Professional Documents
Culture Documents
Assessor Name:
details.
checklist only)
Checking Service? √
(If Yes, please keep a copy of the ACS
*If ‘No’ is recorded the Internal Verifier must recommend actions detailing the issues to be addressed. The Assessor and
the Internal Verifier must then confirm that the action has been undertaken and that the Assignment Brief is authorised
Assessor signature
Date
Student’s name
List which assessment criteria Pass Merit Distinction
the Assessor has awarded.
Assessor Feedback:
LO1 Examine networking principles and their protocols.
Resubmission Feedback:
Grade: Assessor Signature: Date:
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.
Assignment Feedback
Formative Feedback: Assessor to Student
Action Plan
Summative feedback
1. A Cover page or title page – You should always attach a title page to your assignment. Use the
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom, right margins and 1.25” for the left margin of each page.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for compulsory
information. eg: Figures, tables of comparison etc. Adding text boxes to the body except for the
before mentioned compulsory information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade.
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You must provide both in-text citation and a
reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course.
Student Declaration
I hereby, declare that I know what plagiarism entails, namely, to use another’s work and to present it
as my own without attributing the sources in the correct form. I further understand what it means to
copy another’s work.
Unit Tutor
Issue Date
Submission Date
Submission format
The submission should be in the form of an individual report written in a concise, formal business style
using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using Harvard
referencing system. Please also provide an end list of references using the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures, although
you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:
Scenario
Alliance Health is a technology-enabled solutions company that optimizes the revenue cycle of the US
healthcare industry where its global delivery center is located in Colombo. The company is planning to
expand their business operations with their latest branch at Matara and wants it to be one of the
state-of-the-art companies in Matara with the latest facilities.
Assume you have been appointed as the new network analyst of Alliance Health to plan, design and
restructure the existing network. Prepare a network architectural design and implement it with your
suggestions and recommendations to meet the company requirements.
The floor plan of the head office in Colombo is as follows:
Floor 1:
Reception area
Sales & Marketing Department (10 employees)
Customer Services Area – with Wi-Fi facilities
Floor 2:
Administration Department (30 Employees)
HR Department (20 employees)
Accounting & Finance Department (15 employees)
Audit Department (5 employees)
Business Development Department (5 employees)
Floor 3
Video conferencing room
IT Department (60 employees)
The Server Room
Floor 2:
Administration Department (10 Employees)
HR Department (7 employees)
Accounting & Finance Department (8 employees)
IT Department (50 employees)
The conferencing room of the head office and Customer Services Areas of each
branch are to be equipped with Wi-Fi connections .
Connectivity between two branches (Head Office and Matara) would allow the intra
branch connectivity between departments. (Use of VPN is not compulsory)
The necessary IP address classes and ranges must be decided by the network
designer and should be used for all the departments except the server room .
Number of servers required for the Server room need to be decided by the
Network designer and should be assigned with 10.254.10.0/24 subnet. (Uses static
IPs )
Sales and Marketing Team also needs to access Network resources using WIFI
connectivity.
(Note: Clearly state your assumptions. You are allowed to design the network according to your
assumptions, but main requirements should not be violated)
Activity 01
Discuss the benefits and constraints of different network system types that can be
implemented in the Matara branch and the main IEEE Ethernet standards that can
be used in above LAN and WLAN design.
Discuss the importance and impact of network topologies and assess the main
network protocol suites that are used in network design using examples.
Recommend suitable network topology and network protocols for above scenario
and evaluate with valid points how the recommended topology demonstrates the
efficient utilization of the networking system of Matara branch.
Activity 02
Discuss the operating principles of network devices (Ex: Router, Switch, Etc.) and
server types that can be used for above scenario while exploring different servers
that are available in today’s market with their specifications. Recommend
server/servers for the above scenario and justify your selection with valid points.
Activity 03
Prepare a written network design plan to meet the above-mentioned user
requirements including a blueprint drawn using a modeling tool (Ex: Microsoft Visio,
EdrawMax) .T est and evaluate the proposed design by analyzing user feedback with
the aim of optimizing your design and improving efficiency.
(Support your answer by providing the VLAN and IP subnetting scheme for the above
scenario and the list of devices, network components and software used to design the
network for above scenario and while justifying your selections.)
Install and configure Network services, devices and applications (Ex: VLAN,WiFi,
DNS,Proxy, Web, Etc.) according to the proposed design to accomplish the user
requirements and design a detailed Maintenance schedule for above Network.
Activity 04
Implement a networked system based on your prepared design with valid evidences.
Develop test cases and conduct verification (Ex: Ping, extended ping, trace route,
telnet, SSH, etc.) to test the above Network and analyse the test results against the
expected results. Recommend potential future enhancements for the networked
system with valid justifications and critically reflect on the implemented network,
including the plan, design, configurations, tests and the decisions made to enhance
the system.
Grading Rubric
P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication, and
bandwidth requirements.
M1
Assess common networking principles and how protocols enable
the effectiveness of networked systems.
P3
Discuss the operating principles of networking devices and
server types.
P4
Discuss the interdependence of workstation hardware and
relevant networking software
M2
Explore a range of server types and justify the selection of a
server for a given scenario, regarding cost and performance
optimization
LO 1 & LO2
D1 Evaluate the topology protocol selected for a given scenario and
how it demonstrates the efficient utilization of a networking system.
P5
Design a networked system to meet a given specification.
P6
Design a maintenance schedule to support the networked
system.
M3
Analyze user feedback on your designs with the aim of
optimizing your design and improving efficiency.
D2
Critically reflect on the implemented network, including the
design and decisions made to enhance the system.
LO4 : Implement and diagnose networked systems
P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D2 Critically reflect on the implemented network, including the
design and decisions made to enhance the system.
Acknowledgement
I would like to express my special gratitude to our subject Lecture Ms. Haseena
Musadeek & all other individuals who have contributed to the successful
completion of this assignment. Thank you for your guidance, encouragement,
and support throughout this academic endeavour. Your assistance has been
invaluable, and I am truly appreciative of your efforts.
M.I.P Pamod
1 Table of Contents
1. Task 01...............................................................................................................................1
1.8.4 Suitable IEEE standards for above LAN and WLAN network type....................41
1 | Page
NETWORK
2 Task 02.............................................................................................................................43
2.2.4 Selection of Server Types for Cost and Performance Optimization in each
Scenario............................................................................................................................68
3 Task 03.............................................................................................................................79
3.5.1 Response..............................................................................................................87
4 Task 04...........................................................................................................................124
References..............................................................................................................................129
4 | Page
NETWORK
Figure 22 Hubs (Labs, 2023)....................................................................................................50
Figure 23 Switch (Labs, 2023).................................................................................................52
Figure 24 Router (Labs, 2023).................................................................................................53
Figure 25 Bridge (Labs, 2023).................................................................................................56
Figure 26 Gateway (Labs, 2023)..............................................................................................57
Figure 27 Modem (Labs, 2023)................................................................................................58
Figure 28 Repeater (Labs, 2023)..............................................................................................59
Figure 29 Access Point (Labs, 2023).......................................................................................61
Figure 30 Network Interface Card (Labs, 2023)......................................................................64
Figure 31 Firewall (Labs, 2023)...............................................................................................65
Figure 32 Rack server (superrask, 2023)..................................................................................72
Figure 33Tower server (Ingalls, 2023).....................................................................................73
Figure 34 Blade server (wikipedia, 2014)................................................................................73
Figure 35 Mainframe (IBM, 2023)...........................................................................................74
Figure 36 Micro server (Kennedy, 2019).................................................................................75
Figure 37 network software types (Ramya, 2023)...................................................................78
Figure 38 network system design (Author developed)............................................................86
Figure 39 Network system design............................................................................................91
Figure 40 Feedback Form (Author Developed).......................................................................92
Figure 41 Feedback Form (Author Developed).......................................................................93
Figure 42 Feedback Form (Author Developed).......................................................................94
Figure 43Responses (Author Developed)................................................................................94
Figure 44 Responses (Author Developed)...............................................................................95
Figure 45 Responses (Author Developed)...............................................................................96
Figure 46 setep01.....................................................................................................................98
Figure 47 Language Choose.....................................................................................................99
Figure 48 Install Windows.....................................................................................................100
Figure 49 Active windows.....................................................................................................101
Figure 50 Choosing OS..........................................................................................................102
Figure 51step06......................................................................................................................103
Figure 52step07......................................................................................................................104
Figure 53Step08.....................................................................................................................105
Figure 54Step09.....................................................................................................................106
5 | Page
NETWORK
Figure 55step10......................................................................................................................107
Figure 56Step10.....................................................................................................................107
Figure 57 restart......................................................................................................................108
Figure 58 Restarting...............................................................................................................108
Figure 59 Getting Ready........................................................................................................109
Figure 60 Local session Manager...........................................................................................110
Figure 61 Login......................................................................................................................111
Figure 62 Server is ready........................................................................................................112
Figure 63 Step 1.....................................................................................................................113
Figure 64 Step 02...................................................................................................................114
Figure 65 Step 3.....................................................................................................................115
Figure 66 Step 4.....................................................................................................................116
Figure 67 Step 5.....................................................................................................................116
Figure 68 Step 06...................................................................................................................117
Figure 69 Step 07...................................................................................................................117
Figure 70 Step 08...................................................................................................................118
Figure 71 Step 09...................................................................................................................118
Figure 72 Step 10...................................................................................................................119
Figure 73 Step 11...................................................................................................................119
Figure 74 Step 12...................................................................................................................120
Figure 75 Step 13...................................................................................................................120
Figure 76 Step 15...................................................................................................................121
Figure 77 Step 15...................................................................................................................121
Figure 78 Step 16...................................................................................................................122
Figure 79 Step 17...................................................................................................................122
Figure 80 Step 18...................................................................................................................123
Figure 81 Step 19...................................................................................................................123
Figure 82 Step 20...................................................................................................................124
Figure 83step 21.....................................................................................................................124
Figure 84Step 22....................................................................................................................125
Figure 85step 23.....................................................................................................................125
Figure 86Step 24....................................................................................................................126
Figure 87 Step 25...................................................................................................................126
6 | Page
NETWORK
Figure 88 step1.......................................................................................................................127
Figure 89 step02.....................................................................................................................127
Figure 90step3........................................................................................................................128
Figure 91step 4.......................................................................................................................128
Figure 92 step5.......................................................................................................................129
Figure 93 Step6......................................................................................................................129
Figure 94step7........................................................................................................................130
Figure 95 step8.......................................................................................................................130
Figure 96 Implement the Network System by Cisco Packet Tracker (Author developed)....131
7 | Page
NETWORK
1. Task 01
1.1 Network System Types
Advantages Disadvantages
Users have access to files from any networkedViruses and malware transmit quickly
computer. between computers.
Servers can manage data backup, softwareComputers connected to the server may not.
updates, and security. function if it fails.
Use social networking or email to Because there is more data going across the
communicate with others. network, the computer will operate.
slower.
In the context of computer networks, various types of networks serve different purposes.
Here are some common network types in the realm of computing:
PAN (Personal Area Network)
8 | Page
NETWORK
LAN (Local Area Network)
MAN (Metropolitan Area Network)
WAN (Wide Area Network)
VPN (Virtual Private Network)
CAN (Campus Area Network)
WLAN (Wireless Local Area Network)
Virtual Local Area Network (VLAN)
Intranet
Extranet
9 | Page
NETWORK
Without the requirement for centralized coordination by servers or reliable hosts, peers
make a portion of their resources, such as processing power, disk storage, or network
bandwidth, directly available to other network users. Unlike the traditional client-server
architecture, which divides resource consumption and supply, peers are both suppliers and
consumers of resources.
Although P2P systems were previously employed in a wide range of application areas,
Napster, a file sharing service that debuted in 1999, is credited with popularizing
architecture. In several spheres of human interaction, the idea has spawned novel
frameworks and ideologies. Peer-to-peer, as a meme in these kinds of social situations,
alludes to the egalitarian social networking that has proliferated across society, made
possible by Internet technology in general. (Kanade, 2023)
Table 2 Peer to peer (Teach, 2023)
Advantage Disadvantage
No need for a network operating system Because each computer might be being
accessed by others it can slow down the
performance for the user
Does not need an expensive server becauseFiles and folders cannot be centrally backed
individual workstations are used to access theup
files
No need for specialist staff such as network Files and resources are not centrally
technicians because each user sets their own organized into a specific 'shared area'. They
permissions as to which files, they are willingare stored on individual computers and might
to share. be difficult to locate if the computer's owner
doesn't have a logical filing system.
Much easier to set up than a client-server Ensuring that viruses are not introduced to the
network - does not need specialist knowledge network is the responsibility of each
individual user
10 | Page
NETWORK
1.1.3.2 Client server.
A client-server relationship is one in which a software asks another program, the server, for
a resource or service. In the past, the term "client-server" was used to differentiate between
the monolithic, centralized computing approach employed by mainframes and distributed
computing by PCs.
Computer transactions where a server responds to a client request are quite popular these
days. These days, one of the main concepts of network computing is the client-server
architecture. In this scenario, a LAN or WAN, such the internet, is used by the client to
connect to the server.
The connection ends when the server satisfies the client's request. When more than one
client software uses the same server program, a special server known as a daemon may start
up to wait for requests from clients.
Most of the network traffic in the early days of the internet flowed through what is referred
to as north-south traffic. This is the process by which data is sent between servers in data
centers that host the web content and distant clients that request it. Today, with the
maturation of virtualization and cloud computing, network traffic is increasingly likely to
travel server-to-server - a pattern known as east-west traffic.
As a result, network management now prioritizes decentralized security models that regulate
user access to services and data rather than centralized security models that guard the
network perimeter. Additionally, network experts evaluate network activity to make sure
rules and laws are being followed.
11 | Page
NETWORK
Figure 2client sever (KITRUM,2023)
Advantage Disadvantage
All files are stored in a central location A specialist network operating system is
needed
Network peripherals are controlled centrally The server is expensive to purchase
Backups and network security is controlledSpecialist staff such as a network manager is
centrally needed
Users can access shared data which is If any part of the network fails a lot of
centrally controlled disruption can occur
12 | Page
NETWORK
Figure 3 Personal Area Network(geeksforgeeks,2023)
Advantage Disadvantage
13 | Page
NETWORK
1.1.4.2 LAN (Local Area Network)
The most used type of network is LAN. A local area network, or LAN, is a type of
computer network that links computers locally, or across a shared communication channel.
Any two or more PCs linked via a server are included in a LAN. Ethernet and Wi-Fi are the
two key technologies used in this network. It has a 2 km range, a very fast transmission
speed, cheap maintenance costs, and easy upkeep. (GeeksforGeeks, 2023)
Example Of LAN are networking in a home, school, library, collage, office, etc.
Advantage Disadvantage
All the user work can be stored in a central Installation Charge is Expensive
place hub.
14 | Page
NETWORK
if the server fails
Faster Communication Dependency
Metropolitan Area Network is what MAN stands for. It's a computer community that joins
many nearby place networks (LANs) to create a larger network for the motive of sharing pc
assets. While a WAN is intended to cowl the entire city, this form of community covers a
much wider region than a LAN but a lesser region than that of a WAN. MAN is specifically
made to give customers access to high-speed connectivity with Mbps-based speed ranges.
Because of its intricate architecture, MAN is challenging to develop and maintain.
(GeeksforGeeks, 2023)
15 | Page
NETWORK
Table 6 Advantage and Disadvantage in MAN (Author Developed)
Advantage Disadvantage
16 | Page
NETWORK
Figure 6 Wide area network (GeeksfodGeeks,2023)
Advantage Disadvantage
17 | Page
NETWORK
1.1.4.5 Virtual Private Network (VPN)
The virtual private network is known as a VPN. Technology known as a virtual private
network (VPN) establishes a secure, encrypted link over a less secure network, such the
Internet. Using a public network like the Internet, a virtual private network can be used to
expand a private network. All that the term implies is that it is a "Virtual Private Network,"
meaning that a user can join a local network from a distance. To provide a secure
connection, it uses tunneling techniques. (GeeksforGeeks, 2023)
Advantage Disadvantage
Reduces Data Breaches & Cyber Threats VPNs are Illegal in Many Countries
18 | Page
NETWORK
1.1.4.6 Wireless local Area network (WLAN)
A network that permits wireless connections and communication between devices is known
as a WLAN (wireless local area network). WLAN devices communicate with one another
using Wi-Fi, as opposed to a traditional wired LAN, where devices connect via Ethernet
cables. A WLAN looks different from a regular LAN, yet it serves the same purposes. It's
usual practice to add and configure new devices using DHCP. They have the same kind of
communication capabilities as wired devices with other network devices. The way that
information is communicated is the primary difference. Data is transferred via physical
connections in a LAN as an Ethernet packet sequence. In a WLAN, packets are sent over
the air.
Alongside the rise in popularity of wireless devices are WLANs. The bulk of router sales
currently are of wireless models. Any Wi-Fi capable device in the router's wireless signal
range can connect wirelessly by using the router as a base station. This category includes
laptops, tablets, cellphones, and other wireless devices including smart home controls and
appliances. To allow connected devices to access the Internet, wireless routers are often
linked to a cable modem and sometimes another device.
Figure 8 WLAN(Huawei,2023)
19 | Page
NETWORK
Table 9 WLAN (Author Developed)
Advantage Disadvantage
20 | Page
NETWORK
an institution when connected with each other combine to form Campus Area Network
(CAN).
The below figure illustrates a Campus Area Network:
Short, high message frequency, more than Because of electrical loading, the number of
10,000/s. connected devices is limited to a maximum of
64 nodes.
1.1.4.8 Intranet
An intranet may be defined as a personal network utilized by an organization. Its number one
purpose is to assist personnel securely communicate with each other, to keep statistics, and to
help collaborate.
Intranet use.
An intranet software is primarily used by organizations as a tool to:
Share organizational updates.
Store files
Connect employees.
Collaborate with teams across borders.
Increase productivity.
Give employees a voice in the organization.
22 | Page
NETWORK
1.2 Data communication
All networks are built on the same standards, networking standards govern the hardware and
software that uses them and define the rules for data communications that are needed for
interoperability between devices, official organizations that publish regulated standards are:
23 | Page
NETWORK
(Arley, 2021)
- International Standards Organization (ISO)
- International Telecommunication Union (ITU)
- Institute of Electronics and Electrical Engineers (IEEE)
- American National Standards Institute (ANSI)
- Internet Research Task Force (IETF)
- Electronic Industries Association (EIA)
During data communication different standards can be used at the same time at different
layers, the commonly used are:
Application layer − HTTP, HTML, POP, H.323, IMAP
Transport layer − TCP, SPX
Network layer −IP, IPX
Data link layer − Ethernet IEEE 802.3, X.25, Frame Relay
Physical layer −RS-232C (cable), V.92 (modem)
1.3.1.2 IEEE
IEEE Ethernet standards are a set of technical specifications produced by the Institute of
Electrical and Electronics Engineers (IEEE) for Ethernet networking. These standards specify
many features of Ethernet, such as its physical layer, data connection layer, and network
layer. Ethernet is a sort of local area network (LAN) technology that connects devices in a
network by utilizing a standard communication language. (Sushant, 2023)
24 | Page
NETWORK
Table 11 IEEE 802 Standards (Sushant, 2023)
Standards Name
802.6 MAN
Organizations utilize network topology to determine how their network nodes are linked to
each other. The two major types of topologies are physical and logical. Physical network
topology refers to the structure of the physical media for data transfer. On the other hand,
logical network topology relates to how the network sends data between devices, independent
of how these devices are connected physically.
25 | Page
NETWORK
The structure of a network can directly affect its functionality. Therefore, enterprises must
adopt the most suited topology for their network to improve performance and enhance data
efficiency. The right topology also improves resource allocation and saves operating
expenses.
Different types of network topologies exist, and companies may pick the one that best
matches their requirements by evaluating the size, budget, and goals of their firm.
Before finishing the network topology design, a full understanding of the functionality of the
network is required. Once that is completed, a network topology mapping software may
create topology diagrams that offer a visual perspective of the network environment. Such
software would also be beneficial for seeing the way devices link, which may assist IT teams
determine the most effective structure.
Once a network arrangement is established, the following stages would be to execute the
specified network topology, automate it, regularly monitor its performance, and fix any
problems that may develop. Here, configuration management tools, topology design software,
and network management solutions might be advantageous. (Hossein, 2022)
26 | Page
NETWORK
1.4.1 Types Of Network Topology
27 | Page
NETWORK
Figure 13 Point to point topology (Ashtari, 2023)
Advantage Disadvantage
Superior bandwidth, as only two nodes useOnly applicable for small areas with nodes
the link physically close to each other
High speed when compared to other types ofHigh dependence on the common link; if the
network topologies link fails, the network goes down
Simple to implement Only useful if the network has two nodes:
thus, not applicable for many modern use
cases
Easy to maintain and handle
28 | Page
NETWORK
Figure 14 Bus Topology (Ashtari, 2023)
In such a configuration, the server node sends data from one end of the cable and in a single
direction to the client node. As the data goes to each node, its destination address (MAC/IP)
is verified to determine if it is received and processed. If there is a mismatch in the address,
the node does not do anything with the data.
This manner, only the node that knows its address uses the data that passes on the single
wire, while the other nodes are unaffected. Once the data reaches the end of the line, the
terminator eliminates it to avoid signal bouncing. (Ashtari, 2023)
Advantage and disadvantage in Bus topology
Table 13 Bus topology (Ashtari, 2023)
Advantage Disadvantage
Easy to add new devices and replace or Device failure and other network faults are
remove existing devices without affectingdifficult to locate in the network
other devices connected to the network
Failure in a few devices does not affect otherDamage to the backbone cable can bring the
devices, or the network entire network to a halt
Less cable is required when compared to Increase in the bandwidth consumption of a
other network topologies such as mesh andfew devices can affect the performance of the
29 | Page
NETWORK
star; the cable can be extended easily whole network
whenever required
Coaxial or twisted pair cables are mainly used Slower operations, as only one node transmits
in bus-based networks that support up to 10 data at a time
Mbps.
Bus topology is familiar technology as Low privacy, as all nodes receive the signal
installation and troubleshooting techniquessent by the server
are well known.
The cost of the cable is less compared to other Data loss over long distances
topologies, but it is used to build small
networks.
Advantage Disadvantage
Circular flow of data minimizes packet A single failure in the cable can disrupt
collision overall network operations
Unidirectional ring topologies feature high-Unidirectional ring networks see data packets
speed data transmission pass through numerous nodes before reaching
their destination
Robust system–can handle a high number of Adding, modifying, or removing nodes is
nodes and heavy traffic difficult and can disrupt network activity
Lower chances of data loss over longThe addition of stations in between or the
distances removal of stations can disturb the whole
topology.
Faults are located more easily, makingSecurity and privacy issues are becoming
troubleshooting efficient more apparent as data travels through all
devices.
Circular flow of data minimizes packet Troubleshooting is difficult in this topology.
collision
31 | Page
NETWORK
Figure 16 Star Topology (Ashtari, 2023)
In such a system, if one endpoint wishes to communicate data to another endpoint, it must
make the request to the central hub, passing the message to the intended destination.
Advantage Disadvantage
Easy network maintenance and managementChoosing the right central hub is vital, as this
since each node has its own cable device needs to be compatible with all nodes
and links in the network
Failures affect only one device and problem Higher requirement of cables and connectors
areas are located swiftly
Adding new devices is simple andFailure of the central hub brings down the
straightforward entire network
Rapid data transfer Performance is based on the single
32 | Page
NETWORK
concentrator i.e., hub.
It is Robust. If one link fails only that link The cost of installation is high.
will affect and no other than that.
Compared to Bus Topology and RingCompared to the Bus topology, this
Topology, Star Topology offers higher levelsarchitecture calls for additional cables.
of security and privacy.
33 | Page
NETWORK
Three topologies are suitable for large networks such as offices, university campuses, and
hospitals.
Advantage Disadvantage
Ideal for nodes that are grouped together Large volume of cabling and numerous hubs
is required
Superior scalability: more nodes andDifficult to configure and maintain
hierarchies can be added without disrupting
the existing network
In case of damage to one part of the network, Failure of the central backbone (trunk) brings
other nodes and hierarchies remain unaffected the entire network down
Swift and easy fault identification andIf new devices are added, it becomes difficult
maintenance to reconfigure.
High-speed data transfer among nodes in oneIf the central hub gets fails, the entire system
hierarchy fails.
Error detection and error correction are veryAs more devices are connected to it, its
easy in a tree topology. performance, speed, and efficiency suffer.
34 | Page
NETWORK
Figure 18 Mesh Topology (Ashtari, 2023)
Full mesh networks, wherein each node is linked to every other node, are normally reserved
for important networks as they are exceedingly costly to create and complex to maintain. IT
teams also have the option of constructing partial mesh networks, wherein all the nodes are
not linked. This is less cost-intensive and easier to construct; but it does not have all the
advantages of a complete mesh network.
Table 17 Mesh topology (Ashtari, 2023)
Advantage Disadvantage
Extremely robust and redundant, as any nodeRequires many cables and input/output (I/O)
or link failure, affects a minimum number of ports
endpoints
Highly efficient data transfer due to dedicatedTime-consuming installation and maintenance
point-to-point links for all devices
35 | Page
NETWORK
Robust security and privacy Cost-intensive
36 | Page
NETWORK
The two most widely utilized hybrid topologies are the star-bus and star-bus. In the former,
the center hubs of numerous star topologies are linked using a ring topology. In the latter,
the hubs of several star topologies are connected using a bus topology.
Advantage Disadvantage
37 | Page
NETWORK
This guarantees that an IT admin can properly map the organization's network stretching
across many regions.
A protocol is a collection of rules that are used in networking to organize and handle data.
Network protocols act similarly to a universal language for computers. Even though the
38 | Page
NETWORK
software and hardware used by the computers in a network may be substantially different,
protocols allow them to interact with one another.
Standardized protocols, like a common language that two people from different regions of
the world can use even if they don't understand each other's native tongues, are like a
common language that computers can use. Like how the United Nations employs its six
official languages to permit communication among its officials from all over the world, two
computers that use the Internet Protocol (IP) may interact with each other. But, if one
computer utilizes IP and the other does not, they will be unable to interact. (Keary, 2023)
It’s worth mentioning that TCP will establish a connection between the origin and the
destination devices before attempting to send data. This three-way handshake is detailed
shortly below:
- The client or web browser sends the destination server a Synchronize Sequence
Number (SYN).
- The destination server sends an acknowledgement message known as SYN-ACK.
- The original device receives the SYN-ACK message and creates an ACK
acknowledgement message, which finalizes the connection.
39 | Page
NETWORK
While this improvement in speed comes at the sacrifice of accuracy, UDP better supports
video/audio streaming services, online gaming, or voice-over-internet-protocol (VoIP)
conversations, which can manage some degree of data loss.
Another significant distinction between the two is that UDP won’t attempt to establish a
connection before passing packets on to the destination. At the same time, it also doesn’t
ensure the transmission of data to the other device. (Keary, 2023)
Many firms utilize FTP because of its capacity to deliver huge files or much data at once in
a method that’s fast and efficient. Unfortunately, this efficiency comes at the cost of
security as FTP sends all data in plain text.
For this reason, many businesses elect to adopt a secure variant of FTP called File Transfer
Protocol Secure Sockets Layer (FTPS), which works the same but employs SSL encryption
to hide the sent data. (Keary, 2023)
The server holding the material will then react and enable the client to load all the required
text, pictures and videos included on the page. HTTP’s request-response cycle is illustrated
shortly below:
- The client sends an HTTP request message to the web server to seek access to the
web page content.
- The web server processes the request message.
40 | Page
NETWORK
- The web server delivers a response message that includes the requested content or
web page.
- The client gets the message and loads the material in the web browser for the end
user to view.
There is also an encrypted version of HTTP called HTTPS, which employs SSL/TLS
encryption to encrypt requests and answers so they can’t be seen by third parties.
Network monitoring tools commonly utilize SNMP to monitor the performance and
condition of devices throughout a network in real time.
The protocol operates with an SNMP manager or software client issuing SNMP GET
requests to SNMP-enabled devices.
SNMP-enabled devices each have a local SNMP agent that gathers performance data from
the device and will pass this information to the SNMP manager so that an administrator may
receive a top-down view of performance and status. (Keary, 2023)
Troubleshooting tools such as Ping make ICMP queries to a device and measure the round-
trip time, or the time it takes for the device to respond to the request. The degree of delay in
the answer may then be used to measure the quality of the connection.
Other tools such as traceroute employ ICMP to debug and assess the efficiency of network
pathways, showing the user how much time, it takes to travel from one device to another.
41 | Page
NETWORK
Sometimes, hackers would utilize the protocol as part of an ICMP flood attack where they
attempt to overload a server with bogus ICMP queries to divert its computational resources
away from the end user. (Keary, 2023)
Email platforms like Microsoft Outlook may utilize POP3 to gather email messages from
distant servers over TCP/IP so that they’re available off-line.
Under the default configuration, all emails are erased from the server automatically once the
download is complete, but the user may alternatively enable it to store emails on the server
for a particular time. (Keary, 2023)
The key difference between IMAP and POP3 is that the latter only allows users to download
and read emails locally on the same computer. IMAP also doesn’t automatically erase
emails from the server. (Keary, 2023)
42 | Page
NETWORK
Briefly, a firm will first build an SMTP server, which employees may connect to and
communicate with using a mail user agent (MUA) or email client such as Gmail. Through
this connection, they may deliver emails to the SMTP server and other users.
Unlike POP3, SMTP cannot retrieve emails from a mailbox, and unlike POP3, it doesn’t
immediately destroy emails. (Keary, 2023)
The present Internet is not built on OSI, but on the simpler TCP/IP architecture. However,
the OSI 7-layer model is still extensively used, as it helps visualize and describe how
networks operate, and helps isolate and diagnose networking problems.
OSI was introduced in 1983 by representatives of the main computer and telecom firms and
was accepted by ISO as an international standard in 1984. (LearningCenter, 2023)
43 | Page
NETWORK
Figure 20 OSI Model (Woojae, 2023)
7. Application Layer
The application layer is utilized by end-user applications such as web browsers and email
programs. It offers protocols that allow software to exchange and receive information and
deliver useful facts to users. A few examples of application layer protocols include the
Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Post Office Protocol
(POP), Simple Mail Transfer Protocol (SMTP), and Domain Name System (DNS).
6. Presentation Layer
The presentation layer prepares data for the application layer. It outlines how two devices
should encode, encrypt, and compress data so it is received appropriately on the other end.
The presentation layer accepts any data transmitted by the application layer and prepares it
for transmission across the session layer.
5. Session Layer
The session layer generates communication channels, called sessions, between devices. It is
responsible for starting sessions, ensuring they remain open and functional while data is
being exchanged, and terminating them after communication finishes. The session layer can
also define checkpoints during a data transmission—if the session is stopped, devices can
continue data transfer from the latest checkpoint.
44 | Page
NETWORK
4. Transport Layer
The transport layer takes data sent at the session layer and divides it into “segments” on the
sending end. them is responsible for reassembling the segments on the receiving end,
putting them back into data that can be utilized by the session layer. The transport layer
carries out flow control, providing data at a pace that matches the connection speed of the
receiving device, and error control, verifying if data was received erroneously and if not,
requesting it again.
3. Network Layer
The network layer has two basic roles. One is splitting apart segments into network packets
and reassembling the packets on the receiving end. The other is routing packets by
identifying the optimum path over a physical network. The network layer employs network
addresses (usually Internet Protocol addresses) to route packets to a target node.
1. Physical Layer
The physical layer is responsible for the physical cable or wireless connection between
network nodes. It defines the connection, the electrical cable or wireless technology
connecting the devices, and is responsible for transmission of the raw data, which is just a
series of 0s and 1s, while taking care of bit rate regulation.
45 | Page
NETWORK
- Each layer's role should be chosen in line with processes that are internationally
standardized.
- To avoid various functions from being placed on the same layer, there should be
several layers. Yet, it should also be small enough to preclude unduly complicated
development.
- To carry out core operations, each layer of the OSI model is dependent on the layer
behind it. Every lawyer should be able to deliver services to the one above it.
- If modifications are made to one layer, the other layers should not need to be
modified.
TCP/IP was created and developed by the Department of Defense (DoD) in the 1960s and is
based on standard protocols. It stands for Transmission Control Protocol/Internet Protocol.
The TCP/IP model is a condensed version of the OSI model. It comprises four layers, unlike
the seven layers of the OSI model.
The number of layers is sometimes referred to as five or four. Here In this essay, we’ll cover
five levels. The Physical Layer and Data Link Layer are referred to as one single layer as
the ‘Physical Layer’ or ‘Network Interface Layer’ in the 4-layer reference.
(GeeksForGekks, 2023)
46 | Page
NETWORK
Figure 21 TCP/IP layer (LearnLoner, 2023)
47 | Page
NETWORK
Usage It is low in usage. It is mostly used.
Replacement Replacement of tools and changes Replacing the tools is not easy as it is in
can easily be done in this model. OSI Model.
Reliability It is less reliable than TCP/IPIt is more reliable than OSI Model.
Model.
48 | Page
NETWORK
A WAN can employ several technologies such as leased lines, dedicated circuits, or the
Internet to create communication between the main branch and other sites. The utilization of
a WAN enables for easy communication and data exchange between disparate sites, giving a
unified network experience for all users.
1.8.4 Suitable IEEE standards for above LAN and WLAN network type
For LAN
EEE 802.3, popularly known as Ethernet, is a widely used standard for wired LAN
networks. It defines the physical layer and the data connection layer of the network protocol
stack. Ethernet employs CSMA/CD (Carrier Sense Multiple Access with Collision
Detection) as its medium access control (MAC) technique to regulate network traffic and
minimize data collisions. The standard provides several data transfer speeds, such as 10
Mbps, 100 Mbps, 1 Gbps, and 10 Gbps, and different types of cable, such as twisted pair,
fiber optic, and coaxial. Ethernet is compatible with most network equipment, such as
switches, routers, and network interface cards (NICs), and is used for connecting PCs,
servers, printers, and other network devices inside a LAN network.
For WLAN
IEEE 802.11, popularly known as Wi-Fi, is a widely used standard for wireless LAN
networks. It defines the physical layer and the media access control (MAC) layer of the
network protocol stack. Wi-Fi employs several frequency bands, such as 2.4 GHz and 5
GHz, and different modulation methods, such as Frequency Shift Keying (FSK) and
49 | Page
NETWORK
Quadrature Amplitude Modulation (QAM), to transport data wirelessly. The standard
provides several data transmission speeds, such as 1 Mbps, 2 Mbps, 11 Mbps, 54 Mbps, and
higher, and different methods of wireless security, such as WEP, WPA, and WPA2. Wi-Fi
is compatible with most wireless devices, such as laptops, smartphones, tablets, and IoT
devices, and is used for enabling wireless connection to the network inside a WLAN
network.
50 | Page
NETWORK
2 Task 02
In simple words, a network device is a physical item that is used to link other physical
devices on a network. In certain circumstances, its duty is to merely forward packets of
information to a destination. In other circumstances, it can be to function as a translator or
to filter suspect network traffic.
2.1.1.1 Hubs
Hubs are used to connect numerous network devices together. They may be used to transfer
both digital and analogy information. Digital information is conveyed in packets, whereas
analogy information is delivered as a signal. Hubs also operate as a repeater, which
enhances signals that have degraded after being carried across a long distance. Hubs
function at the Physical layer of the Open Systems Interconnection (OSI) paradigm.
Advantage of Hub:
- Connectivity: The major role of the hub is to let clients to attach to a network in order
that they will exchange and hold discussions. For this reason, hubs utilize network
protocol analyser.
51 | Page
NETWORK
- Performance: Hub is understood for having very minimal amount of performance
effects on the network. This is generally because it runs utilizing a broadcast
paradigm which seldom impacts the network.
- Cost: Comparing to switches, hubs are extremely affordable. Basically, owing to its
sort of simplicity. Therefore, they will enable you to save heaps of money. And,
thanks to their items they are extensively available inside the market.
- Device Support: Hubs may link multiple forms of media all at once with a single
hub. Albeit the media wish to function at distinct speeds they will be wont to back
them.
Disadvantage of Hub:
- Collision Domain: The function of the collision domain and again transmission of
packet does not influence it raises more chances of collision in between domains.
- Full-Duplex Mode: Hubs cannot communicate completely duplex mode; it can only
work in half-duplex mode. Half-duplex mode, in essence, meaning data are typically
transferred just one instance at a given time. Therefore, the hub must continually swap
its modes.
- Specification: Hubs cannot handle networks that are vast like a token ring. This is
frequently because hubs must distribute data across all the devices inside the network.
- Network Traffic: As the attachment was received in the packet therefore it cannot
cut traffic. Hence, hubs create a large level of network traffic.
- Bandwidth Wastage: Hubs cannot supply dedicated bandwidth for every device, it is
to share them. When delivering huge bits of information all the bandwidths are going
to be taken by the two computers leaving other computers with sluggish network.
52 | Page
NETWORK
2.1.1.2 Switch
A switch is a multiport network device whose aim is to increase network efficiency and
improve communication between hubs, routers, and other network devices. Switches are
sophisticated devices that acquire information from incoming packets to forward them to
the right destination. Switches often have minimal knowledge about the other nodes on the
network.
Advantage of Switch:
- They simplify network management by centralizing the management to the switch.
- The switch includes extra security measures and may be used to implement VLAN
which isolates multiple ports on the same switch.
- By employing a switch each device has a dedicated connection which decreases
packet collision difficulties. This enhances the speed and general performance of the
network.
- A network constructed using a switch is simple to grow since the number of devices
that may be connected is simply limited to the number of ports on the switch.
Disadvantage of Switch:
- The switches are expensive to purchase.
- Networks are usually used to link devices inside the same network. So, they are
confined solely to LAN networks.
- Advanced switches like managed are complicated to configure and they require an
expert.
- It establishes a single point of failure. When the switch fails the whole network fails.
53 | Page
NETWORK
- Switches require frequent maintenance to keep them running effectively.
2.1.1.3 Router
The fundamental job of the router is to forward packets of information to their destinations.
Routers are more sophisticated than hubs or switches as they keep information about the
other network devices they are linked to. Routers can play an essential role in network
security since they can be configured to operate as packet-filtering firewalls and reference
access control lists (ACLs) while forwarding packets. In addition to filtering approved
network traffic, they also are used to partition networks into subnetworks, thereby
permitting a zero-trust architecture.
Advantage of Router:
54 | Page
NETWORK
climate is secure somewhat. While this isn’t a swap for an antivirus or a firewall, it
is laudable.
- Dynamic Routing: For increasing internetwork correspondence, the Routers
employ dynamic directing techniques. Dynamic directing selects the greatest route
available for the internetwork. And moreover, it produces broadcast and effect
zones. This would ultimately be able to minimize the organizational traffic.
- Reinforcement Plan: On the off chance that if one of the outer organization
segments ends up falling flat, switches employ elective parts for staying away from
troubles in directing rush hour congestion. Associations notably to a big extent take
utilization of this to control traffic effectively.
- NAT Usage: Routers make use of Network Address Translation (NAT). NAT
Routers can share the association by employing one public IP address and
percentage of UDP ports. Additionally, it is essentially inconceivable for major
firms to interact with the web without NAT.
Disadvantage of Router:
- Speed: In contrast to repeaters and scaffolds, Routers don’t just examine 2 tiers of
information’s. It entirely explores information from physical to arrange layer.
Subsequently the association might turn out to be modest. Also utilizing switches,
multiple PCs might share the organization for which the switch goes through a
scenario known as “Connection Wait”. This possibly eases back the connection more.
55 | Page
NETWORK
- Cost Routers: Are pricey more than some other systems administration devices. This
comprises center point, extension, and security. Accordingly, Routers are not typically
the greatest choice regarding cost.
- Similarity: There is also a similarity difficulty for the Routers specifically for the
5GHz recurrence. Except if your PC and its connections do uphold designs of 5GHz
recurrence you can’t acquire its advantages. Subsequently, you must consider opting
for a less costly Routers.
- Unwavering quality: Not all the time switches are trustworthy. Still some cutting-
edge gadgets employ a 2.4GHz spectrum which often becomes disconnected. Most
now and then these forms of separations are doable by those living in pads and
condominiums.
- Usage: An ordinary Routers wants heaps of starting arrangements and NAT to setup.
And in any case, for the easiest association there should be a private IP address doled
out. On the off chance that there are more administrations empowered it demands
extra designs also. This essentially produces extra difficulties in the arrangement.
2.1.1.4 Bridge
A bridge is used to connect hosts or network segments together. As with routers, they may
be used to split bigger networks into smaller ones, by sitting between network devices and
managing the flow of data. A bridge also has the capacity to filter packets of data, known as
56 | Page
NETWORK
frames, before they are forwarded. Bridges are not as common as they once were, and are
now being replaced by switches, which give superior functionality.
Advantage of Bridge:
- Improved Network Performance: Bridges can enhance network performance by
lowering network congestion and enhancing data transmission speeds, resulting in
higher network speeds and reduced latency.
- Flexible Network Design: Bridges enable flexible network design by permitting the
connection of numerous network technologies and kinds, including Ethernet, Token
Ring, and FDDI, among others.
Disadvantage of Bridge:
- Limited Scalability: Bridges may not be scalable in bigger networks, as the number
of devices and network segments rises, which can lead to network congestion and
performance deterioration.
57 | Page
NETWORK
- Single Point of Failure: Bridges can be a single point of failure in the network, and
if they fail, it can cause network outage until the bridge is rebuilt.
- Higher Cost: Bridges can be more expensive compared to other network devices,
such as hubs, which might make them less cost-effective for smaller networks.
2.1.1.5 Gateway
A gateway device is used to improve interoperability between different technologies such as
Open System Interconnection (OSI) and Transmission Control Protocol/Internet Protocol
(TCP/IP). In other words, they translate each other’s communications. You may conceive of a
gateway as a router, but with extra translation capability.
Advantage of Gateway
- It is feasible through gateways that smart items rely on fog computing for data transit
between user and server.
- Gateways give a solution for the practicality of smart objects without lowering the
intelligence of things as there is no need to transmit the intelligence of objects on the
server-side thereby retaining performance and accessibility.
58 | Page
NETWORK
- Gateways facilitate the usage of smart objects energy efficiently as data transfers do
not rely on the smart device and transfers between devices and gateways are feasible
using low energy choices like BLE, ZigBee, or Bluetooth.
- Gateways open a new technology to the world, i.e., fog computing.
- Gateways might give an extra layer of protection to the data if specific changes are
implemented to them.
- Gateways make data encryption, data analysis, and handling feasible so that a new
phase of smart things is available to consumers.
- Gateways push industry to develop and make it feasible for industries to expand more.
- Gateways lead industry and build up an employment chance. As if development to
gateways is done there are more individuals thinking to make gateways more
practicable and overcome constraints.
Disadvantage of Gateway
- Its implementation is difficult and costly.
- It is hard to manage.
- It causes time delays because the conversion of data according to the network takes
time.
- Failure of the gateway can cause the failure of connection with other networks.
2.1.1.6 Modem
A modem, which is short for “modulators-demodulators”, is a piece of network gear that is
used to transform digital communications into analog signals, to transport them over analog
telephone lines. When the signals arrive at the destination, another modem will transform
the analog signals back to a digital version.
59 | Page
NETWORK
Figure 27 Modem (Labs, 2023)
Advantage of Modem
- The modem is more helpful in connecting LANs with the internet.
- Modem speed depends on the cost, the more is the cost more powerful the modem.
- A modem is the most probably used in data communication roadway.
- A modem converts digital signals into analog signals.
Disadvantage of Modem
- The modem lacks in providing traffic maintenance.
- It is just an interface between LAN and the Internet.
- It can make the computer vulnerable to hackers and malware.
2.1.1.7 Repeater
Repeaters are sometimes also known as “Signal Booster”. The main function of the repeater
is to regenerate an incoming signal from the sender before retransmitting it to the receiver.
The layer at which it operates is the physical layer of the OSI model.
60 | Page
NETWORK
Figure 28 Repeater (Labs, 2023)
This layer is principally responsible for the actual transmission and receipt of the data across
the physical media such as cables or fiber optics. A repeater can expand the range of the
network by enhancing the signal and lowering the inaccuracy and loss of data. Apart from
that, repeaters are also responsible for transforming the data between other network
channels, such as optical, wireless, or electrical signals.
Advantage of Repeaters:
- Cost: The cost of repeaters is cheaper than compared to the other network. They’re
going to be acquired for little expense. However, that does not conceal the actual
truth that it demands other sorts of expenses. One example is the consumption of
power.
- Enhance Signal: Whenever a computer and a router are located far away, it’ll end
in weak signals. Repeater has the capacity to amplify signals so that they are often
retransmitted considerably stronger with higher performance.
61 | Page
NETWORK
- Network Extend: Other than improving signals, repeaters have the capacity to
extend the length of the transmission. It means it may expand the complete distance
covered by the network although it is a wired or a wireless medium.
- Physical Barriers: Physical obstacles may lead to the lowering of the overall
signals of wireless communication. Employing a wireless repeater, these effects are
typically decreased so that there will be an assurance that signals are getting to be
supplied to the computers.
- Media Support: In repeaters, networks are commonly connected for receipt and
transmission via various physical media. The main popular form of media is that the
cables.
Disadvantages of Repeaters
- Network Traffic: Repeaters are unable to separate network traffic. Hence, they lack
the potential to relieve congestion also as network traffic.
- Specification: Repeaters are also unable to join networks of various designs. For this
reason, either a gateway or a router is necessary.
- Network Segmentation: Repeaters don’t have the potential to segment the network.
It cannot establish distinct traffic from one cable to a special.
- Collision Domain: The Repeaters cannot distinguish the devices as all the
information is delivered to numerous domains. Moreover, repeaters cannot distinguish
if it is a neighborhood of the same collision domain.
62 | Page
NETWORK
- Bandwidth Usage: This repeater sends the signals in both the ways between the
router and the PC. After the steady connection, the bandwidth gets half.
Apart from this, an access point may also be deployed to expand the range and power of
wireless transmissions. Most of the time, it is utilized in large businesses or public venues
that require wireless connectivity to numerous people or devices. Further, it may handle
several wireless standards and protocols, such as Wi-Fi, Bluetooth, or IoT.
63 | Page
NETWORK
- Normally the wireless router permits 10 – 20 people or devices to access the
network. While WAP permits 50 – 100 or more users or devices to access the
network.
- The WAP has a greater ability to send and receive signals which permits heavy
usage.
3. Flexible Networking:
- It is known that wireless networking, except in households, frequently requires
several wireless devices and varied networking patterns inserted dependent on the
surroundings and requirements of the business sites.
4. Mobility:
- Users may roam freely while still being connected to the network.
2. Poor stability:
- As wireless networks use air as a transmission medium, so the network stability is
poor and slower in WAP as compared to the cable network because the transmission
64 | Page
NETWORK
medium in wired network is cable. Especially in WLAN, there are more devices still
it is slow, and a cable network is faster and more stable than a wireless network.
- The wireless signals are blocked due to certain obstacles such as heavy rain, great
walls, gates, storms, heavy wind, large gatherings of human beings, etc.
- The signal strength also depends upon the location where the wireless network is
implanted.
3. Less Secure:
- As compared to the wired network it is less secure because the user is using radio
waves for transmission and someone or a hacker on that network could sniff the
traffic.
4. Limited range:
- The range of WAP can be affected by many factors like physical barriers,
interference with other wireless devices, and environmental conditions.
5. Bandwidth limitations:
- It can be affected by bandwidth limitations, and lead to reduced speed and reliability
of the network.
2.1.1.9 NIC
NIC stands for Network Interface Card and works at the data link layer (Layer II) of the OSI
architecture. It is a physical component that is responsible for enabling a device to connect to
a network. A NIC also contains one or more ports that allow different types of cables or
wireless signals to connect to the network.
65 | Page
NETWORK
Figure 30 Network Interface Card (Labs, 2023)
NIC further provides a physical interface for data transmission and reception purposes.
Apart from that, it also has a unique MAC address that identifies the device in a network.
Some of the major tasks performed by NIC are data transfer, network traffic engineering,
and interrupt support.
Advantage of NIC
- The information move is exceptionally dependable among the hubs.
- Enormous measure of information can be shared or moved between numerous
clients.
- The web speed for correspondence making conceivable is normally high in
gigabytes.
- By using numerous ports of NIC cards that are given, a few peripherals can get
stopped.
- The correspondence speed utilizing the Internet is generally high in Gigabytes.
- Numerous fringe gadgets can be associated utilizing numerous ports of NIC cards.
- Mass information can be divided between numerous clients.
Disadvantage of NIC
- Badly designed if there should arise an occurrence of wired link NIC, as it isn’t
convenient like a remote switch.
- The design should be legitimate for better correspondence.
66 | Page
NETWORK
- Information is unstable.
- By using numerous ports of NIC cards that are given, a few peripherals can get
stopped.
- Security is minimally low.
- To make fine correspondence the arrangement should be exact.
- At the point when wired links are used in Network Interface Card transportability
isn’t economical and cause inconveniences.
2.1.1.10 Firewall
A firewall is an intermediate device that functions at various levels of the OSI Model
depending on its nature. It can be either hardware or software, and its main goal is to protect
the network from any unwanted access or harmful assaults by enforcing regulations or rules.
Now, the question that arises is how these attacks can be stopped. All malicious activities
can be controlled via a firewall as it can block or allow packets based on their source,
destination address, port number, or protocol type.
67 | Page
NETWORK
- Unified threat management (UTM) firewall
- Next-generation firewall (NGFW)
- Threat-focused NGFW
These are the various networking devices mainly used in Computer Networks.
Advantage of Firewall
- Protection against unauthorized access: Firewalls may be set up to block
incoming traffic from certain IP addresses or networks, preventing hackers or other
bad actors from readily accessing a network or system. Protection from unwanted
access.
- Prevention of malware and other threats: Malware and other threat prevention:
Firewalls may be set up to block traffic associated with known malware or other
security problems, aiding in the defense against these sorts of assaults.
- Monitoring of network activity: Firewalls may be set up to record and keep track
of all network activity. This information is vital for spotting and looking into
security risks and other forms of suspicious conduct.
Disadvantage of Firewall
68 | Page
NETWORK
- Complexity: Setting up and keeping up a firewall may be time-consuming and
complicated, especially for bigger networks or enterprises with a broad range of
users and devices.
- Limited Visibility: Firewalls may not be able to identify or halt security hazards
that operate at other levels, such as the application or endpoint level, because they
can only view and regulate traffic at the network level.
- False feeling of security: Some firms may place an undue degree of trust on their
firewall and overlook other critical security measures like endpoint security or
intrusion detection systems.
- Limited adaptability: Because firewalls are usually rule-based, they might not be
able to respond to novel security threats.
- Performance impact: Network performance can be greatly impacted by firewalls,
particularly if they are set up to monitor or control a lot of traffic.
1. Web server:
An open-source web server is used for accessing the world wide web with public domain
software. These servers connect stored information from an internet website to your own
computer. Web servers hold information for the internet that is retrieved using "HTTP"
code and supplied to your web browser. This is one of the most extensively used types of
servers.
69 | Page
NETWORK
2. Proxy server:
Proxy servers operate as a bridge between a host server and a client server. A proxy
transfers data from a website to your computer IP address after it goes via the proxy's
server. This method adds a layer of security as the information is requested then sent from
the source to the proxy server and never straight from a client to another user. A proxy
server can block out numerous hazardous internet entities.
5. Application server
These servers link customers to software applications using virtual server connections. This
allows users to forgo downloading data on their own devices to access programs.
Application servers can successfully host massive volumes of application data to numerous
users at once, making them excellent for enterprises.
6. File server:
A file server contains data files for several users. They enable speedier data retrieval and
storing or writing files to a computer. This is a simple sort of server used widely by
enterprises when many users require access to files that are more readily and safely stored
on a server than a personal computer.
70 | Page
NETWORK
7. Database server
Database servers act as big storage areas that businesses utilize and access to execute
different applications to satisfy their demands. A database server can run independently of
any database design.
8. Mail server
A mail server stores and distributes messages for customers using email service platforms.
Because mail servers are set up to constantly connect to a network, individual users may get
their email without running any systems through their own devices.
9. Print server
A print server connects remotely to local PCs to print across a network. These servers allow
enterprises the option to employ a single printer to service a whole department. Some
printers even come with their own built-in server ready to join a network once they're
placed in an office space.
- Email Server: An email server can be used to manage email communications inside
the Matara branch. It may provide email services to all the departments, allowing
employees to send and receive emails using their business email accounts. With
suitable security measures and spam filters, the email server may also guarantee that
the email conversations are secure and dependable.
- Web Server: A web server may be used to host and maintain the company's
website. It can give online services to consumers and other stakeholders, allowing
them to access information about the firm and its products/services. With adequate
72 | Page
NETWORK
security measures, the web server may also guarantee that the website is secured
against external threats and assaults.
- Database Server: A database server may be used to store and manage the
company's data in a centralized way. It can give access to the data for the different
departments, allowing them to retrieve and change the data as needed. With suitable
security measures and access controls, the database server may also ensure that the
data is secure and trustworthy.
These slidable, hot-swappable, high-powered rugged computers are suited for tough
locations and projects that stress space conservation, scalability, upgradability, and
expandability.
73 | Page
NETWORK
In this blog article, we'll examine how a rack server works, the many sizes of rack servers
and server racks, and how you may select the best of both to meet your program or
application. (Danial, 2020)
- Tower servers
Tower servers handle most fundamental applications such as system administration, file
management, print collaboration, ER apps, distribution, and system security.
There are significant advantages in employing tower servers. A tower server is sturdy and
basic in nature. As total component density is low, simpler cooling is feasible with tower
servers. Possible damage, overheating or downtime can therefore be averted. The scalability
factor is large in tower servers, and it is much easier to add servers to a basic network,
leading to adaptive integration. Again, the upkeep factor is smaller as compared to other
designs. Easy identification both on the network and physically is achievable with tower
servers as the data is generally kept in a single tower and not across numerous devices.
The wiring required with tower servers can be extensive, and numerous tower servers in a
single place could be loud because each tower could need a dedicated fan. An individual
monitor, mouse or keyboard is required for each tower server, or a keyboard, video, and
74 | Page
NETWORK
mouse (KVM) switch must be accessible for managing devices using a single piece of
equipment. Again, in comparison to blade servers or rack servers, tower servers might be
more substantial. (techopedia, 2023)
- Blade servers
A Blade Server consists of a chassis housing numerous thin, modular electrical circuit
boards, known as server blades, with each blade being dedicated to a specific application.
Each blade has CPUs, an optional Fiber Channel host bus adapter (HBA), integrated
network controllers and additional input/output (IO) interfaces.
Allowing for more processing power in less rack space, Blade Servers simplify cabling and
assist to cut power usage. As less cabling is required for blade deployments in comparison
to Rack and Tower Servers, this dramatically decreases the amount of time spent managing
the infrastructure, and instead permits more time assuring high availability. (techbuyer,
2023)
75 | Page
NETWORK
Figure 34 Blade server (wikipedia, 2014)
- Mainframes
At their heart, mainframes are high-performance computers with vast quantities of memory
and data processors that can handle billions of basic computations and transactions in real
time. A mainframe computer is crucial to business databases, transaction servers, and
applications that demand high reliability, security, and agility. (IBM, 2023)
- Micro servers
76 | Page
NETWORK
Micro servers have less processing power, and less operating and maintenance requirements
than normal servers. Typically, they are built for a certain business/computing function and
come preconfigured with a suite of purpose-specific programs, such as to be used as an
email server, VPN or as a tiny firewall. Generally, a micro server consists of between one
and two CPUs, and up to four slots for memory (RAM). It can also accommodate up to four
disk drives and will have several Ethernet, USB, and other external interface options.
(rouse, 2013)
77 | Page
NETWORK
When picking a server, it is necessary to consider performance optimization. The server
should be supplied with the appropriate hardware components such as CPUs, RAM, and
storage to suit the expectations of the company. Additionally, the server should be able to
manage the predicted demand without having performance difficulties.
For the Alliance Health scenario, it is advised to utilize a Dell PowerEdge R740 rack server.
This server is equipped with two Intel Xeon Gold 6248 processors, delivering a total of 40
cores and 80 threads. It also features 384GB of DDR4 RAM and eight 1.8TB SAS hard
drives in RAID 5 configuration, offering adequate storage space for the organization's
needs. The server also incorporates sophisticated capabilities such as remote management
and redundant power sources to ensure optimal uptime.
While pricing is a consideration to consider, it should not be the main deciding factor when
picking a server. It is crucial to pick a server that will match the demands of the company
and deliver reliable performance for the long term. In the instance of Alliance Health, the
Dell PowerEdge R740 is a good alternative that delivers the essential features and
performance at a fair cost.
- Scalable: this means that you can meet current needs and future needs.
78 | Page
NETWORK
swap components while your computer system is still in service.
(easyhardwaretrading, 2021)
To give a seamless and successful network experience, the networking software and
workstation hardware are closely linked. The CPU, memory, and storage needs of the
networking software must be handled by the hardware components of a workstation, such as
these. For instance, the workstation needs a robust CPU to manage the load if the
networking software demands a lot of computing power.
Workstation hardware and networking software must work together flawlessly to deliver a
beneficial network experience. The physical components of a workstation, such as these,
must be able to fulfill the CPU, memory, and storage demands of the networking software.
For instance, if the networking software demands a lot of processing power, the workstation
needs a strong CPU to manage the load.
A network architecture design must address how networking software and workstation
hardware are linked. For a stable and productive network experience, the network designer
must make sure that the networking software and hardware are compatible and perform
together seamlessly.
Network software is a crucial aspect for every networking system. It helps administrators
and security staff decrease network complexity, and manage, monitor, and better regulate
network traffic. Network software plays a critical role in managing a network architecture
and easing IT operations by allowing communication, security, content, and data sharing.
For example, if an end user inadvertently breaks their machine, the odds of losing data are
lowered greatly as all its data is already shared on the network. Another significant feature
of network software is its ability to enable programmatic administration of network
resources. This reduces the need for manual operations, hence giving a dynamic and
efficient network setup to operate with. (Mohanakrishnan, 2022)
80 | Page
NETWORK
2.3.2 Types of networking Software
81 | Page
NETWORK
or retrieve information with only a click, and at the same time, security issues are also
taken care of.
Example:
- FreeNAS
- OpenMediaVault (OMV)
- Synology DiskStation Manager (DSM)
Organizations contain heaps of data that might not have to be employed every day but
are nonetheless vital to be preserved for several causes, one of them being for regular
compliance. Data archiving software offers better administration of such information
and is an optimum approach to minimize expenses while assuring that the data is
being secured. However, as a word of warning, archive software does not perform the
same way as typical basic backups. Hence, it is usually advisable to guarantee that the
stored data doesn’t need to be retrieved soon.
Example:
- IBM Spectrum Archive
- Amazon Glacier
- Dell EMC Data Domain
3. Patch management software
It is a headache for IT personnel to install updates on each device manually.
Moreover, when a network comprises of multiple devices, guaranteeing the timely
installation of updates is not only expensive but sometimes a tedious task as well. As
the name indicates, patch management software assists in the smoother
administration of updates across various devices on the network through the
installation of patches. This makes the procedure smoother and enables each system
82 | Page
NETWORK
to download a patch handled by central software and run updates automatically.
Patch management software is the most hassle-free and effective approach to make
continuous updates across devices and systems in a business.
Example:
- Microsoft Windows Server Update Services (WSUS)
- IBM BigFix
- Ivanti Patch for Windows (formerly Shavlik Patch)
- Network Planning and Visualization: Tools like Microsoft Visio, Lucid chart, or
draw.io enable network designers to create detailed network diagrams and
visualizations. These diagrams help in planning the layout of the network,
documenting device connections, and illustrating the flow of data within the
network. Visual representations aid in communicating the design to stakeholders and
collaborating with team members during the design process.
86 | Page
NETWORK
2.3.5 Network design tools
- Cisco Packet Tracer
- GNS3 (Graphical Network Simulator-3)
- Juniper NorthStar Controller
- Wireshark
- Microsoft Visio
scenario.
TCP/IP is a collection of communication protocols that describe how data should be sent
across the internet or other networks. It stands for Transmission Control Protocol/Internet
Protocol and is made of two key protocols: TCP and IP.
TCP is responsible for ensuring that data is reliably delivered from one device to another. It
separates data into packets and transmits them over the network, reassembling them in the
right order at the receiving end. It also includes techniques for mistake detection and
correction, ensuring that data is sent properly.
IP, on the other hand, is responsible for routing packets to their destination via the internet
or other networks. It offers addressing and routing capabilities, allowing packets to be
transmitted from one device to another regardless of their actual location on the network.
By employing the TCP/IP protocol, the Matara branch can ensure that patient data and other
vital information is transferred properly and securely. The protocol offers means for
encryption and authentication, helping to prevent unwanted access or manipulation of
sensitive data.
Another advantage of adopting TCP/IP is that it allows each department in the Matara
branch to be segregated and protected, preventing unintentional exchange of data with the
wrong persons. This is done by designating each department a unique subnet that only
devices inside that department may access.
TCP/IP is a dependable and secure networking technology that is commonly used for small
and medium-sized networks. Its implementation in the Matara branch may assist in
87 | Page
NETWORK
maintaining the accuracy and security of patient data and other essential information, while
also offering a mechanism for departmental separation and security.
3 Task 03
88 | Page
NETWORK
3.1.1 Using EdrawMax for Network System Design
89 | Page
NETWORK
IT department - This department likely has its own set of computers and servers for
administering the network, providing technical assistance, and building any internal
applications. There may also be network storage devices and firewalls here.
Unidentified department- The designation is unknown; however, it might be another
department with its own collection of computers and gadgets specific to its role.
Floor 1:
This floor houses the public spaces and certain critical departments.
Reception area: This space likely features a computer for receptionist responsibilities and a
printer for guest registration.
Head office - This might feature computers for top management and executive assistants, as
well as printers and phones.
Sales & marketing department - This department's gadgets could contain PCs for sales and
marketing software, email, and presentations. There might be printers and phones here as
well.
Customer service area - This space typically features computers for customer service
representatives (CSRs) to access customer information and databases. There may also be
printers and phones here.
Matara branch reception - Like the Colombo branch reception, this space likely features a
computer for receptionist functions and a printer for visitor registration.
Devices Routers - There is one router on each level, suggesting that the network is separated
into subnets for better organization and security.
Computers - Each department seems to have many computers for its specialized needs.
Servers - The first and second floors are manned by servers. Important corporate data,
including financial records, customer information, and staff data, is presumably held on
these servers.
Virtual LAN (VLAN) is a concept in which we may segregate the devices logically on layer
2 (data connection layer). Generally, layer 3 devices separate the broadcast domain,
however the broadcast domain may be split by switches utilizing the notion of VLAN.
90 | Page
NETWORK
A broadcast domain is a network segment in which if a device broadcasts a packet, then all
the devices in the same broadcast domain will receive it. The devices in the same broadcast
domain will get all the broadcast packets however it is limited to switches only as routers
don’t forward out the broadcast packet. To root out the packets to other VLAN (from one
VLAN to another) or broadcast domains, inter VLAN routing is needed. Through VLAN,
distinct small-size sub-networks are formed which are comparably easier to handle.
(GeekForGeeks, 2023)
- Cost savings: VLANs can assist decrease hardware costs by allowing numerous
virtual networks to use a single physical network infrastructure.
91 | Page
NETWORK
3.2.2 VLAN ranges:
- VLAN 0, 4095: These are reserved VLAN which cannot be seen or used.
- VLAN 1: It is the default VLAN of switches. By default, all switch ports are in
VLAN. This VLAN can’t be deleted or edited but can be used.
- VLAN 2-1001: This is a normal VLAN range. We can create, edit, and delete these
VLAN.
- VLAN 1002-1005: These are CISCO defaults for fddi and token rings. These VLAN
can’t be deleted.
- VLAN 1006-4094: This is the extended range of Vlan
Wireshark
Wireshark is a free open-source application that analyzes network traffic in real-time for
Windows, Mac, Unix, and Linux platforms. It collects data packets running across a network
interface (such as Ethernet, LAN, or SDRs) and transforms that data into important
information for IT experts and cybersecurity teams.
92 | Page
NETWORK
Wireshark is a form of packet sniffer (also known as a network protocol analyzer, protocol
analyzer, and network analyzer). Packet sniffers capture network data to analyze the activity
being handled and gather helpful insights. (Kost, 2023)
Putty
Developed and mostly maintained by Simon Tatham, PuTTY is an open-source tool making
use of network protocols like Telnet and rlogin in Windows and UNIX systems in
conjunction with an xterm terminal emulator. Over a network, PuTTY makes use of all the
above protocols to enable a remote session on a machine. It is a popular application for text-
based communication and is also a popular utility for connecting Linux servers from
Microsoft operating system-based devices. (Rouse, 2015)
FileZilla
FileZilla is free software which allows you transfer files over the internet.
Consisting of FileZilla Client and FileZilla Server, FileZilla is characterized as a free
software, cross-platform FTP tool.
Available on Windows, Linux and MacOS, FileZilla allows users to transfer files over the
Internet.
The software started life as a computer science class project by Tim Kosse and two
classmates. They opted to make the program open source as they feared that no one would
buy it if they made FileZilla commercial. (burns, 2017)
93 | Page
NETWORK
FileZilla may be utilized by Alliance Health's staff to move files between the head office
and branch office in Matara. They may use FileZilla to upload and download files, manage
data on distant sites, and transfer huge files securely.
94 | Page
NETWORK
3.5 User Feedback for above Network System
95 | Page
NETWORK
Figure 41 Feedback Form (Author Developed)
96 | Page
NETWORK
Figure 42 Feedback Form (Author Developed)
3.5.1 Response
97 | Page
NETWORK
Figure 44 Responses (Author Developed)
98 | Page
NETWORK
Figure 45 Responses (Author Developed)
author did a survey through a Google Form to acquire an overall image of the new
networking infrastructure. After examining the answers, the author identified some severe
faults in the company's networking infrastructure.
One of the primary problems was that all the departments were using the same subnet, which
was generating congestion and poor performance. To address this issue, the author
recommended partitioning each department with its own subnet, which would improve the
network's performance and boost the total network speed.
Another worry was that the Sales and Marketing team required access to network resources
through Wi-Fi connectivity, but the present technology did not allow them to do so. To fix
this issue, author suggested that the Customer Services Areas at both branches and the Sales
and Marketing department should be equipped with Wi-Fi connectivity, enabling the Sales
and Marketing staff to access network resources over the wireless network.
99 | Page
NETWORK
Furthermore, the present system did not have any intra-branch communication between the
Head Office and Matara. To overcome this issue, he proposed joining the branches using
switches and routers, which would allow the different departments to interact with one other
simply. Finally, the author fixes all faults of this system.
Network maintenance refers to anything that needs be done to maintain a network working.
If you have a planned, predetermined strategy for network maintenance, you will be able to
guarantee that IT-related issues are treated with before they cause any substantial harm and
will also assist in lessening the need for reactive problem solutions.
This network application and service setup for ALLIANCE HEALTH involves the following
installation and configuration steps.
100 | Page
NETWORK
3.7.1 Windows Server OS Install
Windows Server is a server operating system that allows a computer to execute network
services such as print server, domain controller, web server, and file server. Being a server
operating system, it also acts as a framework for individually acquired server programs such
as Exchange Server or SQL Server. The creator of Alliance Health utilizes Windows Server
OS for the server machine.
- Step 01
Loding file
Figure 46 setep01
101 | Page
NETWORK
- Step 02
Choose Language
102 | Page
NETWORK
- Step 3
Windows Install
103 | Page
NETWORK
- Step 4
Type Product key.
104 | Page
NETWORK
- Step 5
Choose OS
Figure 50 Choosing OS
105 | Page
NETWORK
- Step 6
Read the license terms and accepting to that.
Figure 51step06
106 | Page
NETWORK
- Step 7
Upgrade
Figure 52step07
107 | Page
NETWORK
- Step 8
Click Drive
Figure 53Step08
108 | Page
NETWORK
- Step 9
Select Partition
Figure 54Step09
109 | Page
NETWORK
- Step 10
Copying Windows files
Figure 55step10
110 | Page
NETWORK
Figure 56Step10
- Step 11
Restart to Continue
Figure 57 restart
111 | Page
NETWORK
Figure 58 Restarting.
112 | Page
NETWORK
- Step 12
113 | Page
NETWORK
Figure 60 Local session Manager
114 | Page
NETWORK
- Step 13
Admin Login
Figure 61 Login
115 | Page
NETWORK
- Step 14
Server is Installed
- Step 01
Select “Add roles and features” and click “Next.”
116 | Page
NETWORK
Figure 63 Step 1
117 | Page
NETWORK
- Step 02
Click “Next”
Figure 64 Step 02
118 | Page
NETWORK
- Step 3
click “Next.”
Figure 65 Step 3
- Step 4
Select server and click “Next.”
119 | Page
NETWORK
Figure 66 Step 4
- Step 5
Click “Active Directory Domain Service” and click “Next.”
Figure 67 Step 5
120 | Page
NETWORK
- Step 06
Click Next.
Figure 68 Step 06
- Step 07
Click Next.
Figure 69 Step 07
121 | Page
NETWORK
- Step 08
Click “Next”
Figure 70 Step 08
- Step 09
Click “Install”
Figure 71 Step 09
122 | Page
NETWORK
- Step 10
Figure 72 Step 10
- Step 11
Figure 73 Step 11
- Step 12
Select “The NetBIOS domain name” and click “Next.”
123 | Page
NETWORK
Figure 74 Step 12
- Step 13
Click “Next”
Figure 75 Step 13
- Step 14
124 | Page
NETWORK
Wait till “Prerequisites Check” finished and click “Next.”
Figure 76 Step 15
- Step 15
Wait till “installation” finished.
Figure 77 Step 15
125 | Page
NETWORK
- Step 16
Figure 78 Step 16
- Step 17
Figure 79 Step 17
126 | Page
NETWORK
- Step 18
Figure 80 Step 18
- Step 19
Figure 81 Step 19
- Step 20
127 | Page
NETWORK
Figure 82 Step 20
- Step 21
Figure 83step 21
128 | Page
NETWORK
- Step 22
Figure 84Step 22
- Step 23
Figure 85step 23
129 | Page
NETWORK
- Step 24
Figure 86Step 24
- Step 25
Figure 87 Step 25
130 | Page
NETWORK
3.7.3 Create User Account
- Step 01
Figure 88 step1
- Step 02
Create new user group.
Figure 89 step02
131 | Page
NETWORK
- Step 03
Figure 90step3
- Step 04
Enter user details and click “Next.”
Figure 91step 4
132 | Page
NETWORK
- Step 5
Figure 92 step5
- Step 6
Click “Finish”
Figure 93 Step6
133 | Page
NETWORK
- Step 07
Figure 94step7
- Step 8
Figure 95 step8
134 | Page
NETWORK
4 Task 04
Figure 96 Implement the Network System by Cisco Packet Tracker (Author developed)
Colombo
Table 20 Colombo branch IP (Author developed)
Mathara
Table 21 Mathara Branch IP(Author Developed)
Network testing demands that test results be documented and compared to projected
outcomes to make sure that the system's functionality satisfies set requirements. In this
technique, the predicted outcomes described in the testing plan are compared with the actual
test results, which include network connectivity, performance metrics, and service
availability. To uncover the underlying reasons of any variations or inconsistencies, such as
hardware failures, configuration difficulties, or ambient circumstances, they are
meticulously documented and evaluated. After resolving the issues detected, remedial
actions are taken, and retesting is done to confirm the efficacy of the remedies put in place.
Network administrators can acquire vital insights into the operation and performance of the
system by carefully recording and assessing test results. This enables for continuing
network infrastructure optimization.
136 | Page
NETWORK
No Name Result
01 Testing Successful Successfully
Ping ping
between
Devices
137 | Page
NETWORK
4.5 Recommendations for Network Enhancements
The strategy and design for the networked system of Alliance Health displayed a
comprehensive approach to suit the company's requirements. The choice to adopt a star
topology with VLANs enabled obvious division of departments, boosting security and
network efficiency. The installation of Wi-Fi facilities in important places like customer
service and sales departments enabled wireless connection for essential work.
138 | Page
NETWORK
The setting of DHCP expedited IP address assignment, reducing manual configurations and
potential mistakes. The choice to set up VLANs for each department enhanced network
segmentation, boosting security and streamlining traffic flow. The distribution of separate
IP address ranges to each department helped simple management and troubleshooting.
The network architecture allows for scalability, permitting future development without
substantial disturbances. The addition of a server room with dedicated subnets for servers
and the usage of rack-mounted servers displayed attention for data center-like architecture.
To upgrade the system, it is necessary to consider future requirements and technology. The
probable future additions listed above focus on enhancing network administration, security,
dependability, and performance. With the ever-evolving IT world, maintaining current with
technological developments and applying best practices is critical to guarantee the network
stays strong and adaptive.
Continuous review and monitoring will assist uncover areas for improvement and
possibilities to optimize network resources. Collaboration with IT stakeholders and
feedback from end-users will permit continuing refinement of the network architecture and
settings, matching it with the company's evolving demands and industry norms. By
addressing possible vulnerabilities and being proactive, the networked system may remain a
state-of-the-art infrastructure, enabling Alliance Health's development and success in the
healthcare business.
References
139 | Page
NETWORK
topology/
[Accessed 08 February 2024].
asq, 2023. asq. [Online]
Available at: https://asq.org/quality-resources/ansi-standards
[Accessed 08 February 2024].
burns, e., 2017. Tech monitor. [Online]
Available at: https://techmonitor.ai/what-is/what-is-filezilla-4951563
[Accessed 08 February 2024].
ComputerNetworkingNotes, 2024. ComputerNetworkingNotes. [Online]
Available at: https://www.computernetworkingnotes.com/networking-tutorials/ethernet-
standards-and-protocols-explained.html
[Accessed 08 February 2024].
Danial, b., 2020. trentonsystems. [Online]
Available at: https://www.trentonsystems.com/blog/what-is-a-rack-server
[Accessed 08 February 2024].
easyhardwaretrading, 2021. easyhardwaretrading. [Online]
Available at: https://easyhardwaretrading.com/importance-of-a-server/
[Accessed 08 February 2024].
F, C., 2023. study. [Online]
Available at: https://study.com/academy/lesson/organizations-that-create-networking-
standards.html
[Accessed 08 February 2024].
GeekForGeeks, 2023. GeeksForGeeks. [Online]
Available at: https://www.geeksforgeeks.org/virtual-lan-vlan/
[Accessed 08 February 2024].
GeeksForGeeks, 2023. GeekForGeeks. [Online]
Available at: https://www.geeksforgeeks.org/difference-between-osi-model-and-tcp-ip-
model/
[Accessed 08 February 2024].
GeeksforGeeks, 2023. GeeksforGeeks. [Online]
Available at: https://www.geeksforgeeks.org/types-of-computer-networks/
[Accessed 23 January 2024].
140 | Page
NETWORK
GeeksForGeeks, 2023. GeeksForgeeks. [Online]
Available at: https://www.geeksforgeeks.org/data-communication-definition-components-
types-channels/
[Accessed 08 February 2024].
GeeksForGekks, 2023. GeeksForGeeks. [Online]
Available at: https://www.geeksforgeeks.org/tcp-ip-model/
[Accessed 08 February 2024].
Hossein, A., 2022. Spiceworks. [Online]
Available at: https://www.spiceworks.com/tech/networking/articles/what-is-network-
topology/
[Accessed 08 February 2024].
IBM, 2023. ibm. [Online]
Available at: https://www.ibm.com/topics/mainframe
[Accessed 08 february 2024].
indeed, 2023. indeed carear guid. [Online]
Available at: https://www.indeed.com/career-advice/career-development/types-of-servers
[Accessed 08 February 2024].
Infinity, B., 2023. Board Infinity. [Online]
Available at: https://www.boardinfinity.com/blog/data-communication-a-process/
[Accessed 08 February 2024].
Ingalls, T., 2023. serverwatch. [Online]
Available at: https://www.serverwatch.com/guides/tower-server/
[Accessed 08 February 2024].
Kanade, V., 2023. Spiceworks. [Online]
Available at: https://www.spiceworks.com/tech/networking/articles/what-is-peer-to-peer/
[Accessed 23 January 2024].
Karen, B., 2020. Electronic Design. [Online]
Available at: https://www.electronicdesign.com/technologies/communications/article/
21796419/10-standards-organizations-that-affect-you-whether-you-know-it-or-not
[Accessed 08 February 2024].
Keary, T., 2023. Forbes. [Online]
Available at: https://www.forbes.com/advisor/business/types-network-protocols/
[Accessed 08 Februaru 2024].
141 | Page
NETWORK
Kennedy, P., 2019. serverthehome. [Online]
Available at: https://www.servethehome.com/hpe-proliant-microserver-gen10-review/
[Accessed 08 February 2024].
Kost, E., 2023. upguard. [Online]
Available at: https://www.upguard.com/blog/what-is-wireshark
[Accessed 08 February 2024].
Labs, P., 2023. PyNet Labs. [Online]
Available at: https://www.pynetlabs.com/network-devices-and-its-various-types/
[Accessed 08 February 2024].
Lawinsider, 2023. Lawinsider. [Online]
Available at: https://www.lawinsider.com/dictionary/ieee-standards
[Accessed 08 February 2024].
LearningCenter, 2023. Learning Center. [Online]
Available at:
https://www.imperva.com/learn/application-security/osi-model/#:~:text=Cybersecurity
%20101-,What%20Is%20the%20OSI%20Model,companies%20in%20the%20early
%201980s
[Accessed 08 February 2024].
LearnLoner, 2023. Learn Loner. [Online]
Available at: https://learnloner.com/explaining-in-detail-tcp-ip-model-layer-and-its-part/
[Accessed 08 February 2024].
Mohanakrishnan, R., 2022. spiceworks. [Online]
Available at: https://www.spiceworks.com/tech/networking/articles/what-is-network-
software/
[Accessed 08 February 2024].
Ramya, M., 2023. Spiceworks. [Online]
Available at: https://www.spiceworks.com/tech/networking/articles/what-is-a-computer-
network/
[Accessed 23 January 2024].
rouse, M., 2013. techopedia. [Online]
Available at: https://www.techopedia.com/definition/29372/micro-server
[Accessed 08 February 2024].
142 | Page
NETWORK
Rouse, M., 2015. techopedia. [Online]
Available at: https://www.techopedia.com/definition/4335/putty
[Accessed 08 February 2024].
superrask, 2023. superrask. [Online]
Available at: https://superrask.xyz/product_details/35470306.html
[Accessed 08 February 2024].
Sushant, 2023. Scaler Topics. [Online]
Available at: https://www.scaler.com/topics/computer-network/ieee-standards-in-computer-
networks/
[Accessed 08 February 2024].
Teach, 2023. Teach. [Online]
Available at: https://www.teach-ict.com/gcse_new/networks/peer_peer/miniweb/pg5.htm
[Accessed 08 February 2024].
techbuyer, 2023. techbuyer. [Online]
Available at: https://www.techbuyer.com/us/blog/what-is-a-blade-server-us
[Accessed 08 February 2024].
techopedia, 2023. techopedia. [Online]
Available at: https://www.techopedia.com/definition/15318/tower-server
[Accessed 08 February 2024].
Thinksigma, 2023. Thinksigma. [Online]
Available at: https://thinksigma.co.uk/blogs/top-5-standards-organisations-in-the-world/
[Accessed 08 February 2024].
wikipedia, 2014. wikipedia. [Online]
Available at: https://en.wikipedia.org/wiki/Blade_server
[Accessed 08 February 2024].
Woojae, L., 2023. Jay's Dev Blog. [Online]
Available at: https://jaylog.hashnode.dev/network-http-deep-dive-into-osi-7-layer-model
[Accessed 08 February 2024].
Attachment:
143 | Page
NETWORK
144 | Page
NETWORK