radio signals

Less Storage Space Incompatibility

Portability Security Issues

Concurrent Multiple Connections Infrared Transmissions

Stability and Dependability No Broadcasting

13 | Page
NETWORK
1.1.4.2 LAN (Local Area Network)
The most used type of network is LAN. A local area network, or LAN, is a type of
computer network that links computers locally, or across a shared communication channel.
Any two or more PCs linked via a server are included in a LAN. Ethernet and Wi-Fi are the
two key technologies used in this network. It has a 2 km range, a very fast transmission
speed, cheap maintenance costs, and easy upkeep. (GeeksforGeeks, 2023)
Example Of LAN are networking in a home, school, library, collage, office, etc.

Figure 4 Local Area Network (geeksforgeeks,2023)

Advantage and Disadvantage in Local area network.


Table 5 Local area network (Author Developed)

Advantage Disadvantage

Hardware and software can be shared. It covers a small geographical area.

All the user work can be stored in a central Installation Charge is Expensive
place hub.

It is easy to control, and it is easy to manage Compatibility Issues


the entire LAN.

Collaboration All devices may be disproportionately affected

14 | Page
NETWORK
if the server fails
Faster Communication Dependency

Communication Data sharing via outside source

1.1.4.3 Metropolitan Area network (MAN)


A pc community that covers a metropolitan region, generally a town, is referred to as a
Metropolitan Area Network (MAN). It gives fast data transfer among numerous LANs
(Local Area Networks) and WANs (Wide Area Networks), such as audio, video, and facts
transport. MAN’s primary function is to link the many local area networks (LANs) in a city
together so that users may access the internet and share resources and data. Larger than a
LAN but smaller than a WAN, a MAN usually spans many kilometers in space.

Metropolitan Area Network is what MAN stands for. It's a computer community that joins
many nearby place networks (LANs) to create a larger network for the motive of sharing pc
assets. While a WAN is intended to cowl the entire city, this form of community covers a
much wider region than a LAN but a lesser region than that of a WAN. MAN is specifically
made to give customers access to high-speed connectivity with Mbps-based speed ranges.
Because of its intricate architecture, MAN is challenging to develop and maintain.
(GeeksforGeeks, 2023)

Figure 5 Metropolitan Area Network (GeeksforGeeks,2023)

Advantage and Disadvantage in MAN (Metropolitan Area Network)

15 | Page
NETWORK
Table 6 Advantage and Disadvantage in MAN (Author Developed)

Advantage Disadvantage

Provides high-speed connectivity over aCan be expensive to set up and maintain.


larger geographical area than LAN.
Can be used as an ISP for multiple customers.May experience congestion and network
performance issues with increased usage.
Offers higher data transfer rates than WAN in May have limited fault tolerance and security
some cases. compared to LANs.
It provides higher security compared to WANThe data rate is slow compared to LAN

It is wider than LAN It is difficult to make a system secure from


hackers
Increases the efficiency of handling data While we move our network to another city
or area it doesn't work

1.1.4.4 Wide Area Network (WAN)


Wide Area Network is what "WAN" stands for. It is a kind of computer network that
usually covers huge geographic areas, such as continents, regions, or cities. Multiple local
area networks (LANs) are connected via WANs, enabling long-distance communication
between them.

16 | Page
NETWORK
Figure 6 Wide area network (GeeksfodGeeks,2023)

Advantage and Disadvantage in Wide Area Network (WAN)


Table 7 Advantage and Disadvantage in WAN (Author Developed)

Advantage Disadvantage

Increase efficiency Traffic congestion in Wide Area Network is


very high.
Access to a wide range of service The fault tolerance ability of WAN is very
less.
large coverage area, allowing data andHigh cost
communication between devices in many
cities or nations.
can be used to link mobile devices or remote Require investing in a good firewall system to
workers to the company's network. avoid disruption by hackers
Increased Bandwidth Troubleshooting Issues

Messages can be quickly to anyone else onMaintenance Issues


the network

17 | Page
NETWORK
1.1.4.5 Virtual Private Network (VPN)
The virtual private network is known as a VPN. Technology known as a virtual private
network (VPN) establishes a secure, encrypted link over a less secure network, such the
Internet. Using a public network like the Internet, a virtual private network can be used to
expand a private network. All that the term implies is that it is a "Virtual Private Network,"
meaning that a user can join a local network from a distance. To provide a secure
connection, it uses tunneling techniques. (GeeksforGeeks, 2023)

Figure 7 Virtual private network (tp-link,2022)

Advantage and Disadvantage in Virtual Private Network

Table 8 advantage and disadvantage in VPN (author developed)

Advantage Disadvantage

VPN Protect Slow internet speed

Bypass Geo-Restriction Performance issues

Secure Public Wi-Fi Monitor or save data

Prevent Bandwidth Controlling Difficult to set up business VPN

Defeat firewall Expensive

Reduces Data Breaches & Cyber Threats VPNs are Illegal in Many Countries

18 | Page
NETWORK
1.1.4.6 Wireless local Area network (WLAN)
A network that permits wireless connections and communication between devices is known
as a WLAN (wireless local area network). WLAN devices communicate with one another
using Wi-Fi, as opposed to a traditional wired LAN, where devices connect via Ethernet
cables. A WLAN looks different from a regular LAN, yet it serves the same purposes. It's
usual practice to add and configure new devices using DHCP. They have the same kind of
communication capabilities as wired devices with other network devices. The way that
information is communicated is the primary difference. Data is transferred via physical
connections in a LAN as an Ethernet packet sequence. In a WLAN, packets are sent over
the air.

Alongside the rise in popularity of wireless devices are WLANs. The bulk of router sales
currently are of wireless models. Any Wi-Fi capable device in the router's wireless signal
range can connect wirelessly by using the router as a base station. This category includes
laptops, tablets, cellphones, and other wireless devices including smart home controls and
appliances. To allow connected devices to access the Internet, wireless routers are often
linked to a cable modem and sometimes another device.

Figure 8 WLAN(Huawei,2023)

Advantage and Disadvantage in WLAN

19 | Page
NETWORK
Table 9 WLAN (Author Developed)

Advantage Disadvantage

It’s a reliable sort of communication. WLAN requires license.

As WLAN reduces physical wires it’s a It’s a limited area to hide.


versatile way of communication.
WLAN also reduces the value of ownership. If there’s rain or thunder, then communication
may interfere.
It’s easier to feature or remove workstation. Due to Low security as attackers can get
access to the transmitted data.
It provides high rate thanks to small area Signals can get from nearest signals by access
coverage. points.
Easy installation and you would like don’t It’s required to vary the network card and
access point when standard changes.
need extra cables for installation.

1.1.4.7 Campus Area Network (CAN)


A campus area network (CAN) is a collection of connected local place networks (LANs) in
a restricted geographic vicinity, along with a commercial enterprise constructing, faculty,
college, or military set up. While a campus region network is smaller than a wide area
community and a metropolitan place community (MAN), it's far large than a neighborhood
location community (WAN).
The Corporate Area Network is another name for this campus area network. Because it is
exclusively utilized by residents of a particular college, this network is also sometimes
referred to as the Residential Network, or ResNet. Campus Area Networks are a collection
of Local Area Networks (LANs) that are connected to one another via switches and routers
to form a unified network like CAN. Campus Area Network offers both wired and wireless
access, and its coverage ranges from one to five kilometers. (GeeksforGeeks, 2023)
Example of CAN:
Let’s think about a university where university networks interconnect academic building,
admission building, library, account section, examination section, placement section etc of

20 | Page
NETWORK
an institution when connected with each other combine to form Campus Area Network
(CAN).
The below figure illustrates a Campus Area Network:

Figure 9 CAN (GeeksforGeeks,2023)

Advantage and Disadvantage in CAN


Advantage Disadvantage

Short, high message frequency, more than Because of electrical loading, the number of
10,000/s. connected devices is limited to a maximum of
64 nodes.

High bandwidth utilization. CAN produce excessive electric noise.

Reasonable transmission speeds. It can support up to 40-meter length.

Support for higher-layer protocols like CANRequires on-going maintenance and


open (standardized protocol for devices andadministration
applications from different manufacturers)
and J1939 (standard for heavy-duty vehicles).
21 | Page
NETWORK
Figure 10 CAN (Author Developed)

1.1.4.8 Intranet
An intranet may be defined as a personal network utilized by an organization. Its number one
purpose is to assist personnel securely communicate with each other, to keep statistics, and to
help collaborate.

Figure 11 Intranet (FinePROXY,2023)

Intranet use.
An intranet software is primarily used by organizations as a tool to:
 Share organizational updates.
 Store files
 Connect employees.
 Collaborate with teams across borders.
 Increase productivity.
 Give employees a voice in the organization.

22 | Page
NETWORK
1.2 Data communication

Communication is described as a process in which more than one computer communicates


information, instructions to each other and for sharing resources. Or in other terms,
communication is a process or act in which we may transmit or receive data. A network of
computers is described as a linked collection of autonomous computers. Autonomous implies
no computer can start, halt, or control another computer. (GeeksforGeeks, 2023)
Table 10 Data communication (GeeksForGeeks, 2023)

- Message: The data to be transmitted or communicated, which can include numbers,


text, photos, sound, or video.
- Sender: The computer or device (e.g., phone, tablet) that sends the message.
- Receiver: The computer or device that receives the message, which can be different
from the sender.
- Medium: The channel through which the message is carried from sender to receiver,
such as twisted pair wire, coaxial cable, fiber optic cable, or wireless.
- Protocol: The set of rules that govern communication between computers. These
rules are followed by both the sender and receiver.

1.3 Network Standards

All networks are built on the same standards, networking standards govern the hardware and
software that uses them and define the rules for data communications that are needed for
interoperability between devices, official organizations that publish regulated standards are:

23 | Page
NETWORK
(Arley, 2021)
- International Standards Organization (ISO)
- International Telecommunication Union (ITU)
- Institute of Electronics and Electrical Engineers (IEEE)
- American National Standards Institute (ANSI)
- Internet Research Task Force (IETF)
- Electronic Industries Association (EIA)

During data communication different standards can be used at the same time at different
layers, the commonly used are:
Application layer − HTTP, HTML, POP, H.323, IMAP
Transport layer − TCP, SPX
Network layer −IP, IPX
Data link layer − Ethernet IEEE 802.3, X.25, Frame Relay
Physical layer −RS-232C (cable), V.92 (modem)

1.3.1 IEEE Ethernet Standards

1.3.1.1 Ethernet Standards


An Ethernet standard describes the qualities, uses, and applications of a given media type.
There are various forms of media. A media type can provide variable transmission rates
depending on how it is implemented. An Ethernet standard defines a specific implementation
of a defined media type. IEEE designs Ethernet specifications. (ComputerNetworkingNotes,
2024)

1.3.1.2 IEEE
IEEE Ethernet standards are a set of technical specifications produced by the Institute of
Electrical and Electronics Engineers (IEEE) for Ethernet networking. These standards specify
many features of Ethernet, such as its physical layer, data connection layer, and network
layer. Ethernet is a sort of local area network (LAN) technology that connects devices in a
network by utilizing a standard communication language. (Sushant, 2023)

24 | Page
NETWORK
Table 11 IEEE 802 Standards (Sushant, 2023)

Standards Name

802.1 Internet working

802.2 Logical Link Control

802.3 Ethernet LAN

802.4 Token Bus LAN

802.5 Token Ring LAN

802.6 MAN

802.7 Broadband technical advisory group

802.8 Fiber Optic technical advisory group

802.9 Integrated voice/ Data network

802.10 Network security

802.11 Wireless networks

802.12 High speed networking

802.14 Cable broad band LANs and MANs

802.15 Wireless personal area networks

802.16 Broadband wireless Access

1.4 Network Topology

Network topology is a physical architecture through which various endpoints and


connections in a corporate network communicate with one other.

Organizations utilize network topology to determine how their network nodes are linked to
each other. The two major types of topologies are physical and logical. Physical network
topology refers to the structure of the physical media for data transfer. On the other hand,
logical network topology relates to how the network sends data between devices, independent
of how these devices are connected physically.

25 | Page
NETWORK
The structure of a network can directly affect its functionality. Therefore, enterprises must
adopt the most suited topology for their network to improve performance and enhance data
efficiency. The right topology also improves resource allocation and saves operating
expenses.

Additionally, network topology diagrams assist IT professionals to analyze problems


connected to connection, explore high latency, and handle other network issues. Finally, the
network topology is essential when establishing how different telecommunication networks
should be structured, allowing tech staff to set up computer networks, industrial field buses,
and command and control radio networks appropriately.

Different types of network topologies exist, and companies may pick the one that best
matches their requirements by evaluating the size, budget, and goals of their firm.

Before finishing the network topology design, a full understanding of the functionality of the
network is required. Once that is completed, a network topology mapping software may
create topology diagrams that offer a visual perspective of the network environment. Such
software would also be beneficial for seeing the way devices link, which may assist IT teams
determine the most effective structure.

Once a network arrangement is established, the following stages would be to execute the
specified network topology, automate it, regularly monitor its performance, and fix any
problems that may develop. Here, configuration management tools, topology design software,
and network management solutions might be advantageous. (Hossein, 2022)

26 | Page
NETWORK
1.4.1 Types Of Network Topology

Figure 12 Network topology Types (STL Tech,2023)

1. Point to point topology.


2. Bus Topology
3. Ring Topology
4. Star Topology
5. Mesh Topology
6. Tree Topology
7. Hybrid Topology

1.4.1.1 Point to point topology.


Point to point is a basic topology that directly joins two nodes and reserves the whole
bandwidth of the connection for them to interact with one another. Physically, point-to-point
connections rely on a cable or wire that links the two ends. However, logical topological
linkages via satellite links and microwaves are increasingly widespread nowadays. (Ashtari,
2023)

27 | Page
NETWORK
Figure 13 Point to point topology (Ashtari, 2023)

A basic example of a point-to-point connection is changing the temperature of an air


conditioning unit using a remote control.
Advantage and disadvantage in Point-to-point topology
Table 12 Point to point topology (Ashtari, 2023)

Advantage Disadvantage

Superior bandwidth, as only two nodes useOnly applicable for small areas with nodes
the link physically close to each other
High speed when compared to other types ofHigh dependence on the common link; if the
network topologies link fails, the network goes down
Simple to implement Only useful if the network has two nodes:
thus, not applicable for many modern use
cases
Easy to maintain and handle

Low instances of latency

1.4.1.2 Bus Topology


In a bus topology, all the nodes are linked via a single cable with a terminator on both ends.
This topology has one main cable operating as the backbone for the full network.

28 | Page
NETWORK
Figure 14 Bus Topology (Ashtari, 2023)

In such a configuration, the server node sends data from one end of the cable and in a single
direction to the client node. As the data goes to each node, its destination address (MAC/IP)
is verified to determine if it is received and processed. If there is a mismatch in the address,
the node does not do anything with the data.

This manner, only the node that knows its address uses the data that passes on the single
wire, while the other nodes are unaffected. Once the data reaches the end of the line, the
terminator eliminates it to avoid signal bouncing. (Ashtari, 2023)
Advantage and disadvantage in Bus topology
Table 13 Bus topology (Ashtari, 2023)

Advantage Disadvantage

Easy to add new devices and replace or Device failure and other network faults are
remove existing devices without affectingdifficult to locate in the network
other devices connected to the network
Failure in a few devices does not affect otherDamage to the backbone cable can bring the
devices, or the network entire network to a halt
Less cable is required when compared to Increase in the bandwidth consumption of a
other network topologies such as mesh andfew devices can affect the performance of the
29 | Page
NETWORK
star; the cable can be extended easily whole network
whenever required
Coaxial or twisted pair cables are mainly used Slower operations, as only one node transmits
in bus-based networks that support up to 10 data at a time
Mbps.
Bus topology is familiar technology as Low privacy, as all nodes receive the signal
installation and troubleshooting techniquessent by the server
are well known.
The cost of the cable is less compared to other Data loss over long distances
topologies, but it is used to build small
networks.

1.4.1.3 Ring Topology


In a ring topology, each node is linked with its neighbor to form a closed network. This setup
sees the data pass from one node to another, either unidirectionally or bidirectionally. Such
network structure is employed in smaller networks, such those in schools.

Figure 15 Ring Topology (Ashtari, 2023)


30 | Page
NETWORK
Many ring networks employ token passing to restrict data flow. In such a system, a token is
transmitted from one device to the next, and only the node having the token may transmit
data. The device that gets the data from the token sends it back to the server along with an
acknowledgment. Only an endpoint having access to an ’empty’ token may transmit data at
a particular moment, while the other computers must wait for their turn.

Advantage and disadvantage in Ring topology


Table 14 Ring topology (Ashtari, 2023)

Advantage Disadvantage

Circular flow of data minimizes packet A single failure in the cable can disrupt
collision overall network operations
Unidirectional ring topologies feature high-Unidirectional ring networks see data packets
speed data transmission pass through numerous nodes before reaching
their destination
Robust system–can handle a high number of Adding, modifying, or removing nodes is
nodes and heavy traffic difficult and can disrupt network activity
Lower chances of data loss over longThe addition of stations in between or the
distances removal of stations can disturb the whole
topology.
Faults are located more easily, makingSecurity and privacy issues are becoming
troubleshooting efficient more apparent as data travels through all
devices.
Circular flow of data minimizes packet Troubleshooting is difficult in this topology.
collision

1.4.1.4 Star Topology


In a star topology, all nodes are connected to a central hub utilizing a communication link.
Each node needs a separate cable to make a point-to-point connection with the hub, which
works as a server to govern and administer the whole network.

31 | Page
NETWORK
Figure 16 Star Topology (Ashtari, 2023)

In such a system, if one endpoint wishes to communicate data to another endpoint, it must
make the request to the central hub, passing the message to the intended destination.

Advantage and disadvantage Star Topology


Table 15 Star topology (Ashtari, 2023)

Advantage Disadvantage

Easy network maintenance and managementChoosing the right central hub is vital, as this
since each node has its own cable device needs to be compatible with all nodes
and links in the network
Failures affect only one device and problem Higher requirement of cables and connectors
areas are located swiftly
Adding new devices is simple andFailure of the central hub brings down the
straightforward entire network
Rapid data transfer Performance is based on the single

32 | Page
NETWORK
concentrator i.e., hub.
It is Robust. If one link fails only that link The cost of installation is high.
will affect and no other than that.
Compared to Bus Topology and RingCompared to the Bus topology, this
Topology, Star Topology offers higher levelsarchitecture calls for additional cables.
of security and privacy.

1.4.1.5 Tree Topology


In a tree topology, nodes are placed in a pattern that mimics a tree’s leaves, branches, and
trunk. Endpoints, or ‘leaves,’ are connected to mid-level nodes or ‘branches’ linked to the
tree’s ‘trunk.’ The trunk is the backbone connection that joins many mid-level nodes.

Figure 17 Tree Topology (Ashtari, 2023)

33 | Page
NETWORK
Three topologies are suitable for large networks such as offices, university campuses, and
hospitals.

Advantage and Disadvantage of Tree Topology.


Table 16 Tree topology (Ashtari, 2023)

Advantage Disadvantage

Ideal for nodes that are grouped together Large volume of cabling and numerous hubs
is required
Superior scalability: more nodes andDifficult to configure and maintain
hierarchies can be added without disrupting
the existing network
In case of damage to one part of the network, Failure of the central backbone (trunk) brings
other nodes and hierarchies remain unaffected the entire network down
Swift and easy fault identification andIf new devices are added, it becomes difficult
maintenance to reconfigure.
High-speed data transfer among nodes in oneIf the central hub gets fails, the entire system
hierarchy fails.
Error detection and error correction are veryAs more devices are connected to it, its
easy in a tree topology. performance, speed, and efficiency suffer.

1.4.1.6 Mesh topology


In a mesh topology, all the nodes are linked and may transmit and receive their data and
relay data from other nodes.

34 | Page
NETWORK
Figure 18 Mesh Topology (Ashtari, 2023)

Full mesh networks, wherein each node is linked to every other node, are normally reserved
for important networks as they are exceedingly costly to create and complex to maintain. IT
teams also have the option of constructing partial mesh networks, wherein all the nodes are
not linked. This is less cost-intensive and easier to construct; but it does not have all the
advantages of a complete mesh network.
Table 17 Mesh topology (Ashtari, 2023)

Advantage Disadvantage

Extremely robust and redundant, as any nodeRequires many cables and input/output (I/O)
or link failure, affects a minimum number of ports
endpoints
Highly efficient data transfer due to dedicatedTime-consuming installation and maintenance
point-to-point links for all devices

35 | Page
NETWORK
Robust security and privacy Cost-intensive

Swift fault identification Installation and configuration are difficult.

Communication is very fast between theThe cost of maintenance is high.


nodes.
Fault finding is straightforward and easy. The cost of cables is high as bulk wiring is
required, hence suitable for a smaller number
of devices.

1.4.1.7 Hybrid Topology

Figure 19 Hybrid Topology (Ashtari, 2023)

36 | Page
NETWORK
The two most widely utilized hybrid topologies are the star-bus and star-bus. In the former,
the center hubs of numerous star topologies are linked using a ring topology. In the latter,
the hubs of several star topologies are connected using a bus topology.

Advantage and Disadvantage of Hybrid Topology


Table 18 Hybrid topology (Ashtari, 2023)

Advantage Disadvantage

Combines the advantages of multipleDepending on the configuration, such a


topologies network can be resource-intensive to create
and maintain
Can be tailor-made to suit specific network Potentially complicated design that could
requirements make troubleshooting difficult
Highly flexible and scalable if implemented Requires compatible cabling and other
correctly hardware for inter-topology links
This topology is very flexible. Hubs used in this topology are very
expensive.
The size of the network can be easilyIt is challenging to design the architecture of
expanded by adding new devices. the Hybrid Network.

1.4.2 Importance of Network topology


- Impacts on how a network operates.
When a good network architecture is implemented, it assures that the network will run at
optimum efficiency with enhanced data transmission rates.

- Helps IT administrators comprehend how the whole network infrastructure is


structured.
Network topology tool helps the IT operations staff to better see the network and
comprehend the relationships of each device.

- Enables spatial visualization of a dispersed network.

37 | Page
NETWORK
This guarantees that an IT admin can properly map the organization's network stretching
across many regions.

- Explains how devices and apps affect others in the network.


Knowing the device dependency through network topology helps detect what device or
application could be influencing other devices and generating network bottlenecks.

- Helps detect and fix systemwide faults.


With the correct network topology map in place, diagnosis of issues, troubleshooting, and
network resource allocation becomes easy.

1.5 Common Networking principals

Effective networking demands a focus on essential factors that assure scalability,


dependability, security, performance, manageability, interoperability, standards-based
implementation, and cost-effectiveness. Scalability allows networks to develop and adapt to
changing organizational demands, while dependability assures constant access to resources
and services. Security precautions safeguard data and resources from unwanted access or
misuse, while performance considerations assist assure timely and reliable access.
Manageability is critical for administrators to monitor and manage networks quickly, while
interoperability guarantees that diverse network components can operate together effortlessly.
Standards-based implementation provides interoperability with other systems, while cost-
effectiveness ensures that networks can deliver the appropriate degree of performance,
dependability, and security while keeping prices acceptable. By concentrating on these
concepts, network designers may construct systems that fit the goals of the company while
offering a safe, dependable, and efficient computing environment.

1.6 Network protocol

A protocol is a collection of rules that are used in networking to organize and handle data.
Network protocols act similarly to a universal language for computers. Even though the

38 | Page
NETWORK
software and hardware used by the computers in a network may be substantially different,
protocols allow them to interact with one another.
Standardized protocols, like a common language that two people from different regions of
the world can use even if they don't understand each other's native tongues, are like a
common language that computers can use. Like how the United Nations employs its six
official languages to permit communication among its officials from all over the world, two
computers that use the Internet Protocol (IP) may interact with each other. But, if one
computer utilizes IP and the other does not, they will be unable to interact. (Keary, 2023)

1.6.1 Network protocol Types


1. Transmission Control Protocol (TCP) A.K.A. Internet Protocol (IP)
TCP is a protocol that turns data into packets so that it may be transferred between a server
and a client. Organizations use TCP to transport material such as files, text, photos, and
emails because it assures that the packets will be sent precisely and in the correct sequence.
(Keary, 2023)

It’s worth mentioning that TCP will establish a connection between the origin and the
destination devices before attempting to send data. This three-way handshake is detailed
shortly below:
- The client or web browser sends the destination server a Synchronize Sequence
Number (SYN).
- The destination server sends an acknowledgement message known as SYN-ACK.
- The original device receives the SYN-ACK message and creates an ACK
acknowledgement message, which finalizes the connection.

2. User Datagram Protocol (UDP)


UDP is a communication protocol that’s meant to transfer packets from one device to
another on a network. Many companies employ UDP as an alternative to TCP because it
offers greater transmission speeds.

39 | Page
NETWORK
While this improvement in speed comes at the sacrifice of accuracy, UDP better supports
video/audio streaming services, online gaming, or voice-over-internet-protocol (VoIP)
conversations, which can manage some degree of data loss.

Another significant distinction between the two is that UDP won’t attempt to establish a
connection before passing packets on to the destination. At the same time, it also doesn’t
ensure the transmission of data to the other device. (Keary, 2023)

3. File Transfer Protocol (FTP)


FTP is a network protocol that’s used to transmit files from one device to another via an
unencrypted TCP/IP connection. With FTP, a user may start up a web browser or FTP
software such as FileZilla or FTP Voyager and transmit up to 2GB at once.

Many firms utilize FTP because of its capacity to deliver huge files or much data at once in
a method that’s fast and efficient. Unfortunately, this efficiency comes at the cost of
security as FTP sends all data in plain text.

For this reason, many businesses elect to adopt a secure variant of FTP called File Transfer
Protocol Secure Sockets Layer (FTPS), which works the same but employs SSL encryption
to hide the sent data. (Keary, 2023)

4. Hypertext Transfer Protocol (HTTP)


HTTP is a communication protocol that enables systems to communicate on the World
Wide Web. With HTTP, a client will submit a hypertext message request to a web server
requesting access to the resources needed to load a web page. (Keary, 2023)

The server holding the material will then react and enable the client to load all the required
text, pictures and videos included on the page. HTTP’s request-response cycle is illustrated
shortly below:

- The client sends an HTTP request message to the web server to seek access to the
web page content.
- The web server processes the request message.
40 | Page
NETWORK
- The web server delivers a response message that includes the requested content or
web page.
- The client gets the message and loads the material in the web browser for the end
user to view.
There is also an encrypted version of HTTP called HTTPS, which employs SSL/TLS
encryption to encrypt requests and answers so they can’t be seen by third parties.

5. Simple Network Management Protocol (SNMP)


SNMP is an application layer protocol that’s used to collect management information from
devices such as computers, routers, switchers, firewalls, and printers.

Network monitoring tools commonly utilize SNMP to monitor the performance and
condition of devices throughout a network in real time.

The protocol operates with an SNMP manager or software client issuing SNMP GET
requests to SNMP-enabled devices.

SNMP-enabled devices each have a local SNMP agent that gathers performance data from
the device and will pass this information to the SNMP manager so that an administrator may
receive a top-down view of performance and status. (Keary, 2023)

6. Internet Control Message Protocol (ICMP)


ICMP is a network protocol that devices utilize to notify about connection difficulties and
mistakes. ICMP can warn devices that a forwarded message was too lengthy or arrived out
of order and will deliver an error message requesting that the device resend the content.

Troubleshooting tools such as Ping make ICMP queries to a device and measure the round-
trip time, or the time it takes for the device to respond to the request. The degree of delay in
the answer may then be used to measure the quality of the connection.

Other tools such as traceroute employ ICMP to debug and assess the efficiency of network
pathways, showing the user how much time, it takes to travel from one device to another.

41 | Page
NETWORK
Sometimes, hackers would utilize the protocol as part of an ICMP flood attack where they
attempt to overload a server with bogus ICMP queries to divert its computational resources
away from the end user. (Keary, 2023)

7. Post Office Protocol (POP)


POP3 is a network protocol that enables a server to fetch emails from a remote server and
download them to the local device. Whenever the client connects to the server via TCP, it
automatically downloads all the new messages to it, making them accessible to the user both
online and off-line.

Email platforms like Microsoft Outlook may utilize POP3 to gather email messages from
distant servers over TCP/IP so that they’re available off-line.

Under the default configuration, all emails are erased from the server automatically once the
download is complete, but the user may alternatively enable it to store emails on the server
for a particular time. (Keary, 2023)

8. Internet Message Access Protocol (IMAP)


IMAP is another protocol that’s utilized for retrieving emails. With IMAP, if a user clicks
on an email, it isn’t downloaded or saved on their computer locally but remains on the
distant server, enabling the user to check their email from numerous devices.

The key difference between IMAP and POP3 is that the latter only allows users to download
and read emails locally on the same computer. IMAP also doesn’t automatically erase
emails from the server. (Keary, 2023)

9. Simple Mail Transfer Protocol (SMTP)


SMTP is a mail delivery technology that allows a device to send and distribute email to a
distant endpoint via a TCP connection. Many providers like Microsoft Outlook, Gmail and
Yahoo Mail utilize SMTP to relay messages to distant servers.

42 | Page
NETWORK
Briefly, a firm will first build an SMTP server, which employees may connect to and
communicate with using a mail user agent (MUA) or email client such as Gmail. Through
this connection, they may deliver emails to the SMTP server and other users.

Unlike POP3, SMTP cannot retrieve emails from a mailbox, and unlike POP3, it doesn’t
immediately destroy emails. (Keary, 2023)

1.7 TCP/IP and OSI model

1.7.1 OSI model


The Open Systems Interconnection (OSI) model specifies seven levels that computer
systems employ to interact over a network. It was the first standard paradigm for network
communications, adopted by all major computer and telecommunication corporations in the
early 1980s.

The present Internet is not built on OSI, but on the simpler TCP/IP architecture. However,
the OSI 7-layer model is still extensively used, as it helps visualize and describe how
networks operate, and helps isolate and diagnose networking problems.

OSI was introduced in 1983 by representatives of the main computer and telecom firms and
was accepted by ISO as an international standard in 1984. (LearningCenter, 2023)

43 | Page
NETWORK
Figure 20 OSI Model (Woojae, 2023)

7. Application Layer
The application layer is utilized by end-user applications such as web browsers and email
programs. It offers protocols that allow software to exchange and receive information and
deliver useful facts to users. A few examples of application layer protocols include the
Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Post Office Protocol
(POP), Simple Mail Transfer Protocol (SMTP), and Domain Name System (DNS).

6. Presentation Layer
The presentation layer prepares data for the application layer. It outlines how two devices
should encode, encrypt, and compress data so it is received appropriately on the other end.
The presentation layer accepts any data transmitted by the application layer and prepares it
for transmission across the session layer.

5. Session Layer
The session layer generates communication channels, called sessions, between devices. It is
responsible for starting sessions, ensuring they remain open and functional while data is
being exchanged, and terminating them after communication finishes. The session layer can
also define checkpoints during a data transmission—if the session is stopped, devices can
continue data transfer from the latest checkpoint.

44 | Page
NETWORK
4. Transport Layer
The transport layer takes data sent at the session layer and divides it into “segments” on the
sending end. them is responsible for reassembling the segments on the receiving end,
putting them back into data that can be utilized by the session layer. The transport layer
carries out flow control, providing data at a pace that matches the connection speed of the
receiving device, and error control, verifying if data was received erroneously and if not,
requesting it again.

3. Network Layer
The network layer has two basic roles. One is splitting apart segments into network packets
and reassembling the packets on the receiving end. The other is routing packets by
identifying the optimum path over a physical network. The network layer employs network
addresses (usually Internet Protocol addresses) to route packets to a target node.

2. Data Link Layer


The data link layer creates and ends a connection between two physically connected nodes
in a network. It splits up packets into frames and transmits them from source to destination.
This layer is made of two parts—Logical Link Control (LLC), which detects network
protocols, conducts error checking, and synchronizes frames, and Media Access Control
(MAC) which utilizes MAC addresses to link devices and specify rights to transmit and
receive data.

1. Physical Layer
The physical layer is responsible for the physical cable or wireless connection between
network nodes. It defines the connection, the electrical cable or wireless technology
connecting the devices, and is responsible for transmission of the raw data, which is just a
series of 0s and 1s, while taking care of bit rate regulation.

1.7.1.1 Characteristics of OSI model


- Only when specified degrees of abstraction are essential should a layer be
established.

45 | Page
NETWORK
- Each layer's role should be chosen in line with processes that are internationally
standardized.
- To avoid various functions from being placed on the same layer, there should be
several layers. Yet, it should also be small enough to preclude unduly complicated
development.
- To carry out core operations, each layer of the OSI model is dependent on the layer
behind it. Every lawyer should be able to deliver services to the one above it.
- If modifications are made to one layer, the other layers should not need to be
modified.

1.7.2 TCP/IP Model


The OSI Model we have looked at is only a reference/logical model. It was created to define
the operations of the communication system by splitting the communication method into
smaller and simpler components.

TCP/IP was created and developed by the Department of Defense (DoD) in the 1960s and is
based on standard protocols. It stands for Transmission Control Protocol/Internet Protocol.
The TCP/IP model is a condensed version of the OSI model. It comprises four layers, unlike
the seven layers of the OSI model.

The number of layers is sometimes referred to as five or four. Here In this essay, we’ll cover
five levels. The Physical Layer and Data Link Layer are referred to as one single layer as
the ‘Physical Layer’ or ‘Network Interface Layer’ in the 4-layer reference.
(GeeksForGekks, 2023)

46 | Page
NETWORK
Figure 21 TCP/IP layer (LearnLoner, 2023)

1.7.2.1 Characteristics TCP/IP model


- Support for a flexible architecture
- It is simple to add new systems to a network.
- Network integrity in TCP/IP is maintained until both the source and destination
computers are functioning.
- TCP is a connection-oriented protocol.
- TCP offers reliability and ensures that data that enters out of order will be placed back
in order.
- TCP allows you to set flow control so that the sender never overwhelms the recipient
with data.

1.7.3 Differences between the OSI and TCP/IP model


Table 19 Differences Between the OSI and TCP/IP model (GeeksForGeeks, 2023)

Parameter OSI Model TCP/IP Model

Layers It has 7 layers. It has 4 layers.

47 | Page
NETWORK
Usage It is low in usage. It is mostly used.

Approach It is vertically approached. It is horizontally approached.

Delivery Delivery of the package isDelivery of the package is not


guaranteed in OSI Model. guaranteed in TCP/IP Model.

Approach It is vertically approached. It is horizontally approached.

Replacement Replacement of tools and changes Replacing the tools is not easy as it is in
can easily be done in this model. OSI Model.

Reliability It is less reliable than TCP/IPIt is more reliable than OSI Model.
Model.

1.8 Discuss suitable network system for Matara branch.

1.8.1 Suitable network model


A client-server model would be suited for the Matara branch since it allows centralized
administration of network resources and data. In this paradigm, clients (users) access
resources and data from a centralized server. This provides for improved security, easier
management, and more effective use of resources.

1.8.2 Suitable network Types


A LAN would be perfect for the Matara branch since it is a network that links computers and
gadgets inside a local area, such as an office building or campus. It enables for exchange of
resources and data, which is crucial for the many departments in the branch. WLAN would
be excellent for the customer services area and Sales & Marketing team since it enables
wireless access to the network and allows for greater flexibility in terms of device placement
and mobility.
An appropriate network type to connect the Colombo main branch to Matara branch, would
be a Wide Area Network (WAN). A WAN is a network that stretches across a vast
geographic region, linking numerous LANs together.

48 | Page
NETWORK
A WAN can employ several technologies such as leased lines, dedicated circuits, or the
Internet to create communication between the main branch and other sites. The utilization of
a WAN enables for easy communication and data exchange between disparate sites, giving a
unified network experience for all users.

1.8.3 Suitable topology to above network type


A star topology is suitable for the LAN network since it links all the devices to a single hub
or switch, which makes it easier to monitor and troubleshoot the network. A mesh
architecture is excellent for WLAN since it provides higher coverage and redundancy in
case of device failure. In a mesh topology, every node is linked to every other node, which
ensures that if one node fails, the others may still interact with each other.

1.8.4 Suitable IEEE standards for above LAN and WLAN network type
For LAN
EEE 802.3, popularly known as Ethernet, is a widely used standard for wired LAN
networks. It defines the physical layer and the data connection layer of the network protocol
stack. Ethernet employs CSMA/CD (Carrier Sense Multiple Access with Collision
Detection) as its medium access control (MAC) technique to regulate network traffic and
minimize data collisions. The standard provides several data transfer speeds, such as 10
Mbps, 100 Mbps, 1 Gbps, and 10 Gbps, and different types of cable, such as twisted pair,
fiber optic, and coaxial. Ethernet is compatible with most network equipment, such as
switches, routers, and network interface cards (NICs), and is used for connecting PCs,
servers, printers, and other network devices inside a LAN network.

For WLAN
IEEE 802.11, popularly known as Wi-Fi, is a widely used standard for wireless LAN
networks. It defines the physical layer and the media access control (MAC) layer of the
network protocol stack. Wi-Fi employs several frequency bands, such as 2.4 GHz and 5
GHz, and different modulation methods, such as Frequency Shift Keying (FSK) and
49 | Page
NETWORK
Quadrature Amplitude Modulation (QAM), to transport data wirelessly. The standard
provides several data transmission speeds, such as 1 Mbps, 2 Mbps, 11 Mbps, 54 Mbps, and
higher, and different methods of wireless security, such as WEP, WPA, and WPA2. Wi-Fi
is compatible with most wireless devices, such as laptops, smartphones, tablets, and IoT
devices, and is used for enabling wireless connection to the network inside a WLAN
network.

1.8.5 Suitable network protocol to Matara branch


TCP/IP (Transmission Control Protocol/Internet Protocol) is suited for the Matara branch
since it is a widely used network protocol that allows dependable and secure data
communication between devices. It is compatible with most network devices and software
applications and is extensively used in LAN and WLAN networks. TCP/IP guarantees that
data is sent properly and securely between the different departments and the head office.

50 | Page
NETWORK
2 Task 02

2.1 Network devices

In simple words, a network device is a physical item that is used to link other physical
devices on a network. In certain circumstances, its duty is to merely forward packets of
information to a destination. In other circumstances, it can be to function as a translator or
to filter suspect network traffic.

2.1.1 Types of network devices

2.1.1.1 Hubs
Hubs are used to connect numerous network devices together. They may be used to transfer
both digital and analogy information. Digital information is conveyed in packets, whereas
analogy information is delivered as a signal. Hubs also operate as a repeater, which
enhances signals that have degraded after being carried across a long distance. Hubs
function at the Physical layer of the Open Systems Interconnection (OSI) paradigm.

Figure 22 Hubs (Labs, 2023)

Advantage of Hub:
- Connectivity: The major role of the hub is to let clients to attach to a network in order
that they will exchange and hold discussions. For this reason, hubs utilize network
protocol analyser.

51 | Page
NETWORK
- Performance: Hub is understood for having very minimal amount of performance
effects on the network. This is generally because it runs utilizing a broadcast
paradigm which seldom impacts the network.

- Cost: Comparing to switches, hubs are extremely affordable. Basically, owing to its
sort of simplicity. Therefore, they will enable you to save heaps of money. And,
thanks to their items they are extensively available inside the market.

- Device Support: Hubs may link multiple forms of media all at once with a single
hub. Albeit the media wish to function at distinct speeds they will be wont to back
them.

- Area Coverage: Area coverage of a network is constrained to a given distance. Hub


extends the space of the network such communication is created simple.

Disadvantage of Hub:
- Collision Domain: The function of the collision domain and again transmission of
packet does not influence it raises more chances of collision in between domains.

- Full-Duplex Mode: Hubs cannot communicate completely duplex mode; it can only
work in half-duplex mode. Half-duplex mode, in essence, meaning data are typically
transferred just one instance at a given time. Therefore, the hub must continually swap
its modes.

- Specification: Hubs cannot handle networks that are vast like a token ring. This is
frequently because hubs must distribute data across all the devices inside the network.

- Network Traffic: As the attachment was received in the packet therefore it cannot
cut traffic. Hence, hubs create a large level of network traffic.

- Bandwidth Wastage: Hubs cannot supply dedicated bandwidth for every device, it is
to share them. When delivering huge bits of information all the bandwidths are going
to be taken by the two computers leaving other computers with sluggish network.
52 | Page
NETWORK
2.1.1.2 Switch
A switch is a multiport network device whose aim is to increase network efficiency and
improve communication between hubs, routers, and other network devices. Switches are
sophisticated devices that acquire information from incoming packets to forward them to
the right destination. Switches often have minimal knowledge about the other nodes on the
network.

Figure 23 Switch (Labs, 2023)

Advantage of Switch:
- They simplify network management by centralizing the management to the switch.
- The switch includes extra security measures and may be used to implement VLAN
which isolates multiple ports on the same switch.
- By employing a switch each device has a dedicated connection which decreases
packet collision difficulties. This enhances the speed and general performance of the
network.
- A network constructed using a switch is simple to grow since the number of devices
that may be connected is simply limited to the number of ports on the switch.

Disadvantage of Switch:
- The switches are expensive to purchase.
- Networks are usually used to link devices inside the same network. So, they are
confined solely to LAN networks.
- Advanced switches like managed are complicated to configure and they require an
expert.
- It establishes a single point of failure. When the switch fails the whole network fails.

53 | Page
NETWORK
- Switches require frequent maintenance to keep them running effectively.

2.1.1.3 Router
The fundamental job of the router is to forward packets of information to their destinations.
Routers are more sophisticated than hubs or switches as they keep information about the
other network devices they are linked to. Routers can play an essential role in network
security since they can be configured to operate as packet-filtering firewalls and reference
access control lists (ACLs) while forwarding packets. In addition to filtering approved
network traffic, they also are used to partition networks into subnetworks, thereby
permitting a zero-trust architecture.

Figure 24 Router (Labs, 2023)

Advantage of Router:

- Relationship: The basic capability of switch is to separate a single organization


relationship across numerous machines. Utilizing this distinct client may be linked
with the web so in general profitability can be enhanced. Other than that, switches
likewise powers to join distinct organization structures and medias.

- Security: Having a Routers is certainly an initial stage towards making sure


regarding an organization association. Since connecting with the web
straightforwardly using a modem puts your PC to assortment of security risks.
Subsequently, switches can be utilized as a transition between 2 organizations so the

54 | Page
NETWORK
climate is secure somewhat. While this isn’t a swap for an antivirus or a firewall, it
is laudable.
- Dynamic Routing: For increasing internetwork correspondence, the Routers
employ dynamic directing techniques. Dynamic directing selects the greatest route
available for the internetwork. And moreover, it produces broadcast and effect
zones. This would ultimately be able to minimize the organizational traffic.

- Bundle Filtering: Different administrations of Routers contain bundle exchanging


and parcel separating Routers channel the organization using a lot of separate rules.
As per this norm the packages are either authorized or gone through.

- Reinforcement Plan: On the off chance that if one of the outer organization
segments ends up falling flat, switches employ elective parts for staying away from
troubles in directing rush hour congestion. Associations notably to a big extent take
utilization of this to control traffic effectively.

- NAT Usage: Routers make use of Network Address Translation (NAT). NAT
Routers can share the association by employing one public IP address and
percentage of UDP ports. Additionally, it is essentially inconceivable for major
firms to interact with the web without NAT.

- Reconciliations: Routers may generally be coordinated with modems. This ensures


that Wireless Access Points are offered to form tiny organizations.

Disadvantage of Router:
- Speed: In contrast to repeaters and scaffolds, Routers don’t just examine 2 tiers of
information’s. It entirely explores information from physical to arrange layer.
Subsequently the association might turn out to be modest. Also utilizing switches,
multiple PCs might share the organization for which the switch goes through a
scenario known as “Connection Wait”. This possibly eases back the connection more.

55 | Page
NETWORK
- Cost Routers: Are pricey more than some other systems administration devices. This
comprises center point, extension, and security. Accordingly, Routers are not typically
the greatest choice regarding cost.
- Similarity: There is also a similarity difficulty for the Routers specifically for the
5GHz recurrence. Except if your PC and its connections do uphold designs of 5GHz
recurrence you can’t acquire its advantages. Subsequently, you must consider opting
for a less costly Routers.

- Unwavering quality: Not all the time switches are trustworthy. Still some cutting-
edge gadgets employ a 2.4GHz spectrum which often becomes disconnected. Most
now and then these forms of separations are doable by those living in pads and
condominiums.

- Usage: An ordinary Routers wants heaps of starting arrangements and NAT to setup.
And in any case, for the easiest association there should be a private IP address doled
out. On the off chance that there are more administrations empowered it demands
extra designs also. This essentially produces extra difficulties in the arrangement.

- Data transmission Shortage: Dynamic directing approaches are employed by the


switches for the correspondence functions. This possibly generates added
organizational overheads. Systems administration overheads consume a big measure
of transmission capabilities bringing about transfer speed limitations. Moreover, for
keeping up steering tables, switches frequently update on the organization. This also
can affect data transmission capacity consumption.

- Convention Support: Routers only conduct their jobs employing routable


conventions. A convention that is routable might supply spectacular IP deliveries to
the devices thus it very well may be recognized across networks.

2.1.1.4 Bridge
A bridge is used to connect hosts or network segments together. As with routers, they may
be used to split bigger networks into smaller ones, by sitting between network devices and
managing the flow of data. A bridge also has the capacity to filter packets of data, known as

56 | Page
NETWORK
frames, before they are forwarded. Bridges are not as common as they once were, and are
now being replaced by switches, which give superior functionality.

Figure 25 Bridge (Labs, 2023)

Advantage of Bridge:
- Improved Network Performance: Bridges can enhance network performance by
lowering network congestion and enhancing data transmission speeds, resulting in
higher network speeds and reduced latency.

- Better Network Security: Bridges can assist in improving network security by


providing logical isolation between various network segments, limiting unwanted
access, and minimizing the risk of network assaults.

- Flexible Network Design: Bridges enable flexible network design by permitting the
connection of numerous network technologies and kinds, including Ethernet, Token
Ring, and FDDI, among others.

- straightforward to Install and Configure: Bridges are relatively straightforward to


install and configure, needing minimum configuration and maintenance, making
them a great choice for small to medium-sized networks.

Disadvantage of Bridge:
- Limited Scalability: Bridges may not be scalable in bigger networks, as the number
of devices and network segments rises, which can lead to network congestion and
performance deterioration.

57 | Page
NETWORK
- Single Point of Failure: Bridges can be a single point of failure in the network, and
if they fail, it can cause network outage until the bridge is rebuilt.

- Restricted Functionality: Bridges have restricted functionality compared to other


network devices, such as routers and switches, and may not be suited for all network
designs and requirements.

- Higher Cost: Bridges can be more expensive compared to other network devices,
such as hubs, which might make them less cost-effective for smaller networks.

2.1.1.5 Gateway
A gateway device is used to improve interoperability between different technologies such as
Open System Interconnection (OSI) and Transmission Control Protocol/Internet Protocol
(TCP/IP). In other words, they translate each other’s communications. You may conceive of a
gateway as a router, but with extra translation capability.

Figure 26 Gateway (Labs, 2023)

Advantage of Gateway
- It is feasible through gateways that smart items rely on fog computing for data transit
between user and server.
- Gateways give a solution for the practicality of smart objects without lowering the
intelligence of things as there is no need to transmit the intelligence of objects on the
server-side thereby retaining performance and accessibility.

58 | Page
NETWORK
- Gateways facilitate the usage of smart objects energy efficiently as data transfers do
not rely on the smart device and transfers between devices and gateways are feasible
using low energy choices like BLE, ZigBee, or Bluetooth.
- Gateways open a new technology to the world, i.e., fog computing.
- Gateways might give an extra layer of protection to the data if specific changes are
implemented to them.
- Gateways make data encryption, data analysis, and handling feasible so that a new
phase of smart things is available to consumers.
- Gateways push industry to develop and make it feasible for industries to expand more.
- Gateways lead industry and build up an employment chance. As if development to
gateways is done there are more individuals thinking to make gateways more
practicable and overcome constraints.

Disadvantage of Gateway
- Its implementation is difficult and costly.
- It is hard to manage.
- It causes time delays because the conversion of data according to the network takes
time.
- Failure of the gateway can cause the failure of connection with other networks.

2.1.1.6 Modem
A modem, which is short for “modulators-demodulators”, is a piece of network gear that is
used to transform digital communications into analog signals, to transport them over analog
telephone lines. When the signals arrive at the destination, another modem will transform
the analog signals back to a digital version.

59 | Page
NETWORK
Figure 27 Modem (Labs, 2023)

Advantage of Modem
- The modem is more helpful in connecting LANs with the internet.
- Modem speed depends on the cost, the more is the cost more powerful the modem.
- A modem is the most probably used in data communication roadway.
- A modem converts digital signals into analog signals.

Disadvantage of Modem
- The modem lacks in providing traffic maintenance.
- It is just an interface between LAN and the Internet.
- It can make the computer vulnerable to hackers and malware.

2.1.1.7 Repeater
Repeaters are sometimes also known as “Signal Booster”. The main function of the repeater
is to regenerate an incoming signal from the sender before retransmitting it to the receiver.
The layer at which it operates is the physical layer of the OSI model.

60 | Page
NETWORK
Figure 28 Repeater (Labs, 2023)

This layer is principally responsible for the actual transmission and receipt of the data across
the physical media such as cables or fiber optics. A repeater can expand the range of the
network by enhancing the signal and lowering the inaccuracy and loss of data. Apart from
that, repeaters are also responsible for transforming the data between other network
channels, such as optical, wireless, or electrical signals.

Advantage of Repeaters:
- Cost: The cost of repeaters is cheaper than compared to the other network. They’re
going to be acquired for little expense. However, that does not conceal the actual
truth that it demands other sorts of expenses. One example is the consumption of
power.

- Network Performance: Repeaters don’t always depend on a processing overhead.


So that’s why the performance of the system is also impaired.

- Enhance Signal: Whenever a computer and a router are located far away, it’ll end
in weak signals. Repeater has the capacity to amplify signals so that they are often
retransmitted considerably stronger with higher performance.
61 | Page
NETWORK
- Network Extend: Other than improving signals, repeaters have the capacity to
extend the length of the transmission. It means it may expand the complete distance
covered by the network although it is a wired or a wireless medium.

- Physical Barriers: Physical obstacles may lead to the lowering of the overall
signals of wireless communication. Employing a wireless repeater, these effects are
typically decreased so that there will be an assurance that signals are getting to be
supplied to the computers.

- Media Support: In repeaters, networks are commonly connected for receipt and
transmission via various physical media. The main popular form of media is that the
cables.

Disadvantages of Repeaters
- Network Traffic: Repeaters are unable to separate network traffic. Hence, they lack
the potential to relieve congestion also as network traffic.

- Specification: Repeaters are also unable to join networks of various designs. For this
reason, either a gateway or a router is necessary.

- Number of Repeaters: There is a restriction on the number of repeaters that may be


deployed on a given network. If more of them are deployed, it’ll make sounds on the
wire and raise the possibilities of packet collision.

- Network Segmentation: Repeaters don’t have the potential to segment the network.
It cannot establish distinct traffic from one cable to a special.

- Collision Domain: The Repeaters cannot distinguish the devices as all the
information is delivered to numerous domains. Moreover, repeaters cannot distinguish
if it is a neighborhood of the same collision domain.

62 | Page
NETWORK
- Bandwidth Usage: This repeater sends the signals in both the ways between the
router and the PC. After the steady connection, the bandwidth gets half.

2.1.1.8 Access Point


Access points are network devices that usually operate at the data link layer (Layer II) of the
OSI model and are mainly used to bridge the wired and wireless network. In simple terms, it
is a device that allows wireless-capable devices to connect to a wired network. Here, the data
can be transmitted and received using radio waves or infrared signals.

Figure 29 Access Point (Labs, 2023)

Apart from this, an access point may also be deployed to expand the range and power of
wireless transmissions. Most of the time, it is utilized in large businesses or public venues
that require wireless connectivity to numerous people or devices. Further, it may handle
several wireless standards and protocols, such as Wi-Fi, Bluetooth, or IoT.

Access Points are classified into 3 categories. These are:


- Standalone access point
- Multifunction access point
- Controlled access point

Advantage of Access Point


1. More User Access:

63 | Page
NETWORK
- Normally the wireless router permits 10 – 20 people or devices to access the
network. While WAP permits 50 – 100 or more users or devices to access the
network.
- The WAP has a greater ability to send and receive signals which permits heavy
usage.

2. Broader Transmission Range:


- A wireless router signals cover up to a dozen or 10 -12 meters. However, a wireless
access point spans more than 100 - 300 meters.
- The broad range is ideal for the huge cover offices or buildings for the major
enterprises. With this wireless access point, a user may effortlessly wander that
network.

3. Flexible Networking:
- It is known that wireless networking, except in households, frequently requires
several wireless devices and varied networking patterns inserted dependent on the
surroundings and requirements of the business sites.

4. Mobility:
- Users may roam freely while still being connected to the network.

Disadvantage of Access point


1. High cost:
- A wireless AP is a little bit expensive because the scale of enterprises the wireless
scale network is larger, the more WAPs are needed the more cost will increase. So,
the enterprise has the priority to control the cost which leads many users to be
reluctant to use WAP but instead of this, they end up using home routers with the
lowest performances.

2. Poor stability:
- As wireless networks use air as a transmission medium, so the network stability is
poor and slower in WAP as compared to the cable network because the transmission

64 | Page
NETWORK
medium in wired network is cable. Especially in WLAN, there are more devices still
it is slow, and a cable network is faster and more stable than a wireless network.
- The wireless signals are blocked due to certain obstacles such as heavy rain, great
walls, gates, storms, heavy wind, large gatherings of human beings, etc.
- The signal strength also depends upon the location where the wireless network is
implanted.

3. Less Secure:
- As compared to the wired network it is less secure because the user is using radio
waves for transmission and someone or a hacker on that network could sniff the
traffic.

4. Limited range:
- The range of WAP can be affected by many factors like physical barriers,
interference with other wireless devices, and environmental conditions.

5. Bandwidth limitations:
- It can be affected by bandwidth limitations, and lead to reduced speed and reliability
of the network.

2.1.1.9 NIC
NIC stands for Network Interface Card and works at the data link layer (Layer II) of the OSI
architecture. It is a physical component that is responsible for enabling a device to connect to
a network. A NIC also contains one or more ports that allow different types of cables or
wireless signals to connect to the network.

65 | Page
NETWORK
Figure 30 Network Interface Card (Labs, 2023)

NIC further provides a physical interface for data transmission and reception purposes.
Apart from that, it also has a unique MAC address that identifies the device in a network.

Some of the major tasks performed by NIC are data transfer, network traffic engineering,
and interrupt support.
Advantage of NIC
- The information move is exceptionally dependable among the hubs.
- Enormous measure of information can be shared or moved between numerous
clients.
- The web speed for correspondence making conceivable is normally high in
gigabytes.
- By using numerous ports of NIC cards that are given, a few peripherals can get
stopped.
- The correspondence speed utilizing the Internet is generally high in Gigabytes.
- Numerous fringe gadgets can be associated utilizing numerous ports of NIC cards.
- Mass information can be divided between numerous clients.

Disadvantage of NIC
- Badly designed if there should arise an occurrence of wired link NIC, as it isn’t
convenient like a remote switch.
- The design should be legitimate for better correspondence.

66 | Page
NETWORK
- Information is unstable.
- By using numerous ports of NIC cards that are given, a few peripherals can get
stopped.
- Security is minimally low.
- To make fine correspondence the arrangement should be exact.
- At the point when wired links are used in Network Interface Card transportability
isn’t economical and cause inconveniences.

2.1.1.10 Firewall
A firewall is an intermediate device that functions at various levels of the OSI Model
depending on its nature. It can be either hardware or software, and its main goal is to protect
the network from any unwanted access or harmful assaults by enforcing regulations or rules.

Figure 31 Firewall (Labs, 2023)

Now, the question that arises is how these attacks can be stopped. All malicious activities
can be controlled via a firewall as it can block or allow packets based on their source,
destination address, port number, or protocol type.

Some of the security functions carried out by firewalls are:


- Encryption
- Authentication
- Logging
- Auditing

There are various types of firewalls. Some of these are:


- Proxy firewall
- Stateful inspection firewall

67 | Page
NETWORK
- Unified threat management (UTM) firewall
- Next-generation firewall (NGFW)
- Threat-focused NGFW
These are the various networking devices mainly used in Computer Networks.

Advantage of Firewall
- Protection against unauthorized access: Firewalls may be set up to block
incoming traffic from certain IP addresses or networks, preventing hackers or other
bad actors from readily accessing a network or system. Protection from unwanted
access.

- Prevention of malware and other threats: Malware and other threat prevention:
Firewalls may be set up to block traffic associated with known malware or other
security problems, aiding in the defense against these sorts of assaults.

- Control of network access: By limiting access to designated persons or groups for


servers or apps, firewalls may be used to restrict access to network resources or
services.

- Monitoring of network activity: Firewalls may be set up to record and keep track
of all network activity. This information is vital for spotting and looking into
security risks and other forms of suspicious conduct.

- Regulation compliance: Many businesses are constrained by rules that necessitate


the employment of firewalls or other security measures. Organizations can comply
with these requirements and avert any fines or penalties by deploying a firewall.

- Network segmentation: By utilizing firewalls to break up a huge network into


smaller subnets, the attack surface is lowered, and the security level is enhanced.

Disadvantage of Firewall

68 | Page
NETWORK
- Complexity: Setting up and keeping up a firewall may be time-consuming and
complicated, especially for bigger networks or enterprises with a broad range of
users and devices.
- Limited Visibility: Firewalls may not be able to identify or halt security hazards
that operate at other levels, such as the application or endpoint level, because they
can only view and regulate traffic at the network level.
- False feeling of security: Some firms may place an undue degree of trust on their
firewall and overlook other critical security measures like endpoint security or
intrusion detection systems.
- Limited adaptability: Because firewalls are usually rule-based, they might not be
able to respond to novel security threats.
- Performance impact: Network performance can be greatly impacted by firewalls,
particularly if they are set up to monitor or control a lot of traffic.

2.1.2 Suitable network devices to above scenario


Router: In the context of the Matara branch, a router can be utilized to connect the branch
to the Head Office and offer inter-departmental connection inside the branch. A suitable
router for this purpose may be a Cisco ISR (Integrated Services Router) or a Juniper SRX
(Services Gateway).
Switch: In the context of the Matara branch, switches can be used to link devices inside
each department, including desktop computers, laptops, printers, and servers. A good switch
for this purpose may be a Cisco Catalyst or a Juniper EX Series switch.

2.2 Server Types

1. Web server:
An open-source web server is used for accessing the world wide web with public domain
software. These servers connect stored information from an internet website to your own
computer. Web servers hold information for the internet that is retrieved using "HTTP"
code and supplied to your web browser. This is one of the most extensively used types of
servers.

69 | Page
NETWORK
2. Proxy server:
Proxy servers operate as a bridge between a host server and a client server. A proxy
transfers data from a website to your computer IP address after it goes via the proxy's
server. This method adds a layer of security as the information is requested then sent from
the source to the proxy server and never straight from a client to another user. A proxy
server can block out numerous hazardous internet entities.

3. Virtual machine (VM)


As their name indicates, virtual machines store and connect data solely through virtual
space. To construct a virtual machine, IT teams employ a hypervisor, also known as a
virtual machine monitor (VMM), which is software that can operate hundreds of virtual
machines with only one piece of real hardware. This technique of server virtualization is
commonly utilized for data transit and storage since they are the most cost-effective type of
server to run.

4. File transfer protocol (FTP) server:


These servers link customers to software applications using virtual server connections. This
allows users to forgo downloading data on their own devices to access programs.
Application servers can successfully host massive volumes of application data to numerous
users at once, making them excellent for enterprises.

5. Application server
These servers link customers to software applications using virtual server connections. This
allows users to forgo downloading data on their own devices to access programs.
Application servers can successfully host massive volumes of application data to numerous
users at once, making them excellent for enterprises.

6. File server:
A file server contains data files for several users. They enable speedier data retrieval and
storing or writing files to a computer. This is a simple sort of server used widely by
enterprises when many users require access to files that are more readily and safely stored
on a server than a personal computer.

70 | Page
NETWORK
7. Database server
Database servers act as big storage areas that businesses utilize and access to execute
different applications to satisfy their demands. A database server can run independently of
any database design.

8. Mail server
A mail server stores and distributes messages for customers using email service platforms.
Because mail servers are set up to constantly connect to a network, individual users may get
their email without running any systems through their own devices.

9. Print server
A print server connects remotely to local PCs to print across a network. These servers allow
enterprises the option to employ a single printer to service a whole department. Some
printers even come with their own built-in server ready to join a network once they're
placed in an office space.

10. Domain name system (DNS) server


These servers translate readable computer domain names into computer language IP
addresses. The DNS server accepts search data from a user and retrieves the desired address
to give to the client device.

11. Collaboration server


When work must be shared among numerous people, a collaboration server makes it easy to
connect. These servers let you exchange and store files, programs, and other vast amounts
of data.

12. Gaming server


Large gaming networks employ servers to link gamers from across the world. These servers
host multi-player online games.

13. Monitoring and management server


Monitoring and management servers perform in many capacities. First, they record and
track digital transactions and accept user requests. Others merely watch and don't actively
71 | Page
NETWORK
participate in user operations. Monitoring servers are responsive to network administrators
who evaluate network health to look for threats or flaws in the system. (indeed, 2023)

2.2.1 Types of Servers in Today's Market


In today’s market people mostly use bellow server types,
- Web servers
- File servers
- Database servers
- Email servers
- Application server
- Game servers
- Print servers.

2.2.2 Suitable server Types to above scenario


- File Server: A file server may be used to store and manage files and documents for
the many departments in the Matara branch. It can provide centralized storage for all
the departmental data, allowing simple access and exchange of information inside
the branch. With suitable access controls and permissions, the file server may also
guarantee that the data is safe and only available to authorized users.

- Email Server: An email server can be used to manage email communications inside
the Matara branch. It may provide email services to all the departments, allowing
employees to send and receive emails using their business email accounts. With
suitable security measures and spam filters, the email server may also guarantee that
the email conversations are secure and dependable.

- Web Server: A web server may be used to host and maintain the company's
website. It can give online services to consumers and other stakeholders, allowing
them to access information about the firm and its products/services. With adequate

72 | Page
NETWORK
security measures, the web server may also guarantee that the website is secured
against external threats and assaults.

- Application Server: An application server may be used to execute and administer


apps utilized by the many departments in the Matara branch. It can enable
centralized control and management of the apps, ensuring that they are available to
all the authorized users in the branch. With suitable security measures and access
restrictions, the application server may also guarantee that the applications are
secure and dependable.

- Database Server: A database server may be used to store and manage the
company's data in a centralized way. It can give access to the data for the different
departments, allowing them to retrieve and change the data as needed. With suitable
security measures and access controls, the database server may also ensure that the
data is secure and trustworthy.

2.2.3 Server in Today’s market


As a network analyst, picking the proper server type is critical for guaranteeing maximum
performance and cost effectiveness. There are several server kinds available on the market,
including tower servers, rack servers, blade servers, and modular servers. Each type of
server has its pros and limitations and should be chosen depending on the unique demands
of the company.
- Rack servers
Now there are various types of rugged computers available now serving several distinct
military, industrial and commercial applications. The most prevalent, however, is the
recognizable rack server.

These slidable, hot-swappable, high-powered rugged computers are suited for tough
locations and projects that stress space conservation, scalability, upgradability, and
expandability.

73 | Page
NETWORK
In this blog article, we'll examine how a rack server works, the many sizes of rack servers
and server racks, and how you may select the best of both to meet your program or
application. (Danial, 2020)

Figure 32 Rack server (superrask, 2023)

- Tower servers
Tower servers handle most fundamental applications such as system administration, file
management, print collaboration, ER apps, distribution, and system security.

There are significant advantages in employing tower servers. A tower server is sturdy and
basic in nature. As total component density is low, simpler cooling is feasible with tower
servers. Possible damage, overheating or downtime can therefore be averted. The scalability
factor is large in tower servers, and it is much easier to add servers to a basic network,
leading to adaptive integration. Again, the upkeep factor is smaller as compared to other
designs. Easy identification both on the network and physically is achievable with tower
servers as the data is generally kept in a single tower and not across numerous devices.

The wiring required with tower servers can be extensive, and numerous tower servers in a
single place could be loud because each tower could need a dedicated fan. An individual
monitor, mouse or keyboard is required for each tower server, or a keyboard, video, and
74 | Page
NETWORK
mouse (KVM) switch must be accessible for managing devices using a single piece of
equipment. Again, in comparison to blade servers or rack servers, tower servers might be
more substantial. (techopedia, 2023)

Figure 33Tower server (Ingalls, 2023)

- Blade servers
A Blade Server consists of a chassis housing numerous thin, modular electrical circuit
boards, known as server blades, with each blade being dedicated to a specific application.
Each blade has CPUs, an optional Fiber Channel host bus adapter (HBA), integrated
network controllers and additional input/output (IO) interfaces.

Allowing for more processing power in less rack space, Blade Servers simplify cabling and
assist to cut power usage. As less cabling is required for blade deployments in comparison
to Rack and Tower Servers, this dramatically decreases the amount of time spent managing
the infrastructure, and instead permits more time assuring high availability. (techbuyer,
2023)

75 | Page
NETWORK
Figure 34 Blade server (wikipedia, 2014)

- Mainframes
At their heart, mainframes are high-performance computers with vast quantities of memory
and data processors that can handle billions of basic computations and transactions in real
time. A mainframe computer is crucial to business databases, transaction servers, and
applications that demand high reliability, security, and agility. (IBM, 2023)

Figure 35 Mainframe (IBM, 2023)

- Micro servers

76 | Page
NETWORK
Micro servers have less processing power, and less operating and maintenance requirements
than normal servers. Typically, they are built for a certain business/computing function and
come preconfigured with a suite of purpose-specific programs, such as to be used as an
email server, VPN or as a tiny firewall. Generally, a micro server consists of between one
and two CPUs, and up to four slots for memory (RAM). It can also accommodate up to four
disk drives and will have several Ethernet, USB, and other external interface options.
(rouse, 2013)

Figure 36 Micro server (Kennedy, 2019)

2.2.4 Selection of Server Types for Cost and Performance


Optimization in each Scenario
For the Alliance Health scenario, where the server room is located on the third floor of the
head office in Colombo, it is advised to employ rack servers. Rack servers are intended to
fit onto typical data center racks, making them easier to manage and arrange. Since space is
limited in the server room, installing rack servers will allow for optimal utilization of the
current space and enable scalability for future development. Rack servers are also less
costly than blade servers and more powerful than tower servers.

77 | Page
NETWORK
When picking a server, it is necessary to consider performance optimization. The server
should be supplied with the appropriate hardware components such as CPUs, RAM, and
storage to suit the expectations of the company. Additionally, the server should be able to
manage the predicted demand without having performance difficulties.

For the Alliance Health scenario, it is advised to utilize a Dell PowerEdge R740 rack server.
This server is equipped with two Intel Xeon Gold 6248 processors, delivering a total of 40
cores and 80 threads. It also features 384GB of DDR4 RAM and eight 1.8TB SAS hard
drives in RAID 5 configuration, offering adequate storage space for the organization's
needs. The server also incorporates sophisticated capabilities such as remote management
and redundant power sources to ensure optimal uptime.

While pricing is a consideration to consider, it should not be the main deciding factor when
picking a server. It is crucial to pick a server that will match the demands of the company
and deliver reliable performance for the long term. In the instance of Alliance Health, the
Dell PowerEdge R740 is a good alternative that delivers the essential features and
performance at a fair cost.

2.2.5 Importance of servers


- Redundancy: This means that the information you want to store is stored in more
than one place. Meaning if it’s ever going to go down for some reason you’ve put it
in another place, so the information isn’t lost.

- Scalable: this means that you can meet current needs and future needs.

- Dual Processor: This applies to a machine of two different processors. Instructions


and knowledge are sent to both processors, enabling computers and networks to
operate faster than a desktop PC.

- Hot-swappable components: The hot-swap component means that if your server


has power loss, device failure or storage device failure for some reason, you can

78 | Page
NETWORK
swap components while your computer system is still in service.
(easyhardwaretrading, 2021)

2.3 Interdependence of Workstation Hardware and Networking Software

To give a seamless and successful network experience, the networking software and
workstation hardware are closely linked. The CPU, memory, and storage needs of the
networking software must be handled by the hardware components of a workstation, such as
these. For instance, the workstation needs a robust CPU to manage the load if the
networking software demands a lot of computing power.
Workstation hardware and networking software must work together flawlessly to deliver a
beneficial network experience. The physical components of a workstation, such as these,
must be able to fulfill the CPU, memory, and storage demands of the networking software.
For instance, if the networking software demands a lot of processing power, the workstation
needs a strong CPU to manage the load.
A network architecture design must address how networking software and workstation
hardware are linked. For a stable and productive network experience, the network designer
must make sure that the networking software and hardware are compatible and perform
together seamlessly.

2.3.1 Networking Software


Network software is an umbrella phrase used to represent a wide range of software
that facilitates the operations, design, monitoring, and deployment of computer
networks.

Network software is a crucial aspect for every networking system. It helps administrators
and security staff decrease network complexity, and manage, monitor, and better regulate
network traffic. Network software plays a critical role in managing a network architecture
and easing IT operations by allowing communication, security, content, and data sharing.

Network software delivers valuable benefits to enterprises. It has become a significant


instrument in promoting round-the-clock communication and permitting an uninterrupted
79 | Page
NETWORK
exchange of information. One of the most significant advantages of network software is its
direct association with productivity. The centralized structure of network software boosts
the productivity of the overall system. This helps decrease end-user technical support
difficulties.

For example, if an end user inadvertently breaks their machine, the odds of losing data are
lowered greatly as all its data is already shared on the network. Another significant feature
of network software is its ability to enable programmatic administration of network
resources. This reduces the need for manual operations, hence giving a dynamic and
efficient network setup to operate with. (Mohanakrishnan, 2022)

Key component of networking software


Ex:
- Network operating systems (NOS
- Network management software
- Network security software
- Network protocol software
- Network virtualization software

80 | Page
NETWORK
2.3.2 Types of networking Software

Figure 37 network software types (Ramya, 2023)

1. Network storage software


In many respects, data within networks is like a kid. With time, it simply grows, and
as it increases, it demands proper treatment. Soon enough, data must be kept spanning
various places and a wide range of devices. Network storage software allows
enterprises to adopt a common interface that maintains innumerable databases across
users or clients. It acts as an excellent manager of access across various departments
or critical groups within a company. This manner, everyone having access may read

81 | Page
NETWORK
or retrieve information with only a click, and at the same time, security issues are also
taken care of.
Example:
- FreeNAS
- OpenMediaVault (OMV)
- Synology DiskStation Manager (DSM)

2. Data archiving software


In today’s day and age of dynamic networks dispersed across numerous functional
business units, data once misplaced is data gone. Hence, it is necessary to take
frequent backups. As businesses grow and networks change in size, it is more
challenging to retain data effectively. In addition to that, data that must be kept
accumulates at a rapid pace, and its administration gets costly. In such a circumstance,
data archiving software is a fantastic solution.

Organizations contain heaps of data that might not have to be employed every day but
are nonetheless vital to be preserved for several causes, one of them being for regular
compliance. Data archiving software offers better administration of such information
and is an optimum approach to minimize expenses while assuring that the data is
being secured. However, as a word of warning, archive software does not perform the
same way as typical basic backups. Hence, it is usually advisable to guarantee that the
stored data doesn’t need to be retrieved soon.
Example:
- IBM Spectrum Archive
- Amazon Glacier
- Dell EMC Data Domain
3. Patch management software
It is a headache for IT personnel to install updates on each device manually.
Moreover, when a network comprises of multiple devices, guaranteeing the timely
installation of updates is not only expensive but sometimes a tedious task as well. As
the name indicates, patch management software assists in the smoother
administration of updates across various devices on the network through the
installation of patches. This makes the procedure smoother and enables each system
82 | Page
NETWORK
to download a patch handled by central software and run updates automatically.
Patch management software is the most hassle-free and effective approach to make
continuous updates across devices and systems in a business.
Example:
- Microsoft Windows Server Update Services (WSUS)
- IBM BigFix
- Ivanti Patch for Windows (formerly Shavlik Patch)

4. Security surveillance software


A bulk of network software focuses on data storage and connecting devices.
However, they do not contain protection for a network. This is when security
surveillance software enters the picture. It monitors and links the many security
solutions inside a network. Specific software is suitable for huge networks as it
readily joins throughout locations and gives authentic browser-based live and
recorded footage to a company. On the other side, better-targeted software works
well in safeguarding susceptible units by establishing a network design that
decreases attack surfaces, so keeping components concealed from any malevolent
parties. This happens by building outbound-only connections with cloud services
and providers.
Example:
- Pelco VideoXpert
- Bosch Video Management System (BVMS)
- Axis Camera Station
- Hikvision iVMS-4200

5. Asset management software


One of the most demanding duties in any corporation is to maintain the network and
work efficiently. Achieving this involves improved visibility of the network
architecture as well as regular tracking and monitoring of important data. That’s
where asset management software comes to the rescue. Compared to most of its
contemporaries, asset management software functions from a centralized server
83 | Page
NETWORK
room or hub and is not connected to any hardware. This is wonderful in terms of
cost savings and delivers a fantastic experience for the customers and clients.
Example:
- Freshservice
- Snipe-IT
- ServiceNow Asset Management
- IBM Maximo Asset Management

6. Deployment and migration software


Managing a network comes with continuous updates or migration of assets, and this
may often become a mammoth undertaking. However, it doesn’t have to be thus.
The usage of deployment and migration software benefits enterprises in making
activities such as updating systems hassle-free. The program provides an interface
that enables simple monitoring of any deployment or data flow between the
hardware and databases within the network. It also guarantees necessary checks on
compatibility when any data is being transferred between normal backups and
archives, so considerably minimizing the risks of data loss.
Example:
- VMware vSphere/vCenter Server
- Microsoft System Center Configuration Manager (SCCM)
- Ansible
- Carbonite Migrate:

7. Printer and fax software


Printers and fax machines are crucial equipment for any functioning firm. As an
organization expands, so does the quantity of assets involved within its network.
Standard solutions like Wi-Fi printing might not always be the ideal choice,
especially for huge organizations or institutions that stretch across multiple levels.
This program provides an easy-to-use interface that facilitates the undertaking and
management of many activities. That’s not it! With this program, one can quickly
configure IP printing across networks or even publish updates. What’s more? In rare
situations, it can also enable enterprises to fax or print crucial papers and
correspondence across several locations.
84 | Page
NETWORK
Example:
- GFI FaxMaker
- Brother ControlCenter
- XMediusFAX
- FaxTalk FaxCenter Pro

8. Network management software


In a sea of various possibilities, why should a company pick network management
software? The rationale is fairly evident. Their major role is to monitor, manage, and
resolve any barriers in network performance throughout the full device
infrastructure. While a network monitoring program could have some basic choices
packed in to diagnose, network management software is prepared to influence and
adjust network performance for the better. These software programs are hosted by
various industry-leading businesses. (Ramya, 2023)
Example:
- SolarWinds Network Performance Monitor (NPM)
- Cisco Prime Infrastructure
- PRTG Network Monitor
- Nagios XI

2.3.3 Network Software Function


- Network Security: Network software incorporates security features such as
firewalls, intrusion detection/prevention systems (IDS/IPS), virtual private networks
(VPNs), and encryption protocols to protect data from unauthorized access,
interception, and malicious attacks.
- Network Protocols Implementation: Network software implements various
communication protocols such as TCP/IP, UDP, HTTP, FTP, SMTP, etc., enabling
devices to communicate and exchange data over the network efficiently.

- Routing and Switching: Network software includes algorithms and protocols


responsible for determining the best paths for data to travel within a network
(routing) and directing data between devices (switching).
85 | Page
NETWORK
- Network Monitoring and Management: Software tools monitor network
performance, traffic patterns, device health, and other parameters in real-time. These
tools help in troubleshooting network issues, optimizing performance, and ensuring
reliability.

2.3.4 Networking software can be used for above network design.


- Network Simulation and Modeling: Networking software like Cisco Packet
Tracer, GNS3, or OPNET Modeler allows network architects to simulate and model
different network configurations. They can create virtual network topologies, deploy
various networking devices, and analyze the performance of these configurations
under different conditions. This helps in evaluating design choices and identifying
potential issues before implementing them in real-world environments.

- Network Planning and Visualization: Tools like Microsoft Visio, Lucid chart, or
draw.io enable network designers to create detailed network diagrams and
visualizations. These diagrams help in planning the layout of the network,
documenting device connections, and illustrating the flow of data within the
network. Visual representations aid in communicating the design to stakeholders and
collaborating with team members during the design process.

- IP address management (IPAM) software: An IPAM solution might be used to


handle the enormous number of IP addresses needed by the network configuration.
IP address assignment may be automated, and IPAM software can also track IP
address usage and offer other management capabilities. BlueCat IPAM, SolarWinds
IPAM, and Infoblox are a few examples of IPAM software.

- Network Monitoring and Analysis: Network monitoring software such as


Wireshark, Nagios, or SolarWinds provides real-time visibility into network traffic,
performance metrics, and device statuses. By monitoring network behavior and
analyzing data packets, designers can gather insights into network usage patterns,
identify bottlenecks, and optimize the design for better performance and reliability.

86 | Page
NETWORK
2.3.5 Network design tools
- Cisco Packet Tracer
- GNS3 (Graphical Network Simulator-3)
- Juniper NorthStar Controller
- Wireshark
- Microsoft Visio

2.4 Topology Protocol Efficiency in Networking Systems for given

scenario.

TCP/IP is a collection of communication protocols that describe how data should be sent
across the internet or other networks. It stands for Transmission Control Protocol/Internet
Protocol and is made of two key protocols: TCP and IP.
TCP is responsible for ensuring that data is reliably delivered from one device to another. It
separates data into packets and transmits them over the network, reassembling them in the
right order at the receiving end. It also includes techniques for mistake detection and
correction, ensuring that data is sent properly.
IP, on the other hand, is responsible for routing packets to their destination via the internet
or other networks. It offers addressing and routing capabilities, allowing packets to be
transmitted from one device to another regardless of their actual location on the network.
By employing the TCP/IP protocol, the Matara branch can ensure that patient data and other
vital information is transferred properly and securely. The protocol offers means for
encryption and authentication, helping to prevent unwanted access or manipulation of
sensitive data.
Another advantage of adopting TCP/IP is that it allows each department in the Matara
branch to be segregated and protected, preventing unintentional exchange of data with the
wrong persons. This is done by designating each department a unique subnet that only
devices inside that department may access.
TCP/IP is a dependable and secure networking technology that is commonly used for small
and medium-sized networks. Its implementation in the Matara branch may assist in

87 | Page
NETWORK
maintaining the accuracy and security of patient data and other essential information, while
also offering a mechanism for departmental separation and security.

3 Task 03

3.1 Network Diagram Alliance Health Company

A networking system diagram is a flowchart depiction of network architecture that depicts


the links between network components. It frequently incorporates information such as the
types of devices and their interconnections, IP addresses, and data flow inside the network.

88 | Page
NETWORK
3.1.1 Using EdrawMax for Network System Design

Figure 38 network system design (Author developed)

3.1.2 Explain the Edrawmax image.


Floors:
Floor 3
This floor features the video conferencing room. It is presumably utilized for
communication between the two branches or with other sites.
Floor 2 - This floor houses numerous departments
Accounting & finance department - This department likely employs computers for duties
including accounting software, financial modeling, and payroll processing. There may be
printers and scanners here as well.
Administration department - This department's gadgets could contain PCs for administrative
chores, document management software, and email. There might also be printers and
phones here.
Business development department -This department could employ computers for duties like
customer relationship management (CRM) software, sales automation tools, and
presentations. There might be printers and phones here as well.
HR department - This department's gadgets could contain computers for human resources
management software, application tracking systems, and payroll processing. There might be
printers and phones here as well.

89 | Page
NETWORK
IT department - This department likely has its own set of computers and servers for
administering the network, providing technical assistance, and building any internal
applications. There may also be network storage devices and firewalls here.
Unidentified department- The designation is unknown; however, it might be another
department with its own collection of computers and gadgets specific to its role.

Floor 1:
This floor houses the public spaces and certain critical departments.
Reception area: This space likely features a computer for receptionist responsibilities and a
printer for guest registration.
Head office - This might feature computers for top management and executive assistants, as
well as printers and phones.
Sales & marketing department - This department's gadgets could contain PCs for sales and
marketing software, email, and presentations. There might be printers and phones here as
well.
Customer service area - This space typically features computers for customer service
representatives (CSRs) to access customer information and databases. There may also be
printers and phones here.
Matara branch reception - Like the Colombo branch reception, this space likely features a
computer for receptionist functions and a printer for visitor registration.

Devices Routers - There is one router on each level, suggesting that the network is separated
into subnets for better organization and security.
Computers - Each department seems to have many computers for its specialized needs.
Servers - The first and second floors are manned by servers. Important corporate data,
including financial records, customer information, and staff data, is presumably held on
these servers.

3.2 Virtual LAN (VLAN)

Virtual LAN (VLAN) is a concept in which we may segregate the devices logically on layer
2 (data connection layer). Generally, layer 3 devices separate the broadcast domain,
however the broadcast domain may be split by switches utilizing the notion of VLAN.

90 | Page
NETWORK
A broadcast domain is a network segment in which if a device broadcasts a packet, then all
the devices in the same broadcast domain will receive it. The devices in the same broadcast
domain will get all the broadcast packets however it is limited to switches only as routers
don’t forward out the broadcast packet. To root out the packets to other VLAN (from one
VLAN to another) or broadcast domains, inter VLAN routing is needed. Through VLAN,
distinct small-size sub-networks are formed which are comparably easier to handle.
(GeekForGeeks, 2023)

3.2.1 Benefit of VLANs


- Improved network security: VLANs may be used to isolate network traffic and
control access to certain network resources. This increases security by preventing
unwanted access to sensitive data and network resources.

- Better network performance: By isolating network traffic into smaller logical


networks, VLANs can minimize the quantity of broadcast traffic and enhance
network performance.

- Simplified network administration: VLANs allow network managers to join


devices together conceptually, rather than physically, which can ease network
management duties such as configuration, troubleshooting, and maintenance.

- Flexibility: VLANs may be established dynamically, allowing network managers to


alter network settings swiftly and simply as needed.

- Cost savings: VLANs can assist decrease hardware costs by allowing numerous
virtual networks to use a single physical network infrastructure.

- Scalability: VLANs may be used to segment a network into smaller, more


manageable groupings as the network expands in size and complexity.

91 | Page
NETWORK
3.2.2 VLAN ranges:

- VLAN 0, 4095: These are reserved VLAN which cannot be seen or used.
- VLAN 1: It is the default VLAN of switches. By default, all switch ports are in
VLAN. This VLAN can’t be deleted or edited but can be used.
- VLAN 2-1001: This is a normal VLAN range. We can create, edit, and delete these
VLAN.
- VLAN 1002-1005: These are CISCO defaults for fddi and token rings. These VLAN
can’t be deleted.
- VLAN 1006-4094: This is the extended range of Vlan

3.2.3 VLAN and IP Subnetting


The IP address 153.172.0.0/ was assigned to the Matara branch, and 152.168.0.0/27 to the
Colombo headquarters. These IP addresses were then partitioned into smaller subnets for
each department.
Using VLANs and IP addresses, I constructed logical subnets over numerous broadcast
domains according to the staff in each department. By expanding the VLAN, it is feasible to
keep outside users out of groups that have strong security demands. VLANs give a way of
conceptually classifying users according to their physical or geographic locations instead of
doing so.

3.3 Network software

Wireshark
Wireshark is a free open-source application that analyzes network traffic in real-time for
Windows, Mac, Unix, and Linux platforms. It collects data packets running across a network
interface (such as Ethernet, LAN, or SDRs) and transforms that data into important
information for IT experts and cybersecurity teams.

92 | Page
NETWORK
Wireshark is a form of packet sniffer (also known as a network protocol analyzer, protocol
analyzer, and network analyzer). Packet sniffers capture network data to analyze the activity
being handled and gather helpful insights. (Kost, 2023)

Putty
Developed and mostly maintained by Simon Tatham, PuTTY is an open-source tool making
use of network protocols like Telnet and rlogin in Windows and UNIX systems in
conjunction with an xterm terminal emulator. Over a network, PuTTY makes use of all the
above protocols to enable a remote session on a machine. It is a popular application for text-
based communication and is also a popular utility for connecting Linux servers from
Microsoft operating system-based devices. (Rouse, 2015)

FileZilla
FileZilla is free software which allows you transfer files over the internet.
Consisting of FileZilla Client and FileZilla Server, FileZilla is characterized as a free
software, cross-platform FTP tool.
Available on Windows, Linux and MacOS, FileZilla allows users to transfer files over the
Internet.
The software started life as a computer science class project by Tim Kosse and two
classmates. They opted to make the program open source as they feared that no one would
buy it if they made FileZilla commercial. (burns, 2017)

3.3.1 Using this software for Alliance Health company


PuTTY can be used by Alliance Health's IT staff to remotely access servers or network
devices in the main office or branch office in Matara. They can use PuTTY to conduct
administrative duties, configure network devices, and troubleshoot difficulties.

Wireshark may be used by Alliance Health's IT department to monitor network traffic,


identify possible security concerns, and fix network issues. They can use Wireshark to
collect and analyse network packets, monitor network statistics, and diagnose network
faults.

93 | Page
NETWORK
FileZilla may be utilized by Alliance Health's staff to move files between the head office
and branch office in Matara. They may use FileZilla to upload and download files, manage
data on distant sites, and transfer huge files securely.

3.4 Blueprint of the network system

Figure 39 Network system design

94 | Page
NETWORK
3.5 User Feedback for above Network System

Figure 40 Feedback Form (Author Developed)

95 | Page
NETWORK
Figure 41 Feedback Form (Author Developed)

96 | Page
NETWORK
Figure 42 Feedback Form (Author Developed)

3.5.1 Response

Figure 43Responses (Author Developed)

97 | Page
NETWORK
Figure 44 Responses (Author Developed)

98 | Page
NETWORK
Figure 45 Responses (Author Developed)

author did a survey through a Google Form to acquire an overall image of the new
networking infrastructure. After examining the answers, the author identified some severe
faults in the company's networking infrastructure.
One of the primary problems was that all the departments were using the same subnet, which
was generating congestion and poor performance. To address this issue, the author
recommended partitioning each department with its own subnet, which would improve the
network's performance and boost the total network speed.
Another worry was that the Sales and Marketing team required access to network resources
through Wi-Fi connectivity, but the present technology did not allow them to do so. To fix
this issue, author suggested that the Customer Services Areas at both branches and the Sales
and Marketing department should be equipped with Wi-Fi connectivity, enabling the Sales
and Marketing staff to access network resources over the wireless network.

99 | Page
NETWORK
Furthermore, the present system did not have any intra-branch communication between the
Head Office and Matara. To overcome this issue, he proposed joining the branches using
switches and routers, which would allow the different departments to interact with one other
simply. Finally, the author fixes all faults of this system.

3.6 Network maintenance

Network maintenance refers to anything that needs be done to maintain a network working.
If you have a planned, predetermined strategy for network maintenance, you will be able to
guarantee that IT-related issues are treated with before they cause any substantial harm and
will also assist in lessening the need for reactive problem solutions.

3.6.1 Network maintenance schedule for above network system


Maintain Task Frequency Responsible Party
Backup server data Weekly IT Department

Install security updates Monthly IT Department

Check network performance Quarterly Network Analyst

Replace aging network hardware As needed Network Analyst

Conduct security audits Annually External Security Vendor

Train employees on networkAnnually HR Department


security
Test disaster recovery plan Annually IT Department

Review and update networkSemi-annually Network Analyst


documentation

3.7 Network Services and Application

This network application and service setup for ALLIANCE HEALTH involves the following
installation and configuration steps.

100 | Page
NETWORK
3.7.1 Windows Server OS Install
Windows Server is a server operating system that allows a computer to execute network
services such as print server, domain controller, web server, and file server. Being a server
operating system, it also acts as a framework for individually acquired server programs such
as Exchange Server or SQL Server. The creator of Alliance Health utilizes Windows Server
OS for the server machine.
- Step 01
Loding file

Figure 46 setep01

101 | Page
NETWORK
- Step 02
Choose Language

Figure 47 Language Choose

102 | Page
NETWORK
- Step 3
Windows Install

Figure 48 Install Windows

103 | Page
NETWORK
- Step 4
Type Product key.

Figure 49 Active windows

104 | Page
NETWORK
- Step 5
Choose OS

Figure 50 Choosing OS

105 | Page
NETWORK
- Step 6
Read the license terms and accepting to that.

Figure 51step06

106 | Page
NETWORK
- Step 7
Upgrade

Figure 52step07

107 | Page
NETWORK
- Step 8
Click Drive

Figure 53Step08

108 | Page
NETWORK
- Step 9
Select Partition

Figure 54Step09

109 | Page
NETWORK
- Step 10
Copying Windows files

Figure 55step10

110 | Page
NETWORK
Figure 56Step10

- Step 11
Restart to Continue

Figure 57 restart

111 | Page
NETWORK
Figure 58 Restarting.

Figure 59 Getting Ready

112 | Page
NETWORK
- Step 12

113 | Page
NETWORK
Figure 60 Local session Manager

114 | Page
NETWORK
- Step 13
Admin Login

Figure 61 Login

115 | Page
NETWORK
- Step 14
Server is Installed

Figure 62 Server is ready.

3.7.2 Active Directly


Active Directory (AD) from Microsoft is a directory and identity management solution for
Windows domain networks. It was initially launched in Windows 2000 and is now available
in most Microsoft Windows Server operating systems. It is leveraged by a number of
Microsoft products, including Exchange Server and SharePoint Server, as well as third-party
apps and services. Active Directory is setup as follows:

- Step 01
Select “Add roles and features” and click “Next.”

116 | Page
NETWORK
Figure 63 Step 1

117 | Page
NETWORK
- Step 02
Click “Next”

Figure 64 Step 02

118 | Page
NETWORK
- Step 3
click “Next.”

Figure 65 Step 3

- Step 4
Select server and click “Next.”

119 | Page
NETWORK
Figure 66 Step 4

- Step 5
Click “Active Directory Domain Service” and click “Next.”

Figure 67 Step 5

120 | Page
NETWORK
- Step 06
Click Next.

Figure 68 Step 06

- Step 07
Click Next.

Figure 69 Step 07

121 | Page
NETWORK
- Step 08
Click “Next”

Figure 70 Step 08

- Step 09
Click “Install”

Figure 71 Step 09

122 | Page
NETWORK
- Step 10

Figure 72 Step 10

- Step 11

Figure 73 Step 11

- Step 12
Select “The NetBIOS domain name” and click “Next.”
123 | Page
NETWORK
Figure 74 Step 12

- Step 13
Click “Next”

Figure 75 Step 13

- Step 14
124 | Page
NETWORK
Wait till “Prerequisites Check” finished and click “Next.”

Figure 76 Step 15

- Step 15
Wait till “installation” finished.

Figure 77 Step 15

125 | Page
NETWORK
- Step 16

Figure 78 Step 16

- Step 17

Figure 79 Step 17

126 | Page
NETWORK
- Step 18

Figure 80 Step 18

- Step 19

Figure 81 Step 19

- Step 20
127 | Page
NETWORK
Figure 82 Step 20

- Step 21

Figure 83step 21

128 | Page
NETWORK
- Step 22

Figure 84Step 22

- Step 23

Figure 85step 23

129 | Page
NETWORK
- Step 24

Figure 86Step 24

- Step 25

Figure 87 Step 25

130 | Page
NETWORK
3.7.3 Create User Account
- Step 01

Figure 88 step1

- Step 02
Create new user group.

Figure 89 step02

131 | Page
NETWORK
- Step 03

Figure 90step3

- Step 04
Enter user details and click “Next.”

Figure 91step 4

132 | Page
NETWORK
- Step 5

Figure 92 step5

- Step 6
Click “Finish”

Figure 93 Step6

133 | Page
NETWORK
- Step 07

Figure 94step7

- Step 8

Figure 95 step8

134 | Page
NETWORK
4 Task 04

4.1 Implement the Network System by Cisco Packet Tracker

Figure 96 Implement the Network System by Cisco Packet Tracker (Author developed)

4.2 IP Subnetting Scheme for the Alliance Health Network

Colombo
Table 20 Colombo branch IP (Author developed)

Port VLAN Department Subnet ID Subnet Host IP Broadcast ID


Number number Mask
1-10 10 Sales & 152.168.0.0 /27 152.168.0.1- 152.168.0.31
Marketing 152.168.0.10
11-40 20 Administration 152.168.0.32 /27 152.168.0.33- 152.168.0.63
152.168.0.62
41-60 30 HR 152.168.0.64 /27 152.168.0.65- 152.168.0.95
152.168.0.85
61-75 40 Accounting & 152.168.0.96 /27 152.168.0.97- 152.168.0.127
Finance 152.168.0.111
76-80 50 Audit 152.168.0.128 /27 152.168.0.129- 152.168.0.159
152.168.0.133
81-85 60 Business 152.168.0.160 /27 152.168.0.161- 152.168.0.191
152.168.0.165
86-115 70 IT 152.168.0.192 /27 152.168.0.193- 152.168.0.223
135 | Page
NETWORK
152.168.0.219
116-145 70 IT 152.168.0.224 /27 152.168.0.221- 152.168.0.255
152.168.0.254

Mathara
Table 21 Mathara Branch IP(Author Developed)

Port VLAN Department Subnet ID Subnet Host IP Broadcast ID


Number number Mask
1-10 10 Administratio 153.172.0.0 /26 153.172.0.1- 153.172.0.63
n 153.172.0.10
11-17 20 HR 153.172.0.64 /26 153.172.0.65- 153.172.0.127
153.172.0.71
18-25 30 Accounting &153.172.0.128 /26 153.172.0.129- 153.172.0.191
Finance 153.172.0.136
26-75 40 IT 153.172.0.192 /26 153.172.0.193- 153.172.0.255
153.172.0.242

4.3 Document and analyze test results against expected results.

Network testing demands that test results be documented and compared to projected
outcomes to make sure that the system's functionality satisfies set requirements. In this
technique, the predicted outcomes described in the testing plan are compared with the actual
test results, which include network connectivity, performance metrics, and service
availability. To uncover the underlying reasons of any variations or inconsistencies, such as
hardware failures, configuration difficulties, or ambient circumstances, they are
meticulously documented and evaluated. After resolving the issues detected, remedial
actions are taken, and retesting is done to confirm the efficacy of the remedies put in place.
Network administrators can acquire vital insights into the operation and performance of the
system by carefully recording and assessing test results. This enables for continuing
network infrastructure optimization.

4.4 Test Results Table for Alliance Health Network

Table 22 test cases (Author Developed)

Test Test Expected Testing Proof Result

136 | Page
NETWORK
No Name Result
01 Testing Successful Successfully
Ping ping
between
Devices

02 Trace Successful Successfully


Route tracking of
the Route
between
Devices

03 Telnet toSuccessfully Successfully


Router inLogin
Network
Team
Client Pc

137 | Page
NETWORK
4.5 Recommendations for Network Enhancements

1. Extension of Wi-Fi infrastructure


Improving customer experience and satisfaction through seamless access to corporate
resources and services would be made feasible by boosting Wi-Fi coverage and capacity at
customer service locations.

2. Virtual Private Network (VPN) technology deployment


By deploying VPNs, sensitive financial and medical data would be secured during data
transfers and conversations between the main office in Colombo and the branch in Matara.

3. Cloud-based service uptake


Integrating cloud-based services for application hosting, storage, and collaboration would
increase resource accessibility, scalability, and flexibility, allowing for more effective
operations and support for expansion plans in the future.

4. Voice-over-Internet Protocol (VoIP) Integration


Using VoIP solutions will allow staff members to interact more efficiently and affordably
inside the organization by enabling calls to be made via the network rather than

5. Introducing the procedures for Quality of Service (QoS)


By giving network traffic priority, QoS will assure that essential applications like data
transfers and video conferencing have enough bandwidth and perform at their best.

4.6 Critical Evolution of Implement Network Design at Alliance Health

The strategy and design for the networked system of Alliance Health displayed a
comprehensive approach to suit the company's requirements. The choice to adopt a star
topology with VLANs enabled obvious division of departments, boosting security and
network efficiency. The installation of Wi-Fi facilities in important places like customer
service and sales departments enabled wireless connection for essential work.

138 | Page
NETWORK
The setting of DHCP expedited IP address assignment, reducing manual configurations and
potential mistakes. The choice to set up VLANs for each department enhanced network
segmentation, boosting security and streamlining traffic flow. The distribution of separate
IP address ranges to each department helped simple management and troubleshooting.

The network architecture allows for scalability, permitting future development without
substantial disturbances. The addition of a server room with dedicated subnets for servers
and the usage of rack-mounted servers displayed attention for data center-like architecture.

To upgrade the system, it is necessary to consider future requirements and technology. The
probable future additions listed above focus on enhancing network administration, security,
dependability, and performance. With the ever-evolving IT world, maintaining current with
technological developments and applying best practices is critical to guarantee the network
stays strong and adaptive.

Continuous review and monitoring will assist uncover areas for improvement and
possibilities to optimize network resources. Collaboration with IT stakeholders and
feedback from end-users will permit continuing refinement of the network architecture and
settings, matching it with the company's evolving demands and industry norms. By
addressing possible vulnerabilities and being proactive, the networked system may remain a
state-of-the-art infrastructure, enabling Alliance Health's development and success in the
healthcare business.

References

Arley, A., 2021. Medium. [Online]


Available at: https://medium.com/@alan6arley/network-standards-and-devices-
1bf99da95b05
[Accessed 08 February 2024].
Ashtari, H., 2023. Spiceworks. [Online]
Available at: https://www.spiceworks.com/tech/networking/articles/what-is-network-

139 | Page
NETWORK
topology/
[Accessed 08 February 2024].
asq, 2023. asq. [Online]
Available at: https://asq.org/quality-resources/ansi-standards
[Accessed 08 February 2024].
burns, e., 2017. Tech monitor. [Online]
Available at: https://techmonitor.ai/what-is/what-is-filezilla-4951563
[Accessed 08 February 2024].
ComputerNetworkingNotes, 2024. ComputerNetworkingNotes. [Online]
Available at: https://www.computernetworkingnotes.com/networking-tutorials/ethernet-
standards-and-protocols-explained.html
[Accessed 08 February 2024].
Danial, b., 2020. trentonsystems. [Online]
Available at: https://www.trentonsystems.com/blog/what-is-a-rack-server
[Accessed 08 February 2024].
easyhardwaretrading, 2021. easyhardwaretrading. [Online]
Available at: https://easyhardwaretrading.com/importance-of-a-server/
[Accessed 08 February 2024].
F, C., 2023. study. [Online]
Available at: https://study.com/academy/lesson/organizations-that-create-networking-
standards.html
[Accessed 08 February 2024].
GeekForGeeks, 2023. GeeksForGeeks. [Online]
Available at: https://www.geeksforgeeks.org/virtual-lan-vlan/
[Accessed 08 February 2024].
GeeksForGeeks, 2023. GeekForGeeks. [Online]
Available at: https://www.geeksforgeeks.org/difference-between-osi-model-and-tcp-ip-
model/
[Accessed 08 February 2024].
GeeksforGeeks, 2023. GeeksforGeeks. [Online]
Available at: https://www.geeksforgeeks.org/types-of-computer-networks/
[Accessed 23 January 2024].

140 | Page
NETWORK
GeeksForGeeks, 2023. GeeksForgeeks. [Online]
Available at: https://www.geeksforgeeks.org/data-communication-definition-components-
types-channels/
[Accessed 08 February 2024].
GeeksForGekks, 2023. GeeksForGeeks. [Online]
Available at: https://www.geeksforgeeks.org/tcp-ip-model/
[Accessed 08 February 2024].
Hossein, A., 2022. Spiceworks. [Online]
Available at: https://www.spiceworks.com/tech/networking/articles/what-is-network-
topology/
[Accessed 08 February 2024].
IBM, 2023. ibm. [Online]
Available at: https://www.ibm.com/topics/mainframe
[Accessed 08 february 2024].
indeed, 2023. indeed carear guid. [Online]
Available at: https://www.indeed.com/career-advice/career-development/types-of-servers
[Accessed 08 February 2024].
Infinity, B., 2023. Board Infinity. [Online]
Available at: https://www.boardinfinity.com/blog/data-communication-a-process/
[Accessed 08 February 2024].
Ingalls, T., 2023. serverwatch. [Online]
Available at: https://www.serverwatch.com/guides/tower-server/
[Accessed 08 February 2024].
Kanade, V., 2023. Spiceworks. [Online]
Available at: https://www.spiceworks.com/tech/networking/articles/what-is-peer-to-peer/
[Accessed 23 January 2024].
Karen, B., 2020. Electronic Design. [Online]
Available at: https://www.electronicdesign.com/technologies/communications/article/
21796419/10-standards-organizations-that-affect-you-whether-you-know-it-or-not
[Accessed 08 February 2024].
Keary, T., 2023. Forbes. [Online]
Available at: https://www.forbes.com/advisor/business/types-network-protocols/
[Accessed 08 Februaru 2024].
141 | Page
NETWORK
Kennedy, P., 2019. serverthehome. [Online]
Available at: https://www.servethehome.com/hpe-proliant-microserver-gen10-review/
[Accessed 08 February 2024].
Kost, E., 2023. upguard. [Online]
Available at: https://www.upguard.com/blog/what-is-wireshark
[Accessed 08 February 2024].
Labs, P., 2023. PyNet Labs. [Online]
Available at: https://www.pynetlabs.com/network-devices-and-its-various-types/
[Accessed 08 February 2024].
Lawinsider, 2023. Lawinsider. [Online]
Available at: https://www.lawinsider.com/dictionary/ieee-standards
[Accessed 08 February 2024].
LearningCenter, 2023. Learning Center. [Online]
Available at:
https://www.imperva.com/learn/application-security/osi-model/#:~:text=Cybersecurity
%20101-,What%20Is%20the%20OSI%20Model,companies%20in%20the%20early
%201980s
[Accessed 08 February 2024].
LearnLoner, 2023. Learn Loner. [Online]
Available at: https://learnloner.com/explaining-in-detail-tcp-ip-model-layer-and-its-part/
[Accessed 08 February 2024].
Mohanakrishnan, R., 2022. spiceworks. [Online]
Available at: https://www.spiceworks.com/tech/networking/articles/what-is-network-
software/
[Accessed 08 February 2024].
Ramya, M., 2023. Spiceworks. [Online]
Available at: https://www.spiceworks.com/tech/networking/articles/what-is-a-computer-
network/
[Accessed 23 January 2024].
rouse, M., 2013. techopedia. [Online]
Available at: https://www.techopedia.com/definition/29372/micro-server
[Accessed 08 February 2024].

142 | Page
NETWORK
Rouse, M., 2015. techopedia. [Online]
Available at: https://www.techopedia.com/definition/4335/putty
[Accessed 08 February 2024].
superrask, 2023. superrask. [Online]
Available at: https://superrask.xyz/product_details/35470306.html
[Accessed 08 February 2024].
Sushant, 2023. Scaler Topics. [Online]
Available at: https://www.scaler.com/topics/computer-network/ieee-standards-in-computer-
networks/
[Accessed 08 February 2024].
Teach, 2023. Teach. [Online]
Available at: https://www.teach-ict.com/gcse_new/networks/peer_peer/miniweb/pg5.htm
[Accessed 08 February 2024].
techbuyer, 2023. techbuyer. [Online]
Available at: https://www.techbuyer.com/us/blog/what-is-a-blade-server-us
[Accessed 08 February 2024].
techopedia, 2023. techopedia. [Online]
Available at: https://www.techopedia.com/definition/15318/tower-server
[Accessed 08 February 2024].
Thinksigma, 2023. Thinksigma. [Online]
Available at: https://thinksigma.co.uk/blogs/top-5-standards-organisations-in-the-world/
[Accessed 08 February 2024].
wikipedia, 2014. wikipedia. [Online]
Available at: https://en.wikipedia.org/wiki/Blade_server
[Accessed 08 February 2024].
Woojae, L., 2023. Jay's Dev Blog. [Online]
Available at: https://jaylog.hashnode.dev/network-http-deep-dive-into-osi-7-layer-model
[Accessed 08 February 2024].

Attachment:

143 | Page
NETWORK
144 | Page
NETWORK

You might also like