Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Networking for IT software Engineering, Study Guides, Projects, Research of Software Engineering

this module based on networking this part is useful for the networking student for basic all kind of networking criteria will covered with Assignment Brief

Typology: Study Guides, Projects, Research

2021/2022

Uploaded on 04/29/2022

shafra-fariz
shafra-fariz 🇱🇰

2

(1)

7 documents

1 / 243

Toggle sidebar

Related documents


Partial preview of the text

Download Networking for IT software Engineering and more Study Guides, Projects, Research Software Engineering in PDF only on Docsity! Networking 2021 EXAMINE NETWORKING PRICIPLES AND THEIR PROTOCOLS SHAFRA FARIZ Shafra Fariz 1 | P a g e Acknowledgement I would like to take this opportunity to thank my lecturer Mr. Shakir Moulana for guiding us and showing us the correct path throughout this assignment to make it a success. At the same time, I would like to thank all the lecturers for fullest support and cooperation. Thank You Shafra Fariz 4 | P a g e STUDENT ASSESSMENT SUBMISSION AND DECLARATION Plagiarism Plagiarism is a particular from of cheating. Plagiarism must be avoided at all costs and student who break the rules, however innocently, may be penalized. It is your responsibility to ensure that you understand correct referencing practices. As a university level student, you are expected to use appropriate references throughout and keep carefully detailed notes of all your sources of materials for material you have used in your work, including any material downloaded from the internet. Please consult the relevant unit lecturer or your course tutor if you need any further advice. Student Declaration Student Declaration I certify that the assignment Submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that making a false declaration is a form of malpractice. Student Signature: Date: Signature of the IV Date Student Agreement : I understand the feedback given to me and agree to carry out the actions in future works as required and indicated. Student Signature: Date Student Name: Assessor Name: Issue Date: Submission Date: Submitted on: Programme: Unit: Assignment number and title: Shafra Fariz 5 | P a g e SUBMISSION FORMAT Assignment Task Submission Format 1 Part 1 Report Part 2 Report Part 3 Report/ Presentation Part 4 Report 2 Part 1 Report Part 2 Report Part 3 Report 3 Part 1 Practical and Report 4 Part 2 Practical and Report Shafra Fariz 6 | P a g e ASSESSMENT REVIEW PLAN Assignment Grading Criteria Evidence Formative Comments Date 01 P1 Report P2 Report M1 Report D1 Report 02 P3 Report P4 Report M2 Report D1 Report 03 P5 Practical / Report P6 Practical / Report M3 Practical / Report D2 Practical / Report 04 P4 Report P5 Report P6 Report D3 Report Shafra Fariz 9 | P a g e Unit 2: Networking Assignment 1 Shafra Fariz 10 | P a g e Higher National Certificate/Diploma in Computing Assignment Brief Student Name/ID Number 1016959 Unit Number and Title 2: Networking Academic Year 2021 Unit Author Mr. Shakir Moulana Assignment Title Understanding Network Concepts according to the current industry Issue Date 02nd February 2021 Submission Date 04th April 2021 IV Name & Date Mr. Sai Thishok – 01st February 2021 Submission Format The submission is in the form of an individual written report. This should be written in a concise, formal business Style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as Appropriate, and all work must be supported with research and referenced using the Harvard referencing system. Please also provide a bibliography using the Harvard referencing system. Shafra Fariz 11 | P a g e Submission Format Unit Learning Outcomes LO1 Examine networking principles and their protocols. LO2 Explain networking devices and operations. Assignment Brief and Guidance Most Universities admired in private Higher Education Institute in Colombo, Sri Lanka. Administration and the academic staff are very much concerned about providing required facilities for the students in the field of Network. Networking computers is not the complicated process it used to be. What used to be along drawn out process is now made easier and more efficient, causing less distraction and disruption in organizations. Imagine that you are a network specialist working for your company Speed tech in a start-up level position. So Before starting the process study the basics of Networking. Talk to the organization thinking about moving to the Best of Networking industry taking the new technological improvement into consideration. You will need to produce an outcome on the networking development process to the organization that includes the following: 1. The growth of the Network 2. Detailing of the new networking technologies introduced 3. The outcome that will be gained through Network considering the networking principles, protocols and devices, including benefits and constraints of networked solutions, the impact of network topology, communication and bandwidth requirements, effectiveness of networking systems, operating principles of Networking devices and server types and networking software. During the process in terms of working in the organization you are supposed to go through in depth process on Designing and implementing a local area network. You are supposed to follow the below steps below according to the requirement by the organization • A LAN design plan and justification document. • A fully completed test plan including an evaluation of results and recommendations for improvements to LAN. • A proposed and justified maintenance schedule. • Evidence of an implemented network. And you are ask to analyse the specification from the institution above for completion of this project within a given timeframe. The LAN design that you are about to design should be well planned thinking out of the box which will make an Effective result on the designed LAN network. After the designing process is completed. The concept to go through with LAN design is to design a network diagram to implement to a start-up Organization with relevant requirements and configurations. The network system should be under the default Gateway of 192.168.10.1 allocating 10 terminals including a server with proper configurations. Shafra Fariz 14 | P a g e LO1 Examine networking principles and their protocols LO1 & 2 D1 Considering a given scenario, identify the topology protocol selected for the efficient utilization of a networking system. P1 Discuss the benefits and constraints of different network types and standards. P2 Explain the impact of network topology, communication and bandwidth requirements. M1 Compare common networking principles and how protocols enable the effectiveness of networked systems. LO2 Explain networking devices and operations P3 Discuss the operating principles of networking devices and server types. P4 Discuss the inter-dependence of workstation hardware with relevant networking software. M2 Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimisation. Shafra Fariz 15 | P a g e Learning Outcomes and Assessment Criteria Pass Merit Distinction LO3 Design efficient networked systems P5 Design a networked to meet a given network services P6 Test and evaluate the design to meet the requirements and analyse user feedback with the aim of improving efficiency. M3 Install and configure network services and applications on your choice. D2 Design a maintenance schedule to support the networked system. LO4 Implement and diagnose networked systems P7 Implement a networked system based on a prepared design. P8 Document and analyse test results against expected results. M4 Recommend potential enhancements for the networked systems. D3 Use critical reflection to evaluate own work and justify valid conclusions. Shafra Fariz 16 | P a g e Table of Contents Computing .............................................................................................................................................. 8 Assignment Brief ................................................................................................................................... 10 Importance of Networking .............................................................................................................. 19 File Sharing ..................................................................................................................................... 19 Printers............................................................................................................................................. 20 Sharing Media ................................................................................................................................. 20 Media Center Server ...................................................................................................................... 20 Video Games................................................................................................................................... 20 The Current Trend Networking ...................................................................................................... 20 Internet Service Provider ................................................................................................................ 20 Wi – Fi .............................................................................................................................................. 21 Switches and Firewall ..................................................................................................................... 22 Past Network Success and Unsuccessful Development .......................................................... 22 Huge interests in Security: Message Aware Networking............................................................. 23 Convergence ................................................................................................................................... 25 Ethernet: 1G Vs 10G Design ......................................................................................................... 26 Network Failure and Success ........................................................................................................ 27 Requirement for Success ............................................................................................................... 28 Wireless Industry Trend ................................................................................................................. 29 Introduction of Networking ............................................................................................................. 30 Examine Networking Principles and Their Protocols ................................................................ 31 What is a Purpose of The Network? ............................................................................................. 32 Purpose of Networks file and Data Sharing.................................................................................. 32 What is Network Resources? ......................................................................................................... 33 Basic Network Resources .............................................................................................................. 33 Network Types .................................................................................................................................. 33 LAN – Local Area Network ............................................................................................................. 33 WAN – Wide Area Network ............................................................................................................ 34 WLAN – Wireless Local Area Network ......................................................................................... 34 Network Models ................................................................................................................................ 35 Peer-to-Peer Network ..................................................................................................................... 36 Shafra Fariz 19 | P a g e Importance of Networking A network is at least two PCs associated together to divide data and documents among them. Networks aren't the solitary ones that can profit by making a network. Home clients can appreciate sharing music, motion pictures and printers from any PC. File Sharing PCs associated with a network can impart records and archives to one another. PCs associated with a business network can pick which file and envelopes are accessible to share on the network. Shafra Fariz 20 | P a g e Printers PCs can print pages to another PC with a printer on the network. Also, printers can be associated utilizing a print worker, which permits direct printing from all PCs. Sharing Media Sharing media between PCs is simple when associated with a network. Like document sharing, PCs can transfer pondering, recordings and films starting with one PC then onto the next. Media Center Server A media focus worker can store your whole diversion library on a unified center to give speedy admittance to your media from each PC on your network. Video Games Comfort and PC gamers profit by systems administration moreover. You can undoubtedly set up multiplayer demise coordinates and even host your own game worker. (www.techwalla.com, 2021) The Current Trend Networking Internet Service Provider Shafra Fariz 21 | P a g e By definition, a PC network basically permits PCs to trade information. In these terms, the Internet is basically the world's most popular PC organization. Thus, quite possibly the main organization administrations to the two homes and organizations are your Internet Service Provider (ISP). Society is utilizing the Internet all the more frequently and for additional things – everything from downloading applications to tuning in to music to accounting. These exercises take transmission capacity, which can be estimated by the measure of information moved throughout some undefined time frame or by the speed of downloads and transfers. ISPs can force a data transmission cap when a channel gets over-burden. Later on, ISPs will probably begin checking your data transfer capacity and charging for overages. For organizations, this could wind up being a massive expense. Off-site network reinforcements specifically take up a great deal of transmission capacity. At the point when you're taking a gander at your reinforcement arrangement, ask your IT supplier how much data transmission you can hope to utilize every month – it very well may be something you'll have to begin working into your spending plan. Guarantee you have a marketable strategy, not a home arrangement, from your ISP. A great deal of private ventures actually utilizes a home arrangement, which doesn't consider business needs. Additionally, field-tested strategies generally offer a specific measure of ensured uptime for your Internet association. A few organizations even decide to purchase two Internet plans from two diverse ISPs, if Internet uptime is vital for business tasks. This choice could be essential for your general business coherence arranging. Wi – Fi Wi-Fi is the ISO (International Organization for Standardization) name for remote innovation that permits an electronic gadget to trade information or associate with the Internet utilizing radio waves. You ought to guarantee your PC equipment is viable with both the current and arising remote frequencies. It's ideal to check with your IT supplier Shafra Fariz 24 | P a g e 4. Broadband Access is becoming quicker than mobile phones Fiber is crawling towards home 5. Ethernet stretching out from Enterprise to Access to Metro … 6. wiring more costly than gear Wireless Access 7. Multi-Protocol Label Switching for traffic designing 8. Voice over Internet Protocol (VOIP) is in the Mainstream 9. Multi-administration IP: Voice, Video, and Data 10. Terabyte/Petabyte stockpiling (Not VoD) High-Speed Networking Network Storage. Work area search. Large interests in Security: Message Aware Networking All messages examined by security passages 2. Remote (WiFi) is spreading (Intel Centrino) 3. More Cell telephones than POTS. Shrewd Cell telephones w PDA, email, video, pictures Mobility Shafra Fariz 25 | P a g e 4. Broadband Access is becoming quicker than mobile phones Fiber is crawling towards home 5. Ethernet stretching out from Enterprise to Access to Metro … 6. wiring more costly than gear Wireless Access 7. Multi-Protocol Label Switching for traffic designing 8. Voice over Internet Protocol (VOIP) is in the Mainstream 9. Multi-administration IP: Voice, Video, and Data 10. Terabyte/Petabyte stockpiling (Not VoD) High-Speed Networking Network Storage. Work area search. Convergence Distance: LAN versus MAN • Services: Data, Voice, Video • Phy: Circuit exchanged versus Packet exchanged Shafra Fariz 26 | P a g e • L2 Protocols: Ethernet and SONET • L3 Protocols: IP • HTTP: Hyper-Application Access convention Ethernet: 1G Vs 10G Design 1G Ethernet • 1000/800/622 Mbps Single information rate • LAN removes as it were • No Full-duplex as it were • Shared Mode • Changes to CSMA/CD 10G Ethernet • 10.0/9.5 Gbps The two rates. Shafra Fariz 29 | P a g e • Interoperability • Concurrence with heritage organizations • Existing framework is a higher priority than new • innovation (IPv4 versus IPv6, Overcast versus IP multicast) Wireless Industry Trend • Remote industry is more grounded than wireline. • Especially solid development in non-industrial nations. • 48% of worldwide telco incomes coming from remote • 26% of remote incomes coming from information (versus voice) • Past: Voice, email, SMS, Ring tones • Present: Push, Gaming, Pictures, Instant Messaging • Future: Music, Video, Location, Remote checking, mcommerce • Long haul: Video communication, far off big business applications, Shafra Fariz 30 | P a g e • Distant administration, Multiparty coordinated effort, (www.cse.wustl.edu, 2005) Introduction of Networking PC's networks are the main impetus behind the advancement of PC frameworks and permit clients to get to information, equipment, and administrations paying little heed to their area. Being proficient about the basic standards of systems administration is of crucial significance to all IT experts. Systems administration is a climate that is progressively unpredictable and under constant turn of events. Complex PC organizing has associated the world by the gatherings of little organizations through web connects to help worldwide correspondences. It underpins admittance to advance data whenever, anyplace utilizing numerous applications like, sound, and video transmission, including the World Wide Web, and this has opened the conduits to the accessibility of data. Shafra Fariz 31 | P a g e Examine Networking Principles and Their Protocols Job of network: Purpose, benefits, asset suggestions, correspondences, working practice, business opportunity, data sharing, joint effort. Framework types: Peer-based, customer worker, cloud, bunch, brought together, virtualized. Systems administration principles: Conceptual models for example: OSI model, TCP/IP model; principles: For example: IEEE 802.x. Geography: Logical for example Ethernet, Token Ring; physical for example Star, Ring, Bus, Mesh, Tree, Ring. Conventions: Purpose of conventions; steered conventions for example: IPv4, IPv6, IPv6 tending to, Global unicast, Multicast, Link nearby, Unique neighborhood, EUI 64, Auto Configuration, FTP, HTTP, SMTP, POP3, SSL; the board of protocols for addressing. Shafra Fariz 34 | P a g e On account of its confined nature, the LAN regularly is fast and less expensive to set up than a WAN. WAN – Wide Area Network A Network that traverses more than one geographic area, regularly interfacing isolated LANs. WANs are slower than LANs and regularly require extra and expensive equipment like switches, devoted rented lines, and muddled execution systems. MAN – Metropolitan Area Network Sporadically, a WAN will be referred to as a Metropolitan Area Network (MAN) when it is restricted to a specific geographic zone, like a college grounds or city. No conventional rules direct the contrasts between a MAN and a WAN. Actually, a MAN is a WAN. Maybe thus, the term MAN is utilized less much of the time than WAN. In the event that any qualification exists, it's that a MAN is more modest than a WAN. A MAN is quite often greater than a LAN and as a rule is more modest than or equivalent to a WAN. Monitors utilize an Internet specialist organization (ISP) or media communications (telco) supplier. WLAN – Wireless Local Area Network Shafra Fariz 35 | P a g e A remote neighborhood (WLAN) gives remote organization correspondence over short distances utilizing radio or infrared signals rather than conventional organization cabling. A WLAN is a kind of neighborhood (LAN). WLAN's utilization Wireless passages (APs) which have a transmitter and recipient (handset) gadget used to make a remote LAN (WLAN). APs ordinarily are a different organization gadget with an underlying receiving wire, transmitter, and connector. APs utilize the remote foundation network mode to give an association point among WLANs and a wired Ethernet LAN. Network Models You can look over two fundamental wired organization models: distributed and customer/worker. The model utilized for an organization is dictated by a few components, including how the organization will be utilized, the number of clients will be on the organization, and budgetary contemplations. These two are: Peer-to- Peer Networking Model Client/Server Networking Model Shafra Fariz 36 | P a g e Peer-to-Peer Network A decentralized Network model contribution no incorporated stockpiling of information or brought together authority over the sharing of records or assets. All system peer-to-peer distributed Network can share the assets on their local PC and use assets of different frameworks. Peer-to-peer are less expensive and simpler to execute than client/server networks, making them an ideal answer for conditions wherein financial plans are a worry. Doesn't function admirably with huge quantities of PC frameworks. As a shared peer-to- peer network, it turns out to be progressively muddled to explore and get to records and assets associated with every PC since they are dispersed all through the network. The absence of centralized data stockpiling makes it hard to find and back up key files. Despite the fact that there is no hypothetical breaking point to the size of a shared peer- to-peer network, execution, security, and access become a significant cerebral pain on peer-based network as the quantity of PCs increments. What's more, Microsoft forces a constraint of just 5, 10 or 20 simultaneous customer associations with PCs running Windows. Client/Server Networking Model Truly, the most broadly executed model and the one you are well on the way to experience when working in genuine conditions. The benefits of the client/server framework are that it is a concentrated model and it empowers unified organization the board of all network administrations, including client the executives, security, and reinforcement strategies. Shafra Fariz 39 | P a g e Types of Server: Types of Server: Cluster Based A gathering of workers that cooperate and act like a solitary framework Empowers high accessibility, if a worker in the server cluster the leftover workers take up the strain. Empowers load balancing Empowers parallel processing Server Type: Cloud Based Access of networking administration assets from a centralized third-party provider Wide Area Networking (WAN) or Internet-based admittance innovations. The facilitating, storage, and conveyance of figuring as an assistance instead of an item. The end user gets to distantly put away projects and different assets through the Internet without the requirement for costly local networking devices, administrations, and backing. Server Type: Virtualized Based Virtual networking administration is an innovation that encourages the control of at least one distantly found PCs or workers over the Internet. Equipment and programming network assets and organization usefulness are consolidated in a solitary, programming based managerial element. Information can be put away and recovered, programming can be run and peripherals can be worked through a Web program as though the inaccessible equipment were nearby. Shafra Fariz 40 | P a g e Outer virtualization can be utilized to consolidate a few LAN's into one VLAN for simpler administration. Inward virtualization single framework with programming holders to imitate an actual organization with programming. For instance Microsoft Virtual Server utilizes virtual machines to make a "network in a case". Its compartments can run Microsoft Windows, Mac or Linux. Centralized Computing versus Distributed Computing These terms depict where the organization preparing happens. In an incorporated registering model, one framework gives both the information stockpiling and preparing power for customer frameworks. This systems administration model is frequently connected with PC centralized computers and stupid terminals, where no preparing or capacity ability exists at the workstation. These organization conditions are uncommon, however they do in any case exist. A disseminated network model has the handling power appropriated between the customer frameworks and the worker. Most present day networks utilize the appropriated network model, where customer workstations share in the preparing duties. The Importance of Different Systems The concentrated versus decentralized versus appropriated frameworks banter is pertinent to the two people and associations. It influences nearly every individual who utilizes the web. It's at the center of the turn of events and advancement of organizations, monetary frameworks, organizations, applications, web administrations, and the sky is the limit from there. Shafra Fariz 41 | P a g e While every one of these frameworks can work successfully, some are steadier and secure than others by plan. Frameworks can be little, interconnecting a couple of gadgets and a small bunch of clients. Or on the other hand they can be huge and length nations and mainland’s. In any case, they face similar difficulties: adaptation to non- critical failure, upkeep expenses, and adaptability. The actual web is the world's biggest organization. So huge truth be told that it unites all these various frameworks into a tremendous computerized biological system. Be that as it may, for most associations and people, utilizing every one of these frameworks isn't attainable. They need to pick. What's more, you may need to pick, as well. Centralized Systems In a brought together framework, all clients are associated with a focal organization proprietor or "worker". The focal proprietor stores information, which different clients can get to, and furthermore client data. This client data may incorporate client profiles, client Shafra Fariz 44 | P a g e A decentralized framework can be similarly as helpless against crashes as a concentrated one. Nonetheless, it is by plan more open minded to flaws. That is on the grounds that when at least one focal proprietors or workers fizzle, the others can keep on giving information admittance to clients. Assets stay dynamic if at any rate one of the focal workers keep on working. Typically, this implies that framework proprietors can fix broken workers and address some other issues while the actual framework keeps on running of course. Worker crashes in a decentralized framework may influence the exhibition and limit admittance to some information. Yet, regarding generally framework uptime, this framework offers a major improvement over a brought together framework. Another bit of leeway of this plan is that the entrance time to the information is frequently quicker. That is on the grounds that proprietors can make hubs in various districts or regions where client action is high. Shafra Fariz 45 | P a g e Nonetheless, decentralized frameworks are as yet inclined to a similar security and protection dangers to clients as unified frameworks. And keeping in mind that their adaptation to internal failure is higher, this includes some major disadvantages. Keeping a decentralized framework is typically more costly. Pros • More averse to fall flat than a concentrated framework • Better execution • Takes into account a more different and more adaptable framework Cons • Security and protection dangers to clients • Higher support costs • Conflicting execution when not appropriately improved Shafra Fariz 46 | P a g e Distributed System A circulated framework is like a decentralized one in that it doesn't have a solitary focal proprietor. Be that as it may, going above and beyond, it wipes out centralization. In a disseminated framework, clients have equivalent admittance to information, however client advantages can be empowered when required. The best illustration of a huge, disseminated framework is simply the web. Shafra Fariz 49 | P a g e Maintenance • Low: Centralized frameworks • Moderate: Decentralized frameworks • High: Distributed frameworks Scalability • Low: Centralized frameworks • Moderate: Decentralized frameworks • High: Distributed frameworks Development • Moderate: Decentralized frameworks, Distributed frameworks • High: Centralized frameworks Evolution • Low: Centralized frameworks Shafra Fariz 50 | P a g e • High: Decentralized frameworks, Distributed frameworks Final Thought about Centralized and Decentralized As should be obvious, there are favorable circumstances and hindrances to each framework. Concentrated frameworks assisted the primary organizations with developing and were the solitary decision before decentralized frameworks started to arise. Less inclined to disappointment and offering quicker access times, decentralized frameworks have given a significant improvement over the old frameworks. They keep on being particularly being used today, particularly since throughout the long term they have gotten more reasonable. Notwithstanding, it's just circulated situation that dispense assets and rights across the entire organization. Thusly, they are amazingly lenient to shortcomings as well as more straightforward than different frameworks. As the appropriation of circulated frameworks brings down their arrangement and support costs, these frameworks will probably demonstrate a propelled decision in the years to come. (berty.tech, 2021) Shafra Fariz 51 | P a g e The Growth of the Networking Introduction The improvement of PC advancements and its applications has been amazingly fast in the Eighties and nineties. PC's networks have a place with the main fields of specialized Improvement. This is a result of two advancement ways: 1. The developing significance of PCs because of the quickly expanding registering limit. 2. The hierarchical and informative preferences of electronic organizations have prompted the Far and wide utilization of private organizations, inside organizations and its auxiliaries as well as in Client provider relations. The fundamental drive came from a public network - the Internet. It is by and large accepted that PC Networks like the Internet will essentially change economy and society (see e.g., Castells, 1996, McLuhan, 1992, Gillespie, 1991). Castells (1996) even contrasts this new turn of events and the Modern Revolution. To comprehend what results PC organizations will have on society and economy it Appears to be important to initially get why and how such organizations create. In this paper we attempt to Make a stride toward this path. We endeavor to discover key monetary elements that may have driven the quick Shafra Fariz 54 | P a g e conventions, a host-to-have layer (the Network Control Protocol or NCP), and a "work arranged convention" layer, where explicit applications, for example, record move, mail, discourse, and far off terminal help were given . Comparative thoughts were being sought after in a few other examination projects around the planet, incorporating the Cyclades network in France, the Public Physical Laboratory Network in England, and the Ethernet Framework at Xerox PARC in the USA. A portion of these undertakings centered all the more intensely on the potential for fast nearby organizations like the mid 3-Mbps Ethernet. Satellite and radio stations for versatile clients were likewise a subject of developing interest. By 1973 it was obvious to the systems administration vanguard that another convention layer should have been embedded into the convention progressive system to oblige the interconnection of different kinds of individual organizations. Cerf and Kahn distributed their fundamental paper depicting such a plan, and advancement of the new Internet Protocol (IP) and Transmission Control Protocol (TCP) to together supplant the NCP started. Comparable work was being sought after by different gatherings meeting in the recently framed IFIP WG 6.1, called the Internetwork Working Group. The reason for the organization interconnection approach creating in this local area was to utilize an assortment of individual network each giving just a straightforward "best exertion" or "datagram" transmission administration. Solid virtual circuit administrations would then be given on a start to finish premise with the TCP (or comparative convention) in the hosts. During a similar time period, public information organizations (PDNs) were arising under the support of CCITT, pointed toward giving more conventional virtual circuit kinds of network administration through the recently characterized X.25 convention. The center and late 1970s saw organizing meetings overwhelmed by warmed discussions over the family member benefits of circuit versus bundle exchanging and datagrams versus X.25 virtual circuits. The PC Shafra Fariz 55 | P a g e sellers kept on contribution their restrictive networks, continuously supporting the new X.25 administration as connections under their own conventions. Advanced Equipment Corporation (DEC) was the remarkable exemption, receiving the exploration local area approach of shared systems administration at an early date, and coming out with its own new set-up of conventions (DECNET). By the last part of the 1970s, another significant impact was arising in the PC network local area. The PC makers understood that multivendor frameworks could at this point don't be evaded, and started to make a move to fulfill the developing client interest for interoperability. Working through their conventional global body, the ISO, another gathering (SC16) was made to create guidelines in the systems administration region. Their underlying contract was to characterize an express "design" for "Open Systems Interconnection" (OSI). By the mid-1980s there were three significant parts in the systems administration game: the ARPANET-style research local area, the transporters with their PDNs in CCITT, and the producers in ISO. The gathering circuit became more bitter, with the examination local area thrashing the sluggish progress, massiveness (7 layers!), absence of test uphold, and Comprehensiveness (five classes of transport convention) of the ISO laborers, while as yet going after the PDNs and X.25. The CCITT and (link.springer.com, 2021) Explain about Growth of Networking Presently a day’s PC network innovation was creating in intriguing manners. A few keys built up that have happened over recent years included. 1. Development on ubiquity of distributed storage and distributed computing. For purchasing actual duplicates of games, music and motion pictures, progressively downloading (or streaming) and purchase advanced licenses their need through Internet. Shafra Fariz 56 | P a g e 2. Improvements on portable organization framework the two arrangements of 4G and 3G organizations (more established) that have permit individuals in their created regions who can permit it to their shrewd cell phones as video broadcasting framework and as versatile TV. A portion of individuals hidden and remaining associated all the occasions, at whatever point them at the work environment, by means of a home organization, through open WiFi areas of interest or advanced cells. 3. Challenges looked by the specialist co-ops (incorporate Google) in extending their private fiber optic links Internet administration because of expanded rivalry and establishment cost from other broadband suppliers. 4. Despite the fact that 4G LTE portable organization was not reached by numerous pieces of world, the business of telecom has been persevering on the improvement of their future "5G" cell correspondence Technology. 5. This 5G exceptional to support up the speed the versatile associations drastically. Precisely how much clients needed this 5G association and to go. 6. At the point when 4G was at first being created, organizations are not paused and they don't feel bashful to ad about the 5G endeavors. 7. It very well may be tried on research facility on by model variants of certain components then it could be standard 5G Shafra Fariz 59 | P a g e In cross section geography every gadget is associated with all other devices on the organization through a committed highlight point interface. At the point when we say committed it implies that the connection just conveys information for the two associated gadgets as it were. Let’s say we have n gadgets in the organization then every gadget should be associated with (n-1) gadgets of the network. Number of connections in a cross section geography of n gadgets would be n (n-1)/2. Advantages of Mesh topology 1. No information traffic issues as there is a devoted connection between two gadgets which implies the connection is just accessible for those two gadgets. Shafra Fariz 60 | P a g e 2. Cross section geography is dependable and hearty as disappointment of one connection doesn't influence different connections and the correspondence between different gadgets on the organization. 3. Cross section geography is secure in light of the fact that there is a highlight point connect consequently unapproved access is preposterous. 3. Flaw discovery is simple. Disadvantage of Mesh Topology • Measure of wires needed to associate every framework is dreary and cerebral pain. • Since every gadget should be associated with different gadgets, number of I/O ports required should be immense. • Adaptability issues in light of the fact that a gadget can't be associated with enormous number of gadgets with a committed highlight point interface. Star Topology In star topology every gadget in the organization is associated with a focal gadget called center. Dissimilar to mesh topology, star topology doesn't permit direct correspondence between gadgets, a gadget should need to convey through center point. In the event that one gadget needs to send information to other gadget, it needs to initially send the Shafra Fariz 61 | P a g e information to center point and afterward the center communicate that information to the assigned gadget. Advantages of Star geography 1. More affordable on the grounds that every gadget just need one I/O port and should be associated with center with one connection. 2. Simpler to introduce 3. Less measure of links required in light of the fact that every gadget should be associated with the center as it were. 4. Strong, on the off chance that one connection fizzles, different connections will turn out great. 5. Simple shortcoming identification in light of the fact that the connection can be effectively distinguished. Shafra Fariz 64 | P a g e In ring topology every gadget is associated with the two gadgets on one or the other side of it. There are two devoted highlight point interfaces a gadget has with the gadgets on its either side. This design frames a ring consequently it is known as ring geography. In the event that a gadget needs to send information to another gadget, it sends the information one way, every gadget in ring geography has a repeater, on the off chance that the got information is proposed for other gadget, repeater advances this information until the planned gadget gets it. Advantage of Ring Topology 1. Simple to introduce. 2. Overseeing is simpler as to add or eliminate a gadget from the geography just two connections are needed to be changed. Shafra Fariz 65 | P a g e Disadvantage of Ring Topology • A connection disappointment can bomb the whole organization as the sign won't go ahead because of disappointment. • Information traffic issues, since all the information is flowing in a ring. Hybrid Topology A combination of at least two topology is known as cross hybrid topology. For instance a mix of star and mesh topology is known as hybrid topology. Shafra Fariz 66 | P a g e Advantage of Hybrid topology 1. We can pick the topology dependent on the necessity for instance, versatility is our anxiety then we can utilize star topology rather than transport innovation. 2. Versatile as we can additionally associate other PC networks with the current networks with various topologies. Disadvantage of Hybrid topology • Shortcoming recognition is troublesome. • Establishment is troublesome. Shafra Fariz 69 | P a g e Shafra Fariz 70 | P a g e Networking 2021 EXAMINE NETWORKING PRICIPLES AND THEIR PROTOCOLS SHAFRA FARIZ [COMPANY NAME] | [Company address] Shafra Fariz 71 | P a g e Table of Contents Assignment Brief ................................................................................................................................... 82 Explain networking devices and operations ............................................................................... 88 Sorts of NICs ................................................................................................................................... 89 There are two sorts of NICs. .......................................................................................................... 89 Media Specific: ................................................................................................................................ 89 Organization Design Specific: ........................................................................................................ 89 Following figure outlines some regular kinds of NICs.................................................................. 89 Hub ................................................................................................................................................... 90 There are two sorts of the Hub. ..................................................................................................... 91 Passive Hub: - ................................................................................................................................. 91 Active Hub: - .................................................................................................................................... 91 MAU and Patch Panel .................................................................................................................... 92 The Bridge ....................................................................................................................................... 93 There are three kinds of Bridge: - .................................................................................................. 94 Nearby Bridge: - .............................................................................................................................. 95 Remote Bridge: ............................................................................................................................... 95 Wireless Bridge:............................................................................................................................ 95 Switch .............................................................................................................................................. 96 Modem ............................................................................................................................................. 97 Gate Way ......................................................................................................................................... 99 Examples of Gate Way: ................................................................................................................ 100 E-mail Gate Way:......................................................................................................................... 100 GSNW Gate Way: ........................................................................................................................ 100 PAD Gate Way: ............................................................................................................................ 101 Router ............................................................................................................................................ 101 Essentially switches are utilized: - ............................................................................................... 102 Proxy .............................................................................................................................................. 103 Transceiver .................................................................................................................................... 103 Data Flow Diagram ......................................................................................................................... 105 Importance of Data Flow Diagram ............................................................................................... 106 term server and its key functions accordingly in your point of view and select server types that are ................................................................................................................................... 106 Shafra Fariz 74 | P a g e Student Declaration I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own without attributing the sources in the correct form. I further understand. What it means to copy another’s work. 1. . I know that plagiarism is a punishable offence because it constitutes theft. 2. I understand the plagiarism and copying policy of Edexcel UK. 3. I know what the consequences will be if I plagiarize or copy another’s work in any of the assignments for this program. 4. I declare therefore that all work presented by me for every aspect of my program, will be my own, and where I have made use of another’s work, I will attribute the source in the correct way . 5. I acknowledge that the attachment of this document signed or not, constitutes a binding agreement between myself and Edexcel UK. 6. I understand that my assignment will not be considered as submitted if this document is not attached to the assignment. (Provide E-mail ID) (Provide Submission Date) shafrafariz25@gmail.com 05th February 2021 Student’s Signature: Shafra Fariz 75 | P a g e Assignment Brief (RQF) Higher National Diploma in Computing Course Tittle Pearson BTECH Level 5 Higher National Diploma in Computing Unit number and Title: Unit2: Networking Assignment Title Understanding Networking concepts according to the current industry Name of the Leaner Ref. No. of the Leaner Pearson Regd. No. 1016959 Assignment Number 01 Batch No & Semester CSD68 Semester 01 Issue Date 02nd February 2021 Submission Date 04th April 2021 Re-submission Date Date Received 1st Submission Unit Assessor: Mr. Shakir Moulana Academic Year 2021 Assessor Summative Feedback Grade: Assessor Signature: Date: Resubmission Feedback – Formative Grade: Assessor Signature: Date: Internal Verifier’s Comments Shafra Fariz 76 | P a g e STUDENT ASSESSMENT SUBMISSION AND DECLARATION Plagiarism Plagiarism is a particular from of cheating. Plagiarism must be avoided at all costs and student who break the rules, however innocently, may be penalized. It is your responsibility to ensure that you understand correct referencing practices. As a university level student, you are expected to use appropriate references throughout and keep carefully detailed notes of all your sources of materials for material you have used in your work, including any material downloaded from the internet. Please consult the relevant unit lecturer or your course tutor if you need any further advice. Student Declaration Student Declaration I certify that the assignment Submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that making a false declaration is a form of malpractice. Student Signature: Date: Signature of the IV Date Student Agreement: I understand the feedback given to me and agree to carry out the actions in future works as required and indicated. Student Signature: Date Student Name: Assessor Name: Issue Date: Submission Date: Submitted on: Programme: Unit: Assignment number and title: Shafra Fariz 79 | P a g e ASSESSMENT TRACKING Assignment Learning Objectives Criterial Targeted Date Issued Hand In Date Formative Feedback Resubmissi on Date* 01 LO1 Basic of Networking and Components P1 P2 M1 D1 02nd February 2021 14th February 2021 02 LO2 Explain networking devices and operations P3 P4 M1 D1 02nd February 2021 28th February 2021 03 LO3 Design efficient networked systems P5 P6 M3 D2 02nd February 2021 12th March 2021 04 LO4 LAN Design & Implementation P7 P8 M4 D3 02nd February 2021 28th March 2021 ASSESSMENT RECORD AND FEEDBACK SHEET Programme: Student Name: Unit No. & Title: Unit2: Networking Assessment Date: 02nd February 2021 Unit Grade: Assessor Name: Mr. Shakir Moulana Completion Date: 04th April 2021 IV Signature: Shafra Fariz 80 | P a g e SUMMATIVE FEEDBACK Assignment No. Grading Criteria Summative Comments Assessor signature 01 P1 P2 M1 D1 02 P3 P4 M2 D1 03 P5 P6 M3 D2 04 P7 P8 M4 D3 Shafra Fariz 81 | P a g e Unit 2: Networking Assignment 2 Shafra Fariz 84 | P a g e Part 1- *Discuss the importance of Networking to the current trend by considering the real world on how the industry moves and how the past network was used going through the relevant concepts in the networking sector, with valid examples in your explanation. (note – you could also include the roles of networking, types of networking and further more) *Finally justify the Importance of introducing Networking to speed tech as described in the scenario. *Further Discuss the benefits and constraints of different Networking systems types (e.g. peer based, client-server) explanation should be in brief with related networking diagrams *With comparison discuss the pros and Cons of Networking systems discussed above (Report) Part 2- Speed tech is planning to get a broadband (ADSL) internet connection from SLT. They are providing ZTE ADSL wireless router (ZXV10-W300) with the internet connection. Wi-Fi is considered as the main networking technology when it comes to implementing Wireless Local Area Networks. *Briefly explain on the Wi-Fi technology and its standard meanwhile analyzing the features and provide strengths and weakness of Wireless ADSL Router, in order give a brief on the transmission media and the components of it ➢ Guided media ➢ Unguided media *You also need to discuss on some of the ISP (Internet Service Providers) in Sri Lanka on their growth and expansion giving out some examples considering the current industry. *Finally come to a valid justification detailing on the most suitable technology considering the Ethernet or WIFI To be used in speed tech. Part 3- As discussed above in the assignment brief and guidance, Imagine, with the position you’re holding in the organization you are working in the networking industry and your supposed to create and present a presentation explaining the basics of networking components to speed tech. * In your Presentation Use appropriate images, diagrams and tables in the presentation and use technical language accurately. *Discuss all the factors needed to form a Networking environment according to your point of view. Information’s should be added to the slide to the point and not more than 15 slides (Presentation) (Report) Part 4- *Explain the term Network Topology and the uses of it in the industrial exposure through a research on the growth of the network history. *Describe the types of Networking Topologies briefly to the point with related diagrams and comparison. (Note: explanations should be in detail with examples) *Considering the topologies select a topology which is the most suitable to the scenario in order to implement the client-server architecture in the lab with relevant diagram and Justification considering the part 1 on Networking Systems. (Report) LO2 - Explain networking devices and operations Part 1- *Discuss how OSI model and network protocols enable effective utilization of different networking systems. (Note: detailed definition for each of the OSI layers defined. Shafra Fariz 85 | P a g e You may discuss how it allows multiple-vendor development through standardization of network components. *In the discussion further discuss the functions of a protocol and explain each protocol defined with examples and short answers to the point. * When it is a network obviously there is a data flow, finally discuss the importance of data flow and the types of data flow in the current networking environment with related diagrams and real-world examples. (Report) Part 2- When it is in the network environment working on with servers which is common now a days. *Describe the term server and its key functions accordingly in your point of view and select server types that are most suitable for the given scenario and separately discuss the role of each and every server type (Report) Part 3 – Describe the components needed to form a network, and along with the report suggest some of the Networking devices and its importance with a detailed explanation with valid examples. LO3 - Design efficient networked systems 1. Prepare a written step-by-step plan of how you are planning to design a Local Area Network (Report) (Diagram) 2. Justify your choice of devices for your network design. 3. Produce a test plan to evaluate this design for the requirements of bandwidth and cost constraints as per user specifications. (Table) (Report) 4. Justify and include the security requirements with a new diagram under the default gateway of 192.168.15.1 for the terminals to the diagram designed above and quality of services needed for selection of accessories. 5. Give out the steps of preparing the Networking cables for real time implementation for the below mentioned, ➢ Straight Through Cabling ➢ Cross over cabling Part 2 Implement test and diagnose networked systems 1. Explain What is IP and the classes of IP and justify the selection of the class of IP address to the above designed diagram in part 1(Report) 2. Explain the term Static IP and Dynamic IP with proper steps of configuration (Add relevant screenshots done during practical session. 3. Show the steps done to complete the process of file sharing (report) (Screenshots) 4. Implement a network you would suggest for a further development according to your point of view with justification with a detailed diagram 5. Conduct verification and explain pinging process (screenshots) 6. Record the test results and analyse these against expected results. (screenshots) 7. Investigate what functionalities would allow the system to support device growth and the addition of communication devices. 8. Discuss the significance of upgrades and security requirements in your recommendations. (Report) Shafra Fariz 86 | P a g e Learning Outcomes and Assessment Criteria Pass Merit Distinction LO1 Examine networking principles and their protocols LO1 & 2 D1 Considering a given scenario, identify the topology protocol selected for the efficient utilization of a networking system. P1 Discuss the benefits and constraints of different network types and standards. P2 Explain the impact of network topology, communication and bandwidth requirements. M1 Compare common networking principles and how protocols enable the effectiveness of networked systems. LO2 Explain networking devices and operations P3 Discuss the operating principles of networking devices and server types. P4 Discuss the inter-dependence of workstation hardware with relevant networking software. M2 Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimization. Shafra Fariz 89 | P a g e Normally all advanced PCs have the incorporated NICs in the motherboards. In the event that extra NICs are required, they are additionally accessible as extra gadgets independently. For work area or worker framework, they are accessible in the connector structure which can be connected to the accessible spaces of the motherboard. For PC or other little size gadgets, they are accessible in the PCMCIA (Personal Computer Memory Card International Association) card structure which can be embedded into the PCMCIA opening. Sorts of NICs There are two sorts of NICs. Media Specific: - LAN card is utilized by the media type. Various sorts of the NICs are utilized to associate the various kinds of media. To associate a particular media type, we should need to utilize a NIC which is especially made for that kind of media. Organization Design Specific: - A particular organization plan needs a particular LAN card. For instance, FDDI, Token Ring and Ethernet have their own unmistakable sort of NIC cards. They can't utilize different sorts of NIC cards. Following figure outlines some regular kinds of NICs. Shafra Fariz 90 | P a g e Hub Center is an incorporated gadget that associates various gadgets in a solitary LAN organization. At the point when Hub gets the information signals from an associated gadget on any of its port, then again, actually port, it advances those signs to any remaining associated gadgets from the leftover ports. As a rule, Hub has at least one uplink ports that are utilized to interface it with another Hub. Shafra Fariz 91 | P a g e There are two sorts of the Hub. Passive Hub: - It advances information signals in a similar arrangement in which it gets them. It doesn't change the information signal in any way. Active Hub: - It additionally works same as the inactive Hub works. Yet, prior to sending the information signals, it intensifies them. Because of this additional component, the dynamic Hub is otherwise called the repeater. Hubs are no longer used in the computer networks. Shafra Fariz 94 | P a g e ➢ Associating distinctive media types. For example, associates UTP with the fiber optic. ➢ Associating distinctive organization designs. For example, associates Ethernet with the Token ring. A Bridge can associate two distinct kinds of media or organization engineering, yet it can't interface two unique sorts of organization layer convention like TCP/IP or IPX. Scaffold requires a similar organization layer convention altogether portions. There are three kinds of Bridge: - Shafra Fariz 95 | P a g e Nearby Bridge: - This Bridge associates two LAN sections straightforwardly. In Ethernet Implementation, it is known as the Transparent Bridge. In Token Ring organization, it is known as the Source-Routed Bridge. Remote Bridge: This Bridge interfaces with another Bridge over the WAN connection. Wireless Bridge: This Bridge associates with another Bridge without utilizing wires. It utilizes radio signs for the network. Shafra Fariz 96 | P a g e In OSI Layers /TCP-IP networking models, the functionalities of the Bridges are defined in the physical layer and data link layer. Just like Hubs, Bridge no longer used in the computer network. Bridges have been replaced by the Switches. Switch Very much like Hub and Bridge, Switch is likewise used to associate the numerous gadgets together in a LAN section. Essentially, a Switch is the updated adaptation of the Bridge. Other than giving every one of the functionalities of Bridge, it likewise offers a few extra highlights. The greatest benefit of Switch is that, it settles on exchanging choices in equipment by utilizing application explicit coordinated circuits (ASICs). Not at all like the conventional processors that we use in our PC, ASICs are the specific processors assembled uniquely to perform not very many specific errands. Generally,
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved