Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Maths for computing assignment, Cheat Sheet of Mathematics

assignment for maths for computing Couldn’t be more pleased with everything about this company! My windows were installed when they said they would be

Typology: Cheat Sheet

2016/2017

Uploaded on 03/23/2022

dw-studios-tamil
dw-studios-tamil 🇱🇰

1 document

Partial preview of the text

Download Maths for computing assignment and more Cheat Sheet Mathematics in PDF only on Docsity! Higher Nationals Internal verification of assessment decisions – BTEC (RQF) INTERNAL VERIFICATION – ASSESSMENT DECISIONS Programme title HND in Computing Assessor Internal Verifier Unit(s) Unit 02: Networking Assignment title LAN Design & Implementation for VIDCO Student’s name List which assessment criteria the Assessor has awarded. Pass Merit Distinction INTERNAL VERIFIER CHECKLIST Do the assessment criteria awarded match those shown in the assignment brief? Y/N Is the Pass/Merit/Distinction grade awarded justified by the assessor’s comments on the student work? Y/N Has the work been assessed accurately? Y/N Is the feedback to the student: Give details: • Constructive? • Linked to relevant assessment criteria? • Identifying opportunities for improved performance? • Agreeing actions? Y/N Y/N Y/N Y/N Does the assessment decision need amending? Y/N Assessor signature Date Internal Verifier signature Date Programme Leader signature (if required) Date Confirm action completed Remedial action taken Give details: Assessor signature Date Internal Verifier signature Date Programme Leader signature (if required) Date Pearson Higher Nationals in Computing Unit 02: Networking Assignment 01 General Guidelines 1. A Cover page or title page – You should always attach a title page to your assignment. Use previous page as your cover sheet and make sure all the details are accurately filled. 2. Attach this brief as the first section of your assignment. 3. All the assignments should be prepared using a word processing software. 4. All the assignments should be printed on A4 sized papers. Use single side printing. 5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page. Word Processing Rules 1. The font size should be 12 point, and should be in the style of Time New Roman. 2. Use 1.5 line spacing. Left justify all paragraphs. 3. Ensure that all the headings are consistent in terms of the font size and font style. 4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and Page Number on each page. This is useful if individual sheets become detached for any reason. 5. Use word processing application spell check and grammar check function to help editing your assignment. Important Points: 1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the before mentioned compulsory information will result in rejection of your work. 2. Carefully check the hand in date and the instructions given in the assignment. Late submissions will not be accepted. 3. Ensure that you give yourself enough time to complete the assignment by the due date. 4. Excuses of any nature will not be accepted for failure to hand in the work on time. 5. You must take responsibility for managing your own time effectively. 6. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may apply (in writing) for an extension. 7. Failure to achieve at least PASS criteria will result in a REFERRAL grade . 8. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will then be asked to complete an alternative assignment. 9. If you use other people’s work or ideas in your assignment, reference them properly using HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and a reference list. 10. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be reduced to A REFERRAL or at worst you could be expelled from the course Student Declaration I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own without attributing the sources in the correct form. I further understand what it means to copy another’s work. 1. I know that plagiarism is a punishable offence because it constitutes theft. 2. I understand the plagiarism and copying policy of Edexcel UK. 3. I know what the consequences will be if I plagiarise or copy another’s work in any of the assignments for this program. 4. I declare therefore that all work presented by me for every aspect of my program, will be my own, and where I have made use of another’s work, I will attribute the source in the correct way. 5. I acknowledge that the attachment of this document signed or not, constitutes a binding agreement between myself and Pearson, UK. 6. I understand that my assignment will not be considered as submitted if this document is not attached to the assignment. Student’s Signature: Date: (Provide E-mail ID) (Provide Submission Date) Case Study VIDCO-19 is a privately owned, well-known Software company located in Colombo. The Management of VIDCO-19 has purchased a 3 story building in the heart of Kandy. They are planning to make it one of the state-of-the-art companies in Kandy with the latest facilities. It is expected to have nearly 150 employees in Kandy branch. Department Number of Users Customer Care 10 Sales and Marketing 20 Finance 25 Legal 5 HR 10 Developers 55 Network Team 5 Server Room Servers +ISP connections Following requirements are given by the Management; • All the departments must be separated with unique subnet and should not communicate with each other unless there is a special requirement. • 192.168.10.0/24 is given and should be used for all the departments except the server room. IPs should assign using DHCP. • ERP and CRM Systems need to be implemented in Kandy branch in local servers. • Number of servers required for the Server room need to be decided by the Network designer and should be assigned with 10.254.1.0/24 subnet. (Uses static IPs) • High level of redundancy is expected in network design to eliminate single point of failures and traffic bottle necks. • Sales and Marketing Team need to access Network resources using WIFI connectivity. • Proper methods for networking monitoring and troubleshooting need to be established. • All possible network security mechanisms should be implemented. Assume you have been appointed as the new network consultant of VIDCO-19 Solutions. Prepare a network architectural design and implement it with your suggestions and recommendations to meet the company requirements. (Note: Clearly state your assumptions. You are allowed to design the network according to your assumptions, but main requirements should not be violated) Task 01 1.1 Discuss the different network models/system types that can be implemented in Kandy branch with their benefits and constraints. 1.2 Discuss main IEEE Ethernet standards that can be used in above LAN and WLAN design? 1.3 Critically analyze network protocol suites used in Network Industry and recommend suitable network protocol suites for above scenario and justify your selection. 1.4 Explain the difference between Logical topology and Physical topology using examples and compare main network topologies used in network design. 1.5 Recommend a suitable network topology for above scenario and justify your answer with valid points. Task 02 2.1 Discuss the operating principles of network devices that can be used for above scenario. Ex: Router, Switch, Etc. 2.2 Explore and describe the devices which we can use to enhance security of VIDCO-19 Kandy Branch. 2.3 Critically analyze the importance of networking software and provide examples for networking software can be used in above network design. 2.4 Discuss the importance of Servers in computer networks and research on Servers that are available in today’s market with their specifications and Recommend server/servers and workstations for above scenario and justify your selection with valid points. 2.5 Discuss why it is important to have compatible devices and related software in network design. Task 03 3.1 Provide VLAN and IP subnetting scheme for above scenario to satisfy user requirements. 3.2 Provide a list of devices, network components and software need to design a network for above scenario and justify your selection. 3.3 Provide a detailed network design (Diagram) for your design using modeling tool. (Ex: Microsoft Visio). 3.4 Design a User feedback form and get feedback from network users and analyze their feedback and suggestions. 3.5 Install and configure Network services and Applications* of your choice to accomplish above user requirements. (Ex: DHCP, DNS, Active Directory, Proxy, Web, Etc.) (Note: Screen shots of minimum 2 services are required) 3.6 Design a detailed Maintenance schedule for above Network design. Discuss the inter-dependence of workstation hardware with relevant networking software. M2 Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimization. LO 1 & LO2 D1 Considering a given scenario, identify the topology protocol selected for the efficient utilisation of a networking system. LO3 : Design efficient networked systems P5 Design a networked system to meet a given specification. P6 Test and evaluate the design to meet the requirements and analyze user feedback. M3 MOHAMED ARSATH Install and configure network services and applications on your choice. D2 Design a maintenance schedule to support the networked system. LO4 : Implement and diagnose networked systems P7 Implement a networked system based on a prepared design. P8 Document and analyze test results against expected results. M4 Recommend potential enhancements for the networked systems. D3 Use critical reflection to evaluate own work and justify valid conclusions. MOHAMED ARSATH MOHAMED ARSATH Figure 25....................................................................................................................................................56 Figure 26....................................................................................................................................................57 Figure 27....................................................................................................................................................58 Figure 28....................................................................................................................................................59 Figure 29....................................................................................................................................................60 Figure 30....................................................................................................................................................62 Figure 31....................................................................................................................................................63 Figure 32....................................................................................................................................................64 Figure 33....................................................................................................................................................64 Figure 34....................................................................................................................................................65 Figure 35....................................................................................................................................................65 Figure 36....................................................................................................................................................66 Figure 37....................................................................................................................................................67 Figure 38....................................................................................................................................................68 Figure 39....................................................................................................................................................68 Figure 40....................................................................................................................................................69 Figure 41....................................................................................................................................................69 Figure 42....................................................................................................................................................70 Figure 43....................................................................................................................................................71 Figure 44....................................................................................................................................................72 Figure 45....................................................................................................................................................73 Figure 46....................................................................................................................................................74 Figure 47....................................................................................................................................................74 Figure 48....................................................................................................................................................75 Figure 49....................................................................................................................................................76 MOHAMED ARSATH Figure 50....................................................................................................................................................78 Activity 1 1.0 Explanation of networking principles, protocols and devices, including benefits and constraints of networked solutions. Introduction MOHAMED ARSATH A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are made up of telecommunication network technologies, based on physically wired, optical, and wireless radio-frequency methods that may be arranged in a variety of network topologies. The nodes of a computer network may include personal computers, servers, networking hardware, or other specialised or general-purpose hosts. They are identified by network addresses, and may have hostnames. Hostnames serve as memorable labels for the nodes, rarely changed after initial assignment. Network addresses serve for locating and identifying the nodes by communication protocols such as the Internet Protocol. Figure 1 A computer network or data network is a telecommunications network which allows computers to change data. In computer networks, networked computing affection pass data to each other along network links (data connections). The connections between bumps are established using either cord media or wireless media. The best- known computer network is the Internet. Network computer affection that actualize, route and terminate the data are called network MOHAMED ARSATH It's less high as it's erected with cheapie outfit comparable as centers, network adjuncts, and Ethernet lacings. The data is transferred at an extremely faster rate in Local Area Network. Figure 3 1.1.2 PAN - Personal Area Network Personal Area Network is a network arranged within an individual person, typically within a range of 10 meters. Personal Area Network is used for connecting the computer devices of personal use is known as Personal Area Network. Thomas Zimmerman was the first research scientist to bring the idea of the Personal Area Network. Personal Area Network covers an area of 30 feet. MOHAMED ARSATH Personal computer devices that are used to develop the personal area network are the laptop, mobile phones, media player and play stations. Figure 4 1.1.3 MAN - Metropolitan Area Network A metropolitan area network is a network that covers a larger geographic area by interconnecting a different LAN to form a larger network. Government agencies use MAN to connect to the citizens and private industries. In MAN, various LANs are connected to each other through a telephone exchange line. The most widely used protocols in MAN are RS-232, Frame Relay, ATM, ISDN, OC-3, ADSL, etc. It has a higher range than Local Area Network(LAN). MOHAMED ARSATH Figure 5 1.1.4 WAN -Wide Area Network A Wide Area Network is a network that extends over a large geographical area such as states or countries. A Wide Area Network is quite bigger network than the LAN. A Wide Area Network is not limited to a single location, but it spans over a large geographical area through a telephone line, fibre optic cable or satellite links. The internet is one of the biggest WAN in the world. A Wide Area Network is widely used in the field of Business, government, and education. MOHAMED ARSATH multiple servers. SAN devices appear to servers as attached drives, eliminating traditional network bottlenecks. 1.1.4.3 EPN - Enterprise Private Network Figure 9 A storage area network (SAN) is a secure high-speed data transfer network that provides access to consolidated block-level storage. A SAN makes a network of storage devices accessible to multiple servers. SAN devices appear to servers as attached drives, eliminating traditional network bottlenecks. MOHAMED ARSATH 1.1.4.4 VPN - Virtual Private Network Figure 10 A Virtual Private Network (VPN) is a network that uses a public telecommunication infrastructure, such as the internet, to provide remote offices or individual users with secure access to their organization’s network Became popular as more employees worked in remote locations. Employees can access the network (intranet) from remote locations. The internet is used as the backbone for VPNs. Reduces cost tremendously from reduction of equipment and maintenance cost. Scalability. Secured networks. These systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that data cannot be intercepted. MOHAMED ARSATH 1.1.5 WLAN - Wireless Local Area Network Functioning like a LAN, WLANs make use of wireless network technology, such as Wi-Fi. Typically seen in the same types of applications as LANs, these types of networks don’t require that devices rely on physical cables to connect to the network. Figure 11 https://i2.wp.com/marketbusinessnews.com/wp-content/uploads/2017/07/Wireless-LAN.jpg? fit=855%2C657&ssl=1 1.1.6 CAN - Campus Area Network Larger than LANs, but smaller than metropolitan area networks (MANs, explained below), these types of networks are typically seen in universities, large K-12 school districts or small businesses. They can be spread across several buildings that are fairly close to each other so users can share resources. MOHAMED ARSATH interfaces (see www.iso.org). ISO is based in Geneva, Switzerland. The membership is composed of the national standards organizations of each ISO member country. 1.2.2 Institute of Electronics and Electrical Engineers (IEEE) The Institute of Electrical and Electronics Engineers (IEEE) is a professional society in the United States who’s Standards Association (IEEE-SA) develops standards (see www.standards.ieee.org). The IEEE-SA is probably most known for its standards for LANs. Other countries have similar groups; for example, the British counterpart of IEEE is the Institution of Electrical Engineers (IEE). 1.2.3 American National Standards Institute (ANSI) The American National Standards Institute (ANSI) is the coordinating organization for the U.S. national system of standards for both technology and nontechnology (see www.ansi.org). ANSI has about 1,000 members from both public and private organizations in the United States. ANSI is a standardization organization, not a standards-making body, in that it accepts standards developed by other organizations and publishes them as American standards. Its role is to coordinate the development of voluntary national standards and to interact with ISO to develop national standards that comply with ISO’s international recommendations. ANSI is a voting participant in the ISO 1.2.4 Internet Research Task Force (IETF) The IETF sets the standards that govern how much of the Internet will operate (see www.ietf.org). The IETF is unique in that it doesn’t really have official memberships. Quite literally anyone is welcome to join its mailing lists, attend its meetings, and comment on developing standards. 1.2.5 IEEE 802 Standards MOHAMED ARSATH In 1985, the computer society of the IEEE started a project called, Project802, to set standards to enable intercommunication among equipment from a variety of Vendors. IEEE 802 refers to a family of IEEE standards dealing with Local area networks (LANs) and Metropolitan area networks (MANs). 1.3 Network Protocols A network protocol is an established set of rules that determine how data is transmitted between different aptitude in the same network. Constitutionally, it allows connected aptitude to communicate with each other, regardless of any differences in their internal processes, structure or design. Network protocols are the reason you can freely communicate with people all over the world, and so play a critical part in newfangled digital dispatches. Corresponding to the way that speaking the same language simplifies communication between two people, network protocols make it possible for impulse to interact with each other because of foredoomed rules made into impulse’software and paraphernalia. Neither nonindigenous area networks (LAN) nor wide area networks (WAN) could perform the way they do moment without the use of network protocols. 1.3.1 OSI & TCP/IP models 1.3.1.1 The OSI Layers OSI (Open Systems Interconnection) model was created by the International Organization for Standardization (ISO), an transnational standard- setting body. It was designed to be a reference model for describing the functions of a communication system. The OSI model provides a shell for creating and executing networking norms and predisposition and describes how network usages on different computers can communicate through the network media. MOHAMED ARSATH The OSI model has seven layers, with each clan describing a different function of data traveling through a network. The OSI reference model organizes a network into seven layers (a protocol cock). These layers define how networking accoutrements and software are to hand data and transfer it across a network. Interoperability, the purpose for defining a standard protocol model, exists when there's chime between the protocol cock of one workstation or accessorial device and that of another. Each echelon is capable to communicate with the corresponding echelon of a receiving station. Figure 14 Physical Layer has rules for dealing with paraphernalia, ditto as voltages, bit- rates, frequentness, etc. Note that this isn't the genuine physical medium ( lacing or the optical fiber or air space). The medium is below this and not given an genuine rank assignment. Despite the fact that this people isn't the communicating tackle per se, the fules can be contained implicitly in the network interface card (NIC) inside the computer, which connects it to the string. Network Interface Cards (NICs), Repeaters and Omphali operate primarily in the Physical People. MOHAMED ARSATH Figure 15 1.3.1.2.1 Network Access Layer o A network layer is the lowest layer of the TCP/IP model. o A network layer is the combination of the Physical layer and Data Link layer defined in the OSI reference model. o It defines how the data should be sent physically through the network. o This layer is mainly responsible for the transmission of the data between two devices on the same network. o The functions carried out by this layer are encapsulating the IP datagram into frames transmitted by the network and mapping of IP addresses into physical addresses. o The protocols used by this layer are ethernet, token ring, FDDI, X.25, frame relay. 1.3.1.2.2 Internet Layer o An internet layer is the second layer of the TCP/IP model. o An internet layer is also known as the network layer. o The main responsibility of the internet layer is to send the packets from any network, and they arrive at the destination irrespective of the route they take. MOHAMED ARSATH o IP Addressing: This protocol implements logical host addresses known as IP addresses. The IP addresses are used by the internet and higher layers to identify the device and to provide internetwork routing. o Host-to-host communication: It determines the path through which the data is to be transmitted. o Data Encapsulation and Formatting: An IP protocol accepts the data from the transport layer protocol. An IP protocol ensures that the data is sent and received securely, it encapsulates the data into message known as IP datagram. o Fragmentation and Reassembly: The limit imposed on the size of the IP datagram by data link layer protocol is known as Maximum Transmission unit (MTU). If the size of IP datagram is greater than the MTU unit, then the IP protocol splits the datagram into smaller units so that they can travel over the local network. Fragmentation can be done by the sender or intermediate router. At the receiver side, all the fragments are reassembled to form an original message. o Routing: When IP datagram is sent over the same local network such as LAN, MAN, WAN, it is known as direct delivery. When source and destination are on the distant network, then the IP datagram is sent indirectly. This can be accomplished by routing the IP datagram through various devices such as routers. MOHAMED ARSATH 1.3.2 ARP Protocol Figure 16 o ARP stands for Address Resolution Protocol. o ARP is a network layer protocol which is used to find the physical address from the IP address. o The two terms are mainly associated with the ARP Protocol: o ARP request: When a sender wants to know the physical address of the device, it broadcasts the ARP request to the network. o ARP reply: Every device attached to the network will accept the ARP request and process the request, but only recipient recognize the IP address and sends back its physical address in the form of ARP reply. The recipient adds the physical address both to its cache memory and to the datagram header MOHAMED ARSATH  SNMP: SNMP stands for Simple Network Management Protocol. It is a framework used for managing the devices on the internet by using the TCP/IP protocol suite.   SMTP: SMTP stands for Simple mail transfer protocol. The TCP/IP protocol that supports the e-mail is known as a Simple mail transfer protocol. This protocol is used to send the data to another e-mail address.   DNS: DNS stands for Domain Name System. An IP address is used to identify the connection of a host to the internet uniquely. But, people prefer to use the names instead of addresses. Therefore, the system that maps the name to the address is known as Domain Name System.   TELNET: It is an abbreviation for Terminal Network. It establishes the connection between the local computer and remote computer in such a way that the local terminal appears to be a terminal at the remote system.   FTP: FTP stands for File Transfer Protocol. FTP is a standard internet protocol used for transmitting the files from one computer to another computer. 1.4 Network Topology Network topology refers to how various nodes, devices, and connections on your network are physically or logically arranged in relation to each other. Think of your network as a city, and the topology as the road map. Just as there are many ways to arrange and maintain a city—such as making sure the avenues and boulevards can facilitate passage between the parts of town getting the most traffic—there are several ways to arrange a network. Each has advantages and disadvantages and depending on the needs of your company, certain arrangements can give you a greater degree of connectivity and security. 1.4.1 Two divisions in network topography. MOHAMED ARSATH o Physical – The physical network topology refers to the actual connections (wires, cables, etc.) of how the network is arranged. Setup, maintenance, and provisioning tasks require insight into the physical network. o Logical – The logical network topology is a higher-level idea of how the network is set up, including which nodes connect to each other and in which ways, as well as how data is transmitted through the network. Logical network topology includes any virtual and cloud resources. 1.4.2 In a computer network, there are mainly six types of physical topology,  Bus Topology  Ring Topology  Star Topology  Mesh Topology  Tree Topology  Hybrid Topology 1.4.2.1 Bus Topology Bus topology is a simple type of topography used to communicate over a common bus or channel network. The bus is connected to various pipelines and droplines. Pipe connectors, cables that connect the droplines bus to the computer. In other words, there is only one transfer line for all nodes. MOHAMED ARSATH Figure 17 https://www.oreilly.com/library/view/networking-fundamentals/9781838643508/assets/34013323- b661-4df5-811f-261154409938.png When the sender sends a message, all other computers can hear it, but only the recipient accepts it (verifying the Mac address attached to the data frame) while others reject it. Bus technology is mainly suitable for small networks like LAN. 1.4.2.2 Ring Topology Ring topology is a topology in which each computer connects exactly to two other computers to form a ring. Messaging is rounded in one direction and in nature. MOHAMED ARSATH  As the leaf nodes can add one or more nodes in the hierarchical chain, this topology provides high scalability.  The other nodes in a network are not affected, if one of their nodes get damaged or not working.  Tree topology provides easy maintenance and easy fault identification can be done.  A callable topology. Leaf nodes can hold more nodes.  Supported by several hardware and software vendors.  Point-to-point wiring for individual segments. Disadvantages of Tree Topology :  This network is very difficult to configure as compared to the other network topologies.  Length of a segment is limited & the limit of the segment depends on the type of cabling used.  Due to the presence of large number of nodes, the network performance of tree topology becomes a bit slowly.  If the computer in first level is erroneous, next level computer will also go under problems.  Requires large number of cables compared to star and ring topology.  As the data needs to travel from the central cable this creates dense network traffic.  The Backbone appears as the failure point of the entire segment of the network.  Treatment of the topology is pretty complex.  The establishment cost increases as well.  If the bulk of nodes are added in this network, then the maintenance will become complicated. MOHAMED ARSATH 1.4.2.4 Mesh Topology Mesh topology is computer network topology in which nodes are interconnected. In other words, direct communication takes place between the nodes in the network. Figure 20 1.4.2.5 Tree Topology Tree topography is a computer network topology in which all terminals are directly or indirectly connected to the main bus cable. Wooden topography is a combination of bus and star topography. MOHAMED ARSATH Figure 21 In a tree topography, the entire network can be divided into sections that are easily managed and maintained. There is a main center and all the other sub-centers are interconnected in this topography. 1.4.2.6 Hybrid Topology A Hybrid topology is a computer topology which is a combination of two or more topologies. In practical use, they are the most widely used. MOHAMED ARSATH Routers help transmit packets to their destinations by charting a path through the ocean of joined networking predisposition using different network topologies. Routers are intelligent predisposition, and they store information about the networks they ’re connected to. Last routers can be configured to operate as packet- filtering firewalls and use access control lists (ACLs). Routers, in confluence with a channel service unit/ data service unit (CSU/ DSU), are also used to paraphrase from LAN framing to WAN framing. This is challenged because LANs and WANs use different network protocols. Analogous routers are known as border routers. They serve as the outside connection of a LAN to a WAN, and they operate at the border of your network. Router are also used to divide internal networks into two or additional subnetworks. Routers can also be connected internally to other routers, creating zones that operate solely. Routers establish communication by maintaining tables about destinations and autochthonous connections. A router contains information about the systems connected to it and where to dispatch requests if the destination is n’t known. Routers normally communicate routing and other information using one of three standard protocols Routing Information Protocol (RIP), Border Gateway Protocol (BGP) or Open Shortest Path First (OSPF). 2.1.2 Switches Figure 24 Switches generally have a another intelligent function than centers. A switch is a multiport device that improves network effectiveness. The switch maintains limited routing information MOHAMED ARSATH about knots in the internal network, and it allows connections to systems like centers or routers. Beaches of LANs are normally connected using switches. Generally, switches can read the outfit addresses of incoming packets to transmit them to the felicitous destination. Using switches improves network effectiveness over centers or routers because of the virtual circuit capability. Virtual circuits are too knotted to explore with network investigators, which also changes for better network security.. You can allow of a switch as a device that has some of the chic capabilities of routers and centers combined. A switch can work at either the Data Link estate or the Network estate of the OSI model. A multilayer switch is one that can operate at both layers, which means that it can operate as both a switch and a router. A multilayer switch is a high- performance device that supports the same routing protocols as routers. 2.1.3 HUB Figure 25 Hubs connect multiple computer networking genius together. A Hub also acts as a repeater in that it MOHAMED ARSATH amplifies signals that deteriorate after traveling long distances over connecting lacings. A Hub is the simplest in the family of network connecting genius because it connects LAN elements with identical protocols. A Hub can be used with both digital and analog data, furnished its settings have been configured to prepare for the formatting of the incoming data. For illustration, if the incoming data is in digital format, the Hub must pass it on as packets; notwithstanding, if the incoming data is analog, either the Hub passes it on in signal form. Centrals don't perform packet filtering or addressing functions; they just ship data packets to all connected genius. Centrals operate at the Physical order of the Open Systems Interconnection (OSI) model. There are two types of centrals simple and multiple harbor. 2.1.4 Bridge Figure 26 Bridges are used to connect two or more hosts or network segments together. The basic role of bridges in network architecture is storing and forwarding frames between the different segments that the bridge connects. They use hardware Media Access Control (MAC) addresses for transferring frames. By looking at the MAC address of the devices connected to each segment, bridges can forward the data or block it from crossing. Bridges can also be used to connect two physical LANs into a larger logical LAN. MOHAMED ARSATH 2.1.7 Repeater Figure 29 A repeater is an electronic device that amplifies the signal it receives. You can think of repeater as a device which receives a signal and retransmits it at a higher level or higher power so that the signal can cover longer distances, more than 100 meters for standard LAN cables. Repeaters work on the Physical layer. 2.2 Network Software Components  2.2.1 Anti-Virus Antivirus software is a type of program designed and developed to protect computers from malware like viruses, computer worms, spyware, botnets, rootkits, keyloggers and such. Antivirus programs function to scan, detect and remove viruses from your computer. There are MOHAMED ARSATH many versions and types of anti-virus programs that are on the market. However, the prime objective of any antivirus program is to protect computers and remove viruses once detected. 2.2.2 Firewalls A firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or leave a computer network. A firewall's main purpose is to filter traffic and lower the risk that malicious packets traveling over the public internet will be able to impact the security of a private network. Firewalls are incorporated into a wide variety of networked devices and may also be purchased as standalone software applications. 2.2.3 Networking Operating System Networking Operating System is designed especially to network system. It is installed on the server then it delivers to some facilitate to workstations on the network such as share files, database, applications, fax machine, plotters, printers etc. 2.3.4Protocol Suite protocol is a set of rules or guidelines that each node of a data communication network follows. Protocol Suite is a group of related protocols designed for computer networks. Two Protocol Suites are OSI Model – OSI stands for Open System interconnections, and it decides that how to flow data in between the multiple computers with the help of these seven layers such as  Physical, Data Link, Network, Transport, Session, Presentation and Application. TCP/IP Model – TCP/IP stands for “Transmission Control Protocol and Internet Protocol“, and it delivers some instructions that how to make a connection with any specific computer over the network and how to get transmission between all computers nodes. Here, Some Name of Software Components are MOHAMED ARSATH  Novell® Netware 4.1 and Microsoft Windows® NT are Network Operating System for server side.  Novell® Netware 4.1 client and Microsoft Windows® 95 are Network Operating System for client side.  Novell® IPX is network protocol software.  Application software’s are web browser, email etc.  Network Interface Card drivers 2.3 Install Windows Server 2019  After creating a bootable USB or DVD medium, insert it and start your Computer. VirtualBox, KVM and VMware users only need to attach the ISO file during VM creation and follow the installation steps shown. 2.3.1 On the first screen, select installation language, Time and keyboard layout the click“Next“ . Figure 30 2.3.2 Start the installation by clicking on “Install Now“. MOHAMED ARSATH 2.3.5 Select a partition to install Windows Server, you can optionally create new one from available or use total available size by clicking “Next“. Figure 34 2.3.6 The installation should start, wait for it to finish. Figure 35 MOHAMED ARSATH 2.3.7 The system should automatically reboot after the installation. Set Administrator password when prompted on the next screen. Figure 36 2.3.8 You can get Windows Server details on the settings section. MOHAMED ARSATH Figure 37 That’s all. You have successfully installed Windows Server 2019 on your Physical server or Virtual Environment. Our next articles will cover configuration of different services on Windows Server 2019. Stay connected for updates. MOHAMED ARSATH ‘BTEC E Ried are ectire acces PC3 Ree - og x Physcal Config Desktop Attrbutes _Software/Services TP Confguratien O orc rp Address Subnet ask Default Gateway ONS Server 1P¥6 Configuration pace O Auto Config © static 1Pv6 Address a Link Local address (Fe50: 2E0:FSFF.FESA:9324 IPV6 Gateway 1Pv6 ONS Server Dre Figure 42 3.1.2 Switch Configuration SwitchO MOHAMED ARSATH “BTEC Switch1 MOHAMED ARSATH WP switchd - Oo Physical Config «CL! Attrbutes 105 Command Line Interface Saivcnvena® a Switeh>enable Switchtcont Switchtconfigure te: Switchéconfigure terminal Enter configuration commands, one per line, Switch config) finterza Switch (config) finterface faz Switch (config) interface fastEthernet 0/1 Switch (config=i£) ¢ ew: Savatchpert ac £)Sewitchport access vlan nd with CNIL/Z Switch (contig~ Switch (config-: Switch (config-if) Sswitchport access vian 10 4 Access VLAN does not exist. Creating vlan 10 Switch (config-if) texir ig) #inter eo fas @ fastEchernes 0/2 ig) finterta Switch (config) #interte Swatch (contag-if)#eeat Switch (config-if) fewitchport ac Seitch(canfig-iz)favitchport access vlan Switch (config-if) $switchport S Access VIAN does not exist Switch (config-ie) exit Switch contig’ af y Copy Paste Ot. Figure 43 Shaping Lives, Creating Futures ‘BTEC Shapinig Lives, Creating Futures, ® Switch? - oF x Physical Config CLI. tributes 105:Command Line Interface Grivch-enabie A Swicchtcontg Suicchtconti Swirengeonfigure ti Swicchteonfigure terminal Enter configuration commands, one per line. End with CNTL/Z Switen (config) tinterts Switch (config) finterface Switch (config) interface Sviten (config-if) raw Switch (config-if)favicchport ac Switch (config-if) avitchpore Switch (config-Af) favitchpert access % Access VLAN does not exist. Creat: Switch (config-if) tenis Switch (config) ¢interta Switch (config) sinterface wertace Suicen (eontig-4 2) fawde Swivch (config-if)faeitchport ac Switen (config-if) tavitchport eEthernet 0/1 Siren (config-if)tavicchpore vian 20 § Access VLAN does not exist. ng vlan 20 Switch (config-if)sexie Suicon (contig) Copy Poste Oe Figure 44 3.1.3 Trunk port configuration MOHAMED ARSATH 3.15 Ping MOHAMED ARSATH Physical Config CT Attributes 105 Command Line interface ¢ encapsulation dotig 19 ‘Router (config-subif) tip add Router (config-subif) $ip address 192.168.1284 285.255.285.0 Router (configuaubif) gre shuts Router (config-subif) $e shutdown Router (config) fintertace fastEthernet 0/0. Router (config-subif) # SLINK-S~CHANGED: Interface FastEthernet(/0.2, changed state to up suimepnoto-s-uppoum: FastEthernet0/0.2, Router (config-subif) gence Copy Paste Figure 48 Shapinig Lives, Creating Futures, Figure 49 3.2 Feedback Form The below questionnaire has been prepared for the users to evaluate the quality of service for the redesigned network of Enclave Films. Please tick the selected option. 1. How is the network speed?  Excellent  Good  Average  Poor MOHAMED ARSATH 2. How often do you find bottlenecks in the network?  Always  Occasionally  Rarely  Never 3. How is the security system?  Excellent  Good  Average  Poor 4. Are you satisfied with our system updates?  Yes  No 5. How is our maintenance service?  Excellent  Good  Average  Poor 6. How often do you wish to have updates in the security and maintenance system?  Once a month  Every six months  Annual updates 7. Do you wish to add more PCs in the future in every department? MOHAMED ARSATH Figure 1 https://lh3.googleusercontent.com/proxy/8ugc4HaO0bg4dRUXHNzGnLwlNhNjxu9wrxWSYPH vHsTck-2twmp9y3C48rqggJqufAM30NaUR4-5f6q4aLbjFw Figure 2 https://www.thestudygenius.com/media/2020/03/Types-of-Network-PAN-LAN- MAN-WAN-1024x484.png Figure 3 https://static.javatpoint.com/tutorial/computer-network/images/local- area-network.png Figure 4 http://generalnote.com/images/Computer-Network/PAN-Network.jpg Figure 5 https://jstech.com.ng/wp-content/uploads/2020/10/MAN-SP.png Figure 6 https://lh3.googleusercontent.com/proxy/SBG0nkHsXye970_MD3xYrr4a4N1jc10Kf2zBqZ0Xq mOSsYMvk-GVq1QR05-VgLBcIn6dNI6sB- A9QC_YMdA6rZ_Vt8EB1Vw6hjVUXzitrn24KJxpIHDKzaEA9PViCY7VEpcxwvSs Figure 7 https://media.geeksforgeeks.org/wp-content/uploads/20200624120206/wireless- 2.png Figure 8 https://i.ytimg.com/vi/Pu4b8K0BQ9Y/maxresdefault.jpg Figure 9 https://www.itrelease.com/wp-content/uploads/2021/06/Enterprise-Private-Network-EPN.jpg Figure 10 https://ecomputernotes.com/images/vpn.jpg Figure 11 https://i2.wp.com/marketbusinessnews.com/wp-content/uploads/2017/07/Wireless- LAN.jpg?fit=855%2C657&ssl=1 Figure 13 https://www.itrelease.com/wp-content/uploads/2018/11/Diagram-of-campus- area-network-CAN.jpg Figure 17 https://ipcisco.com/wp-content/uploads/2018/10/arp-operation-how-arp-works-2- ipcisco.jpg Figure 24 https://img.wavescdn.com/1lib/images/products/hardware/preview/wrc1-wifi-stage- router.png MOHAMED ARSATH Figure 26 https://media.takealot.com/covers/29660799/ts-hub3k-pdpxl.jpg Figure 27 https://docs.oracle.com/cd/E23824_01/html/821-1458/figures/SimpleBridgedNetworkDiagram.p ng Figure 28 https://techdifferences.com/wp-content/uploads/2016/05/Gateway1.jpg Figure 29 https://seeromega.com/wp-content/uploads/2016/11/Cable-Modem-and-Router.jpg Figure 30 https://3.imimg.com/data3/HO/GO/MY-4145714/networking-repeater- 500x500.jpg MOHAMED ARSATH
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved