Download Maritime low is the main beast of world and more Study notes Maritime Law in PDF only on Docsity!
HND IN COMPUTING
UNIT 2 – NETWORKING
MOHAMED RUKSHAN SHAMRI ALI
MH503 43
Table of Contents
- An explanation of networking principles, protocols and devices, including benefits and constraints of networked solutions, the impact of network topology, communication and bandwidth
- List of Figures Part A
- List of Tables
- An introduction to provide an overview of your report
- server types and networking software. requirements, effectiveness of networking systems, operating principles of networking devices and
- 2.1 Networking Principles and Protocols
- 2.1.1 What is Network
- 2.1.2 Networking Principles
- 2.2 Network Types
- Peer-to-Peer
- Client/Server
- Centralized
- Cloud
- Cluster
- Virtualized
- 2.3 Important Types of Computer Networks
- Personal Area Network
- Local Area Network
- Metropolitan Area Network
- Wide Area Network...................................................................................................................
- 2.4 Network Protocols
- OSI Model..................................................................................................................................
- TCP/IP
- 2.4.1 Network protocols further
- 2.5 Networking Standards
- 2.6 Networking Devices
- Network Hub
- Network Switch
- Modem
- Network Router
- Bridge
- Repeater....................................................................................................................................
- 2.7 Network Topologies
- Mesh Topology..........................................................................................................................
- Star Topology
- Bus Topology
- Ring Topology............................................................................................................................
- Hybrid topology
- 2.8 Transmission Media
- Magnetic Media
- Twisted Pair Cable
- Coaxial Cable
- Power Lines
- Fibre Optics
- 2.9 Bandwidth
- 2.10 Server Types
- 2.11 Networking Software
- 2.12 Server Operating Systems
- UNIX operating system
- Linux operating system
- Netware operating system........................................................................................................
- Windows operating system
- Task Part B
- including a blueprint of your LAN 1. Prepare a written step-by-step plan of how you are going to design a Local Area Network
- 1.1 Introduction
- 1.2 Choosing a Topology
- 1.3 Installation & Selection of components
- 1.4 Hardware specification and Cost
- Router
- Switch
- Server
- Cables
- 1.5 Total Cost Calculation
- 1.6 IP Addressing Table
- 1.7 Blueprint of the LAN Network.........................................................................................................
- Justify your choice of devices for your network design.
- Routers
- Switches
- Servers.......................................................................................................................................
- Cables
- constraints as per user specifications. 3. Produce a test plan to evaluate this design for the requirements of bandwidth and cost
- Justify the security requirements and quality of services needed for selection of accessories.
- Security
- Quality of Service
- 4.1 Router Configuration
- 4.2 RIP Configuration
- 4.3 Services Configuration and Testing
- File server
- DNS server.................................................................................................................................
- Web server
- Mail server
- DHCP Service
- 5.Suggest a maintenance schedule to support the networked system..............................................
- Task
- Implement a networked system based on your prepared design.
- Installing Windows Server R2
- Changing the Ethernet settings and PC name
- Changing the Time Zone
- Creating Active Directory, DHCP and DNS
- Installation of Active Directory
- Configure DHCP Server
- Conduct verification with e.g. Ping, extended ping, trace route, telnet, SSH, etc......................
- Ping..........................................................................................................................................
- Extended Ping
- Trace route
- Telnet
- SSH (Secure Shell)
- NSLookup
- Record the test results and analyse these against expected results.
- addition of communication devices.................................................................................................... 4. Investigate what functionalities would allow the system to support device growth and the
- Discuss the significance of upgrades and security requirements in your recommendations.
- 5.1 Proposed future upgrades for the company network system.
- References
- Figure 1 Peer to Peer List of Figures
- Figure 2 Client-Server Network...............................................................................................
- Figure 3 Centralized Network
- Figure 4 Cloud Network
- Figure 5 Cluster Network.........................................................................................................
- Figure 6 Virtualized Network
- Figure 7 Bluetooth Network
- Figure 8 Local Area Network
- Figure 9 Metropolitan Area Network
- Figure 10 Wide Area Network
- Figure 11 OSI Model
- Figure 12 TCP/IP Model
- Figure 13 Major L2 networking standards...............................................................................
- Figure 14 Major L2 networking standards...............................................................................
- Figure 15 Network-Hub
- Figure 16 Network-Switch
- Figure 17 Modem
- Figure 18 Router - In-Network-Devices
- Figure 19 Bridge-In-Network-Devices
- Figure 20 Repeater
- Figure 21 Mesh Topology
- Figure 22 Star Topology
- Figure 23 Bus Topology
- Figure 24 Ring Topology
- Figure 25 Hybrid topology.......................................................................................................
- Figure 26 Twisted Pair Cable
- Figure 27 Coaxial Cable
- Figure 28 Fibre Optics
- Figure 29 Bandwidth................................................................................................................
- Figure 30 Internet connection bandwidth requirements
- Figure 31 SDN Framework
- Figure 32 UNIX Operating System
- Figure 33 Linux Operating System
- Figure 34 Netware operating system
- Figure 35 Windows Operating System
- Figure 36 Ubiquiti Networks EdgeRouter Pro Buy
- Figure 37 Ubiquiti Networks EdgeRouter Pro Key Features
- Figure 38 Ubiquiti Networks EdgeRouter Pro Hardware Specifications
- Figure 39 TP-Link 24 Port Gigabit PoE Switch Buy
- Figure 40 TP-Link 24 Port Gigabit PoE Switch Hardware Features
- Figure 41 2019 Dell PowerEdge T30 Mini Tower Server Buy
- Figure 42 2019 Dell PowerEdge T30 Mini Tower Server Key Specifications
- Figure 43 CAT 7 Gold Plated Shielded Ethernet RJ45 Buy
- Figure 44 CAT 7 Gold Plated Shielded Ethernet RJ45 Product Information
- Figure 45 Software Developing Department
- Figure 46 Network Room
- Figure 47 QA Department
- Figure 48 Project Mangers
- Figure 49 Business Analyst Department..................................................................................
- Figure 50 Head of Department
- Figure 51 Marketing and Administration Department.............................................................
- Figure 52 Higher Manager
- Figure 53 Full Blueprint...........................................................................................................
- Figure 54 Ubiquiti Networks Edge Router Pro 8 Key Features
- Figure 55 TP-Link 24 Port Gigabit PoE Switch Key Features
- Figure 56 Router - 01 Configuration
- Figure 57 Router - 02 Configuration
- Figure 58 Router - 01 RIP Configuration
- Figure 59 Router - 01 RIP........................................................................................................
- Figure 60 Router - 01 Rip
- Figure 61 Router- 02 RIP Configuration
- Figure 62 FTP - IP Configuration
- Figure 63 Permission Record
- Figure 64 File Creating
- Figure 65 Command Prompt - Sending the File to the File server
- Figure 66 Command Prompt - Receiving the File from the File server
- Figure 67 DNS server IP Configuration
- Figure 68 DNS service Configuration
- Figure 69 Ping
- Figure 70 IP Configuration
- Figure 71 Creating HTTP
- Figure 72 Editing Screen
- Figure 73 Entering DNS service
- Figure 74 Creating Web Address
- Figure 75 Web Browser Selection
- Figure 76 Pinging IP address
- Figure 77 Typing Web Address
- Figure 78 Email Service Configuration
- Figure 79 Selecting Email
- Figure 80 Email Configuration
- Figure 81 Email Configuration
- Figure 82 Sending Test Email................................................................................................
- Figure 83 Receiving Test Email
- Figure 84 DHCP server IP Configuration
- Figure 85 DHCP Service Configuration
- Figure 86 Router - 01 Configuration
- Figure 87 Router - 02 Configuration
- Figure 88 Enabling DHCP
- Figure 89 Select Language.....................................................................................................
- Figure 90 Choose the operating system
- Figure 91 Select partition
- Figure 92 the login screen after installing..............................................................................
- Figure 93 Dashboard
- Figure 94 Network Sharing Centre
- Figure 95 Ethernet connection
- Figure 96 Select IPv4
- Figure 97 IP Configuration
- Figure 98 Change Settings
- Figure 99 Add Computer Name
- Figure 100 Save the new name
- Figure 101 IP Address and the computer name have changed
- Figure 102 Change Time Zone
- Figure 103 Select Add roles and features
- Figure 104 Before you Begin
- Figure 105 Installation Type
- Figure 106 Server Selection
- Figure 107 Add Active Directory - Server Roles
- Figure 108 Add DHCP - Server Roles
- Figure 109 Features................................................................................................................
- Figure 110 AD DS
- Figure 111 DHCP server
- Figure 112 Confirmation........................................................................................................
- Figure 113 Results
- Figure 114 Add New Forest
- Figure 115 Domain Controller Options
- Figure 116 DNS Options
- Figure 117 Additional Options
- Figure 118 Paths
- Figure 119 Review Options
- Figure 120 Installation
- Figure 121 New Domain
- Figure 122 Select Software’s
- Figure 123 DHCP
- Figure 124 New Scope Wizard
- Figure 125 Scope Name
- Figure 126 IP Address Range
- Figure 127 New Scope Wizard
- Figure 128 Lease Duration.....................................................................................................
- Figure 129 Configure DHCP Options....................................................................................
- Figure 130 Default Gateway
- Figure 131 Domain Name and DNS Servers
- Figure 132 WINS Servers
- Figure 133 New Scope
- Figure 134 Dashboard
- Figure 135 Local Server.........................................................................................................
- Figure 136 Pinging MWS -
- Figure 137 Pinging NAS Device
- Figure 138 CLI Configuration
- Figure 139 Tracert Command
- Figure 140 Telnet Configuration
- Figure 141 CMD Configuration.............................................................................................
- Figure 142 SSH Configuration
- Figure 143 CMD Configuration.............................................................................................
- Figure 144 CMD Config
- Table 1 Total Cost Calculation List of Tables
- Table 2 Device Allocation
- Table 3 IP Addressing Table....................................................................................................
- Table 4 Expected Results and Actual Results..........................................................................
- Table 5 Permission Access
- Table 6 Maintenance Schedule
- Table 7 Test Results
Part A
1. An introduction to provide an overview of your report With the advent of technology all things have become interconnected. People use this interconnectivity to make their life easier. In the home environment or business environment staying connected is important.to fulfil this connectivity networking is use. In the business environment networking takes and important role. With networking thing tend to become more efficient and easier. In this report I have designed and implemented an network system that is suited to the given scenario according to the client specification.at first I identified the client requirements and to full fill those requirements I added devices such as routers, switches and servers.to purchase these network devices a cost analysis was done. In the selection of network devices, a cost analysis was done, to further get a better option about these devices a network security analysis and the QoS was considered. To make the network place more efficient servers such as DHCP server, File server, DNS server, Web-Email server was added. A Blueprint was designed before the implementation of the network system. Designed blueprints simulation was done using Cisco Packet Tracer with success. The implementation of the network system was done using the Windows Server 2012 R2 network Operating System. Through this journey, I was able to learn about the basics of network designing and implementation and with hard success I was able to successfully design and implement a network system. This experience was able to impart knowledge about the process of the business infrastructure regarding the network system and how the entire business is interconnected using the network system.
2.1. 2 Networking Principles According to Gov.Uk (2015), an article that is published by the Cabinet Office outlining network principles, explains how the underlining networking infrastructures should be transparent and resilient as well as ever-present for all its users. This publication defines several basic networking requirements that should be taken into consideration when designing a network, these include the following: ✓ Bandwidth ✓ Availability ✓ Resilience ✓ Cost 2.2 Network Types
1. Peer-to-Peer Peer-to-peer, or P2P in its abbreviated form, refers to computer networks using a distributed architecture. In P2P networks, all the computers and devices that are part of them are referred to as peers, and they share and exchange workloads. Each peer in a peer-to-peer network is equal to the other peers. There are no privileged peers, and there is no primary administrator device in the centre of the network. Figure 1 Peer to Peer
Advantages ✓ Easy and simple to set up only requiring a hub or a switch to connect all computers together. ✓ You can access any file on the computer if it is set to a shared folder. ✓ If one computer fails to work all the other computers connected to it continue to work. Disadvantages ✓ Security is not good other than setting passwords for files that you don't want people to access. ✓ If the connections are not connected to the computers properly then there can be problems accessing certain files. ✓ It does not run efficient if you have many computers, it is best to used two to eight computers.
2. Client/Server A client-server network is designed for end-users, called clients , to access resources such as files, songs, video collections, or some other service from a central computer called a server. A server's sole purpose is to do what its name implies - serve its clients! You may have been using this configuration and not even have known it. Have you ever played Xbox Live or used the PlayStation Network? Your Xbox One is the client, and when it logs into the network, it contacts the Xbox Live servers to retrieve gaming resources like updates, video, and game demos. Figure 2 Client-Server Network
Advantages ✓ Easy to physically secure. It is easy to secure and service the server and client nodes by virtue of their location ✓ Smooth and elegant personal experience – A client has a dedicated system which he uses (for example, a personal computer) and the company has a similar system which can be modified to suit custom needs ✓ Dedicated resources (memory, CPU cores, etc) Disadvantages ✓ Highly dependent on the network connectivity – System can fail if the nodes lose connectivity as there is only one central node. ✓ No graceful degradation of system – abrupt failure of the entire system ✓ Less possibility of data backup. If the server node fails and there is no backup, you lose the data straight away
4. Cloud Cloud networking refers to hosting or using some or all network resources and services— virtual routers, bandwidth, virtual firewalls, or network management software—from the cloud, whether public, private, or hybrid. The network can be either cloud-enabled or entirely cloud-based. Figure 4 Cloud Network
Advantages ✓ Storage and Scalability ✓ Backup and Recovery ✓ Flexibility ✓ Cost Efficiency ✓ IT Innovations Disadvantages ✓ Less Control and Reliability ✓ Less Security and Compliance ✓ Less Compatibility ✓ Less Cost Unpredictable ✓ Less Contracts and Lock in
5. Cluster Clustering refers to the interconnection of servers in a way that makes them appear to the operating environment as a single system. As such, the cluster draws on the power of all the servers to handle the demanding processing requirements of a broad range of technical applications. It also takes advantage of parallel processing in program execution. Shared resources in a cluster may include physical hardware devices such as disk drives and network cards, TCP/IP addresses, entire applications, and databases Figure 5 Cluster Network
Advantages ✓ Uses Hardware Efficiently ✓ Available Always ✓ Recovery is Easy ✓ Quick and Easy Setup ✓ Cloud Migration is Easier Disadvantages ✓ High Initial Investment ✓ Data Can be at Risk ✓ Quick Scalability is a Challenge ✓ Performance Witnesses a Dip
2.3 Important Types of Computer Networks There are various types of computer networks available. We can categorize them according to their size as well as their purpose. The size of a network should be expressed by the geographic area and number of computers, which are a part of their networks. It includes devices housed in a single room to millions of devices spread across the world. Some of the most popular network types are: ✓ PAN ✓ LAN ✓ MAN ✓ WAN
1. Personal Area Network PAN refers to a personal network that is within close proximity to a user typically within 10 meters. A PAN interconnects devices that include laptops, mobile phones, printers, personal computer systems PC’s and or wareable devices such as smart watches etc PAN Benefits ✓ Bluetooth uses relatively low power comsumptions. ✓ Does not cuase interference with other wireless devices. ✓ Can be upgraded easily. ✓ Has better range compared to infrared communication. PAN Constraints ✓ Bluetooth can loose connectivity under certain conditions. ✓ Uses low bandwidth compared to other wireless specifications (WiFi). ✓ Only allows short range communications between other devices. ✓ Can be exploited easily compared to other wireless standards (WiFi).