Student Name: Sitashma Mahat
Student Name: Sitashma Mahat
Student Name: Sitashma Mahat
Sitashma Mahat
Academic Year
2023-2024
Type of Assignment
Business Report
Issue Date
03/06/2024
1
Table of Content
2
1. Introduction to SBP Ltd.
In the rapidly expanding food delivery sector, SBP Ltd is working to create an online platform that links
customers, delivery drivers, and restaurants. Designing and implementing an effective network system that
supports the business’s operations while guaranteeing scalability, security, and dependability is imperative
as it grows. In order to facilitate smooth communication between its web servers, databases, delivery staff,
and clients, SBP Ltd needs a robust network infrastructure. High traffic volumes must be handled by a scal-
able, secure network, especially during peak hours. It should also guarantee data integrity, offer high avail-
ability, and enable efficient data transfer.
Network
Computer networking links computers and other devices together to share resources, swap data, and talk to
each other. This process uses hardware, software, and rules to create and maintain connections between de-
vices, enabling them to work together smoothly. Computer networking enables various functionalities, such
as accessing the Internet, sharing files and printers, sending emails, and conducting video conferences. It
comprises many technologies and concepts, including local area networks (LANs), wide area networks
(WANs), wireless networks, network security, routing, and switching.
1
Client-Server Network: This works as a centralized computer network, with all its
clients connected to a powerful server computer. Clients access data and run pro-
grams on the server. They request and get services such as file storage, printing,
or database support.
Peer-to-peer network: Peer-to-peer networks link devices directly together without a centralized server.
Every gadget can function as a client and a server, sharing files and bandwidth with
other gadgets.
Cluster
In cluster computing, several computers or nodes are connected to function as
a cohesive system. These nodes cooperate to accomplish tasks, improving over-
all system performance, reliability, and scalability. Typically, they are con-
nected via a local network. Applications requiring significant computational
power, such as large-scale data analysis, scientific research, and high-perfor-
mance computing (HPC), benefit significantly from using clusters.
Cloud Server
Cloud computing provides computing services such as storage, processing power, and applications through
the Internet. This model eliminates the need for users to directly manage physical hardware by enabling on-
demand resource access. Cloud computing is widely recognized for its cost-effectiveness, scalability, and
flexibility, which makes it perfect for numerous applications, including hosting websites, storing data, exe-
cuting apps, and carrying out intricate calculations.
Centralization
Centralized computing combines all processing capacity, data storage, and computing resources into a single
central system or data center. To carry out tasks, user devices—also referred to as clients—connect to this
central system. While this method makes security and management more accessible, it also increases the risk
of single points of failure.
Virtualization
Using virtualization technology, virtualized computing generates virtualized versions of natural computing
resources, such as networks, servers, and storage. This enhances resource utilization and isolates various
workloads by enabling several virtual machines (VMs) to run on a single physical machine. Modern data
centers and cloud environments are built around virtualization because it improves scalability, flexibility,
and efficiency in managing and deploying applications.
Wired Networks
Wired networks use physical cables like Ethernet to establish connections between devices, including com-
puters, switches, routers, and structured cabling systems. They offer reliability, security, and high-speed
communication, making them ideal for critical applications and environments. Faster transfer speeds can be
2
obtained by connecting devices with copper or fiber optic cables. In addition to radio signals, wireless net-
works can also use infrared light for wireless communication.
Wireless Network
Wireless networks connect devices using radio waves instead of wires, allowing for freedom of movement
in different places. They are often found in houses, offices, public spaces, and factories for sharing informa-
tion, talking, and accessing the Internet. Modern connectivity heavily relies on wireless networks, providing
convenient access to resources and information in various contexts.
Hybrid network
Hybrid networks combine wired and wireless connectivity for a flexible infrastructure, offering mobility,
speed, and improved coverage. They support various applications, optimize resource usage, and enhance re-
dundancy. However, they require strong security measures and centralized management to ensure data in-
tegrity and confidentiality.
A personal area network, or PAN, is a small network that links devices close
to the user, usually a few meters away. Bluetooth connections between a
laptop, smartphone, and other personal devices are typical examples. They
have cheap setup and maintenance costs and are valid for rapid and straight-
forward connectivity.
WLANs are computer networks that function similarly to local area net-
works (LANs) but use WiFi and other wireless technologies. This network
enables wireless communication between devices instead of physical cable
communication, as in a LAN. WiFi is the most widely used example of a
3
WLAN. WLANs are a popular option for both personal and business use because they offer the ease of
wireless access to network resources and the Internet.
LAN (Local Area Network) Provides high-speed data transfer It is restricted to a single location,
within a confined area, enabling cost- necessitating network administra-
effective connectivity for devices like tion for maintenance and security
printers and computers. purposes.
MAN (Metropolitan Area Covers larger geographical areas than Higher initial and operational
Network) LANs, supporting rapid data exchange costs than LANs require coordin-
across cities or campuses and intercon- ation with local authorities for in-
necting multiple LANs. frastructure deployment.
WAN (Wide Area Network) Connects geographically dispersed Expensive due to leased lines or
LANs and MANs, enabling global dedicated connections, vulnerable
communication, access to internet ser- to security threats and latency is-
vices, and remote collaboration. sues over extended distances.
WLAN (Wireless Local Facilitates wireless connectivity within Susceptible to interference and
Area Network) a specific area, offering flexibility, mo- security risks, with potential per-
bility, and simplified network expan- formance degradation based on
sion without physical wiring. distance and environmental
obstacles.
CAN (Controlled Area Net- Supports real-time communication in Higher implementation costs due
work) industrial settings, ensuring reliable to specialized hardware and pro-
data exchange for time-sensitive ap- tocols and limited scalability bey-
plications such as automotive systems. ond specific industrial environ-
ments.
POLAN (Passive et al. Area Utilizes cost-effective optical fiber for Starting costs could be higher be-
Network) scalable, high-bandwidth network de- cause installing fiber optic cables
ployments in large buildings or cam- needs experts to handle mainte-
puses, reducing energy consumption nance and fix problems.
and space requirements.
SAN (Storage Area Net- Centralizes storage management, en- It is costly to establish and main-
work) hancing data accessibility, security, tain, especially for smaller de-
5
and backup capabilities across inter- ployments, and requires dedicated
connected servers. infrastructure and management
expertise.
2.2. Standards
Network topology
How different components (links, nodes, etc.) are arranged within a computer network is called network
topology. The selection of topology can significantly impact network maintenance, scalability, performance,
and reliability.
Physical part (topology) + Logical part (topology) = Network topology
Physical topology refers to the physical organization of devices and cables in a computer network, affecting
performance, scalability, and fault tolerance. Logical topology, on the other hand, focuses on the data's route
and communication, affecting scalability, efficiency, and performance.
2.3 Impact of network Topology, Communication, and bandwidth requirements
1. Bus Topology:
All of the devices share one communication line. Benefits include cost-effectiveness, ease of installation,
and minimal cable usage. However, several devices trying to send data simultaneously using this straightfor-
ward broadcast method may result in collisions. Every device connected to the central cable shares its band -
width.
Advantages
Less wire is needed for setup compared to other topologies, which lowers setup costs.
It is simple to install and expand, thanks to its design.
Disadvantages
It is best suited for small networks only.
The entire network may go down if the primary cable fails.
6
Effect on Communication:
Since every device uses the same communication channel, data collisions could occur.
Since every gadget on the bus receives every signal, there is more needless traffic.
2. Star Topology:
Advantages
Disadvantages
Impact on communication
3. Ring Topology:
Advantages
Fast data packet delivery is made possible by dedicated pathways.
Without competition for the network, every device has equal access to
its resources.
Disadvantages
A single point of failure may bring down the network as a whole.
It might be difficult and time-consuming to find errors.
Impact on communication
In token ring networks, access to the network can be controlled through tokens, which minimizes
collisions.
Intermediary devices must be used for data transmission, which
could increase latency.
4. Mesh Topology:
A mesh topology involves devices connected to multiple others, provid-
ing high redundancy and reliability. This configuration allows data to
be routed through multiple paths in case of failure. In a fully connected
mesh, every device is linked to every other, while in a partially con-
7
nected mesh, only some devices are linked. However, mesh topology requires significant bandwidth as each
device manages multiple connections.
Advantages
Redundant pathways offer robustness and dependability.
It provides excellent fault tolerance and is easily expandable.
Disadvantages
Extensive configuration and cabling are necessary.
High expense as a result of the necessity for numerous wires and ports.
Impact on Communication:
Reliability and fault tolerance are increased when data can travel via multiple paths.
Keeping track of the connections and routes can take time and effort.
5. Hybrid Topology:
Disadvantages:
It may need help to develop and implement.
More significant cost due to the amalgamation of several topologies and parts.
Impact on communication
It can be modified to meet particular requirements, increasing dependability and efficiency.
A rise in the complexity of management and design.
The OSI model, a conceptual framework, divides network communication into seven layers: Physical, Data
Link, Network, Transport, Session, Presentation, and Application. It encourages modularity and vendor and
technology compatibility and standardizes communication protocols in computer networks. However, the
OSI model's complexity can also result in inefficiencies and performance overhead, which can facilitate
troubleshooting and raise performance overhead.
Physical Layer: The physical layer, the lowest layer in the OSI reference model, is responsible for the phys-
ical connection between devices and transmitting bits in bits. It converts received signals into 0s and 1s and
sends them to the Data Link layer for frame reconstruction. Switches, hubs, cables, and other hardware are
essential components. USB and Ethernet are two examples of protocols and technologies.
8
Data Link Layer: The physical layer ensures reliable data transfer between network nodes by identifying
and resolving potential issues, ensuring constant data rate, and preventing corruption. It transmits packets
using MAC addresses, with bridges, switches, and MAC addresses being crucial components. Examples in-
clude Ethernet and Point-to-Point Protocol.
Network Layer: The network layer manages data forwarding, routing, and packet routing over networks,
determining the best route, logical addressing, and physical path for data transmission. It also handles packet
routing, selecting the shortest path from available routes. Routers and IP addresses are crucial, including
protocols like IP and ICMP.
Transport Layer: The transport layer ensures end-to-end data transfer and communication with host sys-
tems, offering flow control, error detection, and recovery. Protocols like UDP and TCP use it. Each segment
generates a header with service point or port addresses. Essential elements include TCP/UDP and ports. Ex -
amples of protocols include UDP and TCP.
Session Layer: The session layer manages connections, sessions, user authentication, and device security. It
allows data synchronization points to be added and communication to be initiated in half-duplex or full-du-
plex mode. Session management services are essential components, and protocols like RPC and NetBIOS
are used. It allows for establishing, using, and terminating connections between processes.
Presentation Layer: The layer translates data between the network format and the application layer, han-
dling encryption, compression, and translation. It enables system understanding and produces cipher text.
Data format converters and encryption services, like JPEG, MPEG, and SSL/TLS, are essential components,
reducing network bit usage.
Application Layer: The application layer, at the top of the OSI Reference Model's layer stack, creates data
and serves as a window for application services to access the network. It allows email, file transfers, and
9
web browsing interactions. Protocols used include DNS, SMTP, FTP, and HTTP, enabling users to access
remote hosts. User interfaces and application software are crucial components.
3.2. TCP/IP
The protocols that control data transmission over the Internet are
known as TCP/IP or Transmission Control Protocol/Internet Pro-
tocol. While IP addresses and routes packets to their destinations,
TCP manages data packetization, transmission, and reassembly
to ensure dependable communication. Together, TCP/IP provides
a foundation for network and Internet communications by allow-
ing disparate systems to interact seamlessly.
Transport Layer: This layer ensures that data is dependably transferred between devices. It ensures data in-
tegrity with error checking and flow control using protocols such as TCP for connection-oriented communi-
cation. In contrast, UDP offers less dependable but faster communication without error correction.
Internet Layer: Over linked networks, the Internet Layer manages packet addressing and routing. It em-
ploys IP (Internet Protocol) to give devices logical addresses (IP addresses) and choose the most efficient
data transmission route, guaranteeing that packets reach their intended locations.
Network Access Layer: This layer handles data transmission on a physical level. It outlines the hardware
and protocol requirements for data transmission via physical media, like Ethernet or WiFi. This layer en-
sures that data is formatted correctly for network transmission and controls addressing at the hardware level
(MAC addresses).
10
Layer (HTTP et al.) for specific applica- cols may impact performance. HTTP, DNS,
tion services. - Vulnerable to application-spe- SNNP, TEL-
- Facilitates user-friendly inter- cific security vulnerabilities. NET, RIP
faces and interactions.
Transport - Ensures reliable data delivery - TCP can introduce latency and SCIP, UDP,
Layer with error detection and retrans- overhead due to its error control TCP
mission (TCP). mechanisms.
- Facilitates multiplexing and seg- - UDP lacks guaranteed delivery
mentation of data for efficient and error recovery features that
transmission. are unsuitable for critical applica-
tions.
Internet Layer
- Enables global connectivity with - IP does not guarantee packet de- TC, ICMP,
logical addressing (IP addresses). livery or ensure data integrity. TGMP, ARD,
- Facilitates scalable and dynamic - Vulnerable to routing issues, RARP
routing of data packets across net- network congestion, and IP-based
works. attacks (e.g., spoofing, DDoS).
Network Ac- - Handles physical data transmis- - Dependent on specific network Protocols are
cess Layer sion over network media (Ether- technologies and physical medi- defined by the
net, WiFi). ums. underlying net-
- Offers error checking and fixing - Limited by the bandwidth and works (host to
at the level where data is transmit- performance capabilities of the networks)
ted physically. physical media.
Network Protocol
A network protocol is a collection of standards that manage the transfer and reception of data over a net -
work, ensuring dependable and effective device-to-device communication. Protocols are necessary for net-
working because they set the rules for sharing data and help devices communicate reliably and quickly.
Take into account, for instance, the following:
IPv4: IPv4 (Internet Protocol version 4) is the most common protocol for using IP addresses to locate and
identify devices on a network. With its 32-bit address scheme, roughly 4.3 billion distinct addresses are pos -
sible. Even though IPv4 is widely used, address exhaustion restricts network expansion.
IPv6: Using a 128-bit address format, IPv6 (Internet Protocol version 6) overcomes the drawbacks of IPv4
and dramatically increases the pool of IP addresses available to support the increasing number of internet-
connected devices. Internet-routable unique addresses are known as global unicast addresses.
Multicast addresses are those that are utilized to deliver information to several receivers.
11
HTTP/HTTPS (Hypertext et al./Secure): The HTTP protocol sends web pages over the Internet. It defines
how web servers and browsers respond to instructions and message structure. HTTPS ensures secure com -
munication by encrypting data and protecting it from manipulation and unauthorized access.
Internet protocol/transmission control protocol, or TCP/IP, is the core set of protocols used for Internet
communication. Through connection establishment and correct data transfer and reception, TCP guarantees
dependable data transmission—IP addresses and routing guarantee that data packets arrive at the right place.
How It Enables Effectiveness
Dependable Communication: TCP guarantees the reliable and sequential delivery of data, a critical
aspect for precision-demanding applications like web browsing, email, and file transfers.
Traffic regulation and congestion handling: TCP oversees data flow and congestion management, en-
hancing network efficiency and resource utilization.
FTP (File Transfer Protocol): FTP is a network protocol that transports files between a client and a server.
Users may manage folders, download and upload files, and operate on data in a secure or non-secure man -
ner. It uses separate data and control lines to connect the client and server.
SMTP (Simple et al.): SMTP sends emails across networks. It handles the transmission of emails from
client to server and between mail servers, ensuring messages are delivered correctly to the recipient's email
server. It is utilized to send and forward outgoing emails from the sender's mail server to the recipient's mail
server.
POP3 (Post et al. 3): Emails downloaded via POP3 are usually removed from the server after being down-
loaded to a single device. Local email clients can get emails from a distant server over a TCP/IP connection
using the POP3 protocol. POP3 removes the emails from the server and downloads them to the user's local
computer.
12
DNS (Domain et al.): DNS converts domain names that are accessible to humans (such as
www.example.com) into IP addresses that are used by connected computers to identify one another. It al-
lows users to access websites using memorable names, much like a phonebook for the Internet.
DHCP (Dynamic et al. ): Thanks to DHCP, Devices on a network may interact effectively without human
configuration. DHCP automates assigning IP addresses to devices and designates gateways, IP addresses,
subnet masks, and network settings.
SNMP (Simple et al.): SNMP is used for network management and monitoring. It allows administrators to
collect information about network devices, such as routers, switches, and servers, and manage their configu-
ration and performance.
1. Bus Topology Protocol: Carrier Sense In Ethernet networks, multiple access with collision detec-
tion, or CSMA/CD, is used.
13
Evaluation: Because of its higher collision rates in more extensive networks, CSMA/CD performs poorly in
smaller networks. Shared bandwidth may cause congestion and decreased performance as additional devices
are added. The network may be affected by a single point of failure, the central wire.
It has limited scalability because of the standard media and collision domain.
2. Star Topology Protocol: Ethernet uses switches (modern) or hubs (old). Networks with an access
point are known as WiFi (IEEE 802.11).
Evaluation: Switches efficiently handle data flow, reducing the risk of accidents and boosting productivity.
Each device's dedicated connection to the hub/switch
improves its performance.
Regarding reliability, the topology is more resilient than the bus topology overall, but the central device is a
single point of failure. It allows devices to be added or removed with little to no impact on the network.
3. Ring Topology Protocol: A protocol that passes a token is used, and for redundancy, it uses a dual
ring topology.
Evaluation: Token-passing guarantees equitable network access and minimizes collisions. It effectively
uses bandwidth through regulated access yet is constrained by each gadget's speed. A single device failure
may disrupt the network, but dual-ring FDDI can lessen this risk. It is moderately scalable; latency may rise
with more devices.
4. Mess Topology Protocol: Dynamic source routing (DSR) is used in ad hoc networks. For mobile ad
hoc networks, optimized link state routing (OLSR) (MANETs) is used.
Evaluation: The various pathways and dynamic routing make the mesh highly efficient despite the potential
for increased routing complexity. Multiple connections cause high bandwidth utilization, while redundancy
increases reliability. High fault tolerance and various data channels make it incredibly dependable. Because
of the exponential increase in connections, a full mesh is less scalable than a partial mesh.
5. Hybrid Topology Protocol: Data may be sent from one node to another using multiprotocol label
switching (MPLS), which uses short path labels. Internet routing between autonomous systems is
done using the border gateway protocol (BGP)
Evaluation: It is exceptionally effective for sizable, intricate networks with a wide range of needs. Multiple
pathways and dynamic routing result in optimal bandwidth consumption. Dynamic routing methods and re-
dundant pathways can contribute to high dependability. It has excellent scalability and can adapt to network
structure changes and expansion.
It is critical to consider the unique needs of the network environment, such as scalability, reliability, perfor-
mance, and cost, when choosing network topologies for a particular scenario. The rationale behind selecting
mesh and star topologies for the given scenario is elucidated below:
Star Topology
The star topology was chosen for its ease of installation and maintenance.
All devices are connected to a single hub or switch, allowing for easy ad-
dition or removal—this centralized monitoring and management support
network administration and troubleshooting. The star topology also mini-
mizes network congestion and enhances performance, especially for large-
scale data transfers, making it a beneficial approach.
14
Efficient Utilization of the Network System of Star Topology
The design will use high-performance switches to ensure dedicated bandwidth for all connected devices, re-
ducing collision risks and improving network performance. Traffic shaping will regulate data flow and vol-
ume, while VLANs will divide the network for security and bandwidth management. Link Aggregation
(LACP) technologies will be employed for redundancy and increased bandwidth. A hierarchical structure
and more switches will be added to accommodate future expansion and growing network requirements while
maintaining scalability.
Mesh Topology
The author plans to use dynamic routing protocols like OSPF or BGP for the mesh topology to ensure opti-
mal data paths and effective network load balancing. They plan to use redundant hardware for reliability and
fault tolerance and leverage the mesh topology's inherent redundancy for multiple data paths. Scalable ex-
pansion will involve adding nodes and managing traffic loads, while data compression techniques will mini-
mize transmitted data, and traffic shaping will manage data flow. Updating network hardware and software
will enhance security features and performance.
Hub
A hub is an essential networking tool that connects multiple computers or devices within a single local area
network (LAN). It does not store the IP address, MAC, and other items. It sends and receives data packets to
all devices linked to it, regardless of the intended recipient. Compared to more sophisticated networking
hardware, such as switches and routers, it cannot intelligently manage or direct network traffic, which could
result in inefficiencies and slower data transmission speeds.
Routers
A router is an essential networking device used chiefly for routing that guides
packets between computer networks. It is the same as a bridge, but a network-
layer device works with a different protocol. Its primary job is to determine the
optimal path for data, divided into smaller packets known as "store and for-
ward," to reduce latency and increase network efficiency. This technique can
be used on both external and local networks.
Modem
Digital signals are converted into analog signals at various frequencies by a
modem (modulator-demodulator), which then sends the signals to another mo-
dem at the other end. A connected device, typically a computer, receives a digi-
tal output from the receiving modem, which also executes the reverse transfor-
mation. Usually, a serial line with the industry-standard RS-232 interface trans-
fers digital data to and from the modem.
15
Switches
Switches are essential networking devices that efficiently route data
within local area networks (LANs) by forwarding incoming packets di-
rectly to their intended destinations based on MAC addresses, operating
at the OSI model's Data Link Layer (Layer 2). It can multicast, unicast,
and broadcast the messages. Switches dynamically learn and maintain ta-
bles of MAC addresses per port, enabling them to optimize traffic flow
and support full-duplex communication for simultaneous data transmission and reception without collisions.
Firewalls
A firewall is a security tool for computer networks. It watches and controls the data coming into and going
out of a network based on rules that a company has decided on to protect its information. A firewall is essen-
tially the wall that separates a private internal network from the open Internet at its most basic level. The pri -
mary function of a firewall is to let safe traffic through while blocking harmful traffic.
Repeaters
Repeaters are essential devices used in networks to strengthen sig-
nals and increase data transmission distance. They work at the first
level of the OSI model, where they take in electrical or light signals,
remove any unwanted noise, and send them out again with the same
power. This process ensures the signal remains strong and clear over
long distances, which is particularly useful in large or sprawling net-
works where signal degradation can occur.
Bridges
Bridges are tools that join and manage the flow of information between two or
more parts of a network, working at the level where data is linked (Layer 2) in
the OSI model. They use special codes (MAC addresses) to send data packets
to the correct part of the network, which helps to ease traffic by splitting an
extensive network into smaller, easier-to-handle pieces. Bridges learn the
MAC addresses of devices on each segment and use this information to create
a forwarding table, ensuring that data is only sent to the correct destination
segment.
IoT Gateways
VPN Concentrators
A VPN concentrator is a centralized gateway consolidating and managing multiple VPN connections, ensur-
ing secure access for remote users, branch offices, and business partners. It uses encryption and secures tun-
neling protocols to ensure data confidentiality and integrity over public networks. The VPN client communi-
cates with the concentrator for authentication, establishing a secure tunnel for data transmission.
Access Point
An access point (AP) is a crucial networking device that creates wired or wireless local area networks
(LAN) for device connectivity. It is often integrated into routers to increase network coverage. Wired Ac-
cess Points use Ethernet for desktop computers, while Wireless Access Points convert wired signals for
WiFi connections. WAPs manage device identification, transmit data on specific frequencies, and authenti-
cate using protocols like WPA2. Wired access points support VLANs for network segmentation and effec-
tively manage data traffic.
Content Filter
A content filter, also known as a web filter, is a technology used by organizations, schools, and parents to
regulate and control online content access. It restricts access to harmful or undesirable content through tech-
niques like deep packet inspection, URL and keyword filtering, and DNS filtering based on domain names.
Based on the results, these filters intercept user requests, compare them to pre-established policies, and de-
cide whether to grant or deny access.
File Servers
A file server is a specific computer or software used to store and manage files available to users on a new
work. Thanks to the centralization of file storage it provides, users may save, retrieve, and share documents,
multimedia files, and other data over new work. File servers provide safe and well-organized access to
shared resources, improving cooperation and business data management.
Web Servers
A web server is the hardware or software that allows content to be shared online. It hosts websites and on-
line applications by providing web pages, photos, videos, and other resources in response to requests from
client browsers. Web servers process HTTP requests, run server-side scripts, and maintain user sessions to
enhance worldwide webpage publishing and accessibility.
Email server: An email server is a software or a system on a computer that sends and receives emails. It
handles emails coming in and going out, organizes them in mailboxes, and simplifies sending and receiving
messages. Email servers have two methods for sending and receiving emails: Simple et al.'s SMTP and Post
et al. v3/Internet Message Access Protocol.
Print Server
In a network, a print server is a computer or device that controls printers and print jobs. Centralizing p inner
resources enables numerous users to send networked print jobs to shared printers. Reliable printing services
17
from print servers boost productivity by prioritizing print tasks, managing print queues, and ensuring effec-
tive printer utilization throughout businesses.
DHCP server
Dynamic Host Configuration Protocol (DHCP) servers are network services that automatically provide IP
addresses and network configuration settings to connected devices. They do away with the requirement for
manual IP address settings by dynamically allocating IP addresses from a predetermined pool. In addition,
DHCP servers oversee IP address lease terms, renewals, and releases, guaranteeing effective IP address ad-
ministration and device network access.
Workstation
When a person uses a computer or a small screen connected to a computer to do tasks like writing, designing
pictures, creating computer programs, or working in an office, we call it a workstation. It has special pro-
grams for the person using it and often uses a system that helps manage the computer's desktop, like Win -
dows, macOS, or Linux.
Server
A server is a particular computer or software that provides resources or services to other computers, called
clients, over a network. Servers can display websites, manage email, store files, and run business applica-
tions.
Interconnection device
Multiple devices in a network can communicate with each other more easily when interconnection devices
like switches and routers are present. Devices in a local area network (LAN) are connected via switches, al -
lowing them to speak for themselves. Conversely, routers serve as a bridge between various networks, en -
abling data transfer and connection.
18
and wireless.
Network
media types
STP cable
STP cable, which stands for Shielded Twisted Pair, is similar to twisted
pair cable. However, it includes additional shielding to protect against
electromagnetic interference (EMI). This ensures dependable data trans-
fer and performs better in settings with much electrical interference.
CAT 5
CAT 5 (Category 5) is a twisted pair cable type standardized for Ethernet
networks. It is frequently used in local area networks (LANs) to connect
computers, printers, and other networked devices. It supports data rates of
up to 100 Mbps.
UTP
19
An Unshielded Twisted Pair, or UTP for short, is a twisted pair cable lacking extra shielding. Due to its low
cost and simplicity of installation, it is extensively utilized in Ethernet networks and telecommunications,
even though it might be more prone to electromagnetic interference than STP.
Wireless
Wireless technology uses radio waves or infrared signals to allow devices to communicate without physical
connections. It comprises Bluetooth for close-quarters communication between devices, WiFi for local area
networking, and cellular networks for on-the-go communication.
Mobile Technology
Mobile technology refers to the systems and standards enabling cell phones and tablets to connect to voice
and data services without wires. This includes advancements that provide fast mobile Internet, such as 4G
LTE and the upcoming 5G networks.
Software
Network operating system
"network operating system" (NOS) refers to specialized software that controls network resources and offers
features like printer and file sharing and network security. Examples are Linux distributions set up for server
use, Windows, and macOS Server (previously).
Networking Software
Client software
Client software is the term for programs and applications installed on individual computers or devices
(clients) within a network. Thanks to these applications, users can access and use server-provided services.
Software used for productivity, such as word processors and spreadsheets, email clients, file transfer pro-
grams, and web browsers, are among the examples.
Server Software
Server software refers to programs and applications created to offer resources or services to clients on a net-
work. Server-side applications like these oversee file sharing, email management, web hosting, database ad-
ministration, and network security. Email servers such as Microsoft Exchange, database servers like MySQL
and PostgreSQL, and web servers like Apache and Nginx are a few examples.
Virus checker
Also known as antivirus software, a virus checker prevents damage and illegal access to data by identifying
and eliminating malicious software (viruses, malware, etc.) from computers and networks.
Firewall
20
Based on pre-established security rules, a firewall is network security hardware or software that monitors
and regulates all incoming and outgoing network traffic. Enhancing network security is a barrier between
trusted external networks (like the Internet) and untrusted internal networks.
Commercial system
Commercial software is any software or program intended and developed for licensing or sale to end users
or that assists a commercial purpose. Commercial software used to be known as branded software, but
today, many free and open-source software programs are licensed or sold to users. There are different types
of commercial systems. Here are a few examples: Windows, Ubuntu, Linux, and Mac OS.
Control Bus
The system bus, which acts as an essential communication channel, facilitates the transfer of data and con-
trol signals between a computer system's components. Examples of low-pin-count system buses include
IEEE 196, IEEE-488, and high-performance parallel interfaces.
IP address
An IP address is a unique numerical identification for every device connected to a network via the Internet
Protocol. It facilitates data routing and identifies the device's position within the network. There are two
main types: IPv4 (32-bit) and IPv6 (128-bit). Local networks use private IP addresses, while devices linked
to the Internet use public IP addresses. These addresses are essential for device connectivity, network traffic
control, and efficient data routing.
Port number/address
In networking, a port address sometimes called a port number, is a unique identification used to identify par-
ticular services or applications operating on a device. Alongside IP addresses, it is an essential part of the ad-
dressing system. Every network function, including email sending and web browsing, has a specific port
number. For instance, port 443 is usually used for HTTPS, but port 80 is for HTTP.
Mac Address
A network interface controller (NIC) is assigned a unique identifier by its manufacturer, known as its Media
Access Control address (MAC address). This address is a persistent and universally recognized identifier for
network-connected devices like Ethernet cards and WiFi adapters. Unlike IP addresses, MAC addresses are
hardcoded into the device's firmware and do not change over time.
Operating System
The operating system (OS) controls how computers communicate over networks and needs hardware like
the CPU and memory. Networking software built into the OS, such as the TCP/IP stack, lets devices talk to
each other, showing how the OS depends on the hardware.
Security Software
Security software, like firewalls and antivirus programs, protects computers from network dangers. These
tools need the computer's processing power and memory to watch and control network activity. The hard-
ware's abilities significantly affect how well these tools work.
21
Network Protocols
Protocols like TCP/IP, UDP, and DNS help devices send and receive data. Devices like routers, switches,
and network interface cards use these software protocols to handle and direct data well. This shows how
hardware and networking software work together.
Virtualization Software
Virtualization software lets users make virtual computers and networks on real hardware. This software
needs the computer's processor, memory, and storage to run different operating systems and network setups
simultaneously, showing how virtualization depends on solid hardware.
FTP server: As part of a multiplying system, a file server is a computer connected to a network that offers a
site for shared disk access. File servers are devices that allow access to independently stored files.
Database server: A database server is comparable to a data warehouse, where websites store and maintain
their data and content. The databases and the Database Management System (DBMS) are housed on a data-
base server. It retrieves specific records from the database and sends them back across the network in re-
sponse to requests from the client computers.
Virtualization server: By using virtualization software, a single physical server can be split into multiple
smaller virtual servers through virtualization. Each virtual server in server virtualization runs several operat-
ing system instances concurrently.
Terminal server: A terminal service server is a physical device that provides a shared connecting point for
multiple terminals, such as PCs and printers, to access the Internet or a local network without requiring a
network interface card or modem. It allows devices with an RS-232/RS-423 serial port interface to function
as terminals and access the Internet or local network.
SBP Ltd, a publishing company, requires efficient file management and secure transfer capabilities for large
electronic files. An FTP server offers robust file-handling features, ensuring reliable data exchange among
publishing teams and external collaborators without compromising security. This optimizes performance by
streamlining file transfers and enhancing productivity across the organization. DHCP servers are chosen for
automated IP address management, reducing administrative costs and preventing setup mistakes. HTTP
servers are chosen for hosting digital content, such as publications and online platforms, essential for SBP
Ltd's interaction with the scientific community. These servers provide quick and safe access to electronic
22
publications, ensuring high availability and responsive content delivery. The choice of web, DHCP, and FTP
servers satisfies SBP Ltd's operational requirements while balancing improved performance and cost-effec-
tiveness. These servers work together to provide effective file management, smooth network access, and
rapid digital content delivery for their publishing operations and stakeholder involvement.
In this SPB network design, employees are first provided with a company laptop containing a software fire-
wall and a VPN client.
Employees can store company data on the company fileservers, a high-throughput Cloud VPN server is in-
stalled and configured to allow secure connectivity for all remote working employees, and all office soft-
ware is accessed using a cloud-based Google server. A DHCP, FTP, and HTTP server are installed on the
network design; the data center can handle high-volume data traffic from inside and outside the organiza -
tion. The design has a mixture of wired and wireless connectivity; there is proper consideration given to net-
23
work security to minimize a data breach in the design; a firewall and ADS are installed and configured to al -
low inbound and outbound traffic, and there is no lag of data traffic between floors and no connectivity
‘dead spots, any data sent to a cloud server or stored on the RPS server is encrypted through VPN connectiv-
ity, there are robust backup facilities in place for the SBP data in case of a data loss or security breach, the
current network security model for teams and employees is preserved even though Employees are working
from home.
I designed a detailed network setup using Cisco Packet Tracer for SBP Ltd. to handle the company's various
needs. Each of the four local networks includes standard devices like computers for employees, printers for
handling documents, and wireless access points for laptops and tablets. These devices are connected by
switches that ensure reliable data transfer within each network. The server room contains critical servers for
sharing files, hosting websites, and assigning IP addresses automatically, along with other critical infrastruc-
ture like HTTP, FTP, and DHCP servers. There is also a computer in the server room to manage the net-
work.
I installed two multilayer switches (MLS1 and MLS2) that link all LAN switches and servers to guarantee
robust connectivity throughout the network. This promotes redundancy and load balancing for increased re-
liability. Two routers, each connected to clusters that maximize traffic dispersal, enable connectivity to dis-
tant networks and places. This configuration follows best practices in network design by integrating redun-
dancy, scalability, and effective resource management and facilitating seamless communication and resource
sharing. I successfully implemented the simulation.
25
11.Analysis of Test Results Against Expected Outcomes
Ping
The ping command sends a request to a specific device through the network. If the ping is successful, the
computer that receives it responds to the original computer.
PC0 to PC1
Laptop0 to Laptop 3
26
IPCONFIG
The above results show the default gateway address and the IP
address for the specific computer.
IPCON-
FIG/ALL
The in-
formation provided includes the IP ad- dress, the
subnet mask, the default gateway, the DNS
servers, the DHCP server, and the MAC address.
This way, you can quickly get an over- view of
your network setup.
Tracert
27
PC:
This device combines hardware and software compo-
nents that perform tasks and provide various solu-
tions. It has an IP address in class A and a default
gateway connection to 0.0.0.0. The design includes
five PC0 (192.168.1.5), PC1 (192.168.1.17), PC2
(192.168.1.2), PC3 (192.168.1.4), and PC4
(192.168.1.3), each with an internal IP address and
DHCP enabled. Each room has one PC, and a fire-
wall is enabled.
Router
This gadget scans data packets being transferred to or from another network. I have assigned two routers in
the design, Router 1 and Router 2, with the configuration of Router 1 (192.168.1.1)in gigabit ethernet0/0 and
(10.10.10.0) in gigabit Ethernet 0/1 and Router 2 (192.168.1.2) in gigabit Ethernet 0/0 and 10.10.10.1 in gi-
gabit Ethernet 0/1. I have also inserted the HWIC-2T module in the router to connect serial ports with the
Serial DTE wire.
Cluster
A cluster is a collection of linked hosts or computers. Every computer in
a cluster is called a "node." I have created a cluster with two routers se-
lecting and creating a cluster. I have inserted the NIM-2T module in ev-
ery router in both clusters to connect serial ports with the serial DTE
wire.
Printer
A switch is a fast device that takes incoming data packets and routes them to the
appropriate location. In this network design, a straight-through cable is connec-
ted from the PC’s Ethernet port to an available port on the switch. The switch
port has been given the proper VLAN assignment. Five switches are connected
to two multilayer switch crossover cables between similar ports.
Multilayer switches support two switching and Layer 3 routing. The router's in-
terface is linked to the switch's uplink port via a straight-through connection. If
more than one VLAN is utilized, the switch port is set up for trucking. A cross-
over wire is connected between similar ports on the switch and the multilayer
switch.
Laptop
In addition to the Maths and Physics and other 3
LANs, The Linksys-WPC300N module is inserted in
the NIC port of the laptop, which provides one
2.4GHz wireless interface suitable for connection to
wireless networks. Entering the SSID of the appro-
priate access point and password will make a wire-
less connection from the laptop. An IP address has
been implemented in class A, as depicted in the im-
age. Following a class-appropriate subnet mask and a
default gateway connection to 0.0.0.0, the IP address
is obtained via DHCP. IPs are assigned as Laptop0
(192.168.1.10), Laptop 1 (192.168.1.9), Laptop2
(192.168.1.7), and laptop3 (192.168.1.6).
29
Tablet
Tablets provide portable devices for reviewing pub-
lications. In addition to the Maths and Physics and
other 3 LANs, Entering the SSID of the appropriate
access point and password will make a wireless
connection from the laptop. An IP address has been
implemented in class A, as depicted in the image.
Following a class-appropriate subnet mask and a
default gateway connection to 0.0.0.0, the IP ad-
dress is obtained via DHCP. IP address is obtained
via DHCP. IP are assigned as Tablet0
(192.168.1.12), Tablet 1 (192.168.1.13), Tablet2
(192.168.1.8), Tablet3 (192.168.1.11).
Firewall
The SBP Ltd network was simulated using Cisco
Packet Tracer to improve security by setting up
software firewalls on each PC. These firewalls
are crucial for shielding devices from malicious
activity and illegal access. The settings on each
PC were adjusted to establish guidelines for in-
coming and outgoing traffic based on pre-estab-
lished standards like IP addresses, port numbers,
and protocols.
Servers:
FTP server
This one is one of several servers in the network design
that will provide unique assistance. The picture on the side
shows that an IP address has been implemented in class A.
IPv4 address 192.168.1.14 was assigned; it allows us to
connect to core Router 2 via a Multilayer switch using a
class-appropriate subnet mask and a default gateway con-
nection to 10.10.10.1. This, in turn, allows us to communi-
cate
with
other
end-
point
end-
point devices in the network system.
30
The FTP server is also turned on to enable system endpoint devices to use the FTP service
and facilitate file transfer. I have only added two users to the list to test how well the file
functions. The cd/ftp command can be used to create a file on the server in the file manager.
To connect the FTP server to a PC, use the IP address of the ftp 192.168.1.14 server and then
log in with the credentials set up on the FTP server.
DHCP server
This server is one of several in the network design that will
specifically offer support. The side image shows that an IP
address has been implemented in class A. With a class-appro-
priate subnet mask and a default gateway connection to
10.10.10.1, we can connect to core Router 2 via a Multilayer
switch using the IPv4 address 192.168.1.15 that was assigned.
As a result, we can speak with other network system endpoint
devices.
31
I set up the DHCP server to automatically issue IP addresses. Using a straight-through cable, I added a
server and viewed its configuration on the switch. The DHCP service was activated, and a "server pool" was
made under the Services tab. 192.168.1.0 is the IP address range I have established with a subnet mask of
255.255.255.0, the default gateway to 10.10.10.1, and the DNS server to 8.8.8.8.8. This configuration en-
abled effective network administration, allowing the DHCP server to issue IP addresses to client devices dy -
namically.
HTTP server
PC0 to PC2
The message is encapsulated with headers at PC0 and then sent to PC2 with its destination IP address. It is
transmitted to Switch1, which forwards the message based on PC2's MAC address using its MAC address
table. Once at the multilayer switch, it determines the optimal path and forwards the message to Switch2.
32
After receiving the message, Switch2 forwards it to PC2, which decapsulates and processes it—the multi-
layer switch functions at both data link and network layers.
PC1 to Laptop3
In this scenario, PC1 sends a message to Laptop3 in LAN Room 4, packaging data at application, transport,
and network levels. The Ethernet frame is sent to a multilayer switch, which determines the next step using
its MAC address table. The frame is guided through a router, which steers the packet towards LAN Room 4,
taking into account Laptop3's IP address. The second multilayer switch forwards the frame to the correct
port linked to LAN Room 4, and finally, the switch delivers the frame to Laptop3, which unpacks the mes-
sage, handles it, and finalizes the communication.
The transmission of a message from Tablet PC0 in LAN Room 1 to PC3 in LAN Room 2 involves multiple
steps through various network devices. Tablet PC0 starts communication by specifying PC3's IP address as
the destination. The data is encapsulated into an Ethernet frame at the data link layer. It is transmitted to the
first multilayer switch, which checks the destination MAC address and forwards it to the appropriate port
connected to the first router. The second multilayer switch receives the frame, forwards it to LAN Room 2,
and delivers it to PC3. PC3 then decapsulates the Ethernet frame, retrieves the original message, processes it
at transport and application layers, and responds accordingly.
Laptop 1 in LAN Room 1 initiates communication by broadcasting a DHCP Discover message. This mes-
sage is encapsulated at the application, transport, and data link layers into an Ethernet frame using Laptop
1's MAC address and the nearest multilayer switch's MAC address. The first multilayer switch forwards the
frame to the router, which then forwards it to the server room. The server processes the DHCP Discover
message, allocates an IP address to Laptop 1, and responds with a DHCP Offer, ensuring successful network
connectivity within the configured infrastructure.
34
35
13.Recommending Potential Enhancements
Due to the increased complexity of modern networks operating at higher layers within the OSI model, visib -
ility into layer 7 data flows is becoming increasingly important. When planning for your new network, be
sure that you have the necessary network performance monitoring tools to help you quickly identify and re-
solve application-specific problems. These tools help identify common problems and quickly resolve them
using proactive automation techniques.
As the network grows, more and more accessions will be added that help the networking you and your busi-
ness/organization expand, and the outcome of your business will increase
the network switch.
Once you upgrade your switch, you will conserve energy. Energy efficiency. This was not a major concern,
but network equipment manufacturers are now paying more attention to the issue and installing more effi-
cient power supplies and fans. The improvements are usually not sufficient to justify replacing a switch, but
they are a bonus when upgrading for other reasons.
The decision to replace equipment should be made carefully, even at the best times. Current conditions dic-
tate extra diligence, but new technology and applications can yield savings that make upgrades worthwhile.
The network is configured with a wired router using the latest and new technology of wireless routers. It
would help if you did not have a USB or any other means for the port and were involved in carrying differ -
ent types of devices for a file transfer with the latest wireless connection, and you could quickly transfer
your files from one source to another. Different clouds like OneDrive, Google Drive, and iCloud are on your
devices these days, where you can store and let other people see your files without having a single device to
put in a port, share files, and then remove them.
With the advancement of wireless routers, one does not need to care or worry about the surroundings;
whenever they can work, they can give you tremendous speed without having any wires attached to your
device. All you have to have is your device, and you can move freely from one place to the other, within the
required range, without worrying about anything, like the speed or the breakage of the connection. You are
given the option of free movement as well as peace of mind with the latest technology of wireless routers;
therefore, students will be able to use the college's PCs from anywhere in the college.
36
As a junior network administrator, I created a virtual network solution for Swift & Bacon Publishers (SBP)
Ltd. The system included three servers: FTP, DHCP, and HTTP, essential for information management and
site hosting. Access points were added to enable wireless connectivity, providing flexibility for guests and
employees. FTP servers enable safe file uploading and downloading, DHCP servers assign IP addresses au-
tomatically, and HTTP servers enable website hosting and online image creation.
Wireless connectivity improved productivity and collaboration by allowing remote access for other users.
Each floor was split into two, allowing twenty devices from either side of a floor to be attached to the sys-
tem. This allowed 40 gadgets to be associated with the organization on each floor. To ensure high service
availability, two switches were added for ISP MAN and core switches, and two routers were used in con-
junction with these multilayer switches. The network administrators and server room were located at the top,
hosting email and network servers in the company. This virtual network system exceeded initial require-
ments and met all requirements.
Design choices:
The network setup includes critical decisions to improve safety and fit current work habits. Virtual LANs
(VLANs) help keep data separate, which makes the network more secure. However, they need careful setup
to avoid issues like VLAN hopping attacks. Wireless options like WiFi and Bluetooth offer convenience but
require strong security to stop people from getting in without permission or causing trouble. Shutting down
one office and allowing people to work from home part-time saves money and fits with modern working
methods. However, it needs sound VPN systems and transparent rules for remote access to keep everything
safe and running smoothly.
Area of improvement:
The current network setup shows some parts that need to be improved. First, we can improve the network by
updating the hardware and using special rules for managing bandwidth, which help fix slow spots. Second,
we can handle the network's growth better by using cloud services and flexible ways to use resources, which
makes it easier to handle more users and changes in demand. Lastly, to make the network safer, we should
do regular checks for security issues, use better ways to protect data, and require extra steps to log in, which
are essential to protect against problems and keep the network safe from new threats.
15.Reference
https://www.geeksforgeeks.org/types-of-computer-networks/
Available at: Computer NetworkingNotes. (2018). Complete Form of Hardware and Networking
Devices. [online] Available at: https://www.computernetworkingnotes.com
https://draw.io/
Flowchart Maker & Online Diagram Software
37
Available at:https://www.computernetworkingnotes.com/networking-tutorials/computer-networking-
devices-explained-with-function.html Computer Networking Notes with Function
https://www.computernetworkingnotes.com/networking-tutorials/computer-networkingdevices
explained-with-function.html
Reliability, n.d. [Online] Available at Chapter 11 Network reliability [online] sciencedirect.com. Avail -
able at: https://www.sciencedirect.com/science/article/abs/pii/S0927050705801288
https://cordkuttersconnect.com/understanding-the-advantages-and-disadvantages-of-wireless-routers/
38