Student Name: Sitashma Mahat

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 40

Student Name

Sitashma Mahat

Academic Year
2023-2024

Unit Number and Name


Unit 2: Networking

Unit Lecturer Ms. Varsha C

Assignment Title Principles and Design of Networked Systems

Type of Assignment
Business Report

Issue Date
03/06/2024

Summative Submission Date


30/06/2024

1
Table of Content

1. Introduction to SBP, network, System types……………………………………………1-3


1.1. Overview of Network Requirements

2. Network Types and Standards…………………………………………………………..4-


2.1 Benefits and constraints of different network types
2.2 Standards (e.g., IEEE 802.11, IEEE 802.3)
2.3 The impact of network topology, communication, and bandwidth requirements.

3. Standard networks and principles of networking………………………………………...9-15


3.1 OSI Model
3.2 TCP/IP Model
3.3 Assessment of networking protocols
3.4 Effectiveness of protocol in networked system

4. Evaluation of a Topology Protocol


4.1 Selection and Justification of Star and Mesh Topologies, Efficient Utilization of the Network System

5. Different types of Servers and Networking devices


5.1 Server Types and Networking Software

6. Workstation Hardware and Network Software


6.1 Interdependence of workstation Hardware and Networking Software

7. Server Types and Selection Justification


7.1 Exploring Server Types, FTP, DHCP, HTTP, and Other Servers
7.2 Justification of Server Selection for Cost and Performance Optimization

8. Designing Efficient Networked Systems


8.1 Network Diagram and Description, Device and Cable configuration

9. Maintenance Schedule for Networked Systems

10. Implementation and Configuration of Networking Devices


10.1 Steps in Configuration, Testing Protocols, Cisco Packet Tracer Implementation

11. Analysis of Test Results Against Expected Outcomes


11.1Documenting and Analysing Test Results
11.2Table of Actual result

12. Analyzing the feedback from users

13. Enhancement of Network


12.1 Recommending Potential Enhancement

14. Critical Analysis of the Network Design


13.1Review of Design choice, Enhancement, and Future Improvements
15. Reference

2
1. Introduction to SBP Ltd.
In the rapidly expanding food delivery sector, SBP Ltd is working to create an online platform that links
customers, delivery drivers, and restaurants. Designing and implementing an effective network system that
supports the business’s operations while guaranteeing scalability, security, and dependability is imperative
as it grows. In order to facilitate smooth communication between its web servers, databases, delivery staff,
and clients, SBP Ltd needs a robust network infrastructure. High traffic volumes must be handled by a scal-
able, secure network, especially during peak hours. It should also guarantee data integrity, offer high avail-
ability, and enable efficient data transfer.

Network
Computer networking links computers and other devices together to share resources, swap data, and talk to
each other. This process uses hardware, software, and rules to create and maintain connections between de-
vices, enabling them to work together smoothly. Computer networking enables various functionalities, such
as accessing the Internet, sharing files and printers, sending emails, and conducting video conferences. It
comprises many technologies and concepts, including local area networks (LANs), wide area networks
(WANs), wireless networks, network security, routing, and switching.

Fig1.a Network Diagram Template

Overview of network requirements

Point-to-point links: A point-to-point link directly connects two network


nodes. With its high dependability and security, this dedicated channel guar-
antees exclusive communication between the two endpoints.
Fig: Point-to-point network

Multiple access networks: Thanks to multiple access networks, a single commu-


nication medium can be shared by numerous devices. Ethernet and WiFi networks
are two examples. These networks are scalable and appropriate for public spaces,
offices, and homes where multiple devices require simultaneous communication.

Fig: Multiple access networks

1
Client-Server Network: This works as a centralized computer network, with all its
clients connected to a powerful server computer. Clients access data and run pro-
grams on the server. They request and get services such as file storage, printing,
or database support.

Fig: Client-server network

Peer-to-peer network: Peer-to-peer networks link devices directly together without a centralized server.
Every gadget can function as a client and a server, sharing files and bandwidth with
other gadgets.

Fig: Peer-to-peer network

Cluster
In cluster computing, several computers or nodes are connected to function as
a cohesive system. These nodes cooperate to accomplish tasks, improving over-
all system performance, reliability, and scalability. Typically, they are con-
nected via a local network. Applications requiring significant computational
power, such as large-scale data analysis, scientific research, and high-perfor-
mance computing (HPC), benefit significantly from using clusters.

Fig: Three Clusters connected

Cloud Server
Cloud computing provides computing services such as storage, processing power, and applications through
the Internet. This model eliminates the need for users to directly manage physical hardware by enabling on-
demand resource access. Cloud computing is widely recognized for its cost-effectiveness, scalability, and
flexibility, which makes it perfect for numerous applications, including hosting websites, storing data, exe-
cuting apps, and carrying out intricate calculations.

Centralization

Centralized computing combines all processing capacity, data storage, and computing resources into a single
central system or data center. To carry out tasks, user devices—also referred to as clients—connect to this
central system. While this method makes security and management more accessible, it also increases the risk
of single points of failure.

Virtualization

Using virtualization technology, virtualized computing generates virtualized versions of natural computing
resources, such as networks, servers, and storage. This enhances resource utilization and isolates various
workloads by enabling several virtual machines (VMs) to run on a single physical machine. Modern data
centers and cloud environments are built around virtualization because it improves scalability, flexibility,
and efficiency in managing and deploying applications.

Wired Networks

Wired networks use physical cables like Ethernet to establish connections between devices, including com-
puters, switches, routers, and structured cabling systems. They offer reliability, security, and high-speed
communication, making them ideal for critical applications and environments. Faster transfer speeds can be
2
obtained by connecting devices with copper or fiber optic cables. In addition to radio signals, wireless net-
works can also use infrared light for wireless communication.

Wireless Network
Wireless networks connect devices using radio waves instead of wires, allowing for freedom of movement
in different places. They are often found in houses, offices, public spaces, and factories for sharing informa-
tion, talking, and accessing the Internet. Modern connectivity heavily relies on wireless networks, providing
convenient access to resources and information in various contexts.

Hybrid network
Hybrid networks combine wired and wireless connectivity for a flexible infrastructure, offering mobility,
speed, and improved coverage. They support various applications, optimize resource usage, and enhance re-
dundancy. However, they require strong security measures and centralized management to ensure data in-
tegrity and confidentiality.

Fig: Hybrid Topology

1. Network Types and Standards

1. Personal Network Area (PAN)

A personal area network, or PAN, is a small network that links devices close
to the user, usually a few meters away. Bluetooth connections between a
laptop, smartphone, and other personal devices are typical examples. They
have cheap setup and maintenance costs and are valid for rapid and straight-
forward connectivity.

2. Local area network (LAN)

A LAN connects devices in a particular area, such as a building, office, or


home. Ethernet or WiFi are typically used by LANs, enabling high-speed
data transfer. LANs also share resources like files, printers, and internet ac-
cess. A LAN enables high-speed communication and resource sharing in ad-
dition to centralized management of shared computers, printers, and servers
in homes, offices, and educational institutions.

3. Wireless Local Area Network (WLAN)

WLANs are computer networks that function similarly to local area net-
works (LANs) but use WiFi and other wireless technologies. This network
enables wireless communication between devices instead of physical cable
communication, as in a LAN. WiFi is the most widely used example of a
3
WLAN. WLANs are a popular option for both personal and business use because they offer the ease of
wireless access to network resources and the Internet.

4. Metropolitan Area Network (MAN)

A MAN covers a metropolitan area, such as a town or city, instead of a


LAN and is smaller than a WAN. MANs use fiber optics to connect
multiple LANs within a metropolitan area, offering high-speed connec-
tivity. Unlike a local area network (LAN), MANs offer high-speed
connectivity to businesses, universities, and municipal organizations,
enabling data communication and resource sharing over a larger area.

5. Wide Area Network (WAN)

A vast area network, or WAN, connects devices across vast geo-


graphic regions, such as cities, nations, or continents. It uses satellites, the Internet, or leased telecommuni-
cation lines to facilitate resource sharing and communication across great distances. Because WANs enable
data exchange and connectivity on a larger scale, they are crucial for companies and organizations with mul-
tiple locations.

6. Storage Area Network (SAN)

A SAN is an independent high-speed network that links various


servers and storage arrays. It distributes shared pools of storage de-
vices to them to create a centralized, managed storage infrastructure.
LAN and WAN are not necessary for this network. SANs are fre-
quently utilized in enterprise settings for centralized data storage
management and backup. They are used to improve storage effi-
ciency, performance, and scalability.

7. Virtual Private Network (VPN)

A Virtual Private Network (VPN) is a data-encrypting secure internet con-


nection that enables users to access a private network securely from a dis-
tance. VPNs frequently conceal the user's IP address, protect sensitive data,
and facilitate remote work.

8. Passive Optical Local Area Network (POLAN)


4
A passive optical LAN (POLAN) is a network architecture that provides
voice, video, and high-speed internet access via passive splitters and opti-
cal fiber. In settings like campuses and significant buildings, POLANs
simplify network infrastructure and eliminate the need for active elec-
tronic components. They are also efficient, scalable, and reasonably
priced.

9. Controlled Area Network (CAN)


A serial communication protocol called Controlled Area Networks (CANs) is utilized in industrial and auto-
motive settings. It enables real-time data transmission and reliability in systems like automobiles and indus-
trial machinery by enabling devices like microcontrollers to communicate without a central computer.

2.1 Benefits and constraints of different network types

Network Types Benefits Constraints


PAN (Personal Area Net- It makes connecting over short dis- The range is short, so devices
work) tances simple for personal devices, en- need to be near each other for
abling low power consumption and re- good communication.
source sharing.

LAN (Local Area Network) Provides high-speed data transfer It is restricted to a single location,
within a confined area, enabling cost- necessitating network administra-
effective connectivity for devices like tion for maintenance and security
printers and computers. purposes.
MAN (Metropolitan Area Covers larger geographical areas than Higher initial and operational
Network) LANs, supporting rapid data exchange costs than LANs require coordin-
across cities or campuses and intercon- ation with local authorities for in-
necting multiple LANs. frastructure deployment.
WAN (Wide Area Network) Connects geographically dispersed Expensive due to leased lines or
LANs and MANs, enabling global dedicated connections, vulnerable
communication, access to internet ser- to security threats and latency is-
vices, and remote collaboration. sues over extended distances.
WLAN (Wireless Local Facilitates wireless connectivity within Susceptible to interference and
Area Network) a specific area, offering flexibility, mo- security risks, with potential per-
bility, and simplified network expan- formance degradation based on
sion without physical wiring. distance and environmental
obstacles.
CAN (Controlled Area Net- Supports real-time communication in Higher implementation costs due
work) industrial settings, ensuring reliable to specialized hardware and pro-
data exchange for time-sensitive ap- tocols and limited scalability bey-
plications such as automotive systems. ond specific industrial environ-
ments.
POLAN (Passive et al. Area Utilizes cost-effective optical fiber for Starting costs could be higher be-
Network) scalable, high-bandwidth network de- cause installing fiber optic cables
ployments in large buildings or cam- needs experts to handle mainte-
puses, reducing energy consumption nance and fix problems.
and space requirements.
SAN (Storage Area Net- Centralizes storage management, en- It is costly to establish and main-
work) hancing data accessibility, security, tain, especially for smaller de-
5
and backup capabilities across inter- ployments, and requires dedicated
connected servers. infrastructure and management
expertise.

2.2. Standards

Ethernet (802.3 IEEE)


Ethernet is a commonly used technology for wired local area networks (LANs), as defined by the IEEE
802.3 standard. It is renowned for its high-speed data transfer capabilities, reaching up to 100 Gbps. Ethernet
has advantages but requires physical cables, which can be costly and challenging to set up, especially in sig -
nificant buildings or across multiple buildings.

WiFi (IEEE 802.11)


The IEEE 802.11 standard governs WiFi and offers wireless
connectivity, improving user convenience and mobility. Be-
cause of its adaptability and simplicity of installation, it is a
well-liked option for both commercial and residential settings.
Because WiFi networks are scalable, adding more access
points is a simple way to expand them.

IEEE 802.15.1 Bluetooth


Bluetooth is a technology that lets devices talk to each other
without wires over a short distance. It uses a standard called
IEEE 802.15.1 and uses little power, making it great for things like watches, phones, and earphones that run
on batteries. Because many devices use Bluetooth and are simple to set up, it works well with many different
gadgets and systems. However, one downside is that it only works within about 10 meters.

Network topology
How different components (links, nodes, etc.) are arranged within a computer network is called network
topology. The selection of topology can significantly impact network maintenance, scalability, performance,
and reliability.
Physical part (topology) + Logical part (topology) = Network topology
Physical topology refers to the physical organization of devices and cables in a computer network, affecting
performance, scalability, and fault tolerance. Logical topology, on the other hand, focuses on the data's route
and communication, affecting scalability, efficiency, and performance.
2.3 Impact of network Topology, Communication, and bandwidth requirements
1. Bus Topology:

All of the devices share one communication line. Benefits include cost-effectiveness, ease of installation,
and minimal cable usage. However, several devices trying to send data simultaneously using this straightfor-
ward broadcast method may result in collisions. Every device connected to the central cable shares its band -
width.
Advantages
 Less wire is needed for setup compared to other topologies, which lowers setup costs.
 It is simple to install and expand, thanks to its design.

Disadvantages
 It is best suited for small networks only.
 The entire network may go down if the primary cable fails.

6
Effect on Communication:
 Since every device uses the same communication channel, data collisions could occur.
 Since every gadget on the bus receives every signal, there is more needless traffic.

2. Star Topology:

In a star topology, devices are connected to a central hub or switch


with specific communication lines. Data transmission goes through
the hub and is forwarded to the intended device, reducing collisions
and facilitating troubleshooting due to issues often limited to a single
connection.

Advantages

 With a central hub, it is easy to maintain and troubleshoot.


 It is simple to expand with additional devices without impact-
ing the network as a whole.

Disadvantages

 The entire network crashes if the central hub malfunctions.


 It costs more than bus topology since it needs additional hub/switch gear and wire.

Impact on communication

 Unlike hubs, switches can control data flow to avoid collisions.


 If the hub or switch malfunctions, it can cause a single point of failure that affects the entire network.

3. Ring Topology:

A ring topology is a circular network where each device is connected to


two more, forming a ring. Data moves unidirectionally or bidirectionally
around the ring, and all devices use the same data transfer capacity. How-
ever, as more devices are added, the capacity of each device may decrease.

Advantages
 Fast data packet delivery is made possible by dedicated pathways.
 Without competition for the network, every device has equal access to
its resources.
Disadvantages
 A single point of failure may bring down the network as a whole.
 It might be difficult and time-consuming to find errors.
Impact on communication
 In token ring networks, access to the network can be controlled through tokens, which minimizes
collisions.
 Intermediary devices must be used for data transmission, which
could increase latency.

4. Mesh Topology:
A mesh topology involves devices connected to multiple others, provid-
ing high redundancy and reliability. This configuration allows data to
be routed through multiple paths in case of failure. In a fully connected
mesh, every device is linked to every other, while in a partially con-

7
nected mesh, only some devices are linked. However, mesh topology requires significant bandwidth as each
device manages multiple connections.

Advantages
 Redundant pathways offer robustness and dependability.
 It provides excellent fault tolerance and is easily expandable.
Disadvantages
 Extensive configuration and cabling are necessary.
 High expense as a result of the necessity for numerous wires and ports.
Impact on Communication:
 Reliability and fault tolerance are increased when data can travel via multiple paths.
 Keeping track of the connections and routes can take time and effort.

5. Hybrid Topology:

Combining star and mesh topologies, for example, is an example


of hybrid topology integrating various network topologies to max-
imize their strengths and diminish their weaknesses. The combina-
tion of topologies determines the bandwidth requirements in hy-
brid topologies. A mesh topology would be used for redundancy
and fault tolerance in a hybrid network, while a star topology
would be used for practical, centralized communication.
Advantages:
 It combines several topologies, which allows it to adapt to different situations.
 High reliability and easy expansion are offered.

Disadvantages:
 It may need help to develop and implement.
 More significant cost due to the amalgamation of several topologies and parts.
Impact on communication
 It can be modified to meet particular requirements, increasing dependability and efficiency.
 A rise in the complexity of management and design.

3. Common networking Principles and protocols

3.1. OSI Model

The OSI model, a conceptual framework, divides network communication into seven layers: Physical, Data
Link, Network, Transport, Session, Presentation, and Application. It encourages modularity and vendor and
technology compatibility and standardizes communication protocols in computer networks. However, the
OSI model's complexity can also result in inefficiencies and performance overhead, which can facilitate
troubleshooting and raise performance overhead.

Physical Layer: The physical layer, the lowest layer in the OSI reference model, is responsible for the phys-
ical connection between devices and transmitting bits in bits. It converts received signals into 0s and 1s and
sends them to the Data Link layer for frame reconstruction. Switches, hubs, cables, and other hardware are
essential components. USB and Ethernet are two examples of protocols and technologies.

8
Data Link Layer: The physical layer ensures reliable data transfer between network nodes by identifying
and resolving potential issues, ensuring constant data rate, and preventing corruption. It transmits packets
using MAC addresses, with bridges, switches, and MAC addresses being crucial components. Examples in-
clude Ethernet and Point-to-Point Protocol.

Network Layer: The network layer manages data forwarding, routing, and packet routing over networks,
determining the best route, logical addressing, and physical path for data transmission. It also handles packet
routing, selecting the shortest path from available routes. Routers and IP addresses are crucial, including
protocols like IP and ICMP.

Transport Layer: The transport layer ensures end-to-end data transfer and communication with host sys-
tems, offering flow control, error detection, and recovery. Protocols like UDP and TCP use it. Each segment
generates a header with service point or port addresses. Essential elements include TCP/UDP and ports. Ex -
amples of protocols include UDP and TCP.

Session Layer: The session layer manages connections, sessions, user authentication, and device security. It
allows data synchronization points to be added and communication to be initiated in half-duplex or full-du-
plex mode. Session management services are essential components, and protocols like RPC and NetBIOS
are used. It allows for establishing, using, and terminating connections between processes.

Fig: 7 Layer of OSI model with description

Presentation Layer: The layer translates data between the network format and the application layer, han-
dling encryption, compression, and translation. It enables system understanding and produces cipher text.
Data format converters and encryption services, like JPEG, MPEG, and SSL/TLS, are essential components,
reducing network bit usage.

Application Layer: The application layer, at the top of the OSI Reference Model's layer stack, creates data
and serves as a window for application services to access the network. It allows email, file transfers, and

9
web browsing interactions. Protocols used include DNS, SMTP, FTP, and HTTP, enabling users to access
remote hosts. User interfaces and application software are crucial components.

The benefits and constraints of the OSI model

OSI Model Benefits Constraints


Layered Approach Provides a clear framework for network It can be overly complex and abstract,
design and troubleshooting, with distinct making it challenging for practical
functions at each layer. implementation.
Interoperability Enhances compatibility between different It is only sometimes directly aligned
hardware and software from various ven- with real-world protocols, which can
dors. lead to discrepancies.
Modular Design Allows individual layers to be updated or Some layers may become redundant
replaced without affecting the entire sys- or need more utilized in certain net-
tem. work implementations.
Standardization Promotes standard protocols and interfaces, The model's rigidity can stifle innova-
aiding in developing global communication tion, as new technologies may need to
networks. fit neatly into the existing layers.

3.2. TCP/IP

The protocols that control data transmission over the Internet are
known as TCP/IP or Transmission Control Protocol/Internet Pro-
tocol. While IP addresses and routes packets to their destinations,
TCP manages data packetization, transmission, and reassembly
to ensure dependable communication. Together, TCP/IP provides
a foundation for network and Internet communications by allow-
ing disparate systems to interact seamlessly.

Application Layer: This layer handles user-facing communica-


tion. It offers protocols, such as SMTP for email, FTP for file transfers, and HTTP for web browsing, that let
applications talk to each other over a network. This layer also manages user authentication, encryption, and
data formatting.

Transport Layer: This layer ensures that data is dependably transferred between devices. It ensures data in-
tegrity with error checking and flow control using protocols such as TCP for connection-oriented communi-
cation. In contrast, UDP offers less dependable but faster communication without error correction.

Internet Layer: Over linked networks, the Internet Layer manages packet addressing and routing. It em-
ploys IP (Internet Protocol) to give devices logical addresses (IP addresses) and choose the most efficient
data transmission route, guaranteeing that packets reach their intended locations.

Network Access Layer: This layer handles data transmission on a physical level. It outlines the hardware
and protocol requirements for data transmission via physical media, like Ethernet or WiFi. This layer en-
sures that data is formatted correctly for network transmission and controls addressing at the hardware level
(MAC addresses).

TCP/IP Layer Benefits Constraints Protocol Suites


Application - Provides a variety of protocols - Overhead due to multiple proto- SMP, FTP,

10
Layer (HTTP et al.) for specific applica- cols may impact performance. HTTP, DNS,
tion services. - Vulnerable to application-spe- SNNP, TEL-
- Facilitates user-friendly inter- cific security vulnerabilities. NET, RIP
faces and interactions.
Transport - Ensures reliable data delivery - TCP can introduce latency and SCIP, UDP,
Layer with error detection and retrans- overhead due to its error control TCP
mission (TCP). mechanisms.
- Facilitates multiplexing and seg- - UDP lacks guaranteed delivery
mentation of data for efficient and error recovery features that
transmission. are unsuitable for critical applica-
tions.
Internet Layer
- Enables global connectivity with - IP does not guarantee packet de- TC, ICMP,
logical addressing (IP addresses). livery or ensure data integrity. TGMP, ARD,
- Facilitates scalable and dynamic - Vulnerable to routing issues, RARP
routing of data packets across net- network congestion, and IP-based
works. attacks (e.g., spoofing, DDoS).
Network Ac- - Handles physical data transmis- - Dependent on specific network Protocols are
cess Layer sion over network media (Ether- technologies and physical medi- defined by the
net, WiFi). ums. underlying net-
- Offers error checking and fixing - Limited by the bandwidth and works (host to
at the level where data is transmit- performance capabilities of the networks)
ted physically. physical media.

Network Protocol
A network protocol is a collection of standards that manage the transfer and reception of data over a net -
work, ensuring dependable and effective device-to-device communication. Protocols are necessary for net-
working because they set the rules for sharing data and help devices communicate reliably and quickly.
Take into account, for instance, the following:

IPv4: IPv4 (Internet Protocol version 4) is the most common protocol for using IP addresses to locate and
identify devices on a network. With its 32-bit address scheme, roughly 4.3 billion distinct addresses are pos -
sible. Even though IPv4 is widely used, address exhaustion restricts network expansion.

How it Enables Effectiveness


 Global Standardization: The extensive use of IPv4 guarantees worldwide compatibility across vari-
ous networks and gadgets.
 Effective Routing: IPv4's hierarchical addressing makes routing easier and guarantees that data pack-
ets are sent over the Internet effectively.

IPv6: Using a 128-bit address format, IPv6 (Internet Protocol version 6) overcomes the drawbacks of IPv4
and dramatically increases the pool of IP addresses available to support the increasing number of internet-
connected devices. Internet-routable unique addresses are known as global unicast addresses.
Multicast addresses are those that are utilized to deliver information to several receivers.

How It Enables Effectiveness:


 It eliminates the need for NAT, enhancing network architecture and routing effectiveness.
 IPv6 also offers end-to-end encryption and authentication, making it ideal for real-time applications
like streaming.

3.3. Assessment of Networking Protocols

11
HTTP/HTTPS (Hypertext et al./Secure): The HTTP protocol sends web pages over the Internet. It defines
how web servers and browsers respond to instructions and message structure. HTTPS ensures secure com -
munication by encrypting data and protecting it from manipulation and unauthorized access.

How It Enables Effectiveness:


 Data Integrity and Privacy: HTTPS safeguards data integrity and privacy through data encryption,
guaranteeing the security of sensitive information like personal details and payment data.
 Authentication: HTTPS verifies that users interact with genuine servers, not impostors.

Internet protocol/transmission control protocol, or TCP/IP, is the core set of protocols used for Internet
communication. Through connection establishment and correct data transfer and reception, TCP guarantees
dependable data transmission—IP addresses and routing guarantee that data packets arrive at the right place.
How It Enables Effectiveness
 Dependable Communication: TCP guarantees the reliable and sequential delivery of data, a critical
aspect for precision-demanding applications like web browsing, email, and file transfers.
 Traffic regulation and congestion handling: TCP oversees data flow and congestion management, en-
hancing network efficiency and resource utilization.

FTP (File Transfer Protocol): FTP is a network protocol that transports files between a client and a server.
Users may manage folders, download and upload files, and operate on data in a secure or non-secure man -
ner. It uses separate data and control lines to connect the client and server.

How It Enables Effectiveness


 Streamlined File Transfer (FTP) allows for the movement of substantial files, such as directories,
across systems, which benefits activities like website modifications and exchanging extensive data-
sets.
 Continuation Feature: FTP facilitates the resumption of halted transfers, lessening the necessity to re-
commence file transfers from the beginning.

SMTP (Simple et al.): SMTP sends emails across networks. It handles the transmission of emails from
client to server and between mail servers, ensuring messages are delivered correctly to the recipient's email
server. It is utilized to send and forward outgoing emails from the sender's mail server to the recipient's mail
server.

How It Enables Effectiveness


 Dependable Email Delivery: SMTP guarantees that emails are securely sent between servers, ensur-
ing messages reach their designated recipients.
 Error Management: SMTP incorporates features for reporting errors, aiding administrators in resolv-
ing delivery problems.

POP3 (Post et al. 3): Emails downloaded via POP3 are usually removed from the server after being down-
loaded to a single device. Local email clients can get emails from a distant server over a TCP/IP connection
using the POP3 protocol. POP3 removes the emails from the server and downloads them to the user's local
computer.

How It Enables Effectiveness


 Offline Access: POP3 allows users to access their emails offline by downloading emails to the local
device.
 Simplified Server Load: Since emails are removed from the server after download, POP3 reduces the
storage burden on email servers.
 Compatibility: POP3 is widely supported by email clients and servers, ensuring broad interoperabil-
ity.

12
DNS (Domain et al.): DNS converts domain names that are accessible to humans (such as
www.example.com) into IP addresses that are used by connected computers to identify one another. It al-
lows users to access websites using memorable names, much like a phonebook for the Internet.

How It Enables Effectiveness


 Enhancing Efficiency: Easy Navigation: DNS permits users to reach websites through simple-to-re-
call domain names rather than numerical IP addresses.
 Traffic Distribution: DNS can allocate traffic across various servers, boosting service performance
and reliability.
 Backup and Strength: DNS's decentralized structure guarantees high availability and strength, en-
abling the system to operate even if a portion is compromised or malfunctions.

DHCP (Dynamic et al. ): Thanks to DHCP, Devices on a network may interact effectively without human
configuration. DHCP automates assigning IP addresses to devices and designates gateways, IP addresses,
subnet masks, and network settings.

How It Enables Effectiveness


 Enabling Effectiveness: Automated IP Allocation: DHCP streamlines the IP address assignment pro-
cess, reducing administrative tasks and avoiding address conflicts.
 Adaptive Setup: DHCP can reallocate IP addresses when devices connect or disconnect from the net-
work, maximizing IP address utilization.

SNMP (Simple et al.): SNMP is used for network management and monitoring. It allows administrators to
collect information about network devices, such as routers, switches, and servers, and manage their configu-
ration and performance.

How It Enables Effectiveness


 Network Monitoring: SNMP offers live monitoring of network equipment, allowing administrators
to monitor performance and identify problems swiftly.
 Configuration Management: SNMP permits remote setup of network devices, aiding in effective net-
work management and issue resolution.

3.4. Effectiveness of Network system


The Effectiveness of networked systems hinges on their ability to provide seamless, reliable, and secure
communication between devices. Efficient networked systems enable rapid data transfer, support high levels
of connectivity, and ensure that resources such as files, applications, and internet services are readily acces-
sible. Reliability is ensured through robust hardware, redundancy, and error-correction protocols, minimiz-
ing downtime and data loss. Additionally, scalable network architecture allows for easy expansion and adap-
tation to increasing demands, ensuring sustained performance as the network grows. Together, these factors
contribute to networked systems' overall efficiency and Effectiveness, enabling them to meet the diverse
needs of users and applications in various environments. The network protocol is a collection of guidelines
and norms that control data transmission and reception throughout a network, guaranteeing dependable and
efficient device-to-device connection. Protocols are essential to networking because they provide stable and
effective communication between devices and define criteria for data exchange. Routed protocols are used
to direct data packets across different networks. They include methods for determining the best paths for ad-
dressing systems and data transmission. Consider the following, for instance:

4. Evaluation of a Topology Protocol

1. Bus Topology Protocol: Carrier Sense In Ethernet networks, multiple access with collision detec-
tion, or CSMA/CD, is used.

13
Evaluation: Because of its higher collision rates in more extensive networks, CSMA/CD performs poorly in
smaller networks. Shared bandwidth may cause congestion and decreased performance as additional devices
are added. The network may be affected by a single point of failure, the central wire.
It has limited scalability because of the standard media and collision domain.

2. Star Topology Protocol: Ethernet uses switches (modern) or hubs (old). Networks with an access
point are known as WiFi (IEEE 802.11).

Evaluation: Switches efficiently handle data flow, reducing the risk of accidents and boosting productivity.
Each device's dedicated connection to the hub/switch
improves its performance.
Regarding reliability, the topology is more resilient than the bus topology overall, but the central device is a
single point of failure. It allows devices to be added or removed with little to no impact on the network.

3. Ring Topology Protocol: A protocol that passes a token is used, and for redundancy, it uses a dual
ring topology.

Evaluation: Token-passing guarantees equitable network access and minimizes collisions. It effectively
uses bandwidth through regulated access yet is constrained by each gadget's speed. A single device failure
may disrupt the network, but dual-ring FDDI can lessen this risk. It is moderately scalable; latency may rise
with more devices.

4. Mess Topology Protocol: Dynamic source routing (DSR) is used in ad hoc networks. For mobile ad
hoc networks, optimized link state routing (OLSR) (MANETs) is used.

Evaluation: The various pathways and dynamic routing make the mesh highly efficient despite the potential
for increased routing complexity. Multiple connections cause high bandwidth utilization, while redundancy
increases reliability. High fault tolerance and various data channels make it incredibly dependable. Because
of the exponential increase in connections, a full mesh is less scalable than a partial mesh.

5. Hybrid Topology Protocol: Data may be sent from one node to another using multiprotocol label
switching (MPLS), which uses short path labels. Internet routing between autonomous systems is
done using the border gateway protocol (BGP)

Evaluation: It is exceptionally effective for sizable, intricate networks with a wide range of needs. Multiple
pathways and dynamic routing result in optimal bandwidth consumption. Dynamic routing methods and re-
dundant pathways can contribute to high dependability. It has excellent scalability and can adapt to network
structure changes and expansion.

It is critical to consider the unique needs of the network environment, such as scalability, reliability, perfor-
mance, and cost, when choosing network topologies for a particular scenario. The rationale behind selecting
mesh and star topologies for the given scenario is elucidated below:

4.1 Selection and Justification of Star and Mesh Topology

Star Topology

The star topology was chosen for its ease of installation and maintenance.
All devices are connected to a single hub or switch, allowing for easy ad-
dition or removal—this centralized monitoring and management support
network administration and troubleshooting. The star topology also mini-
mizes network congestion and enhances performance, especially for large-
scale data transfers, making it a beneficial approach.

14
Efficient Utilization of the Network System of Star Topology

The design will use high-performance switches to ensure dedicated bandwidth for all connected devices, re-
ducing collision risks and improving network performance. Traffic shaping will regulate data flow and vol-
ume, while VLANs will divide the network for security and bandwidth management. Link Aggregation
(LACP) technologies will be employed for redundancy and increased bandwidth. A hierarchical structure
and more switches will be added to accommodate future expansion and growing network requirements while
maintaining scalability.

Mesh Topology

Mesh topology is a reliable and fault-tolerant network design that estab-


lishes multiple paths between devices, ensuring data transmission
through alternative routes in case of link failure. It manages high traffic
volumes and lower latency, making it ideal for high-speed connectivity
and real-time data transmission. It is decentralized, preventing a single
point of failure from taking down the entire network. SBP Ltd.'s network
design combines mesh and star topologies for a scalable and effective
system.

Efficient Utilization of the Network System of Mess Topology

The author plans to use dynamic routing protocols like OSPF or BGP for the mesh topology to ensure opti-
mal data paths and effective network load balancing. They plan to use redundant hardware for reliability and
fault tolerance and leverage the mesh topology's inherent redundancy for multiple data paths. Scalable ex-
pansion will involve adding nodes and managing traffic loads, while data compression techniques will mini-
mize transmitted data, and traffic shaping will manage data flow. Updating network hardware and software
will enhance security features and performance.

5. Different types of servers and networking devices

Hub
A hub is an essential networking tool that connects multiple computers or devices within a single local area
network (LAN). It does not store the IP address, MAC, and other items. It sends and receives data packets to
all devices linked to it, regardless of the intended recipient. Compared to more sophisticated networking
hardware, such as switches and routers, it cannot intelligently manage or direct network traffic, which could
result in inefficiencies and slower data transmission speeds.

Routers
A router is an essential networking device used chiefly for routing that guides
packets between computer networks. It is the same as a bridge, but a network-
layer device works with a different protocol. Its primary job is to determine the
optimal path for data, divided into smaller packets known as "store and for-
ward," to reduce latency and increase network efficiency. This technique can
be used on both external and local networks.

Modem
Digital signals are converted into analog signals at various frequencies by a
modem (modulator-demodulator), which then sends the signals to another mo-
dem at the other end. A connected device, typically a computer, receives a digi-
tal output from the receiving modem, which also executes the reverse transfor-
mation. Usually, a serial line with the industry-standard RS-232 interface trans-
fers digital data to and from the modem.

15
Switches
Switches are essential networking devices that efficiently route data
within local area networks (LANs) by forwarding incoming packets di-
rectly to their intended destinations based on MAC addresses, operating
at the OSI model's Data Link Layer (Layer 2). It can multicast, unicast,
and broadcast the messages. Switches dynamically learn and maintain ta-
bles of MAC addresses per port, enabling them to optimize traffic flow
and support full-duplex communication for simultaneous data transmission and reception without collisions.

Firewalls
A firewall is a security tool for computer networks. It watches and controls the data coming into and going
out of a network based on rules that a company has decided on to protect its information. A firewall is essen-
tially the wall that separates a private internal network from the open Internet at its most basic level. The pri -
mary function of a firewall is to let safe traffic through while blocking harmful traffic.

Repeaters
Repeaters are essential devices used in networks to strengthen sig-
nals and increase data transmission distance. They work at the first
level of the OSI model, where they take in electrical or light signals,
remove any unwanted noise, and send them out again with the same
power. This process ensures the signal remains strong and clear over
long distances, which is particularly useful in large or sprawling net-
works where signal degradation can occur.

Bridges

Bridges are tools that join and manage the flow of information between two or
more parts of a network, working at the level where data is linked (Layer 2) in
the OSI model. They use special codes (MAC addresses) to send data packets
to the correct part of the network, which helps to ease traffic by splitting an
extensive network into smaller, easier-to-handle pieces. Bridges learn the
MAC addresses of devices on each segment and use this information to create
a forwarding table, ensuring that data is only sent to the correct destination
segment.

IoT Gateways

IoT gateways connect Internet of Things (IoT) devices to the cloud or


other networks, handling communication, data processing, and protocol
translation. They provide security features to protect IoT devices from cy-
ber threats and process data locally before sending it to the cloud, reducing
latency and bandwidth usage. By converting data between different com-
munication protocols, IoT gateways ensure seamless integration and inter-
operability within the IoT ecosystem.

Host-based Intrusion Detection System (HIDS)

Unlike network-based systems that monitor traffic, a Host-based Intrusion


Detection System (HIDS) is a security tool installed directly on computing systems like servers, worksta-
tions, or endpoint endpoints. HIDS monitors essential system files, user activity, processes, and network
connections to identify and neutralize possible threats quickly. Administrators configure HIDS to monitor
16
specific host behaviors such as file system changes, running processes, and network activity. It continuously
analyzes data to identify unauthorized access or suspicious patterns, generating alerts promptly.

VPN Concentrators
A VPN concentrator is a centralized gateway consolidating and managing multiple VPN connections, ensur-
ing secure access for remote users, branch offices, and business partners. It uses encryption and secures tun-
neling protocols to ensure data confidentiality and integrity over public networks. The VPN client communi-
cates with the concentrator for authentication, establishing a secure tunnel for data transmission.
Access Point
An access point (AP) is a crucial networking device that creates wired or wireless local area networks
(LAN) for device connectivity. It is often integrated into routers to increase network coverage. Wired Ac-
cess Points use Ethernet for desktop computers, while Wireless Access Points convert wired signals for
WiFi connections. WAPs manage device identification, transmit data on specific frequencies, and authenti-
cate using protocols like WPA2. Wired access points support VLANs for network segmentation and effec-
tively manage data traffic.

Content Filter
A content filter, also known as a web filter, is a technology used by organizations, schools, and parents to
regulate and control online content access. It restricts access to harmful or undesirable content through tech-
niques like deep packet inspection, URL and keyword filtering, and DNS filtering based on domain names.
Based on the results, these filters intercept user requests, compare them to pre-established policies, and de-
cide whether to grant or deny access.

IDS and IPS


IDS and IPS, or intrusion prevention and detection systems, use signatures or anomalous activity to monitor
network traffic for indications of potential intrusions. IDS does not directly impede network traffic but alerts
administrators or other security systems when anomalies occur. IPS resets network connections at the TCP/
IP layer to prevent suspected intrusions from spreading to other devices. As one of the first information se -
curity applications, machine learning concepts were used in intrusion prevention systems.

5.1. Server Types and Operations

File Servers
A file server is a specific computer or software used to store and manage files available to users on a new
work. Thanks to the centralization of file storage it provides, users may save, retrieve, and share documents,
multimedia files, and other data over new work. File servers provide safe and well-organized access to
shared resources, improving cooperation and business data management.

Web Servers
A web server is the hardware or software that allows content to be shared online. It hosts websites and on-
line applications by providing web pages, photos, videos, and other resources in response to requests from
client browsers. Web servers process HTTP requests, run server-side scripts, and maintain user sessions to
enhance worldwide webpage publishing and accessibility.

Email server: An email server is a software or a system on a computer that sends and receives emails. It
handles emails coming in and going out, organizes them in mailboxes, and simplifies sending and receiving
messages. Email servers have two methods for sending and receiving emails: Simple et al.'s SMTP and Post
et al. v3/Internet Message Access Protocol.

Print Server
In a network, a print server is a computer or device that controls printers and print jobs. Centralizing p inner
resources enables numerous users to send networked print jobs to shared printers. Reliable printing services

17
from print servers boost productivity by prioritizing print tasks, managing print queues, and ensuring effec-
tive printer utilization throughout businesses.

DHCP server
Dynamic Host Configuration Protocol (DHCP) servers are network services that automatically provide IP
addresses and network configuration settings to connected devices. They do away with the requirement for
manual IP address settings by dynamically allocating IP addresses from a predetermined pool. In addition,
DHCP servers oversee IP address lease terms, renewals, and releases, guaranteeing effective IP address ad-
ministration and device network access.

6. Workstation Hardware and Network Software

Network Interface Card

The part inside a computer or device that lets it join a network is


called a network interface card, or NIC. It helps the computer send
data and connect to the network by letting it talk to other devices on
the same network. NICs are required to link a workstation to a net-
work. They transform workstation data into a format suitable for
network transmission.

Workstation
When a person uses a computer or a small screen connected to a computer to do tasks like writing, designing
pictures, creating computer programs, or working in an office, we call it a workstation. It has special pro-
grams for the person using it and often uses a system that helps manage the computer's desktop, like Win -
dows, macOS, or Linux.

Server
A server is a particular computer or software that provides resources or services to other computers, called
clients, over a network. Servers can display websites, manage email, store files, and run business applica-
tions.

Interconnection device
Multiple devices in a network can communicate with each other more easily when interconnection devices
like switches and routers are present. Devices in a local area network (LAN) are connected via switches, al -
lowing them to speak for themselves. Conversely, routers serve as a bridge between various networks, en -
abling data transfer and connection.

Connector and cabling


Leased line cabling
Dedicated phone lines companies rent from a service provider are called leased line cabling. These lines
guarantee dependable data transmission with guaranteed bandwidth and low latency by offering exclusive,
fast connectivity between two or more locations. Leased lines are frequently used to connect geographically
separated offices to support vital applications that need constant and secure communication channels.

Network media types-


Network media is the genuine path over which an electrical signal travels as it transfers from one component
to another. Common types of network media include twisted pair cable, coaxial cable, fiber-optic cable,
SPT, category 5, UTP, fiber optic,

18
and wireless.

Network
media types

Twisted pair cable


Twisted pair cable

Minimizes electromagnetic interference by twisting pairs of insulated copper


wires together. Its affordability and adaptability to various network architec-
tures make it a famous voice and data communications choice.
Coaxial cable
Coaxial cables have an outer insulating layer, a metallic shield, and insula-
tion surrounding the central copper conductor. Due to their ability to shield
signals against interference, cable TV companies frequently use them to de-
liver television signals to homes and businesses. They are also utilized for
specific telecommunications applications.

Fibre optical cable


Data is transmitted as light pulses via fiber optic cable using optical fibers
composed of glass or plastic. Fiber optic cable is perfect for high-speed in-
ternet connections and telecom networks because of its large bandwidth, im-
munity to electromagnetic interference, and long-distance transmission ca-
pabilities.

STP cable
STP cable, which stands for Shielded Twisted Pair, is similar to twisted
pair cable. However, it includes additional shielding to protect against
electromagnetic interference (EMI). This ensures dependable data trans-
fer and performs better in settings with much electrical interference.

CAT 5
CAT 5 (Category 5) is a twisted pair cable type standardized for Ethernet
networks. It is frequently used in local area networks (LANs) to connect
computers, printers, and other networked devices. It supports data rates of
up to 100 Mbps.

UTP

19
An Unshielded Twisted Pair, or UTP for short, is a twisted pair cable lacking extra shielding. Due to its low
cost and simplicity of installation, it is extensively utilized in Ethernet networks and telecommunications,
even though it might be more prone to electromagnetic interference than STP.

Wireless
Wireless technology uses radio waves or infrared signals to allow devices to communicate without physical
connections. It comprises Bluetooth for close-quarters communication between devices, WiFi for local area
networking, and cellular networks for on-the-go communication.

Mobile Technology
Mobile technology refers to the systems and standards enabling cell phones and tablets to connect to voice
and data services without wires. This includes advancements that provide fast mobile Internet, such as 4G
LTE and the upcoming 5G networks.

Software
Network operating system
"network operating system" (NOS) refers to specialized software that controls network resources and offers
features like printer and file sharing and network security. Examples are Linux distributions set up for server
use, Windows, and macOS Server (previously).

Networking Software
Client software
Client software is the term for programs and applications installed on individual computers or devices
(clients) within a network. Thanks to these applications, users can access and use server-provided services.
Software used for productivity, such as word processors and spreadsheets, email clients, file transfer pro-
grams, and web browsers, are among the examples.

Server Software
Server software refers to programs and applications created to offer resources or services to clients on a net-
work. Server-side applications like these oversee file sharing, email management, web hosting, database ad-
ministration, and network security. Email servers such as Microsoft Exchange, database servers like MySQL
and PostgreSQL, and web servers like Apache and Nginx are a few examples.

Client operating software


A client operating system software controls how individual computers, other devices, or "clients" function
inside a network. It controls hardware resources and offers user interfaces to let users execute applications,
access files, and connect to networks. Microsoft Windows, macOS (formerly OS X), Linux distributions like
Fedora and Ubuntu, and mobile operating systems like iOS and Android are a few examples.

Server operating software


A server operating system is software that administers and runs network servers, giving clients on the net-
work access to resources and services. It facilitates application hosting, network administration, security,
and centralized data storage. Examples include macOS Server (previously OS X Server), Windows Server,
and Linux distributions optimized for server use (such as CentOS and Red Hat Enterprise Linux).

Virus checker
Also known as antivirus software, a virus checker prevents damage and illegal access to data by identifying
and eliminating malicious software (viruses, malware, etc.) from computers and networks.

Firewall

20
Based on pre-established security rules, a firewall is network security hardware or software that monitors
and regulates all incoming and outgoing network traffic. Enhancing network security is a barrier between
trusted external networks (like the Internet) and untrusted internal networks.

Commercial system
Commercial software is any software or program intended and developed for licensing or sale to end users
or that assists a commercial purpose. Commercial software used to be known as branded software, but
today, many free and open-source software programs are licensed or sold to users. There are different types
of commercial systems. Here are a few examples: Windows, Ubuntu, Linux, and Mac OS.

Control Bus
The system bus, which acts as an essential communication channel, facilitates the transfer of data and con-
trol signals between a computer system's components. Examples of low-pin-count system buses include
IEEE 196, IEEE-488, and high-performance parallel interfaces.

IP address
An IP address is a unique numerical identification for every device connected to a network via the Internet
Protocol. It facilitates data routing and identifies the device's position within the network. There are two
main types: IPv4 (32-bit) and IPv6 (128-bit). Local networks use private IP addresses, while devices linked
to the Internet use public IP addresses. These addresses are essential for device connectivity, network traffic
control, and efficient data routing.

Port number/address
In networking, a port address sometimes called a port number, is a unique identification used to identify par-
ticular services or applications operating on a device. Alongside IP addresses, it is an essential part of the ad-
dressing system. Every network function, including email sending and web browsing, has a specific port
number. For instance, port 443 is usually used for HTTPS, but port 80 is for HTTP.

Mac Address
A network interface controller (NIC) is assigned a unique identifier by its manufacturer, known as its Media
Access Control address (MAC address). This address is a persistent and universally recognized identifier for
network-connected devices like Ethernet cards and WiFi adapters. Unlike IP addresses, MAC addresses are
hardcoded into the device's firmware and do not change over time.

6.1. Independence of Workstation Hardware and Networking Software

Network Interface Cards (NICs) and Drivers


Network Interface Cards (NICs) allow computers to connect to networks physically. However, they need
software drivers to work. These drivers help the NIC talk to the computer's operating system and manage
network tasks. With the correct drivers, NICs will work, showing how important it is for hardware and soft-
ware to work together.

Operating System
The operating system (OS) controls how computers communicate over networks and needs hardware like
the CPU and memory. Networking software built into the OS, such as the TCP/IP stack, lets devices talk to
each other, showing how the OS depends on the hardware.

Security Software
Security software, like firewalls and antivirus programs, protects computers from network dangers. These
tools need the computer's processing power and memory to watch and control network activity. The hard-
ware's abilities significantly affect how well these tools work.

21
Network Protocols
Protocols like TCP/IP, UDP, and DNS help devices send and receive data. Devices like routers, switches,
and network interface cards use these software protocols to handle and direct data well. This shows how
hardware and networking software work together.

Virtualization Software
Virtualization software lets users make virtual computers and networks on real hardware. This software
needs the computer's processor, memory, and storage to run different operating systems and network setups
simultaneously, showing how virtualization depends on solid hardware.

Networking Management and Networking Tools


To monitor and manage a network, users need robust computer equipment to provide information as it hap -
pens. Software programs use the computer's ability to process and store information to check how well the
network is doing and inform users about it. This shows that suitable computer hardware is essential to ensure
the monitoring is done correctly.

Remote Desktop and Collaboration Tools


Software that lets users control a computer from a distance or work together with others, like video calls,
needs a good amount of computer power, memory, and the ability to connect to the Internet. These programs
depend on the computer's hardware and the software that connects to the Internet to give smooth and practi -
cal experiences for the people using them.

7. Exploring Server Types


Web server: A web server is a program that helps people get the files that makeup websites using HTTP
(Hypertext et al.). When people request these files, their computers talk to the web server through an HTTP
client. Sometimes, people also call special computers or devices web servers.

FTP server: As part of a multiplying system, a file server is a computer connected to a network that offers a
site for shared disk access. File servers are devices that allow access to independently stored files.

Database server: A database server is comparable to a data warehouse, where websites store and maintain
their data and content. The databases and the Database Management System (DBMS) are housed on a data-
base server. It retrieves specific records from the database and sends them back across the network in re-
sponse to requests from the client computers.

Virtualization server: By using virtualization software, a single physical server can be split into multiple
smaller virtual servers through virtualization. Each virtual server in server virtualization runs several operat-
ing system instances concurrently.

Terminal server: A terminal service server is a physical device that provides a shared connecting point for
multiple terminals, such as PCs and printers, to access the Internet or a local network without requiring a
network interface card or modem. It allows devices with an RS-232/RS-423 serial port interface to function
as terminals and access the Internet or local network.

7.1. Justification of server selection

SBP Ltd, a publishing company, requires efficient file management and secure transfer capabilities for large
electronic files. An FTP server offers robust file-handling features, ensuring reliable data exchange among
publishing teams and external collaborators without compromising security. This optimizes performance by
streamlining file transfers and enhancing productivity across the organization. DHCP servers are chosen for
automated IP address management, reducing administrative costs and preventing setup mistakes. HTTP
servers are chosen for hosting digital content, such as publications and online platforms, essential for SBP
Ltd's interaction with the scientific community. These servers provide quick and safe access to electronic
22
publications, ensuring high availability and responsive content delivery. The choice of web, DHCP, and FTP
servers satisfies SBP Ltd's operational requirements while balancing improved performance and cost-effec-
tiveness. These servers work together to provide effective file management, smooth network access, and
rapid digital content delivery for their publishing operations and stakeholder involvement.

8. Network Design and Description

Fig: Network Design to meet specifications from draw.io

In this SPB network design, employees are first provided with a company laptop containing a software fire-
wall and a VPN client.
Employees can store company data on the company fileservers, a high-throughput Cloud VPN server is in-
stalled and configured to allow secure connectivity for all remote working employees, and all office soft-
ware is accessed using a cloud-based Google server. A DHCP, FTP, and HTTP server are installed on the
network design; the data center can handle high-volume data traffic from inside and outside the organiza -
tion. The design has a mixture of wired and wireless connectivity; there is proper consideration given to net-
23
work security to minimize a data breach in the design; a firewall and ADS are installed and configured to al -
low inbound and outbound traffic, and there is no lag of data traffic between floors and no connectivity
‘dead spots, any data sent to a cloud server or stored on the RPS server is encrypted through VPN connectiv-
ity, there are robust backup facilities in place for the SBP data in case of a data loss or security breach, the
current network security model for teams and employees is preserved even though Employees are working
from home.

9. Maintenance schedule to support the networked system.

Frequency Task Description


Daily Network monitoring Check network monitoring tools for alerts and perform-
ance metrics.
Review logs for unusual activities or errors.
Backup Verification Verify that daily backups have been completed success-
fully.
Ensure critical data is backed up and stored securely.
System health checks Inspect key hardware components for any signs of fail-
ure.
Checks the status of critical network devices (routers,
switches, firewalls).
Weekly Update security Signatures Update antivirus, anti-malware, and intrusion detection
system (IDS) signatures.
Apply updates to firewall rules and security policies.
Performance Analysis Analyse network performance data to identify trends and
potential issues.
Optimize network configurations based on analysis res-
ults
Monthly Patch Management Apply operating system and application patches to net-
work devices and servers.
Ensure firmware on network devices is up-to-date.
Capacity planning Review network capacity and usage trends.
Plans for future capacity needs and potential upgrades
Quarterly Security Audits Perform security checks to make sure that the rules and
guidelines for safety are being followed.
Perform vulnerability assessments and penetration test-
ing.
Redundancy and Failover Test- Test backup systems and failover mechanisms to ensure
ing they function correctly.
Verify redundancy for critical network paths and
devices.
24
Biannually Disaster Recovery Drills Conduct disaster recovery drills to ensure readiness in
case of a network outage or data loss.
Update and review the disaster recovery plan.
Network Documentation Re- Review and update network documentation, including
view diagrams, IP address assignments, and configurations.
Annually Hardware and Software Invent- Perform a complete inventory of network hardware and
ory software.
Plan for hardware replacements and software upgrades
based on lifecycle and performance
Compliance Review Ensure network compliance with relevant regulations
and standards.

10.Network Implementation and Configuration

I designed a detailed network setup using Cisco Packet Tracer for SBP Ltd. to handle the company's various
needs. Each of the four local networks includes standard devices like computers for employees, printers for
handling documents, and wireless access points for laptops and tablets. These devices are connected by
switches that ensure reliable data transfer within each network. The server room contains critical servers for
sharing files, hosting websites, and assigning IP addresses automatically, along with other critical infrastruc-
ture like HTTP, FTP, and DHCP servers. There is also a computer in the server room to manage the net-
work.
I installed two multilayer switches (MLS1 and MLS2) that link all LAN switches and servers to guarantee
robust connectivity throughout the network. This promotes redundancy and load balancing for increased re-
liability. Two routers, each connected to clusters that maximize traffic dispersal, enable connectivity to dis-
tant networks and places. This configuration follows best practices in network design by integrating redun-
dancy, scalability, and effective resource management and facilitating seamless communication and resource
sharing. I successfully implemented the simulation.

25
11.Analysis of Test Results Against Expected Outcomes

Ping
The ping command sends a request to a specific device through the network. If the ping is successful, the
computer that receives it responds to the original computer.

PC0 to PC1
Laptop0 to Laptop 3

PC2 to DHCP Server


PC3 to HTTP Server

26
IPCONFIG
The above results show the default gateway address and the IP
address for the specific computer.

IPCON-
FIG/ALL
The in-
formation provided includes the IP ad- dress, the
subnet mask, the default gateway, the DNS
servers, the DHCP server, and the MAC address.
This way, you can quickly get an over- view of
your network setup.

Tracert

The above result shows the tracing route from one


IP to another. It indicates a packet's path from your
computer to the command's target computer.

27
PC:
This device combines hardware and software compo-
nents that perform tasks and provide various solu-
tions. It has an IP address in class A and a default
gateway connection to 0.0.0.0. The design includes
five PC0 (192.168.1.5), PC1 (192.168.1.17), PC2
(192.168.1.2), PC3 (192.168.1.4), and PC4
(192.168.1.3), each with an internal IP address and
DHCP enabled. Each room has one PC, and a fire-
wall is enabled.

Router
This gadget scans data packets being transferred to or from another network. I have assigned two routers in
the design, Router 1 and Router 2, with the configuration of Router 1 (192.168.1.1)in gigabit ethernet0/0 and
(10.10.10.0) in gigabit Ethernet 0/1 and Router 2 (192.168.1.2) in gigabit Ethernet 0/0 and 10.10.10.1 in gi-
gabit Ethernet 0/1. I have also inserted the HWIC-2T module in the router to connect serial ports with the
Serial DTE wire.

Cluster
A cluster is a collection of linked hosts or computers. Every computer in
a cluster is called a "node." I have created a cluster with two routers se-
lecting and creating a cluster. I have inserted the NIM-2T module in ev-
ery router in both clusters to connect serial ports with the serial DTE
wire.

Printer

A printer is a device that creates a physical version of in-


formation from a computer or another device. The image
shows an IP address in class A. With the correct subnet
mask and a default gateway connected to 0.0.0.0, four
printers are in each room. Network printers get an IP ad-
dress through DHCP. Laptops and PCs have the neces-
sary software installed.
28
Switch:

A switch is a fast device that takes incoming data packets and routes them to the
appropriate location. In this network design, a straight-through cable is connec-
ted from the PC’s Ethernet port to an available port on the switch. The switch
port has been given the proper VLAN assignment. Five switches are connected
to two multilayer switch crossover cables between similar ports.

Multilayer switch Layer:

Multilayer switches support two switching and Layer 3 routing. The router's in-
terface is linked to the switch's uplink port via a straight-through connection. If
more than one VLAN is utilized, the switch port is set up for trucking. A cross-
over wire is connected between similar ports on the switch and the multilayer
switch.

Access point configuration (Wireless)


The Math physics, Computer science engi-
neering, and two other local area networks
are set up on Port 1 using WPA2-PSK to
secure them. An SSID and a password of
at least eight characters are required for
each connection. The unique SSID is the
access point's name, while all system ac-
cess points consistently have parameters
set to 6, including the 2.4 GHz channel,
authentication method, and coverage
range.

Laptop
In addition to the Maths and Physics and other 3
LANs, The Linksys-WPC300N module is inserted in
the NIC port of the laptop, which provides one
2.4GHz wireless interface suitable for connection to
wireless networks. Entering the SSID of the appro-
priate access point and password will make a wire-
less connection from the laptop. An IP address has
been implemented in class A, as depicted in the im-
age. Following a class-appropriate subnet mask and a
default gateway connection to 0.0.0.0, the IP address
is obtained via DHCP. IPs are assigned as Laptop0
(192.168.1.10), Laptop 1 (192.168.1.9), Laptop2
(192.168.1.7), and laptop3 (192.168.1.6).

29
Tablet
Tablets provide portable devices for reviewing pub-
lications. In addition to the Maths and Physics and
other 3 LANs, Entering the SSID of the appropriate
access point and password will make a wireless
connection from the laptop. An IP address has been
implemented in class A, as depicted in the image.
Following a class-appropriate subnet mask and a
default gateway connection to 0.0.0.0, the IP ad-
dress is obtained via DHCP. IP address is obtained
via DHCP. IP are assigned as Tablet0
(192.168.1.12), Tablet 1 (192.168.1.13), Tablet2
(192.168.1.8), Tablet3 (192.168.1.11).

Firewall
The SBP Ltd network was simulated using Cisco
Packet Tracer to improve security by setting up
software firewalls on each PC. These firewalls
are crucial for shielding devices from malicious
activity and illegal access. The settings on each
PC were adjusted to establish guidelines for in-
coming and outgoing traffic based on pre-estab-
lished standards like IP addresses, port numbers,
and protocols.

Servers:

FTP server
This one is one of several servers in the network design
that will provide unique assistance. The picture on the side
shows that an IP address has been implemented in class A.
IPv4 address 192.168.1.14 was assigned; it allows us to
connect to core Router 2 via a Multilayer switch using a
class-appropriate subnet mask and a default gateway con-
nection to 10.10.10.1. This, in turn, allows us to communi-
cate
with
other
end-
point
end-
point devices in the network system.

30
The FTP server is also turned on to enable system endpoint devices to use the FTP service
and facilitate file transfer. I have only added two users to the list to test how well the file
functions. The cd/ftp command can be used to create a file on the server in the file manager.
To connect the FTP server to a PC, use the IP address of the ftp 192.168.1.14 server and then
log in with the credentials set up on the FTP server.

DHCP server
This server is one of several in the network design that will
specifically offer support. The side image shows that an IP
address has been implemented in class A. With a class-appro-
priate subnet mask and a default gateway connection to
10.10.10.1, we can connect to core Router 2 via a Multilayer
switch using the IPv4 address 192.168.1.15 that was assigned.
As a result, we can speak with other network system endpoint
devices.

31
I set up the DHCP server to automatically issue IP addresses. Using a straight-through cable, I added a
server and viewed its configuration on the switch. The DHCP service was activated, and a "server pool" was
made under the Services tab. 192.168.1.0 is the IP address range I have established with a subnet mask of
255.255.255.0, the default gateway to 10.10.10.1, and the DNS server to 8.8.8.8.8. This configuration en-
abled effective network administration, allowing the DHCP server to issue IP addresses to client devices dy -
namically.

HTTP server

This server is one of several in the network design that will


help a certain way. Class A has adopted an IP address, as seen
in the image on the side. The IPv4 address 192.168.1.16 was
assigned, and by utilizing a class-appropriate subnet mask and
a default gateway connection to 10.10.10.1, we can connect to
core Router 2 via a Multilayer switch. As a result, we can then
speak with other endpoint endpoint devices in the network sys-
tem.

To provide network web services, I set up the


HTTP server. I connected a straight-through
cable to the switch from the server I added to
the workspace. I next went to the Services tab
in the server configuration window. After
choosing the HTTP service to activate it, I
made sure the "On" button was pressed. To fa-
cilitate safe web traffic, I also turned on the
HTTPS service. The HTTP server was ready
to host and provide web pages to network
client devices when the configuration was
saved.

11.1. Documenting and Analysing Test Results

PC0 to PC2

The message is encapsulated with headers at PC0 and then sent to PC2 with its destination IP address. It is
transmitted to Switch1, which forwards the message based on PC2's MAC address using its MAC address
table. Once at the multilayer switch, it determines the optimal path and forwards the message to Switch2.

32
After receiving the message, Switch2 forwards it to PC2, which decapsulates and processes it—the multi-
layer switch functions at both data link and network layers.

PC1 to Laptop3

In this scenario, PC1 sends a message to Laptop3 in LAN Room 4, packaging data at application, transport,
and network levels. The Ethernet frame is sent to a multilayer switch, which determines the next step using
its MAC address table. The frame is guided through a router, which steers the packet towards LAN Room 4,
taking into account Laptop3's IP address. The second multilayer switch forwards the frame to the correct
port linked to LAN Room 4, and finally, the switch delivers the frame to Laptop3, which unpacks the mes-
sage, handles it, and finalizes the communication.

Tablet PC0 to PC3

The transmission of a message from Tablet PC0 in LAN Room 1 to PC3 in LAN Room 2 involves multiple
steps through various network devices. Tablet PC0 starts communication by specifying PC3's IP address as
the destination. The data is encapsulated into an Ethernet frame at the data link layer. It is transmitted to the
first multilayer switch, which checks the destination MAC address and forwards it to the appropriate port
connected to the first router. The second multilayer switch receives the frame, forwards it to LAN Room 2,
and delivers it to PC3. PC3 then decapsulates the Ethernet frame, retrieves the original message, processes it
at transport and application layers, and responds accordingly.

Laptop 1 in LAN Room 1 initiates communication by broadcasting a DHCP Discover message. This mes-
sage is encapsulated at the application, transport, and data link layers into an Ethernet frame using Laptop
1's MAC address and the nearest multilayer switch's MAC address. The first multilayer switch forwards the
frame to the router, which then forwards it to the server room. The server processes the DHCP Discover
message, allocates an IP address to Laptop 1, and responds with a DHCP Offer, ensuring successful network
connectivity within the configured infrastructure.

11.2. Table of actual result

Test Expected Results Actual Results Action required to


solve any problem
Communication between Successful communica- Communication estab- Optimize network con-
client and server tion without delays lished and great speed figuration
Access to permitted files Permitted files and Access to permitted files None
and folders folders are accessible and folders as expected
Access denied to non- Non-permitted files and Access denied to non- None
permitted files and folders are not accessible permitted files and
33
folders folders as expected
Network speed and per- Optimal speed and per- Speed as expected None
formance formance across the net-
work
Security protocol adher- All security protocols are Protocols are fully im- None
ence adhered to plemented
User authentication and Users can authenticate Authentication success- None
access control and access resources as ful, access control issues
per their role for some roles
Network monitoring and Real-time monitoring Monitoring working, Check alert configuration
alerts and alert generation alerts generated in a
timely

12.Analyzing the feedback from users

34
35
13.Recommending Potential Enhancements

Due to the increased complexity of modern networks operating at higher layers within the OSI model, visib -
ility into layer 7 data flows is becoming increasingly important. When planning for your new network, be
sure that you have the necessary network performance monitoring tools to help you quickly identify and re-
solve application-specific problems. These tools help identify common problems and quickly resolve them
using proactive automation techniques.
As the network grows, more and more accessions will be added that help the networking you and your busi-
ness/organization expand, and the outcome of your business will increase
the network switch.

Once you upgrade your switch, you will conserve energy. Energy efficiency. This was not a major concern,
but network equipment manufacturers are now paying more attention to the issue and installing more effi-
cient power supplies and fans. The improvements are usually not sufficient to justify replacing a switch, but
they are a bonus when upgrading for other reasons.

The decision to replace equipment should be made carefully, even at the best times. Current conditions dic-
tate extra diligence, but new technology and applications can yield savings that make upgrades worthwhile.

Implementing a wireless router

The network is configured with a wired router using the latest and new technology of wireless routers. It
would help if you did not have a USB or any other means for the port and were involved in carrying differ -
ent types of devices for a file transfer with the latest wireless connection, and you could quickly transfer
your files from one source to another. Different clouds like OneDrive, Google Drive, and iCloud are on your
devices these days, where you can store and let other people see your files without having a single device to
put in a port, share files, and then remove them.
With the advancement of wireless routers, one does not need to care or worry about the surroundings;
whenever they can work, they can give you tremendous speed without having any wires attached to your
device. All you have to have is your device, and you can move freely from one place to the other, within the
required range, without worrying about anything, like the speed or the breakage of the connection. You are
given the option of free movement as well as peace of mind with the latest technology of wireless routers;
therefore, students will be able to use the college's PCs from anywhere in the college.

14. Critical Reflection on Implemented Network

36
As a junior network administrator, I created a virtual network solution for Swift & Bacon Publishers (SBP)
Ltd. The system included three servers: FTP, DHCP, and HTTP, essential for information management and
site hosting. Access points were added to enable wireless connectivity, providing flexibility for guests and
employees. FTP servers enable safe file uploading and downloading, DHCP servers assign IP addresses au-
tomatically, and HTTP servers enable website hosting and online image creation.

Wireless connectivity improved productivity and collaboration by allowing remote access for other users.
Each floor was split into two, allowing twenty devices from either side of a floor to be attached to the sys-
tem. This allowed 40 gadgets to be associated with the organization on each floor. To ensure high service
availability, two switches were added for ISP MAN and core switches, and two routers were used in con-
junction with these multilayer switches. The network administrators and server room were located at the top,
hosting email and network servers in the company. This virtual network system exceeded initial require-
ments and met all requirements.

Design choices:
The network setup includes critical decisions to improve safety and fit current work habits. Virtual LANs
(VLANs) help keep data separate, which makes the network more secure. However, they need careful setup
to avoid issues like VLAN hopping attacks. Wireless options like WiFi and Bluetooth offer convenience but
require strong security to stop people from getting in without permission or causing trouble. Shutting down
one office and allowing people to work from home part-time saves money and fits with modern working
methods. However, it needs sound VPN systems and transparent rules for remote access to keep everything
safe and running smoothly.

Area of improvement:
The current network setup shows some parts that need to be improved. First, we can improve the network by
updating the hardware and using special rules for managing bandwidth, which help fix slow spots. Second,
we can handle the network's growth better by using cloud services and flexible ways to use resources, which
makes it easier to handle more users and changes in demand. Lastly, to make the network safer, we should
do regular checks for security issues, use better ways to protect data, and require extra steps to log in, which
are essential to protect against problems and keep the network safe from new threats.

15.Reference

Digital Samba - video conferencing software, webinar software, virtual


classroom, video API https://www.digitalsamba.com/blog/a-deep-dive-into-the-network-
performance-metrics Date accessed July 2, 2024 Date published June 24, 2024

How to measure Test & Improve Network Reliability


https://obkio.com/blog/how-to-measure-improve-network-reliability/ Obkio
Date accessed July 2, 2024

https://www.geeksforgeeks.org/types-of-computer-networks/
Available at: Computer NetworkingNotes. (2018). Complete Form of Hardware and Networking
Devices. [online] Available at: https://www.computernetworkingnotes.com

https://draw.io/
Flowchart Maker & Online Diagram Software

37
Available at:https://www.computernetworkingnotes.com/networking-tutorials/computer-networking-
devices-explained-with-function.html Computer Networking Notes with Function

https://www.computernetworkingnotes.com/networking-tutorials/computer-networkingdevices
explained-with-function.html

Reliability, n.d. [Online] Available at Chapter 11 Network reliability [online] sciencedirect.com. Avail -
able at: https://www.sciencedirect.com/science/article/abs/pii/S0927050705801288

Eight ways to improve wired network security (Network World)


https://www.networkworld.com/article/2175048/8-ways-to-improve-wired-network-security.html
Date accessed June 20, 2024

https://www.ibm.com/uk-en (2021) Networking [online] Available at:


https://www.ibm.com/uk-en/cloud/learn/networking-a-complete-guide [Accessed June 21
2024]

https://www.netacad.com/ (n.d.) Cisco Packet Tracer [online] Available at:


https://www.netacad.com/courses/packet-tracer [Accessed June 22, 2024]

Seven tips for upgrading your network


https://www.networkcomputing.com/networking/7-tips-upgrading-your-network [Accessed June 20,
2024]

https://cordkuttersconnect.com/understanding-the-advantages-and-disadvantages-of-wireless-routers/

38

You might also like