Networking: Examine Networking Priciples and Their Protocols
Networking: Examine Networking Priciples and Their Protocols
Networking
Acknowledgement
I would like to take this opportunity to thank my lecturer Mr. Shakir Moulana for guiding us
and showing us the correct path throughout this assignment to make it a success. At the
same time, I would like to thank all the lecturers for fullest support and cooperation.
Thank You
1|P ag e
Shafra Fariz
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and
to present it as my own without attributing the sources in the correct form. I further
understand.
What it means to copy another’s work.
3. I know what the consequences will be if I plagiarize or copy another’s work in any
of the assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program,
will be my own, and where I have made use of another’s work, I will attribute the
source in the correct way
.
5. I acknowledge that the attachment of this document signed or not, constitutes
a binding agreement between myself and Edexcel UK.
Student’s Signature:
2|P ag e
Shafra Fariz
3|P ag e
Shafra Fariz
Programme:
Unit:
Plagiarism
Plagiarism is a particular from of cheating. Plagiarism must be avoided at all costs and student who
break the rules, however innocently, may be penalized. It is your responsibility to ensure that you
understand correct referencing practices. As a university level student, you are expected to use
appropriate references throughout and keep carefully detailed notes of all your sources of materials for
material you have used in your work, including any material downloaded from the internet. Please
consult the relevant unit lecturer or your course tutor if you need any further advice.
Student Declaration
Student Declaration
I certify that the assignment Submission is entirely my own work and I fully understand the
consequences of plagiarism. I understand that making a false declaration is a form of
malpractice.
4|P ag e
Shafra Fariz
SUBMISSION FORMAT
5|P ag e
Shafra Fariz
6|P ag e
Shafra Fariz
ASSESSMENT TRACKING
ASSESSMENT RECORD AND FEEDBACK SHEET
Programme: Student Name:
Unit No. & Title: Unit2: Assessment Date: 02nd February Unit Grade:
Networking 2021
Assessor Name: Mr. Shakir Completion Date: 04th April IV Signature:
Moulana 2021
Assignment Learning Objectives Criterial Date Issued Hand In Date Formative Resubmissi
Targeted Feedback on Date*
7|P ag e
Shafra Fariz
SUMMATIVE FEEDBACK
Unit 2: Networking
Assignment 1
9|P ag e
Shafra Fariz
Assignment Brief
Student Name/ID Number 1016959
Unit Number and Title 2: Networking
Academic Year 2021
Unit Author Mr. Shakir Moulana
Assignment Title Understanding Network Concepts according to the
current industry
Issue Date 02nd February 2021
Submission Date 04th April 2021
IV Name & Date Mr. Sai Thishok – 01st February 2021
Submission Format
The submission is in the form of an individual written report. This should be written in a concise, formal business
Style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as
Appropriate, and all work must be supported with research and referenced using the Harvard referencing system.
Please also provide a bibliography using the Harvard referencing system.
10 | P a g e
Shafra Fariz
Unit Learning Outcomes
LO1 Examine networking principles and their protocols.
LO2 Explain networking devices and operations.
Assignment Brief and Guidance
Most Universities admired in private Higher Education Institute in Colombo, Sri Lanka. Administration and the
academic staff are very much concerned about providing required facilities for the students in the field of
Network. Networking computers is not the complicated process it used to be. What used to be along drawn out
process is now made easier and more efficient, causing less distraction and disruption in organizations.
Imagine that you are a network specialist working for your company Speed tech in a start-up level position. So
Before starting the process study the basics of Networking. Talk to the organization thinking about moving to the
Best of Networking industry taking the new technological improvement into consideration.
You will need to produce an outcome on the networking development process to the organization that includes
the
following:
1. The growth of the Network
2. Detailing of the new networking technologies introduced
3. The outcome that will be gained through Network considering the networking principles, protocols and
devices, including benefits and constraints of networked solutions, the impact of network topology,
communication and bandwidth requirements, effectiveness of networking systems, operating principles of
Networking devices and server types and networking software.
During the process in terms of working in the organization you are supposed to go through in depth process on
Designing and implementing a local area network. You are supposed to follow the below steps below according
to the requirement by the organization
And you are ask to analyse the specification from the institution above for completion of this project within a
given timeframe.
The LAN design that you are about to design should be well planned thinking out of the box which will make an
Effective result on the designed LAN network. After the designing process is completed.
The concept to go through with LAN design is to design a network diagram to implement to a start-up
Organization with relevant requirements and configurations. The network system should be under the
default
Gateway of 192.168.10.1 allocating 10 terminals including a server with proper configurations.
Submission Format
11 | P a g e
Shafra
Part 1-Fariz
*Discuss the importance of Networking to the current trend by considering the real world on how the
industry moves and how the past network was used going through the relevant concepts in the networking sector,
with valid examples in your explanation. (note – you could also include the roles of networking, types of networking
and further more)
*Finally justify the Importance of introducing Networking to speed tech as described in the scenario.
*Further Discuss the benefits and constraints of different Networking systems types (eg. peer based, client-server)
explanation should be in brief with related networking diagrams
*With comparison discuss the pros and Cons of Networking systems discussed above (Report)
Part 2- Speed tech is planning to get a broadband (ADSL) internet connection from SLT. They are providing ZTE
ADSL wireless router (ZXV10-W300) with the internet connection. Wi-Fi is considered as the main networking
technology when it comes to implementing Wireless Local Area Networks.
*Briefly explain on the Wi-Fi technology and its standard meanwhile analyzing the features and provide strengths
and weakness of Wireless ADSL Router, in order give a brief on the transmission media and the components of it
➢ Guided media
➢ Unguided media
*You also need to discuss on some of the ISP (Internet Service Providers) in Sri Lanka on their growth and
expansion giving out some examples considering the current industry.
*Finally come to a valid justification detailing on the most suitable technology considering the Ethernet or WIFI
To be used in speed tech.
Part 3- As discussed above in the assignment brief and guidance, Imagine, with the position your holding in the
organization you are working in the networking industry and your supposed to create and present a presentation
explaining the basics of networking components to speed tech. *
In your Presentation Use appropriate images, diagrams and tables in the presentation and use technical language
accurately.
*Discuss all the factors needed to form a Networking environment according to your point of view. Information’s
should be added to the slide to the point and not more than 15 slides (Presentation) (Report)
Part 4- *Explain the term Network Topology and the uses of it in the industrial exposure through a research on the
growth of the network history.
*Describe the types of Networking Topologies briefly to the point with related diagrams and comparison. (Note:
explanations should be in detail with examples)
*Considering the topologies select a topology which is the most suitable to the scenario in order to implement the
client-server architecture in the lab with relevant diagram and Justification considering the part 1 on Networking
Systems. (Report)
Part 1- *Discuss how OSI model and network protocols enable effective utilization of different networking systems.
(Note: detailed definition for each of the OSI layers defined.
12 | P a g e
Shafra Fariz
You may discuss how it allows multiple-vendor development through standardization of network components.
*In the discussion further discuss the functions of a protocol and explain each protocols defined with examples
and short answers to the point.
* When it is a network obviously there is a data flow, finally discuss the importance of data flow and the types
of data flow in the current networking environment with related diagrams and real world examples. (Report)
Part 2- When it is in the network environment working on with servers which is common now a days.
*Describe the term server and its key functions accordingly in your point of view and select server types that are
most suitable for the given scenario and separately discuss the role of each and every server type (Report)
Part 3 – Describe the components needed to form a network, and along with the report suggest some of the
Networking devices and its importance with a detailed explanation with valid examples.
1. Prepare a written step-by-step plan of how you are planning to design a Local Area Network (Report)
(Diagram)
2. Justify your choice of devices for your network design.
3. Produce a test plan to evaluate this design for the requirements of bandwidth and cost constraints as per
user specifications. (Table) (Report)
4. Justify and include the security requirements with a new diagram under the default gateway of
192.168.15.1 for the terminals to the diagram designed above and quality of services needed for selection of
accessories.
5. Give out the steps of preparing the Networking cables for real time implementation for the below
mentioned,
1. Explain What is IP and the classes of IP and justify the selection of the class of IP address to the above
designed diagram in part 1(Report)
2. Explain the term Static IP and Dynamic IP with proper steps of configuration (Add relevant screenshots
done during practical session.
3. Show the steps done to complete the process of file sharing (report) (Screenshots)
4. Implement a network you would suggest for a further development according to your point of view with
justification with a detailed diagram
5. Conduct verification and explain pinging process (screenshots)
6. Record the test results and analyse these against expected results. (screenshots)
7. Investigate what functionalities would allow the system to support device growth and the addition of
communication devices.
8. Discuss the significance of upgrades and security requirements in your recommendations. (Report)
13 | P a g e
Shafra Fariz
14 | P a g e
Shafra Fariz
P5 Design a networked to meet a given M3 Install and configure network D2 Design a maintenance
network services services and applications on your schedule to support the
choice. networked system.
P6 Test and evaluate the design to meet
the requirements and analyse user
feedback with the aim of improving
efficiency.
LO4 Implement and diagnose networked systems
15 | P a g e
Shafra Fariz
Table of Contents
Computing .............................................................................................................................................. 8
Assignment Brief ................................................................................................................................... 10
Importance of Networking .............................................................................................................. 19
File Sharing ..................................................................................................................................... 19
Printers............................................................................................................................................. 20
Sharing Media ................................................................................................................................. 20
Media Center Server ...................................................................................................................... 20
Video Games................................................................................................................................... 20
The Current Trend Networking ...................................................................................................... 20
Internet Service Provider ................................................................................................................ 20
Wi – Fi .............................................................................................................................................. 21
Switches and Firewall ..................................................................................................................... 22
Past Network Success and Unsuccessful Development .......................................................... 22
Huge interests in Security: Message Aware Networking............................................................. 23
Convergence ................................................................................................................................... 25
Ethernet: 1G Vs 10G Design ......................................................................................................... 26
Network Failure and Success ........................................................................................................ 27
Requirement for Success ............................................................................................................... 28
Wireless Industry Trend ................................................................................................................. 29
Introduction of Networking ............................................................................................................. 30
Examine Networking Principles and Their Protocols ................................................................ 31
What is a Purpose of The Network? ............................................................................................. 32
Purpose of Networks file and Data Sharing.................................................................................. 32
What is Network Resources? ......................................................................................................... 33
Basic Network Resources .............................................................................................................. 33
Network Types .................................................................................................................................. 33
LAN – Local Area Network ............................................................................................................. 33
WAN – Wide Area Network ............................................................................................................ 34
WLAN – Wireless Local Area Network ......................................................................................... 34
Network Models ................................................................................................................................ 35
Peer-to-Peer Network ..................................................................................................................... 36
16 | P a g e
Shafra Fariz
17 | P a g e
Shafra Fariz
18 | P a g e
Shafra Fariz
Importance of Networking
A network is at least two PCs associated together to divide data and documents among
them. Networks aren't the solitary ones that can profit by making a network. Home
clients can appreciate sharing music, motion pictures and printers from any PC.
File Sharing
PCs associated with a network can impart records and archives to one another. PCs
associated with a business network can pick which file and envelopes are accessible to
share on the network.
19 | P a g e
Shafra Fariz
Printers
PCs can print pages to another PC with a printer on the network. Also, printers can be
associated utilizing a print worker, which permits direct printing from all PCs.
Sharing Media
Sharing media between PCs is simple when associated with a network. Like document
sharing, PCs can transfer pondering, recordings and films starting with one PC then
onto the next.
A media focus worker can store your whole diversion library on a unified center to give
speedy admittance to your media from each PC on your network.
Video Games
20 | P a g e
Shafra Fariz
Wi – Fi
Wi-Fi is the ISO (International Organization for Standardization) name for remote
innovation that permits an electronic gadget to trade information or associate with the
Internet utilizing radio waves. You ought to guarantee your PC equipment is viable with
both the current and arising remote frequencies. It's ideal to check with your IT supplier
21 | P a g e
Shafra Fariz
prior to buying, and they can likewise play out a site evaluation of your business area to
decide the best remote arrangement and the equipment to supplement it.
Not exclusively are we utilizing the Internet for an ever-increasing number of things,
however the information records we're moving across networks are getting greater and
greater. Since switches are utilized to interface gadgets together on a PC network, and
the information passed between gadgets is developing, fresher switches can deal with
higher volumes of information. Consider putting resources into business-grade switches
that can deal with the everyday activities of your business. Switches that can just deal
with low volumes of information will back everything off, including your print
occupations. It's additionally a smart thought to have a reinforcement switch for each
port. Likewise, in light of the fact that ports are entryways into your organization, you
need to have a decent firewall – something to keep undesirable traffic out. Cisco offers
amazing business-grade arrangements that can perform programmed and proactive
updates and infection examines, while home and independent company arrangements
normally require manual updates. (sysgen.ca, 2021)
22 | P a g e
Shafra Fariz
23 | P a g e
Shafra Fariz
Network Storage. Work area search. Large interests in Security: Message Aware
Networking
24 | P a g e
Shafra Fariz
Convergence
25 | P a g e
Shafra Fariz
• L3 Protocols: IP
1G Ethernet
• No Full-duplex as it were
• Shared Mode
• Changes to CSMA/CD
10G Ethernet
26 | P a g e
Shafra Fariz
• Full-duplex as it were
• No Shared Mode
• No CSMA/CD convention
• Ethernet End-to-End
27 | P a g e
Shafra Fariz
• Elite
• Executioner Applications
• Convenient fruition
• Reasonability
28 | P a g e
Shafra Fariz
• Interoperability
29 | P a g e
Shafra Fariz
Introduction of Networking
PC's networks are the main impetus behind the advancement of PC frameworks and
permit clients to get to information, equipment, and administrations paying little heed to
their area. Being proficient about the basic standards of systems administration is of
crucial significance to all IT experts. Systems administration is a climate that is
progressively unpredictable and under constant turn of events. Complex PC organizing
has associated the world by the gatherings of little organizations through web connects
to help worldwide correspondences. It underpins admittance to advance data
whenever, anyplace utilizing numerous applications like, sound, and video transmission,
including the World Wide Web, and this has opened the conduits to the accessibility of
data.
30 | P a g e
Shafra Fariz
For example: IEEE 802.x. Geography: Logical for example Ethernet, Token Ring;
physical for example Star, Ring, Bus, Mesh, Tree, Ring. Conventions: Purpose of
conventions; steered conventions
for example: IPv4, IPv6, IPv6 tending to, Global unicast, Multicast, Link nearby, Unique
neighborhood, EUI 64, Auto Configuration, FTP, HTTP, SMTP, POP3, SSL; the board
of protocols for addressing.
31 | P a g e
Shafra Fariz
32 | P a g e
Shafra Fariz
Network Types
33 | P a g e
Shafra Fariz
On account of its confined nature, the LAN regularly is fast and less expensive to set up
than a WAN.
A Network that traverses more than one geographic area, regularly interfacing isolated
LANs.
WANs are slower than LANs and regularly require extra and expensive equipment like
switches, devoted rented lines, and muddled execution systems.
MAN – Metropolitan Area Network
34 | P a g e
Shafra Fariz
WLAN's utilization Wireless passages (APs) which have a transmitter and recipient
(handset) gadget used to make a remote LAN (WLAN).
APs ordinarily are a different organization gadget with an underlying receiving wire,
transmitter, and connector.
APs utilize the remote foundation network mode to give an association point among
WLANs and a wired Ethernet LAN.
Network Models
You can look over two fundamental wired organization models: distributed and
customer/worker.
The model utilized for an organization is dictated by a few components, including how
the organization will be utilized, the number of clients will be on the organization, and
budgetary contemplations.
35 | P a g e
Shafra Fariz
Peer-to-Peer Network
The absence of centralized data stockpiling makes it hard to find and back up key files.
Despite the fact that there is no hypothetical breaking point to the size of a shared peer-
to-peer network, execution, security, and access become a significant cerebral pain on
peer-based network as the quantity of PCs increments. What's more, Microsoft forces a
constraint of just 5, 10 or 20 simultaneous customer associations with PCs running
Windows.
Truly, the most broadly executed model and the one you are well on the way to
experience when working in genuine conditions.
The benefits of the client/server framework are that it is a concentrated model and it
empowers unified organization the board of all network administrations, including client
the executives, security, and reinforcement strategies.
36 | P a g e
Shafra Fariz
Regularly requires in fact talented staff to execute and deal with the network. This, and
the expense of devoted worker equipment and programming, expands the expense of
the client/server model.
Attributes
Peer-to-peer Network Model
Client/Server Network Model
Size
Suggested a maximum of 10 PCs
The size of the network is restricted exclusively by worker size, network equipment, and
financial plan. It can have a large number of associated frameworks
Network
Every individual is liable for the network of their own framework. An overseer isn't
required.
A gifted organization director is regularly needed to keep up and deal with the network.
Security
Every individual is liable for keeping up security for local files and devices connected to
the system. Security is overseen from a focal area however regularly requires a talented
executive to accurately design. Cost Simple to arrange and set up. Regularly requires
complex arrangement techniques and gifted staff to set up.
37 | P a g e
Shafra Fariz
38 | P a g e
Shafra Fariz
Types of Server:
39 | P a g e
Shafra Fariz
Outer virtualization can be utilized to consolidate a few LAN's into one VLAN for simpler
administration.
Inward virtualization single framework with programming holders to imitate an actual
organization with programming.
For instance Microsoft Virtual Server utilizes virtual machines to make a "network in a
case". Its compartments can run Microsoft Windows, Mac or Linux.
These organization conditions are uncommon, however they do in any case exist.
A disseminated network model has the handling power appropriated between the
customer frameworks and the worker. Most present day networks utilize the
appropriated network model, where customer workstations share in the preparing
duties.
40 | P a g e
Shafra Fariz
While every one of these frameworks can work successfully, some are steadier and
secure than others by plan. Frameworks can be little, interconnecting a couple of
gadgets and a small bunch of clients. Or on the other hand they can be huge and length
nations and mainland’s. In any case, they face similar difficulties: adaptation to non-
critical failure, upkeep expenses, and adaptability.
The actual web is the world's biggest organization. So huge truth be told that it unites all
these various frameworks into a tremendous computerized biological system. Be that as
it may, for most associations and people, utilizing every one of these frameworks isn't
attainable. They need to pick. What's more, you may need to pick, as well.
Centralized Systems
In a brought together framework, all clients are associated with a focal organization
proprietor or "worker". The focal proprietor stores information, which different clients can
get to, and furthermore client data. This client data may incorporate client profiles, client
41 | P a g e
Shafra Fariz
created substance, and that's just the beginning. A brought together framework is not
difficult to set up and can be grown rapidly.
Be that as it may, this framework has a significant restriction. On the off chance that the
worker crashes, the framework no longer works appropriately and clients can't get to the
information. Since an incorporated framework needs a focal proprietor to interface the
wide range of various clients and gadgets, the accessibility of the organization relies
upon this proprietor. Add to that the conspicuous security worries that emerge when one
proprietor stores (and can get to) client information, and it's straightforward why
incorporated frameworks are not, at this point the best option for some associations.
Pros
• Straightforward network
42 | P a g e
Shafra Fariz
• Moderate to keep up
Cons
• Inclined to disappointments
• Longer access times to information for clients who are a long way from the
worker
Decentralized Systems
As its name suggests, decentralized frameworks don't have one focal proprietor. All
things being equal, they utilize different focal proprietors, every one of which generally
stores a duplicate of the assets clients can get to.
43 | P a g e
Shafra Fariz
Assets stay dynamic if at any rate one of the focal workers keep on working. Typically,
this implies that framework proprietors can fix broken workers and address some other
issues while the actual framework keeps on running of course.
Worker crashes in a decentralized framework may influence the exhibition and limit
admittance to some information. Yet, regarding generally framework uptime, this
framework offers a major improvement over a brought together framework.
Another bit of leeway of this plan is that the entrance time to the information is
frequently quicker. That is on the grounds that proprietors can make hubs in various
districts or regions where client action is high.
44 | P a g e
Shafra Fariz
Pros
• More averse to fall flat than a concentrated framework
• Better execution
Cons
45 | P a g e
Shafra Fariz
Distributed System
A circulated framework is like a decentralized one in that it doesn't have a solitary focal
proprietor. Be that as it may, going above and beyond, it wipes out centralization. In a
disseminated framework, clients have equivalent admittance to information, however
client advantages can be empowered when required. The best illustration of a huge,
disseminated framework is simply the web.
46 | P a g e
Shafra Fariz
It's nothing unexpected then that advances utilizing the dispersed framework – most
remarkably the block chain – are changing numerous enterprises.
Pros
• Fault-tolerant
• Transparent and secure
• Promotes resource sharing
• Extremely scalable
Cons
47 | P a g e
Shafra Fariz
Since you have a superior comprehension of each framework, how about we perceive
how these frameworks contrast and each other. The accompanying straight on
examination centers around key focuses like adaptation to internal failure, support,
adaptability, advancement, and development. For every one of these, we are utilizing
basic appraisals like low, moderate, and high.
Fault Tolerant
48 | P a g e
Shafra Fariz
Maintenance
Scalability
Development
Evolution
49 | P a g e
Shafra Fariz
Notwithstanding, it's just circulated situation that dispense assets and rights across the
entire organization. Thusly, they are amazingly lenient to shortcomings as well as more
straightforward than different frameworks. As the appropriation of circulated frameworks
brings down their arrangement and support costs, these frameworks will probably
demonstrate a propelled decision in the years to come. (berty.tech, 2021)
50 | P a g e
Shafra Fariz
Introduction
The improvement of PC advancements and its applications has been amazingly fast in
the
Eighties and nineties. PC's networks have a place with the main fields of specialized
Improvement. This is a result of two advancement ways:
1. The developing significance of PCs because of the quickly expanding registering
limit.
2. The hierarchical and informative preferences of electronic organizations have
prompted the
Far and wide utilization of private organizations, inside organizations and its auxiliaries
as well as in
Client provider relations.
The fundamental drive came from a public network - the Internet. It is by and large
accepted that PC
Networks like the Internet will essentially change economy and society (see e.g.,
Castells, 1996, McLuhan, 1992, Gillespie, 1991). Castells (1996) even contrasts this
new turn of events and the Modern Revolution.
To comprehend what results PC organizations will have on society and economy it
Appears to be important to initially get why and how such organizations create. In this
paper we attempt to
Make a stride toward this path. We endeavor to discover key monetary elements that
may have driven the quick
51 | P a g e
Shafra Fariz
52 | P a g e
Shafra Fariz
History of Networking
PC organizing as far as we might be concerned today might be said to have gotten its
start with the ARPANET improvement in the last part of the 1960s and mid 1970s.
Earlier to that time there were PC merchant" organizations" planned fundamentally to
interface terminals and distant occupation passage stations to a centralized computer.
In any case, the idea of systems administration between PCs seeing each other as
equivalent friends to accomplish "asset sharing" was crucial to the ARPANET plan The
other solid accentuation of the ARPANET work was its dependence on the at that point
novel method of parcel changing to proficiently share correspondence assets among"
bursty" clients, rather than the more conventional message or circuit exchanging. Albeit
the expression "network engineering" was not at this point generally utilized, the starting
ARPANET configuration had a distinct construction and presented another key idea:
convention layering, or the possibility that the all-out correspondences capacities could
be separated into a few layers, each expanding upon the administrations of the one
underneath. The first plan had three significant layers, a network layer, which
incorporated the organization access and change to-switch (Demon to-IMP)
53 | P a g e
Shafra Fariz
conventions, a host-to-have layer (the Network Control Protocol or NCP), and a "work
arranged convention" layer, where explicit applications, for example, record move, mail,
discourse, and far off terminal help were given .
Comparative thoughts were being sought after in a few other examination projects
around the planet, incorporating the Cyclades network in France, the
Public Physical Laboratory Network in England, and the Ethernet Framework at Xerox
PARC in the USA. A portion of these undertakings centered all the more intensely on
the potential for fast nearby organizations like the mid 3-Mbps Ethernet. Satellite and
radio stations for versatile clients were likewise a subject of developing interest. By
1973 it was obvious to the systems administration vanguard that another convention
layer should have been embedded into the convention progressive system to oblige the
interconnection of different kinds of individual organizations. Cerf and Kahn distributed
their fundamental paper depicting such a plan, and advancement of the new Internet
Protocol (IP) and Transmission Control Protocol
(TCP) to together supplant the NCP started. Comparable work was being sought after
by different gatherings meeting in the recently framed IFIP WG 6.1, called the
Internetwork Working Group. The reason for the organization interconnection approach
creating in this local area was to utilize an assortment of individual network each giving
just a straightforward "best exertion" or "datagram" transmission administration. Solid
virtual circuit administrations would then be given on a start to finish premise with the
TCP (or comparative convention) in the hosts. During a similar time period, public
information organizations (PDNs) were arising under the support of CCITT, pointed
toward giving more conventional virtual circuit kinds of network administration through
the recently characterized X.25 convention. The center and late 1970s saw organizing
meetings overwhelmed by warmed discussions over the family member benefits of
circuit versus bundle exchanging and datagrams versus X.25 virtual circuits. The PC
54 | P a g e
Shafra Fariz
sellers kept on contribution their restrictive networks, continuously supporting the new
X.25 administration as connections under their own conventions. Advanced Equipment
Corporation (DEC) was the remarkable exemption, receiving the exploration local area
approach of shared systems administration at an early date, and coming out with its
own new set-up of conventions (DECNET).
By the last part of the 1970s, another significant impact was arising in the PC network
local area. The PC makers understood that multivendor frameworks could at this point
don't be evaded, and started to make a move to fulfill the developing client interest for
interoperability. Working through their conventional global body, the ISO, another
gathering (SC16) was made to create guidelines in the systems administration region.
Their underlying contract was to characterize an express "design" for "Open Systems
Interconnection" (OSI). By the mid-1980s there were three significant parts in the
systems administration game: the ARPANET-style research local area, the transporters
with their PDNs in CCITT, and the producers in ISO. The gathering circuit became more
bitter, with the examination local area thrashing the sluggish progress, massiveness (7
layers!), absence of test uphold, and Comprehensiveness (five classes of transport
convention) of the ISO laborers, while as yet going after the PDNs and X.25. The CCITT
and (link.springer.com, 2021)
Presently a day’s PC network innovation was creating in intriguing manners. A few keys
built up that have happened over recent years included.
55 | P a g e
Shafra Fariz
4. Despite the fact that 4G LTE portable organization was not reached by numerous
pieces of world, the business of telecom has been persevering on the improvement of
their future "5G" cell correspondence Technology.
6. At the point when 4G was at first being created, organizations are not paused and
they don't feel bashful to ad about the 5G endeavors. 7. It very well may be tried on
research facility on by model variants of certain components then it could be standard
5G
56 | P a g e
Shafra Fariz
1. Man-made reasoning will assist with keeping up, oversee, and ensure it. Presently
the organizations were observed by calculation that empowers for strange form ups of
traffic and action which might be the aftereffect of frightful exercises, for example,
(DDos) Distributed Denial-of-Service assaults and endeavored hacks.
2. This Artificial Network fueling calculations will turn out to be generally smart; it may
discover quicker and dependable strategies for foreseeing dangers and cleaning
organizations.
Types of Topologies
57 | P a g e
Shafra Fariz
1. Mesh Topology
2. Star Topology
3. Bus Topology
4. Ring Topology
5. Hybrid Topology
Mesh Topology
58 | P a g e
Shafra Fariz
In cross section geography every gadget is associated with all other devices on the
organization through a committed highlight point interface. At the point when we say
committed it implies that the connection just conveys information for the two associated
gadgets as it were. Let’s say we have n gadgets in the organization then every gadget
should be associated with (n-1) gadgets of the network. Number of connections in a
cross section geography of n gadgets would be n (n-1)/2.
59 | P a g e
Shafra Fariz
3. Cross section geography is secure in light of the fact that there is a highlight point
connect consequently unapproved access is preposterous.
Star Topology
In star topology every gadget in the organization is associated with a focal gadget called
center. Dissimilar to mesh topology, star topology doesn't permit direct correspondence
between gadgets, a gadget should need to convey through center point. In the event
that one gadget needs to send information to other gadget, it needs to initially send the
60 | P a g e
Shafra Fariz
information to center point and afterward the center communicate that information to the
assigned gadget.
1. More affordable on the grounds that every gadget just need one I/O port and should
be associated with center with one connection.
2. Simpler to introduce
3. Less measure of links required in light of the fact that every gadget should be
associated with the center as it were.
4. Strong, on the off chance that one connection fizzles, different connections will turn
out great.
5. Simple shortcoming identification in light of the fact that the connection can be
effectively distinguished.
61 | P a g e
Shafra Fariz
• On the off chance that center point goes down everything goes down, none of
the gadgets can work without center.
• Center requires more assets and customary support since it is the focal
arrangement of star topology.
Bus Topology
In Bus Topology there is a fundamental link and all the gadgets are associated with this
primary link through drop lines. There is a gadget considered tap that interfaces the
drop line to the principle link. Since all the information is sent over the fundamental link,
there is a restriction of drop lines and the distance a principle link can have.
62 | P a g e
Shafra Fariz
• Not versatile as there is a restriction of the number of hubs you can associate
with spine link.
Ring Topology
63 | P a g e
Shafra Fariz
In ring topology every gadget is associated with the two gadgets on one or the other
side of it. There are two devoted highlight point interfaces a gadget has with the gadgets
on its either side. This design frames a ring consequently it is known as ring geography.
In the event that a gadget needs to send information to another gadget, it sends the
information one way, every gadget in ring geography has a repeater, on the off chance
that the got information is proposed for other gadget, repeater advances this information
until the planned gadget gets it.
1. Simple to introduce.
2. Overseeing is simpler as to add or eliminate a gadget from the geography just two
connections are needed to be changed.
64 | P a g e
Shafra Fariz
• A connection disappointment can bomb the whole organization as the sign won't
go ahead because of disappointment.
• Information traffic issues, since all the information is flowing in a ring.
Hybrid Topology
A combination of at least two topology is known as cross hybrid topology. For instance a
mix of star and mesh topology is known as hybrid topology.
65 | P a g e
Shafra Fariz
1. We can pick the topology dependent on the necessity for instance, versatility is our
anxiety then we can utilize star topology rather than transport innovation.
• Establishment is troublesome.
66 | P a g e
Shafra Fariz
Topology Types
• For flat and vertical scaling, you can consolidate singular frameworks into
customer/worker and multi-site (WAN) geographies:
67 | P a g e
Shafra Fariz
68 | P a g e
Shafra Fariz
69 | P a g e
Shafra Fariz
2021
Networking
70 | P a g e
Shafra Fariz
Table of Contents
Assignment Brief ................................................................................................................................... 82
Explain networking devices and operations ............................................................................... 88
Sorts of NICs ................................................................................................................................... 89
There are two sorts of NICs. .......................................................................................................... 89
Media Specific: ................................................................................................................................ 89
Organization Design Specific:........................................................................................................ 89
Following figure outlines some regular kinds of NICs.................................................................. 89
Hub ................................................................................................................................................... 90
There are two sorts of the Hub. ..................................................................................................... 91
Passive Hub: - ................................................................................................................................. 91
Active Hub: - .................................................................................................................................... 91
MAU and Patch Panel .................................................................................................................... 92
The Bridge ....................................................................................................................................... 93
There are three kinds of Bridge: -.................................................................................................. 94
Nearby Bridge: - .............................................................................................................................. 95
Remote Bridge: ............................................................................................................................... 95
Wireless Bridge:............................................................................................................................ 95
Switch .............................................................................................................................................. 96
Modem ............................................................................................................................................. 97
Gate Way......................................................................................................................................... 99
Examples of Gate Way:................................................................................................................ 100
E-mail Gate Way:......................................................................................................................... 100
GSNW Gate Way: ........................................................................................................................ 100
PAD Gate Way: ............................................................................................................................ 101
Router ............................................................................................................................................ 101
Essentially switches are utilized: - ............................................................................................... 102
Proxy .............................................................................................................................................. 103
Transceiver .................................................................................................................................... 103
Data Flow Diagram ......................................................................................................................... 105
Importance of Data Flow Diagram ............................................................................................... 106
term server and its key functions accordingly in your point of view and select server
types that are ................................................................................................................................... 106
71 | P a g e
Shafra Fariz
72 | P a g e
Shafra Fariz
Acknowledgement
I would like to take this opportunity to thank my lecturer Mr. Shakir Moulana for guiding us
and showing us the correct path throughout this assignment to make it a success. At the
same time, I would like to thank all the lecturers for fullest support and cooperation.
Thank You
73 | P a g e
Shafra Fariz
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and
to present it as my own without attributing the sources in the correct form. I further
understand.
What it means to copy another’s work.
3. I know what the consequences will be if I plagiarize or copy another’s work in any
of the assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program,
will be my own, and where I have made use of another’s work, I will attribute the
source in the correct way
.
5. I acknowledge that the attachment of this document signed or not, constitutes
a binding agreement between myself and Edexcel UK.
Student’s Signature:
74 | P a g e
Shafra Fariz
75 | P a g e
Shafra Fariz
Programme:
Unit:
Plagiarism
Plagiarism is a particular from of cheating. Plagiarism must be avoided at all costs and student who
break the rules, however innocently, may be penalized. It is your responsibility to ensure that you
understand correct referencing practices. As a university level student, you are expected to use
appropriate references throughout and keep carefully detailed notes of all your sources of materials for
material you have used in your work, including any material downloaded from the internet. Please
consult the relevant unit lecturer or your course tutor if you need any further advice.
Student Declaration
Student Declaration
I certify that the assignment Submission is entirely my own work and I fully understand the
consequences of plagiarism. I understand that making a false declaration is a form of
malpractice.
76 | P a g e
Shafra Fariz
SUBMISSION FORMAT
77 | P a g e
Shafra Fariz
78 | P a g e
Shafra Fariz
Unit No. & Title: Unit2: Assessment Date: 02nd February Unit Grade:
Networking 2021
Assessor Name: Mr. Shakir Completion Date: 04th April IV Signature:
Moulana 2021
ASSESSMENT TRACKING
Assignment Learning Objectives Criterial Date Issued Hand In Date Formative Resubmissi
Targeted Feedback on Date*
79 | P a g e
Shafra Fariz
SUMMATIVE FEEDBACK
80 | P a g e
Shafra Fariz
Unit 2: Networking
Assignment 2
81 | P a g e
Shafra Fariz
Assignment Brief
Student Name/ID Number 1016959
Unit Number and Title 2: Networking
Academic Year 2021
Unit Author Mr. Shakir Moulana
Assignment Title Understanding Network Concepts according to the
current industry
Issue Date 02nd February 2021
Submission Date 04th April 2021
IV Name & Date Mr. Sai Thishok – 01st February 2021
Submission Format
The submission is in the form of an individual written report. This should be written in a concise, formal business
Style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as
Appropriate, and all work must be supported with research and referenced using the Harvard referencing system.
Please also provide a bibliography using the Harvard referencing system.
82 | P a g e
Shafra Fariz
Unit Learning Outcomes
LO1 Examine networking principles and their protocols.
LO2 Explain networking devices and operations.
Assignment Brief and Guidance
Most Universities admired in private Higher Education Institute in Colombo, Sri Lanka. Administration and the
academic staff are very much concerned about providing required facilities for the students in the field of
Network. Networking computers is not the complicated process it used to be. What used to be along drawn out
process is now made easier and more efficient, causing less distraction and disruption in organizations.
Imagine that you are a network specialist working for your company Speed tech in a start-up level position. So
Before starting the process study the basics of Networking. Talk to the organization thinking about moving to the
Best of Networking industry taking the new technological improvement into consideration.
You will need to produce an outcome on the networking development process to the organization that includes
the
following:
1. The growth of the Network
2. Detailing of the new networking technologies introduced
3. The outcome that will be gained through Network considering the networking principles, protocols and
devices, including benefits and constraints of networked solutions, the impact of network topology,
communication and bandwidth requirements, effectiveness of networking systems, operating principles of
Networking devices and server types and networking software.
During the process in terms of working in the organization you are supposed to go through in depth process on
Designing and implementing a local area network. You are supposed to follow the below steps below according
to the requirement by the organization
And you are ask to analyze the specification from the institution above for completion of this project within a
given timeframe.
The LAN design that you are about to design should be well planned thinking out of the box which will make an
Effective result on the designed LAN network. After the designing process is completed.
The concept to go through with LAN design is to design a network diagram to implement to a start-up
Organization with relevant requirements and configurations. The network system should be under the
default
Gateway of 192.168.10.1 allocating 10 terminals including a server with proper configurations.
Submission Format
83 | P a g e
Shafra Fariz
Part 1- *Discuss the importance of Networking to the current trend by considering the real world on how the
industry moves and how the past network was used going through the relevant concepts in the networking sector,
with valid examples in your explanation. (note – you could also include the roles of networking, types of networking
and further more)
*Finally justify the Importance of introducing Networking to speed tech as described in the scenario.
*Further Discuss the benefits and constraints of different Networking systems types (e.g. peer based, client-server)
explanation should be in brief with related networking diagrams
*With comparison discuss the pros and Cons of Networking systems discussed above (Report)
Part 2- Speed tech is planning to get a broadband (ADSL) internet connection from SLT. They are providing ZTE
ADSL wireless router (ZXV10-W300) with the internet connection. Wi-Fi is considered as the main networking
technology when it comes to implementing Wireless Local Area Networks.
*Briefly explain on the Wi-Fi technology and its standard meanwhile analyzing the features and provide strengths
and weakness of Wireless ADSL Router, in order give a brief on the transmission media and the components of it
➢ Guided media
➢ Unguided media
*You also need to discuss on some of the ISP (Internet Service Providers) in Sri Lanka on their growth and
expansion giving out some examples considering the current industry.
*Finally come to a valid justification detailing on the most suitable technology considering the Ethernet or WIFI
To be used in speed tech.
Part 3- As discussed above in the assignment brief and guidance, Imagine, with the position you’re holding in the
organization you are working in the networking industry and your supposed to create and present a presentation
explaining the basics of networking components to speed tech. *
In your Presentation Use appropriate images, diagrams and tables in the presentation and use technical language
accurately.
*Discuss all the factors needed to form a Networking environment according to your point of view. Information’s
should be added to the slide to the point and not more than 15 slides (Presentation) (Report)
Part 4- *Explain the term Network Topology and the uses of it in the industrial exposure through a research on the
growth of the network history.
*Describe the types of Networking Topologies briefly to the point with related diagrams and comparison. (Note:
explanations should be in detail with examples)
*Considering the topologies select a topology which is the most suitable to the scenario in order to implement the
client-server architecture in the lab with relevant diagram and Justification considering the part 1 on Networking
Systems. (Report)
Part 1- *Discuss how OSI model and network protocols enable effective utilization of different networking systems.
(Note: detailed definition for each of the OSI layers defined.
84 | P a g e
Shafra Fariz
You may discuss how it allows multiple-vendor development through standardization of network
components.
*In the discussion further discuss the functions of a protocol and explain each protocol defined with
examples and short answers to the point.
* When it is a network obviously there is a data flow, finally discuss the importance of data flow and the
types of data flow in the current networking environment with related diagrams and real-world examples.
(Report)
Part 2- When it is in the network environment working on with servers which is common now a days.
*Describe the term server and its key functions accordingly in your point of view and select server types
that are
most suitable for the given scenario and separately discuss the role of each and every server type (Report)
Part 3 – Describe the components needed to form a network, and along with the report suggest some of
the
Networking devices and its importance with a detailed explanation with valid examples.
1. Prepare a written step-by-step plan of how you are planning to design a Local Area Network (Report)
(Diagram)
2. Justify your choice of devices for your network design.
3. Produce a test plan to evaluate this design for the requirements of bandwidth and cost constraints as per
user specifications. (Table) (Report)
4. Justify and include the security requirements with a new diagram under the default gateway of
192.168.15.1 for the terminals to the diagram designed above and quality of services needed for selection
of accessories.
5. Give out the steps of preparing the Networking cables for real time implementation for the below
mentioned,
1. Explain What is IP and the classes of IP and justify the selection of the class of IP address to the above
designed diagram in part 1(Report)
2. Explain the term Static IP and Dynamic IP with proper steps of configuration (Add relevant screenshots
done during practical session.
3. Show the steps done to complete the process of file sharing (report) (Screenshots)
4. Implement a network you would suggest for a further development according to your point of view with
justification with a detailed diagram
5. Conduct verification and explain pinging process (screenshots)
6. Record the test results and analyse these against expected results. (screenshots)
7. Investigate what functionalities would allow the system to support device growth and the addition of
communication devices.
8. Discuss the significance of upgrades and security requirements in your recommendations. (Report)
85 | P a g e
Shafra Fariz
86 | P a g e
Shafra Fariz
P5 Design a networked to meet a given M3 Install and configure network D2 Design a maintenance
network services services and applications on your schedule to support the
choice. networked system.
P6 Test and evaluate the design to meet
the requirements and analyse user
feedback with the aim of improving
efficiency.
LO4 Implement and diagnose networked systems
87 | P a g e
Shafra Fariz
In the overview of the framework’s organization devices, NIC stays on the essential
spot. Without this device, getting sorted out is incomprehensible. This is usually called
network connector card, Ethernet Card and LAN card. NIC licenses a frameworks
organization contraption to talk with different frameworks organization device.
NIC changes over the data packages between two different data transmission
advancements. A PC uses equivalent data transmission advancement to convey the
data between its inside parts while the media that gives network between different PCs
uses successive data transmission development.
A NIC changes over equal information stream into the sequential information stream
and the sequential information stream into the equal information stream.
88 | P a g e
Shafra Fariz
Normally all advanced PCs have the incorporated NICs in the motherboards. In the
event that extra NICs are required, they are additionally accessible as extra gadgets
independently.
For work area or worker framework, they are accessible in the connector structure
which can be connected to the accessible spaces of the motherboard. For PC or other
little size gadgets, they are accessible in the PCMCIA (Personal Computer Memory
Card International Association) card structure which can be embedded into the PCMCIA
opening.
Sorts of NICs
Media Specific: - LAN card is utilized by the media type. Various sorts of the NICs are
utilized to associate the various kinds of media. To associate a particular media type,
we should need to utilize a NIC which is especially made for that kind of media.
89 | P a g e
Shafra Fariz
Hub
90 | P a g e
Shafra Fariz
Active Hub: - It additionally works same as the inactive Hub works. Yet, prior to
sending the information signals, it intensifies them. Because of this additional
component, the dynamic Hub is otherwise called the repeater.
MAU and Patch Panel resemble the Hub; however, they are unique. MAU (Multi
Access Unit) is the kind of Hub for the symbolic ring organization. Contrasts among
Hub and MAU are the accompanying: -
• Center is utilized for the Ethernet Network while the MAU is utilized for the Token
ring organization.
• Center makes intelligently star geography while MAU makes sensibly ring
geography.
Fix board is utilized to coordinate the UTP links methodically. It doesn't meddle in the
information signals.
92 | P a g e
Shafra Fariz
The Bridge
93 | P a g e
Shafra Fariz
➢ Associating distinctive media types. For example, associates UTP with the fiber
optic.
A Bridge can associate two distinct kinds of media or organization engineering, yet it
can't interface two unique sorts of organization layer convention like TCP/IP or IPX.
Scaffold requires a similar organization layer convention altogether portions.
94 | P a g e
Shafra Fariz
Remote Bridge: This Bridge interfaces with another Bridge over the WAN connection.
Wireless Bridge: This Bridge associates with another Bridge without utilizing wires. It
utilizes radio signs for the network.
95 | P a g e
Shafra Fariz
In OSI Layers /TCP-IP networking models, the functionalities of the Bridges are defined
in the physical layer and data link layer.
Just like Hubs, Bridge no longer used in the computer network. Bridges have been
replaced by the Switches.
Switch
Very much like Hub and Bridge, Switch is likewise used to associate the numerous
gadgets together in a LAN section. Essentially, a Switch is the updated adaptation of
the Bridge. Other than giving every one of the functionalities of Bridge, it likewise offers
a few extra highlights.
Not at all like the conventional processors that we use in our PC, ASICs are the specific
processors assembled uniquely to perform not very many specific errands. Generally,
96 | P a g e
Shafra Fariz
the ASICs in the Switches have single undertaking and that is the exchanging the
casings as quick as could really be expected.
An ASIC involved switch plays out this assignment blazingly quick. For instance, a
passage level Catalyst Switch 2960 can handle 2.7 million edges each second.
Modem
In straightforward language, a Modem is the gadget that is utilized to associate with the
Internet. In fact, the gadget empowers the advanced information to be sent over the
media transmission lines.
97 | P a g e
Shafra Fariz
It empowers correspondence between the PC (Known as the DTE gadget) and the
Telecom organization' office (Known as the DCE gadget).
98 | P a g e
Shafra Fariz
Gate Way
Entryway is utilized to advance the bundles which are created from the nearby host or
network and however expected for the far-off network. In the event that an information
99 | P a g e
Shafra Fariz
parcel doesn't discover its objective location in the nearby organization then it takes the
assistance of the entryway gadget to discover the objective location in the far-off
network. An entryway gadget knows the way of the distant objective location. In the
event that require, it likewise changes the epitome of the bundle so it can go through
different organizations to get its objective location.
E-mail Gate Way: Deciphers SMTP email in standard X.400 design prior to sending.
GSNW Gate Way: Permits Windows customers to get to assets from the NetWare
worker.
100 | P a g e
Shafra Fariz
PAD Gate Way: Gives availability between LAN organization and X.25 organization.
Router
The switch associates the distinctive organization fragments. It switches the information
parcels between those organizations which are either situated in the distinctive coherent
fragments or worked with the diverse organization layer conventions.
At the point when a switch gets an information parcel on any of its interface, it checks
the objective location of that bundle and dependent on that objective location, it
advances that information parcel from the interface which is associated with the
objective location.
101 | P a g e
Shafra Fariz
➢ To interface two diverse media types, for example, UTP and Fiber optical.
➢ To associate two diverse organization structures like Token Ring and Ethernet.
102 | P a g e
Shafra Fariz
➢ To associate LAN network with Telco organization' office (Known as the DTE
gadget).
Proxy
Intermediary is utilized to conceal the interior organization from outside world. It very
well may be a commit gadget or can be an application programming. Whenever it is
arranged, all correspondence goes through it. Since outside gadgets can't get to the
inner gadgets straightforwardly, they can't mess with the inward gadgets.
Transceiver
103 | P a g e
Shafra Fariz
The Transceiver is a little gadget that has the ability of accepting and imparting the two
sorts of signs; simple and advanced. Normally, it is inbuilt in network interface card. In
any case, it is additionally accessible as an individual gadget. It distinguishes the kind of
sign from the organization wire and converts the passing sign appropriately.
For instance, a handset is connected with a gadget that sends signal in advanced
structure. Presently assume, this gadget is associated with the organization wire that
utilizes simple structure for information transmission. For this situation, handset
changes over advanced signs in the simple signals prior to setting them in the
organization wire.
(www.computernetworkingnotes.com, 2021)
104 | P a g e
Shafra Fariz
105 | P a g e
Shafra Fariz
106 | P a g e
Shafra Fariz
An individual framework can give assets and use them from one more framework
simultaneously. This implies that a gadget could be both a worker and a customer
simultaneously.
At first, such workers were associated with customers known as terminals that didn't do
any real registering. These terminals, alluded to as moronic terminals, existed
essentially to acknowledge input by means of a console or card peruser and to return
the aftereffects of any calculations to a presentation screen or printer. The genuine
registering was done on the worker.
As innovation has advanced, the meaning of a worker has developed with it. Nowadays,
a worker might be simply programming running on at least one actual processing
107 | P a g e
Shafra Fariz
gadgets. Such workers are regularly alluded to as virtual workers. Initially, virtual
workers were utilized to build the quantity of worker works a solitary equipment worker
could do. Today, virtual workers are regularly run by an outsider on equipment across
the Internet in a game plan called distributed computing.
For instance, Microsoft's Windows Server working framework gives the usefulness to
tune in to and react to customer demands. Moreover, introduced jobs or administrations
increment which sorts of customer demands the worker can react to. In another model,
an Apache web worker reacts to Internet program demands through an extra
application, Apache, introduced on top of a working framework.
At the point when a customer requires information or usefulness from a worker, it sends
a solicitation over the organization. The worker gets this solicitation and reacts with the
108 | P a g e
Shafra Fariz
suitable data. This is the solicitation and reaction model of customer worker organizing,
otherwise called the call and reaction model.
A worker will frequently play out various extra errands as a feature of a solitary
solicitation and reaction, including checking the character of the requestor, guaranteeing
that the customer has consent to get to the information or assets mentioned, and
appropriately organizing or returning the necessary reaction in a normal manner.
Sorts of workers
There are numerous sorts of workers that all perform various capacities. A huge number
contain at least one of the basic worker types:
Document workers
Document workers store and convey records. Numerous customers or clients may
share documents put away on a worker. Likewise, midway putting away documents
offers simpler reinforcement or adaptation to internal failure arrangements than
endeavoring to give security and uprightness to records on each gadget in an
association. Record worker equipment can be intended to augment peruse and
compose rates to improve execution.
Print workers
109 | P a g e
Shafra Fariz
Print workers take into consideration the administration and dispersion of printing
usefulness. Instead of connecting a printer to each workstation, a solitary print worker
can react to printing demands from various customers. Today, some bigger and better
quality printers accompany their own inherent print worker, which eliminates the
requirement for an extra PC based print worker. This inner print worker likewise works
by reacting to print demands from a customer.
Application workers
DNS workers
Area Name System (DNS) workers are application workers that give name goal to
customer PCs by changing over names effectively comprehended by people into
machine-decipherable IP addresses. The DNS framework is a generally dispersed data
set of names and other DNS workers, every one of which can be utilized to demand a
usually obscure PC name. At the point when a customer needs the location of a
framework, it sends a DNS demand with the name of the ideal asset to a DNS worker.
The DNS worker reacts with the important IP address from its table of names.
110 | P a g e
Shafra Fariz
Mail workers
Mail workers are an extremely basic kind of utilization worker. Mail workers get
messages shipped off a client and store them until mentioned by a customer for said
client. Having an email worker takes into consideration a solitary machine to be
appropriately arranged and connected to the organization consistently. It is then
prepared to send and get messages as opposed to requiring each customer machine to
have its own email subsystem persistently running.
Web workers
Quite possibly the most plentiful kinds of workers in the present market are a web
worker. A web worker is an exceptional sort of use worker that hosts projects and
information mentioned by clients across the Internet or an intranet. Web workers react
to demands from programs running on customer PCs for site pages, or other online
administrations. Regular web workers incorporate Apache web workers, Microsoft
Internet Information Services (IIS) workers and Nginx workers.
Web Server
and react to various solicitations from customers. Regular data set worker applications
incorporate Oracle, Microsoft SQL Server, DB2, and Informix.
Virtual workers
Virtual workers are surprising the worker world. Not at all like customary workers that
are introduced as a working framework on machine equipment, virtual workers exist just
as characterized inside specific programming called hypervisor. Each hypervisor can
run hundreds, or even thousands, of virtual workers at the same time. The hypervisor
presents virtual equipment to the worker as though it were genuine actual equipment.
The virtual worker utilizes the virtual equipment obviously, and the hypervisor passes
the real calculation and capacity needs onto the genuine equipment underneath, which
is divided between the wide range of various virtual workers.
Intermediary workers
112 | P a g e
Shafra Fariz
A few workers exist to screen or oversee different frameworks and customers. There
are numerous kinds of checking workers. A few of them tune in to the organize and get
each customer solicitation and worker reaction, yet some don't ask for or react to
information themselves. Thusly, the checking worker can monitor all the traffic on the
organization, just as the solicitations and answers of customers and workers, without
meddling with those activities. An observing worker will react to demands from checking
customers, for example, those run by network executives watching the soundness of
the organization. (www.paessler.com, 2021)
113 | P a g e
Shafra Fariz
114 | P a g e
Shafra Fariz
2021
Networking
115 | P a g e
Shafra Fariz
Acknowledgement
I would like to take this opportunity to thank my lecturer Mr. Shakir Moulana for guiding us
and showing us the correct path throughout this assignment to make it a success. At the
same time, I would like to thank all the lecturers for fullest support and cooperation.
Thank You
116 | P a g e
Shafra Fariz
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and
to present it as my own without attributing the sources in the correct form. I further
understand.
What it means to copy another’s work.
4. I know what the consequences will be if I plagiarize or copy another’s work in any
of the assignments for this program.
5. I declare therefore that all work presented by me for every aspect of my program,
will be my own, and where I have made use of another’s work, I will attribute the
source in the correct way
.
6. I acknowledge that the attachment of this document signed or not, constitutes
a binding agreement between myself and Edexcel UK.
Student’s Signature:
117 | P a g e
Shafra Fariz
118 | P a g e
Shafra Fariz
Program:
Unit:
Plagiarism
Plagiarism is a particular from of cheating. Plagiarism must be avoided at all costs and student who
break the rules, however innocently, may be penalized. It is your responsibility to ensure that you
understand correct referencing practices. As a university level student, you are expected to use
appropriate references throughout and keep carefully detailed notes of all your sources of materials for
material you have used in your work, including any material downloaded from the internet. Please
consult the relevant unit lecturer or your course tutor if you need any further advice.
Student Declaration
Student Declaration
I certify that the assignment Submission is entirely my own work and I fully understand the
consequences of plagiarism. I understand that making a false declaration is a form of
malpractice.
119 | P a g e
Shafra Fariz
SUBMISSION FORMAT
120 | P a g e
Shafra Fariz
121 | P a g e
Shafra Fariz
Unit No. & Title: Unit2: Assessment Date: 02nd February Unit Grade:
Networking 2021
Assessor Name: Mr. Shakir Completion Date: 04th April IV Signature:
Moulana 2021
ASSESSMENT TRACKING
Assignment Learning Objectives Criterial Date Issued Hand In Date Formative Resubmissi
Targeted Feedback on Date*
122 | P a g e
Shafra Fariz
SUMMATIVE FEEDBACK
123 | P a g e
Shafra Fariz
Unit 2: Networking
Assignment 3
124 | P a g e
Shafra Fariz
Assignment Brief
Student Name/ID Number 1016959
Unit Number and Title 2: Networking
Academic Year 2021
Unit Author Mr. Shakir Moulana
Assignment Title Understanding Network Concepts according to the
current industry
Issue Date 02nd February 2021
Submission Date 04th April 2021
IV Name & Date Mr. Sai Thishok – 01st February 2021
Submission Format
The submission is in the form of an individual written report. This should be written in a concise, formal business
Style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as
Appropriate, and all work must be supported with research and referenced using the Harvard referencing system.
Please also provide a bibliography using the Harvard referencing system.
125 | P a g e
Shafra Fariz
Most Universities admired in private Higher Education Institute in Colombo, Sri Lanka. Administration and the
academic staff are very much concerned about providing required facilities for the students in the field of
Network. Networking computers is not the complicated process it used to be. What used to be along drawn-out
process is now made easier and more efficient, causing less distraction and disruption in organizations.
Imagine that you are a network specialist working for your company Speed tech in a start-up level position. So
Before starting the process study the basics of Networking. Talk to the organization thinking about moving to the
Best of Networking industry taking the new technological improvement into consideration.
You will need to produce an outcome on the networking development process to the organization that includes
the
following:
1. The growth of the Network
2. Detailing of the new networking technologies introduced
3. The outcome that will be gained through Network considering the networking principles, protocols and
devices, including benefits and constraints of networked solutions, the impact of network topology,
communication and bandwidth requirements, effectiveness of networking systems, operating principles of
Networking devices and server types and networking software.
During the process in terms of working in the organization you are supposed to go through in-depth process on
Designing and implementing a local area network. You are supposed to follow the below steps below according
to the requirement by the organization
And you are asking to analyze the specification from the institution above for completion of this project within a
given timeframe.
The LAN design that you are about to design should be well planned thinking out of the box which will make an
Effective result on the designed LAN network. After the designing process is completed.
The concept to go through with LAN design is to design a network diagram to implement to a start-up
Organization with relevant requirements and configurations. The network system should be under the
default
Gateway of 192.168.10.1 allocating 10 terminals including a server with proper configurations.
Submission Format
126 | P a g e
Shafra Fariz
Part 1- *Discuss the importance of Networking to the current trend by considering the real world on how the
industry moves and how the past network was used going through the relevant concepts in the networking sector,
with valid examples in your explanation. (note – you could also include the roles of networking, types of networking
and further more)
*Finally justify the Importance of introducing Networking to speed tech as described in the scenario.
*Further Discuss the benefits and constraints of different Networking systems types (eg. peer based, client-server)
explanation should be in brief with related networking diagrams
*With comparison discuss the pros and Cons of Networking systems discussed above (Report)
Part 2- Speed tech is planning to get a broadband (ADSL) internet connection from SLT. They are providing ZTE
ADSL wireless router (ZXV10-W300) with the internet connection. Wi-Fi is considered as the main networking
technology when it comes to implementing Wireless Local Area Networks.
*Briefly explain on the Wi-Fi technology and its standard meanwhile analyzing the features and provide strengths
and weakness of Wireless ADSL Router, in order give a brief on the transmission media and the components of it
➢ Guided media
➢ Unguided media
*You also need to discuss on some of the ISP (Internet Service Providers) in Sri Lanka on their growth and
expansion giving out some examples considering the current industry.
*Finally come to a valid justification detailing on the most suitable technology considering the Ethernet or WIFI
To be used in speed tech.
Part 3- As discussed above in the assignment brief and guidance, Imagine, with the position you’re holding in the
organization you are working in the networking industry and your supposed to create and present a presentation
explaining the basics of networking components to speed tech. *
In your Presentation Use appropriate images, diagrams and tables in the presentation and use technical language
accurately.
*Discuss all the factors needed to form a Networking environment according to your point of view. Information’s
should be added to the slide to the point and not more than 15 slides (Presentation) (Report)
Part 4- *Explain the term Network Topology and the uses of it in the industrial exposure through a research on the
growth of the network history.
*Describe the types of Networking Topologies briefly to the point with related diagrams and comparison. (Note:
explanations should be in detail with examples)
*Considering the topologies select a topology which is the most suitable to the scenario in order to implement the
client-server architecture in the lab with relevant diagram and Justification considering the part 1 on Networking
Systems. (Report)
Part 1- *Discuss how OSI model and network protocols enable effective utilization of different networking systems.
(Note: detailed definition for each of the OSI layers defined.
127 | P a g e
Shafra Fariz
You may discuss how it allows multiple-vendor development through standardization of network
components.
*In the discussion further discuss the functions of a protocol and explain each protocol defined with
examples and short answers to the point.
* When it is a network obviously there is a data flow, finally discuss the importance of data flow and the
types of data flow in the current networking environment with related diagrams and real-world examples.
(Report)
Part 2- When it is in the network environment working on with servers which is common now a days.
*Describe the term server and its key functions accordingly in your point of view and select server types
that are
most suitable for the given scenario and separately discuss the role of each and every server type (Report)
Part 3 – Describe the components needed to form a network, and along with the report suggest some of
the
Networking devices and its importance with a detailed explanation with valid examples.
1. Prepare a written step-by-step plan of how you are planning to design a Local Area Network (Report)
(Diagram)
2. Justify your choice of devices for your network design.
3. Produce a test plan to evaluate this design for the requirements of bandwidth and cost constraints as per
user specifications. (Table) (Report)
4. Justify and include the security requirements with a new diagram under the default gateway of
192.168.15.1 for the terminals to the diagram designed above and quality of services needed for selection
of accessories.
5. Give out the steps of preparing the Networking cables for real time implementation for the below
mentioned,
1. Explain What is IP and the classes of IP and justify the selection of the class of IP address to the above
designed diagram in part 1(Report)
2. Explain the term Static IP and Dynamic IP with proper steps of configuration (Add relevant screenshots
done during practical session.
3. Show the steps done to complete the process of file sharing (report) (Screenshots)
4. Implement a network you would suggest for a further development according to your point of view with
justification with a detailed diagram
5. Conduct verification and explain pinging process (screenshots)
6. Record the test results and analyze these against expected results. (screenshots)
7. Investigate what functionalities would allow the system to support device growth and the addition of
communication devices.
8. Discuss the significance of upgrades and security requirements in your recommendations. (Report)
128 | P a g e
Shafra Fariz
129 | P a g e
Shafra Fariz
P5 Design a networked to meet a given M3 Install and configure network D2 Design a maintenance
network services services and applications on your schedule to support the
choice. networked system.
P6 Test and evaluate the design to meet
the requirements and analyze user
feedback with the aim of improving
efficiency.
LO4 Implement and diagnose networked systems
130 | P a g e
Shafra Fariz
Table of Contents
Assignment Brief ................................................................................................................................. 125
Design efficient networked systems ........................................................................................... 133
Produce a test plan to evaluate this design for the requirements of bandwidth and cost
constraints as pursuer specifications ........................................................................................ 134
How to Write a Test Plan ............................................................................................................... 135
Step1) Analyze the Product ......................................................................................................... 136
Step2) Develop Test Strategy...................................................................................................... 137
Step2.1) Define Scope of Testing ............................................................................................... 138
Issue Scenario................................................................................................................................. 140
Step2.2) Identify Testing Type ..................................................................................................... 140
Step2.3) Document Risk & Issues............................................................................................... 142
Step2.4) Create Test Logistics .................................................................................................... 143
Step3) Define Test Objectives ..................................................................................................... 145
Step4) Define Test Criteria........................................................................................................... 147
Suspension Criteria ....................................................................................................................... 147
Exit Criteria .................................................................................................................................... 148
Step5) Resource Planning ........................................................................................................... 151
Human Resource ............................................................................................................................ 152
1. Test Manager ........................................................................................................................ 152
2. Tester ..................................................................................................................................... 152
3. Developer Test ...................................................................................................................... 152
4. Test Administrator ................................................................................................................. 152
5. SQA Members ....................................................................................................................... 153
System Resource.......................................................................................................................... 154
Step6) Plan Test Environment ..................................................................................................... 155
What is the Test Environment? ................................................................................................... 155
Instructions to arrangement the Test Environment .................................................................... 155
Step7) Schedule & Estimate ........................................................................................................ 157
Step8) Test Deliverables .............................................................................................................. 159
Test expectations are given prior to testing stage. .................................................................... 160
Test expectations are given during the testing ........................................................................... 160
Test expectations are given after the testing cycles is finished. .......................................... 160
131 | P a g e
Shafra Fariz
132 | P a g e
Shafra Fariz
133 | P a g e
Shafra Fariz
A Test Plan is an itemized record that depicts the test technique, targets, plan,
assessment, expectations, and assets needed to perform testing for a product item.
Test Plan causes us decide the exertion expected to approve the nature of the
application under test. The test plan fills in as an outline to direct programming testing
exercises as a characterized cycle, which is minutely checked and constrained by the
test chief.
We should begin with following Test Plan model/situation: In a gathering, you need to
examine the Test Plan with the colleagues, yet they are not intrigued
Help individuals outside the test group like designers, business administrators, clients
comprehend the subtleties of testing.
Test Plan directs our reasoning. It resembles a standard book, which should be
followed.
134 | P a g e
Shafra Fariz
Significant perspectives like test assessment, test scope, Test Strategy are recorded in
Test Plan, so it very well may be checked on by Management Team and re-utilized for
different tasks.
You definitely realize that making a Test Arrangement is the main errand of Test
Management Process. Follow the seven stages underneath to make a test plan
according to IEEE 829
5. Asset Planning
135 | P a g e
Shafra Fariz
136 | P a g e
Shafra Fariz
How might you test an item with no data about it? The appropriate response is
Impossible. You should get familiar with an item completely prior to testing it.
The item under test is Guru99 banking site. You should investigate customers and the
end clients to know their requirements and assumptions from the application
137 | P a g e
Shafra Fariz
Back to your venture, you need to create Test Strategy for testing that financial site. You
ought to follow ventures underneath.
Prior to the beginning of any test action, extent of the testing ought to be known. You
should contemplate it.
The segments of the framework that won't be tried likewise should be unmistakably
characterized as being "out of extension."
138 | P a g e
Shafra Fariz
• Characterizing the extent of your testing project is vital for all partners. An exact
degree encourages you
• Give everybody a certainty and exact data of the testing you are doing
• All task individuals will have an unmistakable comprehension about what is tried
and what isn't
• Venture Budget
• Item Specification
139 | P a g e
Shafra Fariz
Nonfunctional testing like pressure, execution or legitimate data set at present won't be
tried. (out of extension)
Issue Scenario
The client needs you to test his API. Yet, the task spending plan doesn't allow to do as
such. In such a case how will you respond?
Indeed, in such case you need to persuade the client that Api Testing is additional work
and will burn-through huge assets. Give him information supporting your realities.
Advise him if Api Testing is remembered for scope the spending will increment by XYZ
sum.
The client concurs and appropriately the new degrees, out of extension things are
• Out of extension things: Database Testing, equipment and some other outer
interfaces.
140 | P a g e
Shafra Fariz
A Testing Type is a standard test procedure that gives an expected test outcome.
Each testing type is formulated to identify a specific type of product bugs. But all Testing
Types are aimed at achieving one common goal “Early detection of all the defects
before releasing the product to the customer”
There are huge loads of Testing Types for testing programming item. Your group can't
have enough endeavors to deal with all sort of testing. As Test Manager, you should set
need of the Testing Types
141 | P a g e
Shafra Fariz
Danger is future's dubious occasion with a likelihood of event and a potential for
misfortune. At the point when the danger really occurs, it turns into the 'issue'.
In the article Risk Analysis and Solution, you have effectively found out about the
'Danger' investigation in detail and recognized likely dangers in the task.
Risk Mitigation
Colleague do not have the necessary abilities for site testing. Plan instructional class to
expertise up your individuals
The venture plan is excessively close; it's difficult to finish this task on time Set Test
Priority for every one of the test movement.
142 | P a g e
Shafra Fariz
Test Manager has helpless administration skill Plan authority preparing for director
Wrong spending appraisal and cost overruns Establish the degree prior to starting
work, give a great deal of consideration to project arranging and continually track and
measure the advancement
In Test Logistics, the Test Manager should address the accompanying inquiries:
You may not know definite names of the analyzer who will test, yet the sort of analyzer
can be characterized.
143 | P a g e
Shafra Fariz
To choose the correct part for indicated task, you need to consider if his ability is
equipped for the errand or not, likewise gauge the venture financial plan. Choosing
incorrectly part for the assignment may make the undertaking fizzle or postponement.
3. Meticulousness
4. Great collaboration
In your undertaking, the part who will take in control for the test execution is the
analyzer. Base on the undertaking financial plan, you can pick in-source or reevaluate
part as the analyzer.
144 | P a g e
Shafra Fariz
Test Objective is the general objective and accomplishment of the test execution. The
goal of the testing is finding however many programming deserts as could be allowed;
guarantee that the product under test is without bug before discharge.
Rundown all the product highlights (usefulness, execution, GUI…) which may have to
test.
Characterize the objective or the objective of the test dependent on above highlights
How about we apply these means to discover the test objective of your Guru99 Bank
testing project
145 | P a g e
Shafra Fariz
You can pick the 'TOP-DOWN' technique to discover the site's highlights which may
have to test. In this technique, you separate the application under test to part and sub-
segment.
In the past point, you have effectively dissected the prerequisite specs and stroll
through the site, so you can make a Mind-Map to discover the site highlights as
following.
146 | P a g e
Shafra Fariz
In light of above highlights, you can characterize the Test Objective of the undertaking
Guru99 as following
Watch that whether site Guru99 functionality (Account, Deposit…) is filling in true to
form with no mistake or bugs in genuine business climate
Watch that the outer interface of the site, for example, UI is filling in true to form and
meet the client need
Confirm the convenience of the site. Are those functionalities helpful for client or not?
Test Criteria is a norm or rule on which a test system or test judgment can be based.
There're 2 sorts of test standards as following
Suspension Criteria
Indicate the basic suspension models for a test. On the off chance that the suspension
rules are met during testing, the dynamic test cycle will be suspended until the rules are
settled.
147 | P a g e
Shafra Fariz
Test Plan Example: If your colleagues report that there are 40% of experiments fizzled,
you ought to suspend testing until the advancement group fixes every one of the
bombed cases.
Exit Criteria
It indicates the measures that mean a fruitful consummation of a test stage. The leave
rules are the focused-on aftereffects of the test and are essential prior to continuing to
the following period of advancement. Model: 95% of all basic experiments should pass.
148 | P a g e
Shafra Fariz
A few strategies for characterizing exit standards are by indicating a focused-on run rate
and pass rate.
• Pass rate is subject to project scope, however accomplishing high pass rate is an
objective.
Test Plan Example: Your Team has effectively done the test executions. They report the
test result to you, and they need you to affirm the Exit Criteria.
149 | P a g e
Shafra Fariz
In above case, the Run rate is obligatory is 100%, however the test group just finished 90% of
experiments. It implies the Run rate isn't fulfilled, so don't affirm the Exit Criteria
150 | P a g e
Shafra Fariz
Asset plan is a point-by-point outline of a wide range of assets needed to finish project
task. Asset could be human, hardware and materials expected to finish a venture
The asset arranging is significant factor of the test arranging since helps in deciding the
quantity of assets (representative, gear…) to be utilized for the venture. Subsequently,
the Test Manager can make the right timetable and assessment for the venture.
151 | P a g e
Shafra Fariz
Human Resource
The accompanying table addresses different individuals in your task group
152 | P a g e
Shafra Fariz
153 | P a g e
Shafra Fariz
System Resource
For testing, a web application, you should design the assets as following tables:
154 | P a g e
Shafra Fariz
Back to your task, how would you set up test climate for this financial site?
To complete this undertaking, you need a solid collaboration between Test Team and
Development Team
You ought to pose the engineer a few inquiries to comprehend the web application
under test obviously. Here're some suggested questions. Obviously, you can pose
different inquiries on the off chance that you need.
155 | P a g e
Shafra Fariz
• What is the most extreme client association which this site can deal with
simultaneously?
156 | P a g e
Shafra Fariz
Test assessment, you previously utilized a few methods to appraise the push to finish
the task. Presently you ought to incorporate that assessment just as the timetable to the
Test Planning
In the Test Estimation stage, assume you break out the entire undertaking into little
errands and add the assessment for each assignment as beneath
Making plan is a typical term in project the executives. By making a strong timetable in
the Test Planning, the Test Manager can utilize it as instrument for observing the
venture progress, control the expense overwhelms.
To make the task plan, the Test Manager needs a few kinds of contribution as beneath:
157 | P a g e
Shafra Fariz
• Representative and undertaking cutoff time: The working days, the venture cutoff
time, asset accessibility are the variables which influenced to the timetable
• Task assessment: Base on the assessment, the Test Manager realizes how long
it requires to finish the undertaking. So, he can make the suitable venture plan
• Venture Risk: Understanding the danger helps Test Manager add sufficient
additional chance to the undertaking timetable to manage the dangers
Assume the manager needs to finish the undertaking Guru99 in one month, you
previously assessed the exertion for each assignment in Test Estimation. You can make
the timetable as underneath
158 | P a g e
Shafra Fariz
Test Deliverables is a rundown of the relative multitude of reports, devices and different
segments that must be created and kept up on the side of the testing exertion.
There are diverse test expectations at each period of the product advancement
lifecycle.
159 | P a g e
Shafra Fariz
• Test Scripts
• Simulators.
• Test Data
• Test outcomes/reports
• Defect Report
160 | P a g e
Shafra Fariz
• Release notes
(www.guru99.com, 2021)
192.168.15.1 Diagram
The IP address 192.168.15.1 is the default door for most remote switches or ADSL
modems.
The switch can utilize different IPs as the login address, yet 192.168.15.1 is one of the
normal locations. It ought to be noticed that the default IP access address is distinctive
for various brands of switches, and clients are by and large permitted to alter the default
address. In this way, if it's not too much trouble, allude to the particular access address.
It ought to likewise be added that the default port is for the most part 80, so the port is
discarded from the entrance address (the total location is http://192.168.15.1:80). On
the off chance that the port worth is altered, it should be composed totally, for instance,
http://192.168.15.1:8080.
To deal with your switch, fill in 192.168.15.1 in your program's location bar. After you
effectively access the switch the executives board, you can change and set the
accompanying alternatives: IP Qos, DNS, intermediary, LAN, WAN, network the board,
security choices, WLAN settings, PPPOE, MAC, WPS, DSL, and DHCP customers end.
161 | P a g e
Shafra Fariz
(en.ipshu.com, 2021)
162 | P a g e
Shafra Fariz
discloses how to make the get over link and straight-through link in detail with picture
models. Figure out how the UTP link moves information between two hubs or end
gadgets.
Before we figure out how to make a straight-through or cross-link, we should see how
the UTP link moves the information.
In UTP link, electronic signs are utilized to send and get the information. An UTP link
interfaces two hubs. In information transmission, one hub sends information and
another hub gets that information. NIC of the sender hub changes over information
stream into the electronic signals and places them into the copper wire of the UTP link.
NIC of the collector hub peruses those signs from the wire and converts back them into
the information stream.
Electronic signs or electric flows stream in a circuit. In an electric circuit, two wires are
utilized. The principal wire is utilized to convey the electrons or current from the source
to the heap. The subsequent wire is utilized to finish the circuit between the heap and
163 | P a g e
Shafra Fariz
the source. At the point when electrons or current goes through the heap, the heap
plays out its capacities.
How about we take a basic model. Assume we have a LED bulb, two wires, and a
battery. To light this bulb, we interface it from the battery utilizing the wires. We interface
the positive side and negative side of the battery to the bulb independently. The
accompanying picture shows this EX:
164 | P a g e
Shafra Fariz
A similar system is utilized in UTP link to move the information. Two wires of an UTP
link make an electric circuit between hubs.
In this circuit: -
• The NIC of the hub which sends the information is fill in as the source.
• The NIC of the hub which gets the information is function as the heap.
• The first wire conveys the current from the sender hub to the collector hub.
The accompanying picture shows how the electric circuit works between the sender and
recipient hubs.
165 | P a g e
Shafra Fariz
When the electric circuit is fabricated, both the sender and beneficiary hubs utilize this
electric circuit to move the information.
End gadgets, typically PCs or Server, store and interaction information in computerized
or paired organization. To move double information through the electric circuit, NICs of
both sender and beneficiary hubs utilize an encoding plan.
An encoding plan is a language that both NICs comprehend. In the encoding plan, the
sender hub changes the electrical sign after some time, while the collector hub
deciphers those progressions as paired information.
For instance, to move a double digit 0, NIC of the sender hub drops the voltage to the
lower voltage during the center of a 1/10,000,000th-of-a-second span. NIC of the
beneficiary hub distinguishes this change and deciphers it as a paired digit 0. Very
much like this, to move paired digit 1, NIC of the sender hub raises the voltage to the
higher voltage.
166 | P a g e
Shafra Fariz
Flow in an electric circuit consistently streams a single way; from the source to the
heap. Consequently, just the sender hub (source) can send its information to the
collector hub (load). On the off chance that the collector hub needs to send its
information, it should need to make its own circuit.
The accompanying picture shows how the two hubs make and utilize their circuits to
move the information.
167 | P a g e
Shafra Fariz
Along these lines, for a two-way information move, two electrical circuits are required.
To make two electrical circuits, four wires are required. In the beneath area, we will
comprehend which wires of the UTP link are utilized to the electric circuit between hubs.
UTP Cable
An UTP link contains 8 wires. These wires are gathered in four sets. Each pair comprise
of two turned wires. The main wire has a solitary shading coded plastic covering while
the other wire has that tone in addition to white shading striped plastic covering. For
168 | P a g e
Shafra Fariz
instance, for the earthy colored wire pair, one wire's covering is all earthy colored, while
the other wire's covering is earthy colored and-white striped.
At the point when electrical flow goes through the copper wire, it makes electromagnetic
impedance (EMI). The EMI meddles with the electrical signs in close by wires,
remembering the wires for a similar link. It is known as the cross talk. Bending the wires
two by two eliminates the impact of cross talk.
169 | P a g e
Shafra Fariz
A NIC utilizes pins 1 and 2 to send the information. To get information, it utilizes pins 3
and 6. A switch does something contrary to it. It gets information on pins 1 and 2 and
communicates information from the pin 3 and 6. In view of the sort of end gadgets, an
UTP link can be made twoly. The primary kind of link, known as the straight-through
link, associates two distinct sorts of end gadgets; like PC to Switch. The second kind of
170 | P a g e
Shafra Fariz
link, known as the get over link, interfaces two same sort of end gadgets like PC to PC
or Switch to Switch.
A NIC utilizes pins 1 and 2 to send the information. To get information, it utilizes pins 3
and 6. A switch does something contrary to it. It gets information on pins 1 and 2 and
sends information from the pin 3 and 6. In view of the sort of end gadgets, an UTP link
can be made twoly. The main kind of link, known as the straight-through link, associates
two distinct sorts of end gadgets; like PC to Switch. The second sort of link, known as
the get over link, interfaces two same kind of end gadgets like PC to PC or Switch to
Switch.
Side A Side B
Green Green
Blue Blue
171 | P a g e
Shafra Fariz
Orange Orange
Brown Brown
• PC to Switch
• PC to Hub
• Router to Switch
• Switch to Server
• Hub to Server
172 | P a g e
Shafra Fariz
173 | P a g e
Shafra Fariz
In this link, sending pins of one side associate with the getting pins of the opposite side.
The wire at nail 1 to one finish of the link interfaces with pin 3 at the opposite finish of
the link. The wire at pin 2 associates with nail 6 to the opposite finish of the link.
Remaining wires interface in similar situations at the two finishes.
The accompanying table records the wire places of the get over link on the two sides.
Side A Side B
Green Orange
Blue Blue
Orange Green
174 | P a g e
Shafra Fariz
Brown Brown
• Two Computers
• Two Hubs
• A Hub to a Switch
• A Cable Modem to a Router
• Two Routers Interfaces
175 | P a g e
Shafra Fariz
(www.computernetworkingnotes.com, 2021)
176 | P a g e
Shafra Fariz
177 | P a g e
Shafra Fariz
2021
Networking
178 | P a g e
Shafra Fariz
Acknowledgement
I would like to take this opportunity to thank my lecturer Mr. Shakir Moulana for guiding us
and showing us the correct path throughout this assignment to make it a success. At the
same time, I would like to thank all the lecturers for fullest support and cooperation.
Thank You
179 | P a g e
Shafra Fariz
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and
to present it as my own without attributing the sources in the correct form. I further
understand.
What it means to copy another’s work.
5. I know what the consequences will be if I plagiarize or copy another’s work in any
of the assignments for this program.
6. I declare therefore that all work presented by me for every aspect of my program,
will be my own, and where I have made use of another’s work, I will attribute the
source in the correct way
.
7. I acknowledge that the attachment of this document signed or not, constitutes
a binding agreement between myself and Edexcel UK.
Student’s Signature:
180 | P a g e
Shafra Fariz
181 | P a g e
Shafra Fariz
Program:
Unit:
Plagiarism
Plagiarism is a particular from of cheating. Plagiarism must be avoided at all costs and student who
break the rules, however innocently, may be penalized. It is your responsibility to ensure that you
understand correct referencing practices. As a university level student, you are expected to use
appropriate references throughout and keep carefully detailed notes of all your sources of materials for
material you have used in your work, including any material downloaded from the internet. Please
consult the relevant unit lecturer or your course tutor if you need any further advice.
Student Declaration
Student Declaration
I certify that the assignment Submission is entirely my own work and I fully understand the
consequences of plagiarism. I understand that making a false declaration is a form of
malpractice.
182 | P a g e
Shafra Fariz
SUBMISSION FORMAT
183 | P a g e
Shafra Fariz
184 | P a g e
Shafra Fariz
SUMMATIVE FEEDBACK
185 | P a g e
Shafra Fariz
186 | P a g e
Shafra Fariz
Assignment Brief
Student Name/ID Number 1016959
Unit Number and Title 2: Networking
Academic Year 2021
Unit Author Mr. Shakir Moulana
Assignment Title Understanding Network Concepts according to the
current industry
Issue Date 02nd February 2021
Submission Date 04th April 2021
IV Name & Date Mr. Sai Thishok – 01st February 2021
Submission Format
The submission is in the form of an individual written report. This should be written in a concise, formal business
Style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as
Appropriate, and all work must be supported with research and referenced using the Harvard referencing system.
Please also provide a bibliography using the Harvard referencing system.
187 | P a g e
Shafra Fariz
Unit Learning Outcomes
LO1 Examine networking principles and their protocols.
LO2 Explain networking devices and operations.
Assignment Brief and Guidance
Most Universities admired in private Higher Education Institute in Colombo, Sri Lanka. Administration and the
academic staff are very much concerned about providing required facilities for the students in the field of
Network. Networking computers is not the complicated process it used to be. What used to be along drawn-out
process is now made easier and more efficient, causing less distraction and disruption in organizations.
Imagine that you are a network specialist working for your company Speed tech in a start-up level position. So
Before starting the process study the basics of Networking. Talk to the organization thinking about moving to the
Best of Networking industry taking the new technological improvement into consideration.
You will need to produce an outcome on the networking development process to the organization that includes
the
following:
1. The growth of the Network
2. Detailing of the new networking technologies introduced
3. The outcome that will be gained through Network considering the networking principles, protocols and
devices, including benefits and constraints of networked solutions, the impact of network topology,
communication and bandwidth requirements, effectiveness of networking systems, operating principles of
Networking devices and server types and networking software.
During the process in terms of working in the organization you are supposed to go through in-depth process on
Designing and implementing a local area network. You are supposed to follow the below steps below according
to the requirement by the organization
And you are asking to analyze the specification from the institution above for completion of this project within a
given timeframe.
The LAN design that you are about to design should be well planned thinking out of the box which will make an
Effective result on the designed LAN network. After the designing process is completed.
The concept to go through with LAN design is to design a network diagram to implement to a start-up
Organization with relevant requirements and configurations. The network system should be under the
default
Gateway of 192.168.10.1 allocating 10 terminals including a server with proper configurations.
Submission Format
188 | P a g e
Shafra Fariz
Part 1- *Discuss the importance of Networking to the current trend by considering the real world on how the
industry moves and how the past network was used going through the relevant concepts in the networking sector,
with valid examples in your explanation. (note – you could also include the roles of networking, types of networking
and further more)
*Finally justify the Importance of introducing Networking to speed tech as described in the scenario.
*Further Discuss the benefits and constraints of different Networking systems types (eg. peer based, client-server)
explanation should be in brief with related networking diagrams
*With comparison discuss the pros and Cons of Networking systems discussed above (Report)
Part 2- Speed tech is planning to get a broadband (ADSL) internet connection from SLT. They are providing ZTE
ADSL wireless router (ZXV10-W300) with the internet connection. Wi-Fi is considered as the main networking
technology when it comes to implementing Wireless Local Area Networks.
*Briefly explain on the Wi-Fi technology and its standard meanwhile analyzing the features and provide strengths
and weakness of Wireless ADSL Router, in order give a brief on the transmission media and the components of it
➢ Guided media
➢ Unguided media
*You also need to discuss on some of the ISP (Internet Service Providers) in Sri Lanka on their growth and
expansion giving out some examples considering the current industry.
*Finally come to a valid justification detailing on the most suitable technology considering the Ethernet or WIFI
To be used in speed tech.
Part 3- As discussed above in the assignment brief and guidance, Imagine, with the position your holding in the
organization you are working in the networking industry and your supposed to create and present a presentation
explaining the basics of networking components to speed tech. *
In your Presentation Use appropriate images, diagrams and tables in the presentation and use technical language
accurately.
*Discuss all the factors needed to form a Networking environment according to your point of view. Information’s
should be added to the slide to the point and not more than 15 slides (Presentation) (Report)
Part 4- *Explain the term Network Topology and the uses of it in the industrial exposure through a research on the
growth of the network history.
*Describe the types of Networking Topologies briefly to the point with related diagrams and comparison. (Note:
explanations should be in detail with examples)
*Considering the topologies select a topology which is the most suitable to the scenario in order to implement the
client-server architecture in the lab with relevant diagram and Justification considering the part 1 on Networking
Systems. (Report)
Part 1- *Discuss how OSI model and network protocols enable effective utilization of different networking systems.
(Note: detailed definition for each of the OSI layers defined.
189 | P a g e
Shafra Fariz
You may discuss how it allows multiple-vendor development through standardization of network components.
*In the discussion further discuss the functions of a protocol and explain each protocol defined with examples
and short answers to the point.
* When it is a network obviously there is a data flow, finally discuss the importance of data flow and the types
of data flow in the current networking environment with related diagrams and real-world examples. (Report)
Part 2- When it is in the network environment working on with servers which is common now a days.
*Describe the term server and its key functions accordingly in your point of view and select server types that are
most suitable for the given scenario and separately discuss the role of each and every server type (Report)
Part 3 – Describe the components needed to form a network, and along with the report suggest some of the
Networking devices and its importance with a detailed explanation with valid examples.
1. Prepare a written step-by-step plan of how you are planning to design a Local Area Network (Report)
(Diagram)
2. Justify your choice of devices for your network design.
3. Produce a test plan to evaluate this design for the requirements of bandwidth and cost constraints as per
user specifications. (Table) (Report)
4. Justify and include the security requirements with a new diagram under the default gateway of
192.168.15.1 for the terminals to the diagram designed above and quality of services needed for selection of
accessories.
5. Give out the steps of preparing the Networking cables for real time implementation for the below
mentioned,
1. Explain What is IP and the classes of IP and justify the selection of the class of IP address to the above
designed diagram in part 1(Report)
2. Explain the term Static IP and Dynamic IP with proper steps of configuration (Add relevant screenshots
done during practical session.
3. Show the steps done to complete the process of file sharing (report) (Screenshots)
4. Implement a network you would suggest for a further development according to your point of view with
justification with a detailed diagram
5. Conduct verification and explain pinging process (screenshots)
6. Record the test results and analyze these against expected results. (screenshots)
7. Investigate what functionalities would allow the system to support device growth and the addition of
communication devices.
8. Discuss the significance of upgrades and security requirements in your recommendations. (Report)
190 | P a g e
Shafra Fariz
191 | P a g e
Shafra Fariz
P5 Design a networked to meet a given M3 Install and configure network D2 Design a maintenance
network services services and applications on your schedule to support the
choice. networked system.
P6 Test and evaluate the design to meet
the requirements and analyze user
feedback with the aim of improving
efficiency.
LO4 Implement and diagnose networked systems
192 | P a g e
Shafra Fariz
What is IP Address?
An IP address comprises of four numbers, each number contains one to three digits,
with a solitary spot (.) isolates each number or set of digits. (www.guru99.com, 2021)
Parts of IP Address
193 | P a g e
Shafra Fariz
Addresses in IPv4 are 32-bits in length. This takes into account a limit of 4,294,967,296
(232) special locations. Addresses in IPv6 are 128-bits, which takes into consideration
3.4 x 1038 (2128) novel locations.
The complete usable location pool of the two adaptations is decreased by different
saved locations and different contemplations.
IP addresses are parallel numbers yet are normally communicated in decimal structure
(IPv4) or hexadecimal structure (IPv6) to make perusing and utilizing them simpler for
people.
IP represents Internet Protocol and depicts a bunch of principles and prerequisites for
making and sending information bundles, or datagrams, across networks. The Internet
Protocol (IP) is essential for the Internet layer of the Internet convention suite. In the
OSI model, IP would be viewed as a feature of the organization layer. IP is customarily
utilized related to a more elevated level convention, most prominently TCP. The IP
standard is administered by RFC 791. (www.paessler.com, 2021)
• Postfix: The addition part distinguishes the individual PC on the organization. The
addition is likewise called the host address.
(www.guru99.com, 2021)
194 | P a g e
Shafra Fariz
What is IPv6?
IPv6 is the cutting-edge Internet Protocol (IP) address standard planned to enhance and
at last supplant IPv4, the convention numerous Internet benefits actually use today.
Each PC, cell phone, home robotization part, IoT sensor and some other gadget
associated with the Internet needs a mathematical IP address to impart between
different gadgets. The first IP address conspire, called IPv4, is running out of addresses
because of its broad use from the expansion of such countless associated gadgets.
What is IPv4?
IPv4 represents Internet Protocol rendition 4. It is the basic innovation that makes it
workable for us to interface our gadgets to the web. At whatever point a gadget gets to
the Internet, it is allocated an exceptional, mathematical IP address like 99.48.227.227.
To send information starting with one PC then onto the next through the web, an
information bundle should be moved across the organization containing the IP locations
of the two gadgets.
195 | P a g e
Shafra Fariz
IPv6 (Internet Protocol rendition 6) is the 6th amendment to the Internet Protocol and
the replacement to IPv4. It works correspondingly to IPv4 in that it gives the novel IP
tends to vital for Internet-empowered gadgets to convey. Nonetheless, it has one huge
distinction: it uses a 128-bit IP address.
✓ Auto-arrangement
196 | P a g e
Shafra Fariz
IPv4 utilizes a 32-digit address for its Internet addresses. That implies it can offer help
for 2^32 IP addresses altogether â” around 4.29 billion. That may appear to be a ton,
yet all 4.29 billion IP addresses have now been allocated, prompting the location
deficiency issues we face today.
IPv6 uses 128-digit Internet addresses. Subsequently, it can uphold 2^128 Internet
addresses—340,282,366,920,938,463,463,374,607,431,768,211,456 of them to be
accurate. The quantity of IPv6 addresses is multiple times bigger than the quantity of
IPv4 addresses. So, there are a sizable amount of IPv6 delivers to consider Internet
gadgets to extend for seemingly forever.
197 | P a g e
Shafra Fariz
With Dual-IP stacks, your PCs, switches, switches, and different gadgets run the two
conventions, yet IPv6 is the favored convention. An average method for organizations is
to begin by empowering both TCP/IP convention stacks on the wide territory
organization (WAN) center switches, at that point border switches and firewalls, trailed
by server farm switches lastly the work area access switches.
With IPv6 getting more predominant in cloud supplier and purchaser access
organizations, you may as of now be on the way to IPv6 arrangement with your
organization and applications.
In the event that you are hoping to comprehend IPv6 in your current circumstance there
are three things you ought to screen:
198 | P a g e
Shafra Fariz
ThousandEyes has support for IPv6 so associations can use IPv6 across the entirety of
their test types (web, organization, voice, directing) and specialist types (cloud,
endeavor, endpoint).
ThousandEyes Cloud Agent support for IPv6 is given on six mainland’s permitting
worldwide inclusion for associations. ThousandEyes additionally upholds the utilization
of double stack IPv4 and IPv6 Enterprise Agents. Undertaking Agents can have the two
tends to allotted and executes tests dependent on a client characterized inclination for
just IPv4, just IPv6 or an inclination for IPv6.
(www.thousandeyes.com, 2021)
Web Protocol form 4 (IPv4) is the fourth form of the standard that courses Internet traffic
and other bundle exchanged organizations presented in 1982 by the Internet
Engineering Task Force (IETF). IPv4 is the most generally utilized rendition of the
convention notwithstanding the constraints of its 32-digit address space. With marginally
under 4.3 billion accessible interesting locations, the accessible number of addresses
immediately started to run out. With some smart resourcefulness throughout the long
199 | P a g e
Shafra Fariz
term that all-inclusive the existence of the convention, the pool of accessible locations
didn't evaporate until 2011.
At first, the standard characterized the main octet as an organization identifier, yet with
just 256 interesting qualities, the quantity of accessible organizations immediately ran
out. A few unique changes made over the course of the years have considered the
200 | P a g e
Shafra Fariz
augmentation of IPv4's life. First came the division of the accessible locations into five
classes: A, B, C, D, and E.
• Class An organization's first octet starts with 0. The main octet distinguishes the
organization. Class A backings 127 organizations, each with 16 million hosts.
• Class B organization's first octet starts with 10. The first and second octets
recognize the organization. Class B upports 16,000 organizations, each with
65,000 hosts.
• Class C organization's first octet starts with 110. The initial three octets recognize
the organization. Class C backings 2 million organizations, each with 254 hosts.
• Class D organization's first octet starts with 1110. Class D is held for multicast
gatherings.
• Class E organization's first octet starts with 1111. Class E is held for some time
later.
201 | P a g e
Shafra Fariz
IPv4 Today
CIDR eased back the development of directing tables and broadened the existence of
IPv4 by decreasing the quantity of squandered tends to that tormented the class
framework. CIDR is as yet the most generally utilized organization directing strategy
utilized today for both IPv4 and IPv6 steering.
2011 saw the last dispersion of IPv4 address squares to the five provincial Internet
vaults, one of which ran out of addresses totally inside the following not many months.
202 | P a g e
Shafra Fariz
The individual Internet specialist co-ops keep IPv4 alive by reusing addresses as they
become accessible.
As noted, before, IPv4 has a cap barely shy of 4.3 billion accessible locations. With the
Internet's blast in development and the Internet of Things, the quantity of accessible
locations immediately exhausted. To cure the circumstance, the IETF delivered IPv6
with its 128-digit address space for an almost endless 340 undecillions (340 followed by
37 zeros) accessible locations.
203 | P a g e
Shafra Fariz
In spite of the fact that IPv4 and IPv6 use CIDR to deal with their organization and host
tending to, the two conventions are not tradable. IPv6 likewise fixes numerous other
systems administration issues inalienable in IPv4, for example, more modest directing
tables, worked on parcel headers, and utilizations multicast rather than broadcast.
A solitary gadget can uphold both IPv4 and IPv6. Double stack IP takes into account a
solitary switch, switch, or worker to measure either address space. You can't associate
with an IPv6 just gadget utilizing an IPv4 association and the other way around.
204 | P a g e
Shafra Fariz
Speed of IPv4
A portion of the things IPv4 conveys to expand the quantity of addresses influences
network speed. In the ideal IPv6 climate, IPv6 beats IPv4. Be that as it may, the IPv6
network actually requires work, thus relying upon nearby engineering, IPv4 is frequently
quicker. A calculation called Happy Eyeballs utilized by certain programs will test the
speed of both organization conventions and utilize the quicker form.
The Domain Name System (DNS) upholds the two conventions. The DNS stores the IP
addresses for either or both and reacts to each demand for area name goal with both IP
addresses (A site can have different locations for one or the other convention).
DNS puts IPv4 addresses into the A record. The DNS framework stores IPv6 addresses
in the AAAA record. The customer would then be able to choose which convention to
utilize.
205 | P a g e
Shafra Fariz
address once each moment. A DNS screen can likewise check and confirm different
records contained in your DNS, for example, MX and NS records.
Since the two conventions course to a similar worker doesn't imply that the two
conventions work. Expressly observing IPv6 and IPv4 is conceivable with uptime
checking (for sites and web administrations). Pick either convention in the screen
settings and assign the observing designated spots. For IPv6 assign designated spots
that lone help IPv6 locally or use them all with IPv6 recreation over IPv4.
The free DNS Lookup Tool settle the location. That is, the device questions the DNS
framework and recovers your DNS records. Look down the outcomes and search for the
An and AAAA records. You may have various of either or none of the other.
1. On the off chance that the outcomes incorporate A record, the site upholds IPv4
(most destinations do).
206 | P a g e
Shafra Fariz
2. On the off chance that the outcomes incorporate an AAAA record, the site
upholds IPv6 (more uncommon).
3. In the event that the site has results for both, the site upholds both.
4. IPv6 and IPv4 can exist on a similar gadget with double stack empowered.
5. Cheerful Eyeballs is a calculation that permits the gadget or program to pick the
quicker convention from an objective.
6. IPv6 will at last supplant IPv4, and IPv6 selection develops by 5% every year.
207 | P a g e
Shafra Fariz
7. A site or administration while accessible on one convention may blunder on the other.
Screen both IPv6 and IPv4 addresses for accessibility.
(www.uptrends.com, 2021)
The IPv4 network address is distinguished as the piece savvy consistent AND of the 32-
bit IPv4 address with another 32-digit amount, the netmask. All frameworks with a
similar organization number offer the equivalent netmask (here and there called a
"subnet cover"). This worth is regularly mastered utilizing DHCP.
The subnet cover is coordinated so that each piece with a coherent '1' shows somewhat
in the address esteem that is a piece of the organization number, and an intelligent '0'
for each piece which is a piece of the host number. The netmask might be written in
specked decimal documentation, or then again as a hexadecimal number.
208 | P a g e
Shafra Fariz
A 24-cycle network number leaves a host part of 8 pieces. That is an organization with
space for 254 hosts. (Recollect the host number "0" is saved for the actual organization,
and the all one's host address is saved for use as the organization broadcast address).
Some of the time the netmask is addressed by composing the IP address followed by
as a cut ('/') with the quantity of consective "1" bits used to shape the organization
number. The above netmask can therefore likewise be addressed as "/24" (i.e., there
are 24 '1's before the '0's). Here are a couple of more models:
209 | P a g e
Shafra Fariz
IP is planned to work over an amazing association. This suggests that IP should work
without a central library or screen, and that it can't rely on unequivocal associations or
center points existing. IP is a connectionless show that is datagram-masterminded., so
every group ought to contain the source IP address, target IP address, and other data in
the header to be adequately passed on.
Joined, these factors make IP a problematic, best effort movement show. Bungle cure is
managed by upper-level shows taking everything into account. These shows join TCP,
which is an affiliation arranged show, and UDP, which is a connectionless show.
IP address works in an IP network like a postal area. For example, a postal area
solidifies two areas, address, or your region your home area.
The area or your domain is a get-together location of all houses that have a spot with a
specific locale. The house address is the novel area of your homes around there. Here,
your domain is tended to by a PIN code number.
In this model, the association address contains all hosts which have a spot with a
specific association. The host address is the intriguing area of a particular host around
there. (www.guru99.com, 2021)
210 | P a g e
Shafra Fariz
Examples of IP Versions
There are two adaptations of IP being used today, IPv4 and IPv6. The first IPv4
convention is as yet utilized today on both the web, and numerous corporate
organizations. Nonetheless, the IPv4 convention just considered 232 locations. This,
combined with how locations were allotted, prompted a circumstance where there would
not be sufficient one-of-a-kind locations for all gadgets associated with the web.
IPv6 was created by the Internet Engineering Task Force (IETF), and was formalized in
1998. This update considerably expanded the accessible location space and took into
account 2128 locations. Also, there were changes to improve the effectiveness of IP
parcel headers, just as enhancements to directing and security.
211 | P a g e
Shafra Fariz
4 Types of IP Classes
212 | P a g e
Shafra Fariz
Classes of IP Address
(www.paessler.com, 2021)
213 | P a g e
Shafra Fariz
Header Classes of IP
Before factor length subnet covers permitted organizations of any size to be designed,
the IPv4 address space was broken into five classes.
Class A
In a Class An organization, the initial eight pieces, or the originally dabbed decimal, is
the organization part of the location, with the leftover piece of the location being the host
part of the location. There are 128 potential Class An organization.
0.0.0.0 to 127.0.0.0
214 | P a g e
Shafra Fariz
In any case, any location that starts with 127. is viewed as a loopback address.
2.134.213.2
Class B
In a Class B organization, the initial 16 pieces are the organization part of the location.
All Class B networks have their first piece set to 1 and the subsequent piece set to 0. In
dabbed decimal documentation, that makes 128.0.0.0 to 191.255.0.0 as Class B
organizations. There are 16,384 potential Class B organizations.
135.58.24.17
Class C
In a Class C organization, the initial two pieces are set to 1, and the third piece is set to
0. That makes the initial 24 pieces of the location the organization address and the rest
of the host address. Class C organization delivers range from 192.0.0.0 to
223.255.255.0. There are more than 2 million potential Class C organizations.
215 | P a g e
Shafra Fariz
192.168.178.1
Class D
Class D locations are utilized for multicasting applications. In contrast to the past
classes, the Class D isn't utilized for "ordinary" organizing tasks. Class D locations have
their initial three pieces set to "1" and their fourth piece set to "0". Class D locations are
32-bit network addresses, implying that every one of the qualities inside the scope of
224.0.0.0 – 239.255.255.255 are utilized to interestingly recognize multicast gatherings.
There are no host addresses inside the Class D location space, since every one of the
hosts inside a gathering share the gathering's IP address for collector purposes.
227.21.6.173
Class E
Class E networks are characterized by having the initial four organization address bits
as 1. That includes addresses from 240.0.0.0 to 255.255.255.255. While this class is
held, its utilization was rarely characterized. Therefore, most organization executions
dispose of these locations as illicit or unclear. The special case is 255.255.255.255,
which is utilized as a transmission address.
216 | P a g e
Shafra Fariz
243.164.89.28
217 | P a g e
Shafra Fariz
Inside the location space, certain organizations are held for private organizations.
Bundles from these organizations are not steered across the public web. This gives an
approach to private organizations to utilize inside IP addresses without meddling with
different organizations. The private organizations are
(www.paessler.com, 2021)
218 | P a g e
Shafra Fariz
Static IP Address
Dynamic IP Address
A Dynamic IP address is an IP address that an ISP allows you to utilize briefly. In the
event that a unique location isn't being used, it tends to be naturally allocated to an
alternate gadget. Dynamic IP addresses are appointed utilizing either DHCP or PPPoE.
About DHCP
219 | P a g e
Shafra Fariz
Internet association that utilizes a powerful IP address, the ISP can appoint that IP
address to an alternate client.
You can arrange your Firebox as a DHCP worker for networks behind the gadget. You
allocate a scope of addresses for the DHCP worker to utilize.
About DHCP
220 | P a g e
Shafra Fariz
221 | P a g e
Shafra Fariz
222 | P a g e
Shafra Fariz
File Sharing
223 | P a g e
Shafra Fariz
Right-click on the document, select properties. Snap over to the "Sharing" tab and
select progressed sharing. Check the case stamped "Offer this envelope".
224 | P a g e
Shafra Fariz
225 | P a g e
Shafra Fariz
226 | P a g e
Shafra Fariz
Step 3: Permissions
Select which authorizations you need different clients to have for this document. You
will hold full access; however, others will have either perused just, alter, or executable
consents, contingent upon what you select.
227 | P a g e
Shafra Fariz
228 | P a g e
Shafra Fariz
Go to control board, select organization and web, at that point select organization and
sharing focus. Go to Advanced sharing settings. Look down, and select "Turn on
sharing so anybody with network access can peruse and compose records in the Public
organizers" and "Mood killer secret word secured sharing".
229 | P a g e
Shafra Fariz
Step 5: Note
Guarantee that you can associate with the other PC. Ping each other to check whether
you are both associated with a similar worker.
On the second PC, open document wayfarer. Go to organize. Your document ought to
be there. (www.instructables.com, 2021)
230 | P a g e
Shafra Fariz
What is Ping?
Ping is an association diagnostics mechanical assembly for the Windows request brief.
In network diagnostics, the request line program engages you to check if another PC is
open in a related close by or public association.
Ping is gotten to using the request line brief of a comparative name, either in blend in
with the IP address or the goal PC's host name. If the target PC isn't arranged in a
comparable area network as the source PC, it is critical to demonstrate the region.
231 | P a g e
Shafra Fariz
To affirm a PC's availability, ping sends in its default setting four ICMP resonation
request bundles of 32 bytes each to the area named as a limit.
ICMP (Internet Control Message Protocol) is a show that engages the exchanging of
information and misstep sees inside IPv4 associations. For PC networks using IPv6,
ICMPv6 has a substitution show that can be used therefore.
On a fundamental level and according to the show specific, PCs that assist ICMP with
welling ICMPv6 ought to normally respond to moving toward resonation requests with
an ICMP resonation answer. Before long, this doesn't for the most part work, as various
heads, for security reasons, mastermind the PCs they regulate so ICMP bundles are
excused without a response. Accordingly, the detachment of the target PC can't be
reasoned from an unanswered ICMP request.
In case the world in general objective PC doesn't respond, ICMP gives a notification
from the fitting entryway. Regularly for the present circumstance a switch responds that
either the association or the fitting host isn't available.
If there is no response from the switch, it might be normal that the PC is in all honesty
available anyway isn't normally responding to the resonation request as a result of its
arrangement.
232 | P a g e
Shafra Fariz
• Authenticity period for ICMP bundles (time to live, TTL) (just with IPv4)
The response time decides how long a data package should be sent off the target PC
and back. The authenticity period demonstrated as the TTL looks at to a data package's
taken a break. The basic worth amounts to a furthest reaches of 255. Generally
speaking, executions have a hidden TTL of either 31, 63 or 127. The TTL is diminished
by 1 by every association center point that the data pack passes. This is insinuated as
bobs. Should the TTL drop to 0, the data package is excused.
The TTL that you get as yield consistently thinks about to the responding PC's hidden
worth short the number of ricochets on the course.
With a TTL of 58, for example, you can acknowledge that the response group was
dispatched with a fundamental assessment of 63 and passed five association center
points on the way back. (www.ionos.com, 2021)
233 | P a g e
Shafra Fariz
234 | P a g e
Shafra Fariz
To help present day reserve, Windows is intended to utilize the perfect organization
connector at the perfect time for an Internet association. All cutting-edge backup PCs
have a Wi-Fi connector, yet a few PCs additionally have a portable broadband (MBB)
connector as well as a wired Ethernet connector. During present day reserve, Windows
consequently associates with the best accessible organization. (docs.microsoft.com,
2021)
Communication Device
A specialized gadget is an equipment gadget fit for sending a simple or advanced sign
via phone, other correspondence wire, or remotely.
235 | P a g e
Shafra Fariz
The following is a full posting of the multitude of various kinds of specialized gadgets
you may experience when managing a PC.
• Bluetooth Device
• Infrared Device
• Modem (Over Phone Line)
• Network Card (Using Ethernet)
• Smartphones
• Wi-Fi Device (Using a Wi-Fi router)
Examples
236 | P a g e
Shafra Fariz
A PC can turn out great without a specialized gadget. In any case, for a PC to speak
with different PCs, they need a specialized gadget. For instance, for your PC to
associate with the Internet to see this website page, it needs a specialized gadget.
Without a specialized gadget, you'd need to utilize a tennis shoe net to move or divide
information among PCs. (www.computerhope.com, 2021)
237 | P a g e
Shafra Fariz
238 | P a g e
Shafra Fariz
References
berty.tech, 2021. berty.tech. [Online]
Available at: https://berty.tech/blog/decentralized-distributed-centralized
[Accessed 25 02 2021].
References
berty.tech, 2021. berty.tech. [Online]
Available at: https://berty.tech/blog/decentralized-distributed-centralized
[Accessed 25 02 2021].
239 | P a g e
Shafra Fariz
References
www.computernetworkingnotes.com, 2021. www.computernetworkingnotes.com. [Online]
Available at: https://www.computernetworkingnotes.com/networking-tutorials/computer-networking-
devices-explained-with-function.html
[Accessed 12 03 2021].
240 | P a g e
Shafra Fariz
References
en.ipshu.com, 2021. en.ipshu.com. [Online]
Available at: https://en.ipshu.com/ipv4/192.168.15.1
[Accessed 28 03 2021].
References
docs.microsoft.com, 2021. docs.microsoft.com. [Online]
Available at: https://docs.microsoft.com/en-us/windows-hardware/design/device-
experiences/functionality-wiht-networking-devices
[Accessed 14 04 2021].
241 | P a g e
Shafra Fariz
242 | P a g e