0% found this document useful (0 votes)
82 views243 pages

Networking: Examine Networking Priciples and Their Protocols

This document contains an assignment brief for a networking course. It provides instructions for an assignment on understanding networking concepts according to the current industry. The submission is to be an individual written report in a formal business style. It includes the student name and ID, unit number and title, academic year, assignment title, issue and submission dates, and internal verifier name and date. The format requires using headings, paragraphs and subsections. The goal is for the student to examine networking principles and protocols.

Uploaded by

Muhannad Tadros
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
82 views243 pages

Networking: Examine Networking Priciples and Their Protocols

This document contains an assignment brief for a networking course. It provides instructions for an assignment on understanding networking concepts according to the current industry. The submission is to be an individual written report in a formal business style. It includes the student name and ID, unit number and title, academic year, assignment title, issue and submission dates, and internal verifier name and date. The format requires using headings, paragraphs and subsections. The goal is for the student to examine networking principles and protocols.

Uploaded by

Muhannad Tadros
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 243

2021

Networking

EXAMINE NETWORKING PRICIPLES AND THEIR PROTOCOLS


SHAFRA FARIZ
Shafra Fariz

Acknowledgement

I would like to take this opportunity to thank my lecturer Mr. Shakir Moulana for guiding us
and showing us the correct path throughout this assignment to make it a success. At the
same time, I would like to thank all the lecturers for fullest support and cooperation.
Thank You

1|P ag e
Shafra Fariz

Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and
to present it as my own without attributing the sources in the correct form. I further
understand.
What it means to copy another’s work.

1. . I know that plagiarism is a punishable offence because it constitutes theft.

2. I understand the plagiarism and copying policy of Edexcel UK.

3. I know what the consequences will be if I plagiarize or copy another’s work in any
of the assignments for this program.

4. I declare therefore that all work presented by me for every aspect of my program,
will be my own, and where I have made use of another’s work, I will attribute the
source in the correct way
.
5. I acknowledge that the attachment of this document signed or not, constitutes
a binding agreement between myself and Edexcel UK.

6. I understand that my assignment will not be considered as submitted if this


document is not attached to the assignment.

(Provide E-mail ID)


(Provide Submission Date)
[email protected] 05th February 2021

Student’s Signature:

2|P ag e
Shafra Fariz

Course Tittle Pearson BTECH Level 5 Higher National Diploma in Computing


Unit number and Title: Unit2: Networking
Assignment Title Understanding Networking concepts according to the current industry
Name of the Leaner
Ref. No. of the Leaner Pearson Regd. No. 1016959
Assignment Number 01 Batch No & Semester CSD68 Semester 01
Issue Date 02nd February 2021 Submission Date 04th April 2021

Re-submission Date Date Received 1st Submission


Unit Assessor: Mr. Shakir Moulana Academic Year 2021

Assignment Brief (RQF)


Higher National Diploma in Computing

Assessor Summative Feedback

Grade: Assessor Signature: Date:


Resubmission Feedback – Formative

Grade: Assessor Signature: Date:


Internal Verifier’s Comments

3|P ag e
Shafra Fariz

Signature of the IV Date


Student Agreement : Student Signature:
I understand the feedback given to me and agree to carry out the actions in
future works as required and indicated. Date

Student Name: Assessor Name:

Issue Date: Submission Date: Submitted on:

Programme:

Unit:

Assignment number and title:

STUDENT ASSESSMENT SUBMISSION AND DECLARATION

Plagiarism
Plagiarism is a particular from of cheating. Plagiarism must be avoided at all costs and student who
break the rules, however innocently, may be penalized. It is your responsibility to ensure that you
understand correct referencing practices. As a university level student, you are expected to use
appropriate references throughout and keep carefully detailed notes of all your sources of materials for
material you have used in your work, including any material downloaded from the internet. Please
consult the relevant unit lecturer or your course tutor if you need any further advice.

Student Declaration
Student Declaration
I certify that the assignment Submission is entirely my own work and I fully understand the
consequences of plagiarism. I understand that making a false declaration is a form of
malpractice.

Student Signature: Date:

4|P ag e
Shafra Fariz

SUBMISSION FORMAT

Assignment Task Submission Format


Part 1 Report
1 Part 2 Report
Part 3 Report/ Presentation
Part 4 Report
Part 1 Report
2 Part 2 Report
Part 3 Report
3 Part 1 Practical and Report

4 Part 2 Practical and Report

5|P ag e
Shafra Fariz

ASSESSMENT REVIEW PLAN

Assignment Grading Evidence Formative Comments Date


Criteria
P1 Report
P2 Report
01
M1 Report
D1 Report
P3 Report
P4 Report
02
M2 Report
D1 Report
P5 Practical / Report
P6 Practical / Report
03
M3 Practical / Report
D2 Practical / Report
P4 Report
P5 Report
04
P6 Report
D3 Report

6|P ag e
Shafra Fariz

ASSESSMENT TRACKING
ASSESSMENT RECORD AND FEEDBACK SHEET
Programme: Student Name:

Unit No. & Title: Unit2: Assessment Date: 02nd February Unit Grade:
Networking 2021
Assessor Name: Mr. Shakir Completion Date: 04th April IV Signature:
Moulana 2021

Assignment Learning Objectives Criterial Date Issued Hand In Date Formative Resubmissi
Targeted Feedback on Date*

01 LO1 Basic of Networking P1 02nd February 14th


and Components P2 2021 February
M1 2021
D1
02 LO2 Explain networking P3 02nd February 28th
devices and operations P4 2021 February
M1 2021
D1
03 LO3 Design efficient P5 02nd February 12th March
networked systems P6 2021 2021
M3
D2
04 LO4 LAN Design & P7 02nd February 28th March
Implementation P8 2021 2021
M4
D3

7|P ag e
Shafra Fariz

SUMMATIVE FEEDBACK

Assignment Grading Summative Comments Assessor


No. Criteria signature
P1
01
P2
M1
D1
P3
02 P4
M2
D1
P5
03 P6
M3
D2
P7
04 P8
M4
D3

Pearson Higher Nationals in


Computing
8|P ag e
Shafra Fariz

Unit 2: Networking
Assignment 1

9|P ag e
Shafra Fariz

Higher National Certificate/Diploma in Computing

Assignment Brief
Student Name/ID Number 1016959
Unit Number and Title 2: Networking
Academic Year 2021
Unit Author Mr. Shakir Moulana
Assignment Title Understanding Network Concepts according to the
current industry
Issue Date 02nd February 2021
Submission Date 04th April 2021
IV Name & Date Mr. Sai Thishok – 01st February 2021

Submission Format
The submission is in the form of an individual written report. This should be written in a concise, formal business
Style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as
Appropriate, and all work must be supported with research and referenced using the Harvard referencing system.
Please also provide a bibliography using the Harvard referencing system.

10 | P a g e
Shafra Fariz
Unit Learning Outcomes
LO1 Examine networking principles and their protocols.
LO2 Explain networking devices and operations.
Assignment Brief and Guidance
Most Universities admired in private Higher Education Institute in Colombo, Sri Lanka. Administration and the
academic staff are very much concerned about providing required facilities for the students in the field of
Network. Networking computers is not the complicated process it used to be. What used to be along drawn out
process is now made easier and more efficient, causing less distraction and disruption in organizations.

Imagine that you are a network specialist working for your company Speed tech in a start-up level position. So
Before starting the process study the basics of Networking. Talk to the organization thinking about moving to the
Best of Networking industry taking the new technological improvement into consideration.
You will need to produce an outcome on the networking development process to the organization that includes
the

following:
1. The growth of the Network
2. Detailing of the new networking technologies introduced
3. The outcome that will be gained through Network considering the networking principles, protocols and
devices, including benefits and constraints of networked solutions, the impact of network topology,
communication and bandwidth requirements, effectiveness of networking systems, operating principles of
Networking devices and server types and networking software.

During the process in terms of working in the organization you are supposed to go through in depth process on
Designing and implementing a local area network. You are supposed to follow the below steps below according
to the requirement by the organization

• A LAN design plan and justification document.


• A fully completed test plan including an evaluation of results and recommendations for improvements to
LAN.
• A proposed and justified maintenance schedule.
• Evidence of an implemented network.

And you are ask to analyse the specification from the institution above for completion of this project within a
given timeframe.
The LAN design that you are about to design should be well planned thinking out of the box which will make an
Effective result on the designed LAN network. After the designing process is completed.

The concept to go through with LAN design is to design a network diagram to implement to a start-up
Organization with relevant requirements and configurations. The network system should be under the
default
Gateway of 192.168.10.1 allocating 10 terminals including a server with proper configurations.

Submission Format

11 | P a g e
Shafra
Part 1-Fariz
*Discuss the importance of Networking to the current trend by considering the real world on how the
industry moves and how the past network was used going through the relevant concepts in the networking sector,
with valid examples in your explanation. (note – you could also include the roles of networking, types of networking
and further more)
*Finally justify the Importance of introducing Networking to speed tech as described in the scenario.

*Further Discuss the benefits and constraints of different Networking systems types (eg. peer based, client-server)
explanation should be in brief with related networking diagrams
*With comparison discuss the pros and Cons of Networking systems discussed above (Report)

Part 2- Speed tech is planning to get a broadband (ADSL) internet connection from SLT. They are providing ZTE
ADSL wireless router (ZXV10-W300) with the internet connection. Wi-Fi is considered as the main networking
technology when it comes to implementing Wireless Local Area Networks.
*Briefly explain on the Wi-Fi technology and its standard meanwhile analyzing the features and provide strengths
and weakness of Wireless ADSL Router, in order give a brief on the transmission media and the components of it
➢ Guided media
➢ Unguided media
*You also need to discuss on some of the ISP (Internet Service Providers) in Sri Lanka on their growth and
expansion giving out some examples considering the current industry.

*Finally come to a valid justification detailing on the most suitable technology considering the Ethernet or WIFI
To be used in speed tech.

Part 3- As discussed above in the assignment brief and guidance, Imagine, with the position your holding in the
organization you are working in the networking industry and your supposed to create and present a presentation
explaining the basics of networking components to speed tech. *
In your Presentation Use appropriate images, diagrams and tables in the presentation and use technical language
accurately.
*Discuss all the factors needed to form a Networking environment according to your point of view. Information’s
should be added to the slide to the point and not more than 15 slides (Presentation) (Report)

Part 4- *Explain the term Network Topology and the uses of it in the industrial exposure through a research on the
growth of the network history.
*Describe the types of Networking Topologies briefly to the point with related diagrams and comparison. (Note:
explanations should be in detail with examples)
*Considering the topologies select a topology which is the most suitable to the scenario in order to implement the
client-server architecture in the lab with relevant diagram and Justification considering the part 1 on Networking
Systems. (Report)

LO2 - Explain networking devices and operations

Part 1- *Discuss how OSI model and network protocols enable effective utilization of different networking systems.
(Note: detailed definition for each of the OSI layers defined.

12 | P a g e
Shafra Fariz
You may discuss how it allows multiple-vendor development through standardization of network components.
*In the discussion further discuss the functions of a protocol and explain each protocols defined with examples
and short answers to the point.
* When it is a network obviously there is a data flow, finally discuss the importance of data flow and the types
of data flow in the current networking environment with related diagrams and real world examples. (Report)

Part 2- When it is in the network environment working on with servers which is common now a days.
*Describe the term server and its key functions accordingly in your point of view and select server types that are
most suitable for the given scenario and separately discuss the role of each and every server type (Report)

Part 3 – Describe the components needed to form a network, and along with the report suggest some of the
Networking devices and its importance with a detailed explanation with valid examples.

LO3 - Design efficient networked systems

1. Prepare a written step-by-step plan of how you are planning to design a Local Area Network (Report)
(Diagram)
2. Justify your choice of devices for your network design.
3. Produce a test plan to evaluate this design for the requirements of bandwidth and cost constraints as per
user specifications. (Table) (Report)
4. Justify and include the security requirements with a new diagram under the default gateway of
192.168.15.1 for the terminals to the diagram designed above and quality of services needed for selection of
accessories.
5. Give out the steps of preparing the Networking cables for real time implementation for the below
mentioned,

➢ Straight Through Cabling


➢ Cross over cabling

Part 2 Implement test and diagnose networked systems

1. Explain What is IP and the classes of IP and justify the selection of the class of IP address to the above
designed diagram in part 1(Report)
2. Explain the term Static IP and Dynamic IP with proper steps of configuration (Add relevant screenshots
done during practical session.
3. Show the steps done to complete the process of file sharing (report) (Screenshots)
4. Implement a network you would suggest for a further development according to your point of view with
justification with a detailed diagram
5. Conduct verification and explain pinging process (screenshots)
6. Record the test results and analyse these against expected results. (screenshots)
7. Investigate what functionalities would allow the system to support device growth and the addition of
communication devices.
8. Discuss the significance of upgrades and security requirements in your recommendations. (Report)

Learning Outcomes and Assessment Criteria

Pass Merit Distinction

13 | P a g e
Shafra Fariz

LO1 Examine networking principles and their protocols


P1 Discuss the benefits and M1 Compare common networking
constraints of different network principles and how protocols enable LO1 & 2
types and standards. the effectiveness of networked D1 Considering a given scenario,
systems. identify the topology protocol
P2 Explain the impact of network selected
topology, communication and for the efficient utilization of a
bandwidth requirements. networking system.
LO2 Explain networking devices and operations
P3 Discuss the operating principles M2 Explore a range of server types
of networking devices and server and justify the selection of a server,
types. considering a given scenario
regarding cost and performance
P4 Discuss the inter-dependence of optimisation.
workstation hardware with relevant
networking software.

14 | P a g e
Shafra Fariz

Learning Outcomes and Assessment Criteria

Pass Merit Distinction

LO3 Design efficient networked systems

P5 Design a networked to meet a given M3 Install and configure network D2 Design a maintenance
network services services and applications on your schedule to support the
choice. networked system.
P6 Test and evaluate the design to meet
the requirements and analyse user
feedback with the aim of improving
efficiency.
LO4 Implement and diagnose networked systems

P7 Implement a networked system based M4 Recommend potential D3 Use critical reflection to


on a prepared design. enhancements for the networked evaluate own work and justify
systems. valid conclusions.
P8 Document and analyse test results
against expected results.

15 | P a g e
Shafra Fariz

Table of Contents
Computing .............................................................................................................................................. 8
Assignment Brief ................................................................................................................................... 10
Importance of Networking .............................................................................................................. 19
File Sharing ..................................................................................................................................... 19
Printers............................................................................................................................................. 20
Sharing Media ................................................................................................................................. 20
Media Center Server ...................................................................................................................... 20
Video Games................................................................................................................................... 20
The Current Trend Networking ...................................................................................................... 20
Internet Service Provider ................................................................................................................ 20
Wi – Fi .............................................................................................................................................. 21
Switches and Firewall ..................................................................................................................... 22
Past Network Success and Unsuccessful Development .......................................................... 22
Huge interests in Security: Message Aware Networking............................................................. 23
Convergence ................................................................................................................................... 25
Ethernet: 1G Vs 10G Design ......................................................................................................... 26
Network Failure and Success ........................................................................................................ 27
Requirement for Success ............................................................................................................... 28
Wireless Industry Trend ................................................................................................................. 29
Introduction of Networking ............................................................................................................. 30
Examine Networking Principles and Their Protocols ................................................................ 31
What is a Purpose of The Network? ............................................................................................. 32
Purpose of Networks file and Data Sharing.................................................................................. 32
What is Network Resources? ......................................................................................................... 33
Basic Network Resources .............................................................................................................. 33
Network Types .................................................................................................................................. 33
LAN – Local Area Network ............................................................................................................. 33
WAN – Wide Area Network ............................................................................................................ 34
WLAN – Wireless Local Area Network ......................................................................................... 34
Network Models ................................................................................................................................ 35
Peer-to-Peer Network ..................................................................................................................... 36

16 | P a g e
Shafra Fariz

Client/Server Networking Model .................................................................................................... 36


Comparing peer-to-peer network and Client/Server Network Models ....................................... 37
Server types: centralized based .................................................................................................... 38
Types of Server:................................................................................................................................ 39
Types of Server: Cluster Based ..................................................................................................... 39
Server Type: Cloud Based ............................................................................................................. 39
Server Type: Virtualized Based ..................................................................................................... 39
Centralized Computing versus Distributed Computing ............................................................ 40
The Importance of Different Systems............................................................................................ 40
Centralized Systems ....................................................................................................................... 41
Decentralized Systems................................................................................................................... 43
Distributed System.......................................................................................................................... 46
Centralized vs Decentralized vs Distributed Systems Comparison ............................................... 48
Fault Tolerant .................................................................................................................................. 48
Maintenance .................................................................................................................................... 49
Scalability......................................................................................................................................... 49
Development ................................................................................................................................... 49
Evolution .......................................................................................................................................... 49
Final Thought about Centralized and Decentralized.................................................................... 50
The Growth of the Networking ....................................................................................................... 51
Introduction ...................................................................................................................................... 51
History of Networking ..................................................................................................................... 53
Explain about Growth of Networking ............................................................................................. 55
Types of Topologies ........................................................................................................................ 57
Mesh Topology................................................................................................................................ 58
Advantages of Mesh topology ....................................................................................................... 59
Disadvantage of Mesh Topology ................................................................................................... 60
Star Topology .................................................................................................................................. 60
Advantages of Star geography ...................................................................................................... 61
Disadvantage of Star topology....................................................................................................... 62
Bus Topology .................................................................................................................................. 62
Advantages of Bus Topology ......................................................................................................... 63
Disadvantage of Bus Topology ...................................................................................................... 63

17 | P a g e
Shafra Fariz

Ring Topology ................................................................................................................................. 63


Disadvantage of Ring Topology .................................................................................................... 65
Hybrid Topology .............................................................................................................................. 65
Advantage of Hybrid topology........................................................................................................ 66
Disadvantage of Hybrid topology................................................................................................... 66
Topology Types............................................................................................................................... 67
References .......................................................................................................................................... 239
References .......................................................................................................................................... 239

18 | P a g e
Shafra Fariz

Importance of Networking

A network is at least two PCs associated together to divide data and documents among

them. Networks aren't the solitary ones that can profit by making a network. Home
clients can appreciate sharing music, motion pictures and printers from any PC.

File Sharing

PCs associated with a network can impart records and archives to one another. PCs
associated with a business network can pick which file and envelopes are accessible to
share on the network.

19 | P a g e
Shafra Fariz

Printers

PCs can print pages to another PC with a printer on the network. Also, printers can be
associated utilizing a print worker, which permits direct printing from all PCs.

Sharing Media

Sharing media between PCs is simple when associated with a network. Like document
sharing, PCs can transfer pondering, recordings and films starting with one PC then
onto the next.

Media Center Server

A media focus worker can store your whole diversion library on a unified center to give
speedy admittance to your media from each PC on your network.

Video Games

Comfort and PC gamers profit by systems administration moreover. You can


undoubtedly set up multiplayer demise coordinates and even host your own game
worker. (www.techwalla.com, 2021)

The Current Trend Networking

Internet Service Provider

20 | P a g e
Shafra Fariz

By definition, a PC network basically permits PCs to trade information. In these terms,


the Internet is basically the world's most popular PC organization. Thus, quite possibly
the main organization administrations to the two homes and organizations are your
Internet Service Provider (ISP). Society is utilizing the Internet all the more frequently
and for additional things – everything from downloading applications to tuning in to
music to accounting. These exercises take transmission capacity, which can be
estimated by the measure of information moved throughout some undefined time frame
or by the speed of downloads and transfers. ISPs can force a data transmission cap
when a channel gets over-burden. Later on, ISPs will probably begin checking your data
transfer capacity and charging for overages. For organizations, this could wind up being
a massive expense. Off-site network reinforcements specifically take up a great deal of
transmission capacity. At the point when you're taking a gander at your reinforcement
arrangement, ask your IT supplier how much data transmission you can hope to utilize
every month – it very well may be something you'll have to begin working into your
spending plan. Guarantee you have a marketable strategy, not a home arrangement,
from your ISP. A great deal of private ventures actually utilizes a home arrangement,
which doesn't consider business needs. Additionally, field-tested strategies generally
offer a specific measure of ensured uptime for your Internet association. A few
organizations even decide to purchase two Internet plans from two diverse ISPs, if
Internet uptime is vital for business tasks. This choice could be essential for your
general business coherence arranging.

Wi – Fi

Wi-Fi is the ISO (International Organization for Standardization) name for remote
innovation that permits an electronic gadget to trade information or associate with the
Internet utilizing radio waves. You ought to guarantee your PC equipment is viable with
both the current and arising remote frequencies. It's ideal to check with your IT supplier

21 | P a g e
Shafra Fariz

prior to buying, and they can likewise play out a site evaluation of your business area to
decide the best remote arrangement and the equipment to supplement it.

Switches and Firewall

Not exclusively are we utilizing the Internet for an ever-increasing number of things,
however the information records we're moving across networks are getting greater and
greater. Since switches are utilized to interface gadgets together on a PC network, and
the information passed between gadgets is developing, fresher switches can deal with
higher volumes of information. Consider putting resources into business-grade switches
that can deal with the everyday activities of your business. Switches that can just deal
with low volumes of information will back everything off, including your print
occupations. It's additionally a smart thought to have a reinforcement switch for each
port. Likewise, in light of the fact that ports are entryways into your organization, you
need to have a decent firewall – something to keep undesirable traffic out. Cisco offers
amazing business-grade arrangements that can perform programmed and proactive
updates and infection examines, while home and independent company arrangements
normally require manual updates. (sysgen.ca, 2021)

Past Network Success and Unsuccessful Development

22 | P a g e
Shafra Fariz

Huge interests in Security: Message Aware Networking

All messages examined by security passages

2. Remote (WiFi) is spreading (Intel Centrino)

3. More Cell telephones than POTS.

Shrewd Cell telephones w PDA, email, video, pictures -Mobility

23 | P a g e
Shafra Fariz

4. Broadband Access is becoming quicker than mobile phones

Fiber is crawling towards home

5. Ethernet stretching out from Enterprise to Access to Metro …

6. wiring more costly than gear Wireless Access

7. Multi-Protocol Label Switching for traffic designing

8. Voice over Internet Protocol (VOIP) is in the Mainstream

9. Multi-administration IP: Voice, Video, and Data

10. Terabyte/Petabyte stockpiling (Not VoD) High-Speed Networking

Network Storage. Work area search. Large interests in Security: Message Aware
Networking

All messages examined by security passages

2. Remote (WiFi) is spreading (Intel Centrino)

3. More Cell telephones than POTS.

Shrewd Cell telephones w PDA, email, video, pictures Mobility

24 | P a g e
Shafra Fariz

4. Broadband Access is becoming quicker than mobile phones

Fiber is crawling towards home

5. Ethernet stretching out from Enterprise to Access to Metro …

6. wiring more costly than gear Wireless Access

7. Multi-Protocol Label Switching for traffic designing

8. Voice over Internet Protocol (VOIP) is in the Mainstream

9. Multi-administration IP: Voice, Video, and Data

10. Terabyte/Petabyte stockpiling (Not VoD) High-Speed Networking

Network Storage. Work area search.

Convergence

Distance: LAN versus MAN

• Services: Data, Voice, Video

• Phy: Circuit exchanged versus Packet exchanged

25 | P a g e
Shafra Fariz

• L2 Protocols: Ethernet and SONET

• L3 Protocols: IP

• HTTP: Hyper-Application Access convention

Ethernet: 1G Vs 10G Design

1G Ethernet

• 1000/800/622 Mbps Single information rate

• LAN removes as it were

• No Full-duplex as it were

• Shared Mode

• Changes to CSMA/CD

10G Ethernet

• 10.0/9.5 Gbps The two rates.

26 | P a g e
Shafra Fariz

• LAN and MAN distances

• Full-duplex as it were

• No Shared Mode

• No CSMA/CD convention

• No distance limit because of MAC

• Ethernet End-to-End

Network Failure and Success

• 1980: Broadband (versus baseband) Ethernet

• 1984: ISDN (versus Modems)

• 1986: MAP/TOP (versus Ethernet)

• 1988: Open System Interconnection (OSI) versus TCP/IP

• 1991: Distributed Queue Dual Bus (DQDB)

27 | P a g e
Shafra Fariz

• 1994: CMIP (versus SNMP)

• 1995: FDDI (versus Ethernet)

• 1996: 100BASE-VG or AnyLan (versus Ethernet)

• 1997: ATM to Desktop (versus Ethernet)

• 1998: Integrated Services (versus MPLS)

• 1999: Token Rings (versus Ethernet)

Requirement for Success

• Ease: Low startup cost Evolution

• Elite

• Executioner Applications

• Convenient fruition

• Reasonability

28 | P a g e
Shafra Fariz

• Interoperability

• Concurrence with heritage organizations

• Existing framework is a higher priority than new

• innovation (IPv4 versus IPv6, Overcast versus IP multicast)

Wireless Industry Trend

• Remote industry is more grounded than wireline.

• Especially solid development in non-industrial nations.

• 48% of worldwide telco incomes coming from remote

• 26% of remote incomes coming from information (versus voice)

• Past: Voice, email, SMS, Ring tones

• Present: Push, Gaming, Pictures, Instant Messaging

• Future: Music, Video, Location, Remote checking, mcommerce

• Long haul: Video communication, far off big business applications,

29 | P a g e
Shafra Fariz

• Distant administration, Multiparty coordinated effort, (www.cse.wustl.edu, 2005)

Introduction of Networking

PC's networks are the main impetus behind the advancement of PC frameworks and
permit clients to get to information, equipment, and administrations paying little heed to
their area. Being proficient about the basic standards of systems administration is of
crucial significance to all IT experts. Systems administration is a climate that is
progressively unpredictable and under constant turn of events. Complex PC organizing
has associated the world by the gatherings of little organizations through web connects
to help worldwide correspondences. It underpins admittance to advance data
whenever, anyplace utilizing numerous applications like, sound, and video transmission,
including the World Wide Web, and this has opened the conduits to the accessibility of
data.

30 | P a g e
Shafra Fariz

Examine Networking Principles and Their Protocols

Job of network: Purpose, benefits, asset suggestions, correspondences, working


practice, business opportunity, data sharing, joint effort. Framework types: Peer-based,
customer worker, cloud, bunch, brought together, virtualized. Systems administration
principles: Conceptual models for example: OSI model, TCP/IP model; principles:

For example: IEEE 802.x. Geography: Logical for example Ethernet, Token Ring;
physical for example Star, Ring, Bus, Mesh, Tree, Ring. Conventions: Purpose of
conventions; steered conventions

for example: IPv4, IPv6, IPv6 tending to, Global unicast, Multicast, Link nearby, Unique
neighborhood, EUI 64, Auto Configuration, FTP, HTTP, SMTP, POP3, SSL; the board
of protocols for addressing.

31 | P a g e
Shafra Fariz

What is a Purpose of The Network?

Purpose of Networks file and Data Sharing

Asset sharing e.g. printers


Information Protection and Redundancy
Here and there site stockpiling and reinforcements for the organization
Simplicity of Administration
Normalize conventions
Uniform programming establishment, security and updates for network PCs
Inward Communications
Moment
Cooperative programming and booking
Disseminated Computing Power
Accelerate preparing of enormous errands by utilizing the force of all or a portion of the
organized PC's

32 | P a g e
Shafra Fariz

What is Network Resources?

Basic Network Resources

Copper Ethernet cabling


For example, CAT 5, CAT 6, CAT 7, quicker the better
Worker with Network Operating System (Not required for distributed organizations)
Customer PC's with Operating framework
Switch – Allows different devices (Such as customers, printers and so forth) to be
associated

Network Types

Networks are arranged by their geographic inclusion and size.


The two most regular organization arrangements are neighborhood (LANs) and wide
zone organizations (WANs).

LAN – Local Area Network

An information network limited to a solitary geographic area and ordinarily incorporates


a moderately little territory, for example, a place of business or school.
The capacity of the LAN is to interconnect workstation PCs to share records and assets.

33 | P a g e
Shafra Fariz

On account of its confined nature, the LAN regularly is fast and less expensive to set up
than a WAN.

WAN – Wide Area Network

A Network that traverses more than one geographic area, regularly interfacing isolated
LANs.
WANs are slower than LANs and regularly require extra and expensive equipment like
switches, devoted rented lines, and muddled execution systems.
MAN – Metropolitan Area Network

Sporadically, a WAN will be referred to as a Metropolitan Area Network (MAN) when it


is restricted to a specific geographic zone, like a college grounds or city. No
conventional rules direct the contrasts between a MAN and a WAN. Actually, a MAN is
a WAN. Maybe thus, the term MAN is utilized less much of the time than WAN. In the
event that any qualification exists, it's that a MAN is more modest than a WAN. A MAN
is quite often greater than a LAN and as a rule is more modest than or equivalent to a
WAN. Monitors utilize an Internet specialist organization (ISP) or media communications
(telco) supplier.

WLAN – Wireless Local Area Network

34 | P a g e
Shafra Fariz

A remote neighborhood (WLAN) gives remote organization correspondence over short


distances utilizing radio or infrared signals rather than conventional organization
cabling.

A WLAN is a kind of neighborhood (LAN).

WLAN's utilization Wireless passages (APs) which have a transmitter and recipient
(handset) gadget used to make a remote LAN (WLAN).

APs ordinarily are a different organization gadget with an underlying receiving wire,
transmitter, and connector.

APs utilize the remote foundation network mode to give an association point among
WLANs and a wired Ethernet LAN.

Network Models

You can look over two fundamental wired organization models: distributed and
customer/worker.

The model utilized for an organization is dictated by a few components, including how
the organization will be utilized, the number of clients will be on the organization, and
budgetary contemplations.

These two are:


Peer-to- Peer Networking Model
Client/Server Networking Model

35 | P a g e
Shafra Fariz

Peer-to-Peer Network

A decentralized Network model contribution no incorporated stockpiling of information or


brought together authority over the sharing of records or assets.
All system peer-to-peer distributed Network can share the assets on their local PC and
use assets of different frameworks.
Peer-to-peer are less expensive and simpler to execute than client/server networks,
making them an ideal answer for conditions wherein financial plans are a worry.
Doesn't function admirably with huge quantities of PC frameworks. As a shared peer-to-
peer network, it turns out to be progressively muddled to explore and get to records and
assets associated with every PC since they are dispersed all through the network.

The absence of centralized data stockpiling makes it hard to find and back up key files.

Despite the fact that there is no hypothetical breaking point to the size of a shared peer-
to-peer network, execution, security, and access become a significant cerebral pain on
peer-based network as the quantity of PCs increments. What's more, Microsoft forces a
constraint of just 5, 10 or 20 simultaneous customer associations with PCs running
Windows.

Client/Server Networking Model

Truly, the most broadly executed model and the one you are well on the way to
experience when working in genuine conditions.

The benefits of the client/server framework are that it is a concentrated model and it
empowers unified organization the board of all network administrations, including client
the executives, security, and reinforcement strategies.

36 | P a g e
Shafra Fariz

Regularly requires in fact talented staff to execute and deal with the network. This, and
the expense of devoted worker equipment and programming, expands the expense of
the client/server model.

Notwithstanding this, the upsides of concentrated administration, information


stockpiling, organization, and security make the client/server network the organization
model of decision

Comparing peer-to-peer network and Client/Server Network Models

Attributes
Peer-to-peer Network Model
Client/Server Network Model
Size
Suggested a maximum of 10 PCs
The size of the network is restricted exclusively by worker size, network equipment, and
financial plan. It can have a large number of associated frameworks
Network
Every individual is liable for the network of their own framework. An overseer isn't
required.
A gifted organization director is regularly needed to keep up and deal with the network.
Security
Every individual is liable for keeping up security for local files and devices connected to
the system. Security is overseen from a focal area however regularly requires a talented
executive to accurately design. Cost Simple to arrange and set up. Regularly requires
complex arrangement techniques and gifted staff to set up.

37 | P a g e
Shafra Fariz

Server types: centralized based

Foundation based network utilizing a NOS/Server designed to help an organization of


equipment and programming assets having a place with a whole organization
Empowers network availability, correspondence, activities and the executives of an
organization.
Gives the correspondence way and administrations between clients, measures,
applications, administrations and outer networks/the Internet.
A common network framework incorporates:
Networking Hardware:
• Routers
• Switches
• LAN Cards
• Wireless Router Cables
Networking Software:
• Network operation and management operating systems
• Firewall
• Network security applications
Network Services:
• T-1 Line
• DSL
• Satellite
• Wireless Protocols
• IP Addressing

38 | P a g e
Shafra Fariz

Types of Server:

Types of Server: Cluster Based

A gathering of workers that cooperate and act like a solitary framework


Empowers high accessibility, if a worker in the server cluster the leftover workers take
up the strain.
Empowers load balancing
Empowers parallel processing

Server Type: Cloud Based

Access of networking administration assets from a centralized third-party provider Wide


Area Networking (WAN) or Internet-based admittance innovations.
The facilitating, storage, and conveyance of figuring as an assistance instead of an
item.
The end user gets to distantly put away projects and different assets through the
Internet without the requirement for costly local networking devices, administrations,
and backing.

Server Type: Virtualized Based

Virtual networking administration is an innovation that encourages the control of at least


one distantly found PCs or workers over the Internet.
Equipment and programming network assets and organization usefulness are
consolidated in a solitary, programming based managerial element.
Information can be put away and recovered, programming can be run and peripherals
can be worked through a Web program as though the inaccessible equipment were
nearby.

39 | P a g e
Shafra Fariz

Outer virtualization can be utilized to consolidate a few LAN's into one VLAN for simpler
administration.
Inward virtualization single framework with programming holders to imitate an actual
organization with programming.
For instance Microsoft Virtual Server utilizes virtual machines to make a "network in a
case". Its compartments can run Microsoft Windows, Mac or Linux.

Centralized Computing versus Distributed Computing

These terms depict where the organization preparing happens.


In an incorporated registering model, one framework gives both the information
stockpiling and preparing power for customer frameworks.
This systems administration model is frequently connected with PC centralized
computers and stupid terminals, where no preparing or capacity ability exists at the
workstation.

These organization conditions are uncommon, however they do in any case exist.
A disseminated network model has the handling power appropriated between the
customer frameworks and the worker. Most present day networks utilize the
appropriated network model, where customer workstations share in the preparing
duties.

The Importance of Different Systems

The concentrated versus decentralized versus appropriated frameworks banter is


pertinent to the two people and associations. It influences nearly every individual who
utilizes the web. It's at the center of the turn of events and advancement of
organizations, monetary frameworks, organizations, applications, web administrations,
and the sky is the limit from there.

40 | P a g e
Shafra Fariz

While every one of these frameworks can work successfully, some are steadier and
secure than others by plan. Frameworks can be little, interconnecting a couple of
gadgets and a small bunch of clients. Or on the other hand they can be huge and length
nations and mainland’s. In any case, they face similar difficulties: adaptation to non-
critical failure, upkeep expenses, and adaptability.

The actual web is the world's biggest organization. So huge truth be told that it unites all
these various frameworks into a tremendous computerized biological system. Be that as
it may, for most associations and people, utilizing every one of these frameworks isn't
attainable. They need to pick. What's more, you may need to pick, as well.

Centralized Systems

In a brought together framework, all clients are associated with a focal organization
proprietor or "worker". The focal proprietor stores information, which different clients can
get to, and furthermore client data. This client data may incorporate client profiles, client
41 | P a g e
Shafra Fariz

created substance, and that's just the beginning. A brought together framework is not
difficult to set up and can be grown rapidly.

Be that as it may, this framework has a significant restriction. On the off chance that the
worker crashes, the framework no longer works appropriately and clients can't get to the
information. Since an incorporated framework needs a focal proprietor to interface the
wide range of various clients and gadgets, the accessibility of the organization relies
upon this proprietor. Add to that the conspicuous security worries that emerge when one
proprietor stores (and can get to) client information, and it's straightforward why
incorporated frameworks are not, at this point the best option for some associations.

Pros

• Straightforward network
42 | P a g e
Shafra Fariz

• Can be grown rapidly

• Moderate to keep up

• Pragmatic when information should be controlled halfway

Cons

• Inclined to disappointments

• Higher security and protection chances for clients

• Longer access times to information for clients who are a long way from the
worker

Decentralized Systems

As its name suggests, decentralized frameworks don't have one focal proprietor. All
things being equal, they utilize different focal proprietors, every one of which generally
stores a duplicate of the assets clients can get to.

43 | P a g e
Shafra Fariz

A decentralized framework can be similarly as helpless against crashes as a


concentrated one. Nonetheless, it is by plan more open minded to flaws. That is on the
grounds that when at least one focal proprietors or workers fizzle, the others can keep
on giving information admittance to clients.

Assets stay dynamic if at any rate one of the focal workers keep on working. Typically,
this implies that framework proprietors can fix broken workers and address some other
issues while the actual framework keeps on running of course.

Worker crashes in a decentralized framework may influence the exhibition and limit
admittance to some information. Yet, regarding generally framework uptime, this
framework offers a major improvement over a brought together framework.

Another bit of leeway of this plan is that the entrance time to the information is
frequently quicker. That is on the grounds that proprietors can make hubs in various
districts or regions where client action is high.

44 | P a g e
Shafra Fariz

Nonetheless, decentralized frameworks are as yet inclined to a similar security and


protection dangers to clients as unified frameworks. And keeping in mind that their
adaptation to internal failure is higher, this includes some major disadvantages. Keeping
a decentralized framework is typically more costly.

Pros
• More averse to fall flat than a concentrated framework

• Better execution

• Takes into account a more different and more adaptable framework

Cons

• Security and protection dangers to clients

• Higher support costs

• Conflicting execution when not appropriately improved

45 | P a g e
Shafra Fariz

Distributed System

A circulated framework is like a decentralized one in that it doesn't have a solitary focal
proprietor. Be that as it may, going above and beyond, it wipes out centralization. In a
disseminated framework, clients have equivalent admittance to information, however
client advantages can be empowered when required. The best illustration of a huge,
disseminated framework is simply the web.

46 | P a g e
Shafra Fariz

The dispersed framework empowers clients to share responsibility for information.


Equipment and programming assets are likewise distributed between clients, which
sometimes may improve the presentation of the framework. An appropriated framework
is protected from the free disappointment of parts, which can improve its uptime
impressively.

Circulated frameworks have developed because of the constraints of different


frameworks. With expanding security, information stockpiling, and protection concerns,
and the steady requirement for improving execution, dispersed frameworks are the
common decision for some associations.

It's nothing unexpected then that advances utilizing the dispersed framework – most
remarkably the block chain – are changing numerous enterprises.

Pros

• Fault-tolerant
• Transparent and secure
• Promotes resource sharing
• Extremely scalable

Cons

47 | P a g e
Shafra Fariz

• More hard to send


• Higher upkeep costs

Centralized vs Decentralized vs Distributed Systems Comparison

Since you have a superior comprehension of each framework, how about we perceive
how these frameworks contrast and each other. The accompanying straight on
examination centers around key focuses like adaptation to internal failure, support,
adaptability, advancement, and development. For every one of these, we are utilizing
basic appraisals like low, moderate, and high.

Fault Tolerant

• Low: Centralized frameworks

• Moderate: Decentralized frameworks

• High: Distributed frameworks

48 | P a g e
Shafra Fariz

Maintenance

• Low: Centralized frameworks

• Moderate: Decentralized frameworks

• High: Distributed frameworks

Scalability

• Low: Centralized frameworks

• Moderate: Decentralized frameworks

• High: Distributed frameworks

Development

• Moderate: Decentralized frameworks, Distributed frameworks

• High: Centralized frameworks

Evolution

• Low: Centralized frameworks

49 | P a g e
Shafra Fariz

• High: Decentralized frameworks, Distributed frameworks

Final Thought about Centralized and Decentralized

As should be obvious, there are favorable circumstances and hindrances to each


framework. Concentrated frameworks assisted the primary organizations with
developing and were the solitary decision before decentralized frameworks started to
arise.

Less inclined to disappointment and offering quicker access times, decentralized


frameworks have given a significant improvement over the old frameworks. They keep
on being particularly being used today, particularly since throughout the long term they
have gotten more reasonable.

Notwithstanding, it's just circulated situation that dispense assets and rights across the
entire organization. Thusly, they are amazingly lenient to shortcomings as well as more
straightforward than different frameworks. As the appropriation of circulated frameworks
brings down their arrangement and support costs, these frameworks will probably
demonstrate a propelled decision in the years to come. (berty.tech, 2021)

50 | P a g e
Shafra Fariz

The Growth of the Networking

Introduction

The improvement of PC advancements and its applications has been amazingly fast in
the
Eighties and nineties. PC's networks have a place with the main fields of specialized
Improvement. This is a result of two advancement ways:
1. The developing significance of PCs because of the quickly expanding registering
limit.
2. The hierarchical and informative preferences of electronic organizations have
prompted the
Far and wide utilization of private organizations, inside organizations and its auxiliaries
as well as in
Client provider relations.
The fundamental drive came from a public network - the Internet. It is by and large
accepted that PC
Networks like the Internet will essentially change economy and society (see e.g.,
Castells, 1996, McLuhan, 1992, Gillespie, 1991). Castells (1996) even contrasts this
new turn of events and the Modern Revolution.
To comprehend what results PC organizations will have on society and economy it
Appears to be important to initially get why and how such organizations create. In this
paper we attempt to
Make a stride toward this path. We endeavor to discover key monetary elements that
may have driven the quick

51 | P a g e
Shafra Fariz

Worldwide dispersion of systems administration over the previous years, and to


distinguish the conditions that may
Animate or hamper this turn of events. We will do this by building up a reasonable
structure and a
Basic monetary model that catches the key elements.
In this paper we apply a microeconomic viewpoint. Objective specialists are accepted to
choose about
Regardless of whether to interface with another specialist through an organization
connect or not founded on a correlation of their
Expenses and advantages of this progression. To keep the examination sensible we
utilize generally basic
Ideas of expenses and advantages in this specific situation. In particular, we accept that
all the expenses and
Benefits emerge in the current time frame, so we don't need to consider limiting and
Assumptions regarding the future advancement of the organization.
Obviously, in actuality there are various parts of the expenses of an organization
connect: establishment costs,
Fixed and variable telecom costs, supplier expenses, and so forth in our examination
we expect to be just the
Expenses of setting up the organization connect. A comparable contention holds for
benefits too. Here we
Accept that the fundamental impact of a PC network interface lies in the decrease of
distance rubbing.
This, thus, considers an expanded degree of collaboration between entertainers. The
entertainers are expected to
Get utility from this connection.
A significant monetary component of any organization framework lies in the presence of
organization

52 | P a g e
Shafra Fariz

Externalities (Capello, 1994). In our straightforward model network externalities start


from the way that
At the point when an entertainer associates with another entertainer who is now on an
organization, distance contact between all
Entertainers effectively on the organization and the new part is diminished. As we will
see, these organizations
Externalities are the primary main impetus behind organization improvement. They
additionally bring up the issue of
Optimally and individual versus social valuation. (citeseerx.ist.psu.edu/viewdoc, 2021)

History of Networking

PC organizing as far as we might be concerned today might be said to have gotten its
start with the ARPANET improvement in the last part of the 1960s and mid 1970s.
Earlier to that time there were PC merchant" organizations" planned fundamentally to
interface terminals and distant occupation passage stations to a centralized computer.
In any case, the idea of systems administration between PCs seeing each other as
equivalent friends to accomplish "asset sharing" was crucial to the ARPANET plan The
other solid accentuation of the ARPANET work was its dependence on the at that point
novel method of parcel changing to proficiently share correspondence assets among"
bursty" clients, rather than the more conventional message or circuit exchanging. Albeit
the expression "network engineering" was not at this point generally utilized, the starting
ARPANET configuration had a distinct construction and presented another key idea:
convention layering, or the possibility that the all-out correspondences capacities could
be separated into a few layers, each expanding upon the administrations of the one
underneath. The first plan had three significant layers, a network layer, which
incorporated the organization access and change to-switch (Demon to-IMP)

53 | P a g e
Shafra Fariz

conventions, a host-to-have layer (the Network Control Protocol or NCP), and a "work
arranged convention" layer, where explicit applications, for example, record move, mail,
discourse, and far off terminal help were given .

Comparative thoughts were being sought after in a few other examination projects
around the planet, incorporating the Cyclades network in France, the

Public Physical Laboratory Network in England, and the Ethernet Framework at Xerox
PARC in the USA. A portion of these undertakings centered all the more intensely on
the potential for fast nearby organizations like the mid 3-Mbps Ethernet. Satellite and
radio stations for versatile clients were likewise a subject of developing interest. By
1973 it was obvious to the systems administration vanguard that another convention
layer should have been embedded into the convention progressive system to oblige the
interconnection of different kinds of individual organizations. Cerf and Kahn distributed
their fundamental paper depicting such a plan, and advancement of the new Internet
Protocol (IP) and Transmission Control Protocol

(TCP) to together supplant the NCP started. Comparable work was being sought after
by different gatherings meeting in the recently framed IFIP WG 6.1, called the

Internetwork Working Group. The reason for the organization interconnection approach
creating in this local area was to utilize an assortment of individual network each giving
just a straightforward "best exertion" or "datagram" transmission administration. Solid
virtual circuit administrations would then be given on a start to finish premise with the
TCP (or comparative convention) in the hosts. During a similar time period, public
information organizations (PDNs) were arising under the support of CCITT, pointed
toward giving more conventional virtual circuit kinds of network administration through
the recently characterized X.25 convention. The center and late 1970s saw organizing
meetings overwhelmed by warmed discussions over the family member benefits of
circuit versus bundle exchanging and datagrams versus X.25 virtual circuits. The PC

54 | P a g e
Shafra Fariz

sellers kept on contribution their restrictive networks, continuously supporting the new
X.25 administration as connections under their own conventions. Advanced Equipment
Corporation (DEC) was the remarkable exemption, receiving the exploration local area
approach of shared systems administration at an early date, and coming out with its
own new set-up of conventions (DECNET).

By the last part of the 1970s, another significant impact was arising in the PC network
local area. The PC makers understood that multivendor frameworks could at this point
don't be evaded, and started to make a move to fulfill the developing client interest for
interoperability. Working through their conventional global body, the ISO, another
gathering (SC16) was made to create guidelines in the systems administration region.
Their underlying contract was to characterize an express "design" for "Open Systems
Interconnection" (OSI). By the mid-1980s there were three significant parts in the
systems administration game: the ARPANET-style research local area, the transporters
with their PDNs in CCITT, and the producers in ISO. The gathering circuit became more
bitter, with the examination local area thrashing the sluggish progress, massiveness (7
layers!), absence of test uphold, and Comprehensiveness (five classes of transport
convention) of the ISO laborers, while as yet going after the PDNs and X.25. The CCITT
and (link.springer.com, 2021)

Explain about Growth of Networking

Presently a day’s PC network innovation was creating in intriguing manners. A few keys
built up that have happened over recent years included.

1. Development on ubiquity of distributed storage and distributed computing. For


purchasing actual duplicates of games, music and motion pictures, progressively
downloading (or streaming) and purchase advanced licenses their need through
Internet.

55 | P a g e
Shafra Fariz

2. Improvements on portable organization framework the two arrangements of 4G and


3G organizations (more established) that have permit individuals in their created regions
who can permit it to their shrewd cell phones as video broadcasting framework and as
versatile TV. A portion of individuals hidden and remaining associated all the occasions,
at whatever point them at the work environment, by means of a home organization,
through open WiFi areas of interest or advanced cells.

3. Challenges looked by the specialist co-ops (incorporate Google) in extending their


private fiber optic links Internet administration because of expanded rivalry and
establishment cost from other broadband suppliers.

4. Despite the fact that 4G LTE portable organization was not reached by numerous
pieces of world, the business of telecom has been persevering on the improvement of
their future "5G" cell correspondence Technology.

5. This 5G exceptional to support up the speed the versatile associations drastically.


Precisely how much clients needed this 5G association and to go.

6. At the point when 4G was at first being created, organizations are not paused and
they don't feel bashful to ad about the 5G endeavors. 7. It very well may be tried on
research facility on by model variants of certain components then it could be standard
5G

56 | P a g e
Shafra Fariz

1. Man-made reasoning will assist with keeping up, oversee, and ensure it. Presently
the organizations were observed by calculation that empowers for strange form ups of
traffic and action which might be the aftereffect of frightful exercises, for example,
(DDos) Distributed Denial-of-Service assaults and endeavored hacks.

2. This Artificial Network fueling calculations will turn out to be generally smart; it may
discover quicker and dependable strategies for foreseeing dangers and cleaning
organizations.

3. Man-made reasoning ready to be a superior anticipate traffic as it gathers and


dissects information progressively, some of organization supervisors were more ready
for large occasions like the World cup, Olympics, Valentine's Day, which frequently put
on the Internet under pressure. (www.sarthaks.com, 2021)

Types of Topologies

57 | P a g e
Shafra Fariz

1. Mesh Topology
2. Star Topology
3. Bus Topology
4. Ring Topology

5. Hybrid Topology

Advantages of Mesh topology

Mesh Topology

58 | P a g e
Shafra Fariz

In cross section geography every gadget is associated with all other devices on the
organization through a committed highlight point interface. At the point when we say
committed it implies that the connection just conveys information for the two associated
gadgets as it were. Let’s say we have n gadgets in the organization then every gadget
should be associated with (n-1) gadgets of the network. Number of connections in a
cross section geography of n gadgets would be n (n-1)/2.

Advantages of Mesh topology

1. No information traffic issues as there is a devoted connection between two gadgets


which implies the connection is just accessible for those two gadgets.

59 | P a g e
Shafra Fariz

2. Cross section geography is dependable and hearty as disappointment of one


connection doesn't influence different connections and the correspondence between
different gadgets on the organization.

3. Cross section geography is secure in light of the fact that there is a highlight point
connect consequently unapproved access is preposterous.

3. Flaw discovery is simple.

Disadvantage of Mesh Topology

• Measure of wires needed to associate every framework is dreary and cerebral


pain.
• Since every gadget should be associated with different gadgets, number of I/O
ports required should be immense.
• Adaptability issues in light of the fact that a gadget can't be associated with
enormous number of gadgets with a committed highlight point interface.

Star Topology

In star topology every gadget in the organization is associated with a focal gadget called
center. Dissimilar to mesh topology, star topology doesn't permit direct correspondence
between gadgets, a gadget should need to convey through center point. In the event
that one gadget needs to send information to other gadget, it needs to initially send the

60 | P a g e
Shafra Fariz

information to center point and afterward the center communicate that information to the
assigned gadget.

Advantages of Star geography

1. More affordable on the grounds that every gadget just need one I/O port and should
be associated with center with one connection.

2. Simpler to introduce

3. Less measure of links required in light of the fact that every gadget should be
associated with the center as it were.

4. Strong, on the off chance that one connection fizzles, different connections will turn
out great.

5. Simple shortcoming identification in light of the fact that the connection can be
effectively distinguished.

61 | P a g e
Shafra Fariz

Disadvantage of Star topology

• On the off chance that center point goes down everything goes down, none of
the gadgets can work without center.
• Center requires more assets and customary support since it is the focal
arrangement of star topology.

Bus Topology

In Bus Topology there is a fundamental link and all the gadgets are associated with this
primary link through drop lines. There is a gadget considered tap that interfaces the
drop line to the principle link. Since all the information is sent over the fundamental link,
there is a restriction of drop lines and the distance a principle link can have.

62 | P a g e
Shafra Fariz

Advantages of Bus Topology

1. Simple establishment, each link should be associated with spine link.

2. Less links needed than Mesh and star geography

Disadvantage of Bus Topology

• Troublesomely in flaw location.

• Not versatile as there is a restriction of the number of hubs you can associate
with spine link.

Ring Topology

63 | P a g e
Shafra Fariz

In ring topology every gadget is associated with the two gadgets on one or the other
side of it. There are two devoted highlight point interfaces a gadget has with the gadgets
on its either side. This design frames a ring consequently it is known as ring geography.

In the event that a gadget needs to send information to another gadget, it sends the
information one way, every gadget in ring geography has a repeater, on the off chance
that the got information is proposed for other gadget, repeater advances this information
until the planned gadget gets it.

Advantage of Ring Topology

1. Simple to introduce.

2. Overseeing is simpler as to add or eliminate a gadget from the geography just two
connections are needed to be changed.

64 | P a g e
Shafra Fariz

Disadvantage of Ring Topology

• A connection disappointment can bomb the whole organization as the sign won't
go ahead because of disappointment.
• Information traffic issues, since all the information is flowing in a ring.

Hybrid Topology

A combination of at least two topology is known as cross hybrid topology. For instance a
mix of star and mesh topology is known as hybrid topology.

65 | P a g e
Shafra Fariz

Advantage of Hybrid topology

1. We can pick the topology dependent on the necessity for instance, versatility is our
anxiety then we can utilize star topology rather than transport innovation.

2. Versatile as we can additionally associate other PC networks with the current


networks with various topologies.

Disadvantage of Hybrid topology

• Shortcoming recognition is troublesome.

• Establishment is troublesome.

66 | P a g e
Shafra Fariz

• Configuration is perplexing so support is high subsequently costly.

Topology Types

Geography choices permit you to scale on a level plane and vertically.

Assortment of reserve geographies:

• At the center of all frameworks is the single, shared appropriated framework.

• For flat and vertical scaling, you can consolidate singular frameworks into
customer/worker and multi-site (WAN) geographies:

67 | P a g e
Shafra Fariz

o In client/server system, few worker measures oversee information and occasion


preparing for a lot bigger customer gathering.

o In multi-site frameworks, a few geologically unique frameworks are inexactly


coupled into a solitary, durable handling unit. (geode.apache.org, 2021)

68 | P a g e
Shafra Fariz

69 | P a g e
Shafra Fariz

2021

Networking

EXAMINE NETWORKING PRICIPLES AND THEIR PROTOCOLS


SHAFRA FARIZ

[COMPANY NAME] | [Company address]

70 | P a g e
Shafra Fariz

Table of Contents
Assignment Brief ................................................................................................................................... 82
Explain networking devices and operations ............................................................................... 88
Sorts of NICs ................................................................................................................................... 89
There are two sorts of NICs. .......................................................................................................... 89
Media Specific: ................................................................................................................................ 89
Organization Design Specific:........................................................................................................ 89
Following figure outlines some regular kinds of NICs.................................................................. 89
Hub ................................................................................................................................................... 90
There are two sorts of the Hub. ..................................................................................................... 91
Passive Hub: - ................................................................................................................................. 91
Active Hub: - .................................................................................................................................... 91
MAU and Patch Panel .................................................................................................................... 92
The Bridge ....................................................................................................................................... 93
There are three kinds of Bridge: -.................................................................................................. 94
Nearby Bridge: - .............................................................................................................................. 95
Remote Bridge: ............................................................................................................................... 95
Wireless Bridge:............................................................................................................................ 95
Switch .............................................................................................................................................. 96
Modem ............................................................................................................................................. 97
Gate Way......................................................................................................................................... 99
Examples of Gate Way:................................................................................................................ 100
E-mail Gate Way:......................................................................................................................... 100
GSNW Gate Way: ........................................................................................................................ 100
PAD Gate Way: ............................................................................................................................ 101
Router ............................................................................................................................................ 101
Essentially switches are utilized: - ............................................................................................... 102
Proxy .............................................................................................................................................. 103
Transceiver .................................................................................................................................... 103
Data Flow Diagram ......................................................................................................................... 105
Importance of Data Flow Diagram ............................................................................................... 106
term server and its key functions accordingly in your point of view and select server
types that are ................................................................................................................................... 106

71 | P a g e
Shafra Fariz

How a worker function .................................................................................................................. 108


Sorts of workers ............................................................................................................................ 109
Document workers ........................................................................................................................ 109
Print workers ................................................................................................................................. 109
Application workers....................................................................................................................... 110
DNS workers ................................................................................................................................. 110
Mail workers .................................................................................................................................. 111
Web workers ................................................................................................................................. 111
Web Server.................................................................................................................................... 111
Data set workers ........................................................................................................................... 111
Virtual workers .............................................................................................................................. 112
References .......................................................................................................................................... 240

72 | P a g e
Shafra Fariz

Acknowledgement

I would like to take this opportunity to thank my lecturer Mr. Shakir Moulana for guiding us
and showing us the correct path throughout this assignment to make it a success. At the
same time, I would like to thank all the lecturers for fullest support and cooperation.
Thank You

73 | P a g e
Shafra Fariz

Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and
to present it as my own without attributing the sources in the correct form. I further
understand.
What it means to copy another’s work.

1. . I know that plagiarism is a punishable offence because it constitutes theft.

2. I understand the plagiarism and copying policy of Edexcel UK.

3. I know what the consequences will be if I plagiarize or copy another’s work in any
of the assignments for this program.

4. I declare therefore that all work presented by me for every aspect of my program,
will be my own, and where I have made use of another’s work, I will attribute the
source in the correct way
.
5. I acknowledge that the attachment of this document signed or not, constitutes
a binding agreement between myself and Edexcel UK.

6. I understand that my assignment will not be considered as submitted if this


document is not attached to the assignment.

(Provide E-mail ID)


(Provide Submission Date)
[email protected] 05th February 2021

Student’s Signature:

74 | P a g e
Shafra Fariz

Course Tittle Pearson BTECH Level 5 Higher National Diploma in Computing


Unit number and Title: Unit2: Networking
Assignment Title Understanding Networking concepts according to the current industry
Name of the Leaner
Ref. No. of the Leaner Pearson Regd. No. 1016959
Assignment Number 01 Batch No & Semester CSD68 Semester 01
Issue Date 02nd February 2021 Submission Date 04th April 2021

Re-submission Date Date Received 1st Submission


Unit Assessor: Mr. Shakir Moulana Academic Year 2021

Assignment Brief (RQF)


Higher National Diploma in Computing

Assessor Summative Feedback

Grade: Assessor Signature: Date:


Resubmission Feedback – Formative

Grade: Assessor Signature: Date:


Internal Verifier’s Comments

75 | P a g e
Shafra Fariz

Signature of the IV Date


Student Agreement: Student Signature:
I understand the feedback given to me and agree to carry out the actions in
future works as required and indicated. Date

Student Name: Assessor Name:

Issue Date: Submission Date: Submitted on:

Programme:

Unit:

Assignment number and title:

STUDENT ASSESSMENT SUBMISSION AND DECLARATION

Plagiarism
Plagiarism is a particular from of cheating. Plagiarism must be avoided at all costs and student who
break the rules, however innocently, may be penalized. It is your responsibility to ensure that you
understand correct referencing practices. As a university level student, you are expected to use
appropriate references throughout and keep carefully detailed notes of all your sources of materials for
material you have used in your work, including any material downloaded from the internet. Please
consult the relevant unit lecturer or your course tutor if you need any further advice.

Student Declaration
Student Declaration
I certify that the assignment Submission is entirely my own work and I fully understand the
consequences of plagiarism. I understand that making a false declaration is a form of
malpractice.

Student Signature: Date:

76 | P a g e
Shafra Fariz

SUBMISSION FORMAT

Assignment Task Submission Format


Part 1 Report
1 Part 2 Report
Part 3 Report/ Presentation
Part 4 Report
Part 1 Report
2 Part 2 Report
Part 3 Report
3 Part 1 Practical and Report

4 Part 2 Practical and Report

77 | P a g e
Shafra Fariz

ASSESSMENT REVIEW PLAN

Assignment Grading Evidence Formative Comments Date


Criteria
P1 Report
P2 Report
01
M1 Report
D1 Report
P3 Report
P4 Report
02
M2 Report
D1 Report
P5 Practical / Report
P6 Practical / Report
03
M3 Practical / Report
D2 Practical / Report
P4 Report
P5 Report
04
P6 Report
D3 Report

78 | P a g e
Shafra Fariz

ASSESSMENT RECORD AND FEEDBACK SHEET


Programme: Student Name:

Unit No. & Title: Unit2: Assessment Date: 02nd February Unit Grade:
Networking 2021
Assessor Name: Mr. Shakir Completion Date: 04th April IV Signature:
Moulana 2021

ASSESSMENT TRACKING

Assignment Learning Objectives Criterial Date Issued Hand In Date Formative Resubmissi
Targeted Feedback on Date*

01 LO1 Basic of Networking P1 02nd February 14th


and Components P2 2021 February
M1 2021
D1
02 LO2 Explain networking P3 02nd February 28th
devices and operations P4 2021 February
M1 2021
D1
03 LO3 Design efficient P5 02nd February 12th March
networked systems P6 2021 2021
M3
D2
04 LO4 LAN Design & P7 02nd February 28th March
Implementation P8 2021 2021
M4
D3

79 | P a g e
Shafra Fariz

SUMMATIVE FEEDBACK

Assignment Grading Summative Comments Assessor


No. Criteria signature
P1
01
P2
M1
D1
P3
02 P4
M2
D1
P5
03 P6
M3
D2
P7
04 P8
M4
D3

80 | P a g e
Shafra Fariz

Unit 2: Networking
Assignment 2

81 | P a g e
Shafra Fariz

Higher National Certificate/Diploma in Computing

Assignment Brief
Student Name/ID Number 1016959
Unit Number and Title 2: Networking
Academic Year 2021
Unit Author Mr. Shakir Moulana
Assignment Title Understanding Network Concepts according to the
current industry
Issue Date 02nd February 2021
Submission Date 04th April 2021
IV Name & Date Mr. Sai Thishok – 01st February 2021

Submission Format
The submission is in the form of an individual written report. This should be written in a concise, formal business
Style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as
Appropriate, and all work must be supported with research and referenced using the Harvard referencing system.
Please also provide a bibliography using the Harvard referencing system.

82 | P a g e
Shafra Fariz
Unit Learning Outcomes
LO1 Examine networking principles and their protocols.
LO2 Explain networking devices and operations.
Assignment Brief and Guidance
Most Universities admired in private Higher Education Institute in Colombo, Sri Lanka. Administration and the
academic staff are very much concerned about providing required facilities for the students in the field of
Network. Networking computers is not the complicated process it used to be. What used to be along drawn out
process is now made easier and more efficient, causing less distraction and disruption in organizations.

Imagine that you are a network specialist working for your company Speed tech in a start-up level position. So
Before starting the process study the basics of Networking. Talk to the organization thinking about moving to the
Best of Networking industry taking the new technological improvement into consideration.
You will need to produce an outcome on the networking development process to the organization that includes
the

following:
1. The growth of the Network
2. Detailing of the new networking technologies introduced
3. The outcome that will be gained through Network considering the networking principles, protocols and
devices, including benefits and constraints of networked solutions, the impact of network topology,
communication and bandwidth requirements, effectiveness of networking systems, operating principles of
Networking devices and server types and networking software.

During the process in terms of working in the organization you are supposed to go through in depth process on
Designing and implementing a local area network. You are supposed to follow the below steps below according
to the requirement by the organization

• A LAN design plan and justification document.


• A fully completed test plan including an evaluation of results and recommendations for improvements to
LAN.
• A proposed and justified maintenance schedule.
• Evidence of an implemented network.

And you are ask to analyze the specification from the institution above for completion of this project within a
given timeframe.
The LAN design that you are about to design should be well planned thinking out of the box which will make an
Effective result on the designed LAN network. After the designing process is completed.

The concept to go through with LAN design is to design a network diagram to implement to a start-up
Organization with relevant requirements and configurations. The network system should be under the
default
Gateway of 192.168.10.1 allocating 10 terminals including a server with proper configurations.

Submission Format

83 | P a g e
Shafra Fariz

Part 1- *Discuss the importance of Networking to the current trend by considering the real world on how the
industry moves and how the past network was used going through the relevant concepts in the networking sector,
with valid examples in your explanation. (note – you could also include the roles of networking, types of networking
and further more)
*Finally justify the Importance of introducing Networking to speed tech as described in the scenario.

*Further Discuss the benefits and constraints of different Networking systems types (e.g. peer based, client-server)
explanation should be in brief with related networking diagrams
*With comparison discuss the pros and Cons of Networking systems discussed above (Report)

Part 2- Speed tech is planning to get a broadband (ADSL) internet connection from SLT. They are providing ZTE
ADSL wireless router (ZXV10-W300) with the internet connection. Wi-Fi is considered as the main networking
technology when it comes to implementing Wireless Local Area Networks.
*Briefly explain on the Wi-Fi technology and its standard meanwhile analyzing the features and provide strengths
and weakness of Wireless ADSL Router, in order give a brief on the transmission media and the components of it
➢ Guided media
➢ Unguided media
*You also need to discuss on some of the ISP (Internet Service Providers) in Sri Lanka on their growth and
expansion giving out some examples considering the current industry.

*Finally come to a valid justification detailing on the most suitable technology considering the Ethernet or WIFI
To be used in speed tech.

Part 3- As discussed above in the assignment brief and guidance, Imagine, with the position you’re holding in the
organization you are working in the networking industry and your supposed to create and present a presentation
explaining the basics of networking components to speed tech. *
In your Presentation Use appropriate images, diagrams and tables in the presentation and use technical language
accurately.
*Discuss all the factors needed to form a Networking environment according to your point of view. Information’s
should be added to the slide to the point and not more than 15 slides (Presentation) (Report)

Part 4- *Explain the term Network Topology and the uses of it in the industrial exposure through a research on the
growth of the network history.
*Describe the types of Networking Topologies briefly to the point with related diagrams and comparison. (Note:
explanations should be in detail with examples)
*Considering the topologies select a topology which is the most suitable to the scenario in order to implement the
client-server architecture in the lab with relevant diagram and Justification considering the part 1 on Networking
Systems. (Report)

LO2 - Explain networking devices and operations

Part 1- *Discuss how OSI model and network protocols enable effective utilization of different networking systems.
(Note: detailed definition for each of the OSI layers defined.

84 | P a g e
Shafra Fariz

You may discuss how it allows multiple-vendor development through standardization of network
components.
*In the discussion further discuss the functions of a protocol and explain each protocol defined with
examples and short answers to the point.
* When it is a network obviously there is a data flow, finally discuss the importance of data flow and the
types of data flow in the current networking environment with related diagrams and real-world examples.
(Report)

Part 2- When it is in the network environment working on with servers which is common now a days.
*Describe the term server and its key functions accordingly in your point of view and select server types
that are
most suitable for the given scenario and separately discuss the role of each and every server type (Report)

Part 3 – Describe the components needed to form a network, and along with the report suggest some of
the
Networking devices and its importance with a detailed explanation with valid examples.

LO3 - Design efficient networked systems

1. Prepare a written step-by-step plan of how you are planning to design a Local Area Network (Report)
(Diagram)
2. Justify your choice of devices for your network design.
3. Produce a test plan to evaluate this design for the requirements of bandwidth and cost constraints as per
user specifications. (Table) (Report)
4. Justify and include the security requirements with a new diagram under the default gateway of
192.168.15.1 for the terminals to the diagram designed above and quality of services needed for selection
of accessories.
5. Give out the steps of preparing the Networking cables for real time implementation for the below
mentioned,

➢ Straight Through Cabling


➢ Cross over cabling

Part 2 Implement test and diagnose networked systems

1. Explain What is IP and the classes of IP and justify the selection of the class of IP address to the above
designed diagram in part 1(Report)
2. Explain the term Static IP and Dynamic IP with proper steps of configuration (Add relevant screenshots
done during practical session.
3. Show the steps done to complete the process of file sharing (report) (Screenshots)
4. Implement a network you would suggest for a further development according to your point of view with
justification with a detailed diagram
5. Conduct verification and explain pinging process (screenshots)
6. Record the test results and analyse these against expected results. (screenshots)
7. Investigate what functionalities would allow the system to support device growth and the addition of
communication devices.
8. Discuss the significance of upgrades and security requirements in your recommendations. (Report)

85 | P a g e
Shafra Fariz

Learning Outcomes and Assessment Criteria

Pass Merit Distinction

LO1 Examine networking principles and their protocols


P1 Discuss the benefits and M1 Compare common networking
constraints of different network principles and how protocols enable LO1 & 2
types and standards. the effectiveness of networked D1 Considering a given scenario,
systems. identify the topology protocol
P2 Explain the impact of network selected
topology, communication and for the efficient utilization of a
bandwidth requirements. networking system.
LO2 Explain networking devices and operations
P3 Discuss the operating principles M2 Explore a range of server types
of networking devices and server and justify the selection of a server,
types. considering a given scenario
regarding cost and performance
P4 Discuss the inter-dependence of optimization.
workstation hardware with relevant
networking software.

86 | P a g e
Shafra Fariz

Learning Outcomes and Assessment Criteria

Pass Merit Distinction

LO3 Design efficient networked systems

P5 Design a networked to meet a given M3 Install and configure network D2 Design a maintenance
network services services and applications on your schedule to support the
choice. networked system.
P6 Test and evaluate the design to meet
the requirements and analyse user
feedback with the aim of improving
efficiency.
LO4 Implement and diagnose networked systems

P7 Implement a networked system based M4 Recommend potential D3 Use critical reflection to


on a prepared design. enhancements for the networked evaluate own work and justify
systems. valid conclusions.
P8 Document and analyse test results
against expected results.

87 | P a g e
Shafra Fariz

Explain networking devices and operations

In the overview of the framework’s organization devices, NIC stays on the essential
spot. Without this device, getting sorted out is incomprehensible. This is usually called
network connector card, Ethernet Card and LAN card. NIC licenses a frameworks
organization contraption to talk with different frameworks organization device.

NIC changes over the data packages between two different data transmission
advancements. A PC uses equivalent data transmission advancement to convey the
data between its inside parts while the media that gives network between different PCs
uses successive data transmission development.

A NIC changes over equal information stream into the sequential information stream
and the sequential information stream into the equal information stream.

88 | P a g e
Shafra Fariz

Normally all advanced PCs have the incorporated NICs in the motherboards. In the
event that extra NICs are required, they are additionally accessible as extra gadgets
independently.

For work area or worker framework, they are accessible in the connector structure
which can be connected to the accessible spaces of the motherboard. For PC or other
little size gadgets, they are accessible in the PCMCIA (Personal Computer Memory
Card International Association) card structure which can be embedded into the PCMCIA
opening.

Sorts of NICs

There are two sorts of NICs.

Media Specific: - LAN card is utilized by the media type. Various sorts of the NICs are
utilized to associate the various kinds of media. To associate a particular media type,
we should need to utilize a NIC which is especially made for that kind of media.

Organization Design Specific: - A particular organization plan needs a particular LAN


card. For instance, FDDI, Token Ring and Ethernet have their own unmistakable sort of
NIC cards. They can't utilize different sorts of NIC cards.

Following figure outlines some regular kinds of NICs.

89 | P a g e
Shafra Fariz

Hub

Center is an incorporated gadget that associates various gadgets in a solitary LAN


organization. At the point when Hub gets the information signals from an associated
gadget on any of its port, then again, actually port, it advances those signs to any
remaining associated gadgets from the leftover ports. As a rule, Hub has at least one
uplink ports that are utilized to interface it with another Hub.

90 | P a g e
Shafra Fariz

There are two sorts of the Hub.

Passive Hub: - It advances information signals in a similar arrangement in which it


gets them. It doesn't change the information signal in any way.

Active Hub: - It additionally works same as the inactive Hub works. Yet, prior to
sending the information signals, it intensifies them. Because of this additional
component, the dynamic Hub is otherwise called the repeater.

Hubs are no longer used in the computer networks.


91 | P a g e
Shafra Fariz

MAU and Patch Panel

MAU and Patch Panel resemble the Hub; however, they are unique. MAU (Multi
Access Unit) is the kind of Hub for the symbolic ring organization. Contrasts among
Hub and MAU are the accompanying: -

• Center is utilized for the Ethernet Network while the MAU is utilized for the Token
ring organization.

• Center makes intelligently star geography while MAU makes sensibly ring
geography.

Fix board is utilized to coordinate the UTP links methodically. It doesn't meddle in the
information signals.

92 | P a g e
Shafra Fariz

The Bridge

Bridge is used to an enormous organization into more modest portions. Fundamental


elements of the Bridge are the accompanying: -

➢ Breaking an enormous organization into more modest fragments.

93 | P a g e
Shafra Fariz

➢ Associating distinctive media types. For example, associates UTP with the fiber
optic.

➢ Associating distinctive organization designs. For example, associates Ethernet


with the Token ring.

A Bridge can associate two distinct kinds of media or organization engineering, yet it
can't interface two unique sorts of organization layer convention like TCP/IP or IPX.
Scaffold requires a similar organization layer convention altogether portions.

There are three kinds of Bridge: -

94 | P a g e
Shafra Fariz

Nearby Bridge: - This Bridge associates two LAN sections straightforwardly. In


Ethernet Implementation, it is known as the Transparent Bridge. In Token Ring
organization, it is known as the Source-Routed Bridge.

Remote Bridge: This Bridge interfaces with another Bridge over the WAN connection.

Wireless Bridge: This Bridge associates with another Bridge without utilizing wires. It
utilizes radio signs for the network.

95 | P a g e
Shafra Fariz

In OSI Layers /TCP-IP networking models, the functionalities of the Bridges are defined
in the physical layer and data link layer.

Just like Hubs, Bridge no longer used in the computer network. Bridges have been
replaced by the Switches.

Switch

Very much like Hub and Bridge, Switch is likewise used to associate the numerous
gadgets together in a LAN section. Essentially, a Switch is the updated adaptation of
the Bridge. Other than giving every one of the functionalities of Bridge, it likewise offers
a few extra highlights.

The greatest benefit of Switch is that, it settles on exchanging choices in equipment by


utilizing application explicit coordinated circuits (ASICs).

Not at all like the conventional processors that we use in our PC, ASICs are the specific
processors assembled uniquely to perform not very many specific errands. Generally,

96 | P a g e
Shafra Fariz

the ASICs in the Switches have single undertaking and that is the exchanging the
casings as quick as could really be expected.

An ASIC involved switch plays out this assignment blazingly quick. For instance, a
passage level Catalyst Switch 2960 can handle 2.7 million edges each second.

Modem

In straightforward language, a Modem is the gadget that is utilized to associate with the
Internet. In fact, the gadget empowers the advanced information to be sent over the
media transmission lines.
97 | P a g e
Shafra Fariz

A Telco organization utilizes completely unique information transmission innovation


from the innovation that a PC utilizes for the information transmission. A modem
comprehends the two advances. It changes the innovation that a PC utilizes, in the
innovation which Telco Company gets it.

It empowers correspondence between the PC (Known as the DTE gadget) and the
Telecom organization' office (Known as the DCE gadget).

Following figure shows some normal kinds of the Modem.

98 | P a g e
Shafra Fariz

Gate Way

Entryway is utilized to advance the bundles which are created from the nearby host or
network and however expected for the far-off network. In the event that an information

99 | P a g e
Shafra Fariz

parcel doesn't discover its objective location in the nearby organization then it takes the
assistance of the entryway gadget to discover the objective location in the far-off
network. An entryway gadget knows the way of the distant objective location. In the
event that require, it likewise changes the epitome of the bundle so it can go through
different organizations to get its objective location.

Examples of Gate Way:

E-mail Gate Way: Deciphers SMTP email in standard X.400 design prior to sending.

GSNW Gate Way: Permits Windows customers to get to assets from the NetWare
worker.

100 | P a g e
Shafra Fariz

PAD Gate Way: Gives availability between LAN organization and X.25 organization.

Router

The switch associates the distinctive organization fragments. It switches the information
parcels between those organizations which are either situated in the distinctive coherent
fragments or worked with the diverse organization layer conventions.

At the point when a switch gets an information parcel on any of its interface, it checks
the objective location of that bundle and dependent on that objective location, it
advances that information parcel from the interface which is associated with the
objective location.

To advance an information bundle to its objective, switch keeps the records of


associated networks. These records are kept up in an information base table known as
the steering table. Directing table can be assembled statically or progressively.

101 | P a g e
Shafra Fariz

Essentially switches are utilized: -

➢ To interface diverse organization sections.

➢ To interface distinctive organization conventions like IP and IPX.

➢ To associate a few more modest organizations into an enormous organization


(known as the Internetwork)

➢ To break a huge organization into more modest organizations (Known as the


Subnets. Normally made to improve the exhibition or reasonability.)

➢ To interface two diverse media types, for example, UTP and Fiber optical.

➢ To associate two diverse organization structures like Token Ring and Ethernet.

102 | P a g e
Shafra Fariz

➢ To associate LAN network with Telco organization' office (Known as the DTE
gadget).

➢ To get to DSL administrations (known as the DSL Router).

Proxy

Intermediary is utilized to conceal the interior organization from outside world. It very
well may be a commit gadget or can be an application programming. Whenever it is
arranged, all correspondence goes through it. Since outside gadgets can't get to the
inner gadgets straightforwardly, they can't mess with the inward gadgets.

Transceiver

103 | P a g e
Shafra Fariz

The Transceiver is a little gadget that has the ability of accepting and imparting the two
sorts of signs; simple and advanced. Normally, it is inbuilt in network interface card. In
any case, it is additionally accessible as an individual gadget. It distinguishes the kind of
sign from the organization wire and converts the passing sign appropriately.

For instance, a handset is connected with a gadget that sends signal in advanced
structure. Presently assume, this gadget is associated with the organization wire that
utilizes simple structure for information transmission. For this situation, handset
changes over advanced signs in the simple signals prior to setting them in the
organization wire.

(www.computernetworkingnotes.com, 2021)

104 | P a g e
Shafra Fariz

Data Flow Diagram

105 | P a g e
Shafra Fariz

Importance of Data Flow Diagram

When building up a PC program, from a straightforward order line game to a luxurious


working framework, perhaps the main things a developer can do is to make an
information stream graph. Despite the fact that it very well might be a bit irritating,
making an information stream chart will permit the developer to make a program with
insignificant distress in programming the real code and further increment the efficiency
of the software engineer (or programming gathering). (www.techwalla.com, 2021)

term server and its key functions accordingly in your point of


view and select server types that are

A worker is a PC or framework that gives assets, information, administrations, or


projects to different PCs, known as customers, over an organization. In principle, at
whatever point PCs share assets with customer machines they are viewed as workers.
There are numerous kinds of workers, including web workers, mail workers, and virtual
workers.

106 | P a g e
Shafra Fariz

An individual framework can give assets and use them from one more framework
simultaneously. This implies that a gadget could be both a worker and a customer
simultaneously.

A portion of the principal workers were centralized server PCs or minicomputers.


Minicomputers were a lot more modest than centralized server PCs, consequently the
name. Nonetheless, as innovation advanced, they wound up getting a lot bigger than
personal computers, which made the term microcomputer to some degree ludicrous.

At first, such workers were associated with customers known as terminals that didn't do
any real registering. These terminals, alluded to as moronic terminals, existed
essentially to acknowledge input by means of a console or card peruser and to return
the aftereffects of any calculations to a presentation screen or printer. The genuine
registering was done on the worker.

Afterward, workers were frequently single, amazing PCs associated over an


organization to a bunch of less-incredible customer PCs. This organization engineering
is frequently alluded to as the customer worker model, in which both the customer PC
and the worker have registering power, however certain errands are appointed to
workers. In past registering models, for example, the centralized computer terminal
model, the centralized computer went about as a worker despite the fact that it wasn't
alluded to by that name.

As innovation has advanced, the meaning of a worker has developed with it. Nowadays,
a worker might be simply programming running on at least one actual processing

107 | P a g e
Shafra Fariz

gadgets. Such workers are regularly alluded to as virtual workers. Initially, virtual
workers were utilized to build the quantity of worker works a solitary equipment worker
could do. Today, virtual workers are regularly run by an outsider on equipment across
the Internet in a game plan called distributed computing.

A worker might be intended to do a solitary undertaking, like a mail worker, which


acknowledges and stores email and afterward gives it to a mentioning customer.
Workers may likewise play out a few assignments, for example, a document and print
worker, which the two stores record and acknowledges print occupations from
customers and afterward sends them on to an organization connected printer.

How a worker function

To work as a worker, a gadget should be arranged to tune in to demands from


customers on an organization association. This usefulness can exist as a component of
the working framework as an introduced application, job, or a mix of the two.

For instance, Microsoft's Windows Server working framework gives the usefulness to
tune in to and react to customer demands. Moreover, introduced jobs or administrations
increment which sorts of customer demands the worker can react to. In another model,
an Apache web worker reacts to Internet program demands through an extra
application, Apache, introduced on top of a working framework.

At the point when a customer requires information or usefulness from a worker, it sends
a solicitation over the organization. The worker gets this solicitation and reacts with the

108 | P a g e
Shafra Fariz

suitable data. This is the solicitation and reaction model of customer worker organizing,
otherwise called the call and reaction model.

A worker will frequently play out various extra errands as a feature of a solitary
solicitation and reaction, including checking the character of the requestor, guaranteeing
that the customer has consent to get to the information or assets mentioned, and
appropriately organizing or returning the necessary reaction in a normal manner.

Sorts of workers

There are numerous sorts of workers that all perform various capacities. A huge number
contain at least one of the basic worker types:

Document workers

Document workers store and convey records. Numerous customers or clients may
share documents put away on a worker. Likewise, midway putting away documents
offers simpler reinforcement or adaptation to internal failure arrangements than
endeavoring to give security and uprightness to records on each gadget in an
association. Record worker equipment can be intended to augment peruse and
compose rates to improve execution.

Print workers

109 | P a g e
Shafra Fariz

Print workers take into consideration the administration and dispersion of printing
usefulness. Instead of connecting a printer to each workstation, a solitary print worker
can react to printing demands from various customers. Today, some bigger and better
quality printers accompany their own inherent print worker, which eliminates the
requirement for an extra PC based print worker. This inner print worker likewise works
by reacting to print demands from a customer.

Application workers

Application workers run applications in lieu of customer PCs running applications


locally. Application workers frequently run asset concentrated applications that are
shared by an enormous number of clients. Doing so eliminates the requirement for
every customer to have adequate assets to run the applications. It additionally
eliminates the need to introduce and keep up programming on numerous machines
instead of just one.

DNS workers

Area Name System (DNS) workers are application workers that give name goal to
customer PCs by changing over names effectively comprehended by people into
machine-decipherable IP addresses. The DNS framework is a generally dispersed data
set of names and other DNS workers, every one of which can be utilized to demand a
usually obscure PC name. At the point when a customer needs the location of a
framework, it sends a DNS demand with the name of the ideal asset to a DNS worker.
The DNS worker reacts with the important IP address from its table of names.

110 | P a g e
Shafra Fariz

Mail workers

Mail workers are an extremely basic kind of utilization worker. Mail workers get
messages shipped off a client and store them until mentioned by a customer for said
client. Having an email worker takes into consideration a solitary machine to be
appropriately arranged and connected to the organization consistently. It is then
prepared to send and get messages as opposed to requiring each customer machine to
have its own email subsystem persistently running.

Web workers

Quite possibly the most plentiful kinds of workers in the present market are a web
worker. A web worker is an exceptional sort of use worker that hosts projects and
information mentioned by clients across the Internet or an intranet. Web workers react
to demands from programs running on customer PCs for site pages, or other online
administrations. Regular web workers incorporate Apache web workers, Microsoft
Internet Information Services (IIS) workers and Nginx workers.

Web Server

Data set workers

The measure of information utilized by organizations, clients, and different


administrations is faltering. A lot of that information is put away in data sets. Data sets
should be open to numerous customers at some random time and can require
uncommon measures of plate space. Both of these necessities loan themselves well to
finding such information bases on workers. Data set workers run data set applications
111 | P a g e
Shafra Fariz

and react to various solicitations from customers. Regular data set worker applications
incorporate Oracle, Microsoft SQL Server, DB2, and Informix.

Virtual workers

Virtual workers are surprising the worker world. Not at all like customary workers that
are introduced as a working framework on machine equipment, virtual workers exist just
as characterized inside specific programming called hypervisor. Each hypervisor can
run hundreds, or even thousands, of virtual workers at the same time. The hypervisor
presents virtual equipment to the worker as though it were genuine actual equipment.
The virtual worker utilizes the virtual equipment obviously, and the hypervisor passes
the real calculation and capacity needs onto the genuine equipment underneath, which
is divided between the wide range of various virtual workers.

Intermediary workers

An intermediary worker goes about as a go between a customer and a worker.


Regularly used to separate either the customers or workers for security purposes, an
intermediary worker takes the solicitation from the customer. Rather than reacting to the
customer, it gives the solicitation to another worker or cycle. The intermediary worker
gets the reaction from the subsequent worker and afterward answers to the first
customer as though it were answering all alone. Thusly, neither the customer nor the
reacting worker needs to straightforwardly interface with one another.

Checking and the executives workers

112 | P a g e
Shafra Fariz

A few workers exist to screen or oversee different frameworks and customers. There
are numerous kinds of checking workers. A few of them tune in to the organize and get
each customer solicitation and worker reaction, yet some don't ask for or react to
information themselves. Thusly, the checking worker can monitor all the traffic on the
organization, just as the solicitations and answers of customers and workers, without
meddling with those activities. An observing worker will react to demands from checking
customers, for example, those run by network executives watching the soundness of
the organization. (www.paessler.com, 2021)

113 | P a g e
Shafra Fariz

114 | P a g e
Shafra Fariz

2021

Networking

EXAMINE NETWORKING PRICIPLES AND THEIR PROTOCOLS


SHAFRA FARIZ

115 | P a g e
Shafra Fariz

Acknowledgement

I would like to take this opportunity to thank my lecturer Mr. Shakir Moulana for guiding us
and showing us the correct path throughout this assignment to make it a success. At the
same time, I would like to thank all the lecturers for fullest support and cooperation.
Thank You

116 | P a g e
Shafra Fariz

Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and
to present it as my own without attributing the sources in the correct form. I further
understand.
What it means to copy another’s work.

2. . I know that plagiarism is a punishable offence because it constitutes theft.

3. I understand the plagiarism and copying policy of Edexcel UK.

4. I know what the consequences will be if I plagiarize or copy another’s work in any
of the assignments for this program.

5. I declare therefore that all work presented by me for every aspect of my program,
will be my own, and where I have made use of another’s work, I will attribute the
source in the correct way
.
6. I acknowledge that the attachment of this document signed or not, constitutes
a binding agreement between myself and Edexcel UK.

7. I understand that my assignment will not be considered as submitted if this


document is not attached to the assignment.

(Provide E-mail ID)


(Provide Submission Date)
[email protected] 17th March 2021

Student’s Signature:

117 | P a g e
Shafra Fariz

Course Tittle Pearson BTECH Level 5 Higher National Diploma in Computing


Unit number and Title: Unit2: Networking
Assignment Title Understanding Networking concepts according to the current industry
Name of the Leaner
Ref. No. of the Leaner Pearson Regd. No. 1016959
Assignment Number 01 Batch No & Semester CSD68 Semester 01
Issue Date 02nd February 2021 Submission Date 04th April 2021

Re-submission Date Date Received 1st Submission


Unit Assessor: Mr. Shakir Moulana Academic Year 2021

Assignment Brief (RQF)


Higher National Diploma in Computing

Assessor Summative Feedback

Grade: Assessor Signature: Date:


Resubmission Feedback – Formative

Grade: Assessor Signature: Date:


Internal Verifier’s Comments

118 | P a g e
Shafra Fariz

Signature of the IV Date


Student Agreement: Student Signature:
I understand the feedback given to me and agree to carry out the actions in
future works as required and indicated. Date

STUDENT ASSESSMENT SUBMISSION AND DECLARATION


Student Name: Assessor Name:

Issue Date: Submission Date: Submitted on:

Program:

Unit:

Assignment number and title:

Plagiarism
Plagiarism is a particular from of cheating. Plagiarism must be avoided at all costs and student who
break the rules, however innocently, may be penalized. It is your responsibility to ensure that you
understand correct referencing practices. As a university level student, you are expected to use
appropriate references throughout and keep carefully detailed notes of all your sources of materials for
material you have used in your work, including any material downloaded from the internet. Please
consult the relevant unit lecturer or your course tutor if you need any further advice.

Student Declaration
Student Declaration
I certify that the assignment Submission is entirely my own work and I fully understand the
consequences of plagiarism. I understand that making a false declaration is a form of
malpractice.

Student Signature: Date:

119 | P a g e
Shafra Fariz

SUBMISSION FORMAT

Assignment Task Submission Format


Part 1 Report
1 Part 2 Report
Part 3 Report/ Presentation
Part 4 Report
Part 1 Report
2 Part 2 Report
Part 3 Report
3 Part 1 Practical and Report

4 Part 2 Practical and Report

120 | P a g e
Shafra Fariz

ASSESSMENT REVIEW PLAN

Assignment Grading Evidence Formative Comments Date


Criteria
P1 Report
P2 Report
01
M1 Report
D1 Report
P3 Report
P4 Report
02
M2 Report
D1 Report
P5 Practical / Report
P6 Practical / Report
03
M3 Practical / Report
D2 Practical / Report
P4 Report
P5 Report
04
P6 Report
D3 Report

121 | P a g e
Shafra Fariz

ASSESSMENT RECORD AND FEEDBACK SHEET


Program: Student Name:

Unit No. & Title: Unit2: Assessment Date: 02nd February Unit Grade:
Networking 2021
Assessor Name: Mr. Shakir Completion Date: 04th April IV Signature:
Moulana 2021

ASSESSMENT TRACKING

Assignment Learning Objectives Criterial Date Issued Hand In Date Formative Resubmissi
Targeted Feedback on Date*

01 LO1 Basic of Networking P1 02nd February 14th


and Components P2 2021 February
M1 2021
D1
02 LO2 Explain networking P3 02nd February 28th
devices and operations P4 2021 February
M1 2021
D1
03 LO3 Design efficient P5 02nd February 12th March
networked systems P6 2021 2021
M3
D2
04 LO4 LAN Design & P7 02nd February 28th March
Implementation P8 2021 2021
M4
D3

122 | P a g e
Shafra Fariz

SUMMATIVE FEEDBACK

Assignment Grading Summative Comments Assessor


No. Criteria signature
P1
01
P2
M1
D1
P3
02 P4
M2
D1
P5
03 P6
M3
D2
P7
04 P8
M4
D3

123 | P a g e
Shafra Fariz

Unit 2: Networking
Assignment 3

124 | P a g e
Shafra Fariz

Higher National Certificate/Diploma in Computing

Assignment Brief
Student Name/ID Number 1016959
Unit Number and Title 2: Networking
Academic Year 2021
Unit Author Mr. Shakir Moulana
Assignment Title Understanding Network Concepts according to the
current industry
Issue Date 02nd February 2021
Submission Date 04th April 2021
IV Name & Date Mr. Sai Thishok – 01st February 2021

Submission Format
The submission is in the form of an individual written report. This should be written in a concise, formal business
Style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as
Appropriate, and all work must be supported with research and referenced using the Harvard referencing system.
Please also provide a bibliography using the Harvard referencing system.

125 | P a g e
Shafra Fariz
Most Universities admired in private Higher Education Institute in Colombo, Sri Lanka. Administration and the
academic staff are very much concerned about providing required facilities for the students in the field of
Network. Networking computers is not the complicated process it used to be. What used to be along drawn-out
process is now made easier and more efficient, causing less distraction and disruption in organizations.

Imagine that you are a network specialist working for your company Speed tech in a start-up level position. So
Before starting the process study the basics of Networking. Talk to the organization thinking about moving to the
Best of Networking industry taking the new technological improvement into consideration.
You will need to produce an outcome on the networking development process to the organization that includes
the

following:
1. The growth of the Network
2. Detailing of the new networking technologies introduced
3. The outcome that will be gained through Network considering the networking principles, protocols and
devices, including benefits and constraints of networked solutions, the impact of network topology,
communication and bandwidth requirements, effectiveness of networking systems, operating principles of
Networking devices and server types and networking software.

During the process in terms of working in the organization you are supposed to go through in-depth process on
Designing and implementing a local area network. You are supposed to follow the below steps below according
to the requirement by the organization

• A LAN design plan and justification document.


• A fully completed test plan including an evaluation of results and recommendations for improvements to
LAN.
• A proposed and justified maintenance schedule.
• Evidence of an implemented network.

And you are asking to analyze the specification from the institution above for completion of this project within a
given timeframe.
The LAN design that you are about to design should be well planned thinking out of the box which will make an
Effective result on the designed LAN network. After the designing process is completed.

The concept to go through with LAN design is to design a network diagram to implement to a start-up
Organization with relevant requirements and configurations. The network system should be under the
default
Gateway of 192.168.10.1 allocating 10 terminals including a server with proper configurations.

Submission Format

126 | P a g e
Shafra Fariz

Part 1- *Discuss the importance of Networking to the current trend by considering the real world on how the
industry moves and how the past network was used going through the relevant concepts in the networking sector,
with valid examples in your explanation. (note – you could also include the roles of networking, types of networking
and further more)
*Finally justify the Importance of introducing Networking to speed tech as described in the scenario.

*Further Discuss the benefits and constraints of different Networking systems types (eg. peer based, client-server)
explanation should be in brief with related networking diagrams
*With comparison discuss the pros and Cons of Networking systems discussed above (Report)

Part 2- Speed tech is planning to get a broadband (ADSL) internet connection from SLT. They are providing ZTE
ADSL wireless router (ZXV10-W300) with the internet connection. Wi-Fi is considered as the main networking
technology when it comes to implementing Wireless Local Area Networks.
*Briefly explain on the Wi-Fi technology and its standard meanwhile analyzing the features and provide strengths
and weakness of Wireless ADSL Router, in order give a brief on the transmission media and the components of it
➢ Guided media
➢ Unguided media
*You also need to discuss on some of the ISP (Internet Service Providers) in Sri Lanka on their growth and
expansion giving out some examples considering the current industry.

*Finally come to a valid justification detailing on the most suitable technology considering the Ethernet or WIFI
To be used in speed tech.

Part 3- As discussed above in the assignment brief and guidance, Imagine, with the position you’re holding in the
organization you are working in the networking industry and your supposed to create and present a presentation
explaining the basics of networking components to speed tech. *
In your Presentation Use appropriate images, diagrams and tables in the presentation and use technical language
accurately.
*Discuss all the factors needed to form a Networking environment according to your point of view. Information’s
should be added to the slide to the point and not more than 15 slides (Presentation) (Report)

Part 4- *Explain the term Network Topology and the uses of it in the industrial exposure through a research on the
growth of the network history.
*Describe the types of Networking Topologies briefly to the point with related diagrams and comparison. (Note:
explanations should be in detail with examples)
*Considering the topologies select a topology which is the most suitable to the scenario in order to implement the
client-server architecture in the lab with relevant diagram and Justification considering the part 1 on Networking
Systems. (Report)

LO2 - Explain networking devices and operations

Part 1- *Discuss how OSI model and network protocols enable effective utilization of different networking systems.
(Note: detailed definition for each of the OSI layers defined.

127 | P a g e
Shafra Fariz
You may discuss how it allows multiple-vendor development through standardization of network
components.
*In the discussion further discuss the functions of a protocol and explain each protocol defined with
examples and short answers to the point.
* When it is a network obviously there is a data flow, finally discuss the importance of data flow and the
types of data flow in the current networking environment with related diagrams and real-world examples.
(Report)

Part 2- When it is in the network environment working on with servers which is common now a days.
*Describe the term server and its key functions accordingly in your point of view and select server types
that are
most suitable for the given scenario and separately discuss the role of each and every server type (Report)

Part 3 – Describe the components needed to form a network, and along with the report suggest some of
the
Networking devices and its importance with a detailed explanation with valid examples.

LO3 - Design efficient networked systems

1. Prepare a written step-by-step plan of how you are planning to design a Local Area Network (Report)
(Diagram)
2. Justify your choice of devices for your network design.
3. Produce a test plan to evaluate this design for the requirements of bandwidth and cost constraints as per
user specifications. (Table) (Report)
4. Justify and include the security requirements with a new diagram under the default gateway of
192.168.15.1 for the terminals to the diagram designed above and quality of services needed for selection
of accessories.
5. Give out the steps of preparing the Networking cables for real time implementation for the below
mentioned,

➢ Straight Through Cabling


➢ Cross over cabling

Part 2 Implement test and diagnose networked systems

1. Explain What is IP and the classes of IP and justify the selection of the class of IP address to the above
designed diagram in part 1(Report)
2. Explain the term Static IP and Dynamic IP with proper steps of configuration (Add relevant screenshots
done during practical session.
3. Show the steps done to complete the process of file sharing (report) (Screenshots)
4. Implement a network you would suggest for a further development according to your point of view with
justification with a detailed diagram
5. Conduct verification and explain pinging process (screenshots)
6. Record the test results and analyze these against expected results. (screenshots)
7. Investigate what functionalities would allow the system to support device growth and the addition of
communication devices.
8. Discuss the significance of upgrades and security requirements in your recommendations. (Report)

128 | P a g e
Shafra Fariz

Learning Outcomes and Assessment Criteria

Pass Merit Distinction

LO1 Examine networking principles and their protocols


P1 Discuss the benefits and M1 Compare common networking
constraints of different network principles and how protocols enable LO1 & 2
types and standards. the effectiveness of networked D1 Considering a given scenario,
systems. identify the topology protocol
P2 Explain the impact of network selected
topology, communication and for the efficient utilization of a
bandwidth requirements. networking system.
LO2 Explain networking devices and operations
P3 Discuss the operating principles M2 Explore a range of server types
of networking devices and server and justify the selection of a server,
types. considering a given scenario
regarding cost and performance
P4 Discuss the inter-dependence of optimization.
workstation hardware with relevant
networking software.

129 | P a g e
Shafra Fariz

Learning Outcomes and Assessment Criteria

Pass Merit Distinction

LO3 Design efficient networked systems

P5 Design a networked to meet a given M3 Install and configure network D2 Design a maintenance
network services services and applications on your schedule to support the
choice. networked system.
P6 Test and evaluate the design to meet
the requirements and analyze user
feedback with the aim of improving
efficiency.
LO4 Implement and diagnose networked systems

P7 Implement a networked system based M4 Recommend potential D3 Use critical reflection to


on a prepared design. enhancements for the networked evaluate own work and justify
systems. valid conclusions.
P8 Document and analyze test results
against expected results.

130 | P a g e
Shafra Fariz

Table of Contents
Assignment Brief ................................................................................................................................. 125
Design efficient networked systems ........................................................................................... 133
Produce a test plan to evaluate this design for the requirements of bandwidth and cost
constraints as pursuer specifications ........................................................................................ 134
How to Write a Test Plan ............................................................................................................... 135
Step1) Analyze the Product ......................................................................................................... 136
Step2) Develop Test Strategy...................................................................................................... 137
Step2.1) Define Scope of Testing ............................................................................................... 138
Issue Scenario................................................................................................................................. 140
Step2.2) Identify Testing Type ..................................................................................................... 140
Step2.3) Document Risk & Issues............................................................................................... 142
Step2.4) Create Test Logistics .................................................................................................... 143
Step3) Define Test Objectives ..................................................................................................... 145
Step4) Define Test Criteria........................................................................................................... 147
Suspension Criteria ....................................................................................................................... 147
Exit Criteria .................................................................................................................................... 148
Step5) Resource Planning ........................................................................................................... 151
Human Resource ............................................................................................................................ 152
1. Test Manager ........................................................................................................................ 152
2. Tester ..................................................................................................................................... 152
3. Developer Test ...................................................................................................................... 152
4. Test Administrator ................................................................................................................. 152
5. SQA Members ....................................................................................................................... 153
System Resource.......................................................................................................................... 154
Step6) Plan Test Environment ..................................................................................................... 155
What is the Test Environment? ................................................................................................... 155
Instructions to arrangement the Test Environment .................................................................... 155
Step7) Schedule & Estimate ........................................................................................................ 157
Step8) Test Deliverables .............................................................................................................. 159
Test expectations are given prior to testing stage. .................................................................... 160
Test expectations are given during the testing ........................................................................... 160
Test expectations are given after the testing cycles is finished. .......................................... 160

131 | P a g e
Shafra Fariz

• Test outcomes/reports .......................................................................................................... 160


• Defect Report ........................................................................................................................ 160
• Installation/Test methods rules ............................................................................................ 161
• Release notes........................................................................................................................ 161
192.168.15.1 Diagram ..................................................................................................................... 161
Straight Through Cabling and Cross Over Cabling ................................................................. 163
How Does the UTP Cable Work? ................................................................................................ 163
UTP Cable ..................................................................................................................................... 168
Why are the Wires Twisted? ........................................................................................................ 169
RJ-45 (UTP Cable) Connector..................................................................................................... 170
Making a UTP Cable .................................................................................................................... 170
Ethernet Straight-Through Cable................................................................................................. 171
Ethernet Cross-Over Cable.......................................................................................................... 174
References .......................................................................................................................................... 241

132 | P a g e
Shafra Fariz

Design efficient networked systems

133 | P a g e
Shafra Fariz

Produce a test plan to evaluate this design for the


requirements of bandwidth and cost constraints as pursuer
specifications

A Test Plan is an itemized record that depicts the test technique, targets, plan,
assessment, expectations, and assets needed to perform testing for a product item.
Test Plan causes us decide the exertion expected to approve the nature of the
application under test. The test plan fills in as an outline to direct programming testing
exercises as a characterized cycle, which is minutely checked and constrained by the
test chief.

According to ISTQB definition: "Test Plan is an archive portraying the extension,


approach, assets, and timetable of expected test exercises."

We should begin with following Test Plan model/situation: In a gathering, you need to
examine the Test Plan with the colleagues, yet they are not intrigued

Help individuals outside the test group like designers, business administrators, clients
comprehend the subtleties of testing.

Test Plan directs our reasoning. It resembles a standard book, which should be
followed.

134 | P a g e
Shafra Fariz

Significant perspectives like test assessment, test scope, Test Strategy are recorded in
Test Plan, so it very well may be checked on by Management Team and re-utilized for
different tasks.

How to Write a Test Plan

You definitely realize that making a Test Arrangement is the main errand of Test
Management Process. Follow the seven stages underneath to make a test plan
according to IEEE 829

1. Dissect the item

2. Plan the Test Strategy

3. Characterize the Test Objectives

4. Characterize Test Criteria

5. Asset Planning

6. Plan Test Environment

135 | P a g e
Shafra Fariz

7. Timetable and Estimation

8. Decide Test Deliverables

Step1) Analyze the Product

136 | P a g e
Shafra Fariz

How might you test an item with no data about it? The appropriate response is
Impossible. You should get familiar with an item completely prior to testing it.

The item under test is Guru99 banking site. You should investigate customers and the
end clients to know their requirements and assumptions from the application

Who will utilize the site?

What is it utilized for?

How might it work?

What is programming/equipment the item employments?

Step2) Develop Test Strategy

Test Strategy is a basic advance in making a Test Arrangement in Software Testing. A


Test Strategy archive, is a significant level record, which is typically evolved by Test
Manager. This report characterizes:

• The venture's trying goals and the way to accomplish them

137 | P a g e
Shafra Fariz

• Decides testing exertion and expenses

Back to your venture, you need to create Test Strategy for testing that financial site. You
ought to follow ventures underneath.

Step2.1) Define Scope of Testing

Prior to the beginning of any test action, extent of the testing ought to be known. You
should contemplate it.

The segments of the framework to be tried (equipment, programming, middleware, and


so forth) are characterized as "in scope"

The segments of the framework that won't be tried likewise should be unmistakably
characterized as being "out of extension."

138 | P a g e
Shafra Fariz

• Characterizing the extent of your testing project is vital for all partners. An exact
degree encourages you

• Give everybody a certainty and exact data of the testing you are doing

• All task individuals will have an unmistakable comprehension about what is tried
and what isn't

• How would you decide scope your venture?

• To decide scope, you should –

• Exact client prerequisite

• Venture Budget

• Item Specification

• Abilities and ability of your test group

139 | P a g e
Shafra Fariz

Nonfunctional testing like pressure, execution or legitimate data set at present won't be
tried. (out of extension)

Issue Scenario

The client needs you to test his API. Yet, the task spending plan doesn't allow to do as
such. In such a case how will you respond?

Indeed, in such case you need to persuade the client that Api Testing is additional work
and will burn-through huge assets. Give him information supporting your realities.
Advise him if Api Testing is remembered for scope the spending will increment by XYZ
sum.

The client concurs and appropriately the new degrees, out of extension things are

• In-scope things: Functional Testing, Api Testing

• Out of extension things: Database Testing, equipment and some other outer
interfaces.

Step2.2) Identify Testing Type

140 | P a g e
Shafra Fariz

A Testing Type is a standard test procedure that gives an expected test outcome.

Each testing type is formulated to identify a specific type of product bugs. But all Testing
Types are aimed at achieving one common goal “Early detection of all the defects
before releasing the product to the customer”

There are huge loads of Testing Types for testing programming item. Your group can't
have enough endeavors to deal with all sort of testing. As Test Manager, you should set
need of the Testing Types

• Which Testing Types ought to be engaged for web application testing?

141 | P a g e
Shafra Fariz

• Which Testing Types ought to be overlooked for saving expense?

Step2.3) Document Risk & Issues

Danger is future's dubious occasion with a likelihood of event and a potential for
misfortune. At the point when the danger really occurs, it turns into the 'issue'.

In the article Risk Analysis and Solution, you have effectively found out about the
'Danger' investigation in detail and recognized likely dangers in the task.

In the QA Test Plan, you will archive those dangers

Risk Mitigation

Colleague do not have the necessary abilities for site testing. Plan instructional class to
expertise up your individuals

The venture plan is excessively close; it's difficult to finish this task on time Set Test
Priority for every one of the test movement.

142 | P a g e
Shafra Fariz

Test Manager has helpless administration skill Plan authority preparing for director

A resistance adversely influences your representatives' productivity Encourage each


colleague in his undertaking, and motivate them to more prominent endeavors.

Wrong spending appraisal and cost overruns Establish the degree prior to starting
work, give a great deal of consideration to project arranging and continually track and
measure the advancement

Step2.4) Create Test Logistics

In Test Logistics, the Test Manager should address the accompanying inquiries:

• Who will test?

• When will the test happen?

• Who will test?

You may not know definite names of the analyzer who will test, yet the sort of analyzer
can be characterized.

143 | P a g e
Shafra Fariz

To choose the correct part for indicated task, you need to consider if his ability is
equipped for the errand or not, likewise gauge the venture financial plan. Choosing
incorrectly part for the assignment may make the undertaking fizzle or postponement.

Individual having the accompanying abilities is generally ideal for performing


programming testing:

1. Capacity to comprehend client’s perspective

2. Powerful urge for quality

3. Meticulousness

4. Great collaboration

In your undertaking, the part who will take in control for the test execution is the
analyzer. Base on the undertaking financial plan, you can pick in-source or reevaluate
part as the analyzer.

• When will the test happen?

144 | P a g e
Shafra Fariz

Test exercises should be coordinated with related advancement exercises.

Step3) Define Test Objectives

Test Objective is the general objective and accomplishment of the test execution. The
goal of the testing is finding however many programming deserts as could be allowed;
guarantee that the product under test is without bug before discharge.

To characterize the test goals, you ought to do 2 after advances

Rundown all the product highlights (usefulness, execution, GUI…) which may have to
test.

Characterize the objective or the objective of the test dependent on above highlights

How about we apply these means to discover the test objective of your Guru99 Bank
testing project

145 | P a g e
Shafra Fariz

You can pick the 'TOP-DOWN' technique to discover the site's highlights which may
have to test. In this technique, you separate the application under test to part and sub-
segment.

In the past point, you have effectively dissected the prerequisite specs and stroll
through the site, so you can make a Mind-Map to discover the site highlights as
following.

146 | P a g e
Shafra Fariz

In light of above highlights, you can characterize the Test Objective of the undertaking
Guru99 as following

Watch that whether site Guru99 functionality (Account, Deposit…) is filling in true to
form with no mistake or bugs in genuine business climate

Watch that the outer interface of the site, for example, UI is filling in true to form and
meet the client need

Confirm the convenience of the site. Are those functionalities helpful for client or not?

Step4) Define Test Criteria

Test Criteria is a norm or rule on which a test system or test judgment can be based.
There're 2 sorts of test standards as following

Suspension Criteria

Indicate the basic suspension models for a test. On the off chance that the suspension
rules are met during testing, the dynamic test cycle will be suspended until the rules are
settled.

147 | P a g e
Shafra Fariz

Test Plan Example: If your colleagues report that there are 40% of experiments fizzled,
you ought to suspend testing until the advancement group fixes every one of the
bombed cases.

Exit Criteria

It indicates the measures that mean a fruitful consummation of a test stage. The leave
rules are the focused-on aftereffects of the test and are essential prior to continuing to
the following period of advancement. Model: 95% of all basic experiments should pass.

148 | P a g e
Shafra Fariz

A few strategies for characterizing exit standards are by indicating a focused-on run rate
and pass rate.

• Run rate is proportion between number experiments executed/complete


experiments of test determination. For instance, the test determination has
absolute 120 TCs, however the analyzer just executed 100 TCs, So the run rate
is 100/120 = 0.83 (83%)

• Pass rate is proportion between numbers experiments breezed


through/assessment cases executed. For instance, in over 100 TCs executed,
there're 80 TCs that passed, so the pass rate is 80/100 = 0.8 (80%)

This information can be recovered in Test Metric archives.

• Run rate is required to be 100% except if an unmistakable explanation is given.

• Pass rate is subject to project scope, however accomplishing high pass rate is an
objective.

Test Plan Example: Your Team has effectively done the test executions. They report the
test result to you, and they need you to affirm the Exit Criteria.

149 | P a g e
Shafra Fariz

In above case, the Run rate is obligatory is 100%, however the test group just finished 90% of
experiments. It implies the Run rate isn't fulfilled, so don't affirm the Exit Criteria

150 | P a g e
Shafra Fariz

Step5) Resource Planning

Asset plan is a point-by-point outline of a wide range of assets needed to finish project
task. Asset could be human, hardware and materials expected to finish a venture

The asset arranging is significant factor of the test arranging since helps in deciding the
quantity of assets (representative, gear…) to be utilized for the venture. Subsequently,
the Test Manager can make the right timetable and assessment for the venture.

This part addresses the suggested assets for your undertaking.

151 | P a g e
Shafra Fariz

Human Resource
The accompanying table addresses different individuals in your task group

No. Member Tasks


Manage with the entire undertaking
1. Test Manager Characterize project bearings
Get suitable assets
Recognizing and depicting proper test
2. Tester strategies/apparatuses/mechanization
engineering
Check and evaluate the Test Approach
Execute the tests, Log results, Report
the deformities.
Analyzer could be in-sourced or out-
sourced individuals, based on the venture
financial plan
For the errand which required low
expertise, I prescribe you pick re-
appropriated individuals to save project
cost.
3. Developer Test Carry out the experiments, test program,
test suite and so on
4. Test Administrator Develops and guarantees Test
Environment and resources are
overseen and kept up

SupportTester to utilize the test climate


for test execution

152 | P a g e
Shafra Fariz

5. SQA Members Take accountable for quality affirmation

Check to affirm whether the testing cycle


is meeting indicated prerequisites

153 | P a g e
Shafra Fariz

System Resource

For testing, a web application, you should design the assets as following tables:

No. Resources Descriptions


1. Server Introduce the web application under test
This incorporates a different web worker,
information base worker, and application worker if
material

2. Test Tool The testing instrument is to mechanize the testing,


reproduce the client activity, produce the test
outcomes
There are huge loads of test devices you can use
for this undertaking like Selenium, QTP… and so
forth

3. Network You need a Network incorporate LAN and Internet


to recreate the genuine business and client climate

4. Computer The PC which clients regularly use to interface the


web worker

154 | P a g e
Shafra Fariz

Step6) Plan Test Environment

What is the Test Environment?

A testing climate is an arrangement of programming and equipment in which the testing


group will execute experiments. The test climate comprises of genuine business and
client climate, just as actual conditions, like worker, front end running climate.

Instructions to arrangement the Test Environment

Back to your task, how would you set up test climate for this financial site?

To complete this undertaking, you need a solid collaboration between Test Team and
Development Team

You ought to pose the engineer a few inquiries to comprehend the web application
under test obviously. Here're some suggested questions. Obviously, you can pose
different inquiries on the off chance that you need.

155 | P a g e
Shafra Fariz

• What is the most extreme client association which this site can deal with
simultaneously?

• What is equipment/programming prerequisites to introduce this site?

• Does the client's PC need a specific setting to peruse the site?

156 | P a g e
Shafra Fariz

Step7) Schedule & Estimate

Test assessment, you previously utilized a few methods to appraise the push to finish
the task. Presently you ought to incorporate that assessment just as the timetable to the
Test Planning

In the Test Estimation stage, assume you break out the entire undertaking into little
errands and add the assessment for each assignment as beneath

Test Members Estimate


Make the test detail Test Designer 170 man-hours
Perform Test Execution Analyzer, Test 80 man-hours
Administrator
Test Report Tester 10 man-hours
Test Delivery 20 man-hours
Total 280 man-hours

At that point you make the timetable to finish these errands.

Making plan is a typical term in project the executives. By making a strong timetable in
the Test Planning, the Test Manager can utilize it as instrument for observing the
venture progress, control the expense overwhelms.

To make the task plan, the Test Manager needs a few kinds of contribution as beneath:

157 | P a g e
Shafra Fariz

• Representative and undertaking cutoff time: The working days, the venture cutoff
time, asset accessibility are the variables which influenced to the timetable

• Task assessment: Base on the assessment, the Test Manager realizes how long
it requires to finish the undertaking. So, he can make the suitable venture plan

• Venture Risk: Understanding the danger helps Test Manager add sufficient
additional chance to the undertaking timetable to manage the dangers

We should rehearse with a EX:

Assume the manager needs to finish the undertaking Guru99 in one month, you
previously assessed the exertion for each assignment in Test Estimation. You can make
the timetable as underneath

158 | P a g e
Shafra Fariz

Step8) Test Deliverables

Test Deliverables is a rundown of the relative multitude of reports, devices and different
segments that must be created and kept up on the side of the testing exertion.

There are diverse test expectations at each period of the product advancement
lifecycle.

159 | P a g e
Shafra Fariz

Test expectations are given prior to testing stage.

• Test plans record.

• Test cases records

• Test Design particulars.

Test expectations are given during the testing

• Test Scripts

• Simulators.

• Test Data

• Test Traceability Matrix

• Error logs and execution logs.

Test expectations are given after the testing cycles is


finished.

• Test outcomes/reports

• Defect Report

160 | P a g e
Shafra Fariz

• Installation/Test methods rules

• Release notes

(www.guru99.com, 2021)

192.168.15.1 Diagram

The IP address 192.168.15.1 is the default door for most remote switches or ADSL
modems.

The switch can utilize different IPs as the login address, yet 192.168.15.1 is one of the
normal locations. It ought to be noticed that the default IP access address is distinctive
for various brands of switches, and clients are by and large permitted to alter the default
address. In this way, if it's not too much trouble, allude to the particular access address.
It ought to likewise be added that the default port is for the most part 80, so the port is
discarded from the entrance address (the total location is http://192.168.15.1:80). On
the off chance that the port worth is altered, it should be composed totally, for instance,
http://192.168.15.1:8080.

To deal with your switch, fill in 192.168.15.1 in your program's location bar. After you
effectively access the switch the executives board, you can change and set the
accompanying alternatives: IP Qos, DNS, intermediary, LAN, WAN, network the board,
security choices, WLAN settings, PPPOE, MAC, WPS, DSL, and DHCP customers end.

161 | P a g e
Shafra Fariz

(en.ipshu.com, 2021)

162 | P a g e
Shafra Fariz

Straight Through Cabling and Cross Over Cabling

discloses how to make the get over link and straight-through link in detail with picture
models. Figure out how the UTP link moves information between two hubs or end
gadgets.

Before we figure out how to make a straight-through or cross-link, we should see how
the UTP link moves the information.

How Does the UTP Cable Work?

In UTP link, electronic signs are utilized to send and get the information. An UTP link
interfaces two hubs. In information transmission, one hub sends information and
another hub gets that information. NIC of the sender hub changes over information
stream into the electronic signals and places them into the copper wire of the UTP link.
NIC of the collector hub peruses those signs from the wire and converts back them into
the information stream.

How about we comprehend this interaction shortly more detail.

Electronic signs or electric flows stream in a circuit. In an electric circuit, two wires are
utilized. The principal wire is utilized to convey the electrons or current from the source
to the heap. The subsequent wire is utilized to finish the circuit between the heap and

163 | P a g e
Shafra Fariz

the source. At the point when electrons or current goes through the heap, the heap
plays out its capacities.

How about we take a basic model. Assume we have a LED bulb, two wires, and a
battery. To light this bulb, we interface it from the battery utilizing the wires. We interface
the positive side and negative side of the battery to the bulb independently. The
accompanying picture shows this EX:

164 | P a g e
Shafra Fariz

A similar system is utilized in UTP link to move the information. Two wires of an UTP
link make an electric circuit between hubs.

In this circuit: -

• The NIC of the hub which sends the information is fill in as the source.

• The NIC of the hub which gets the information is function as the heap.

• The first wire conveys the current from the sender hub to the collector hub.

• The second wire finishes the electric circuit.

The accompanying picture shows how the electric circuit works between the sender and
recipient hubs.

165 | P a g e
Shafra Fariz

When the electric circuit is fabricated, both the sender and beneficiary hubs utilize this
electric circuit to move the information.

End gadgets, typically PCs or Server, store and interaction information in computerized
or paired organization. To move double information through the electric circuit, NICs of
both sender and beneficiary hubs utilize an encoding plan.

An encoding plan is a language that both NICs comprehend. In the encoding plan, the
sender hub changes the electrical sign after some time, while the collector hub
deciphers those progressions as paired information.

For instance, to move a double digit 0, NIC of the sender hub drops the voltage to the
lower voltage during the center of a 1/10,000,000th-of-a-second span. NIC of the
beneficiary hub distinguishes this change and deciphers it as a paired digit 0. Very
much like this, to move paired digit 1, NIC of the sender hub raises the voltage to the
higher voltage.

166 | P a g e
Shafra Fariz

Flow in an electric circuit consistently streams a single way; from the source to the
heap. Consequently, just the sender hub (source) can send its information to the
collector hub (load). On the off chance that the collector hub needs to send its
information, it should need to make its own circuit.

The accompanying picture shows how the two hubs make and utilize their circuits to
move the information.

167 | P a g e
Shafra Fariz

Along these lines, for a two-way information move, two electrical circuits are required.
To make two electrical circuits, four wires are required. In the beneath area, we will
comprehend which wires of the UTP link are utilized to the electric circuit between hubs.

UTP Cable

An UTP link contains 8 wires. These wires are gathered in four sets. Each pair comprise
of two turned wires. The main wire has a solitary shading coded plastic covering while
the other wire has that tone in addition to white shading striped plastic covering. For

168 | P a g e
Shafra Fariz

instance, for the earthy colored wire pair, one wire's covering is all earthy colored, while
the other wire's covering is earthy colored and-white striped.

The accompanying picture shows an UTP link.

Why are the Wires Twisted?

At the point when electrical flow goes through the copper wire, it makes electromagnetic
impedance (EMI). The EMI meddles with the electrical signs in close by wires,
remembering the wires for a similar link. It is known as the cross talk. Bending the wires
two by two eliminates the impact of cross talk.

169 | P a g e
Shafra Fariz

RJ-45 (UTP Cable) Connector


Both NIC and switch port have an eight pins space. To associate these pins with the
wires of an UTP link, a connector known as the RJ-45 connector is utilized. The RJ-45
connector has eight actual areas, known as pin positions or basically sticks, into which
the eight wires of the UTP link can be embedded. These pins make where the closures
of the copper wires can contact the pins of NIC or switch port.

The accompanying picture shows a RJ-45 connector.

Making a UTP Cable

A NIC utilizes pins 1 and 2 to send the information. To get information, it utilizes pins 3
and 6. A switch does something contrary to it. It gets information on pins 1 and 2 and
communicates information from the pin 3 and 6. In view of the sort of end gadgets, an
UTP link can be made twoly. The primary kind of link, known as the straight-through
link, associates two distinct sorts of end gadgets; like PC to Switch. The second kind of
170 | P a g e
Shafra Fariz

link, known as the get over link, interfaces two same sort of end gadgets like PC to PC
or Switch to Switch.

We should see how to make the two sorts of link in detail.

Ethernet Straight-Through Cable

A NIC utilizes pins 1 and 2 to send the information. To get information, it utilizes pins 3
and 6. A switch does something contrary to it. It gets information on pins 1 and 2 and
sends information from the pin 3 and 6. In view of the sort of end gadgets, an UTP link
can be made twoly. The main kind of link, known as the straight-through link, associates
two distinct sorts of end gadgets; like PC to Switch. The second sort of link, known as
the get over link, interfaces two same kind of end gadgets like PC to PC or Switch to
Switch.

We should see how to make the two sorts of link in detail.

Side A Side B

Green White Green White

Green Green

Orange White Orange White

Blue Blue

171 | P a g e
Shafra Fariz

Blue White Blue White

Orange Orange

Brown White Brown White

Brown Brown

The Image Shows the Straight-Trough Cable

A straight-through link is utilized to interface the accompanying gadgets.

• PC to Switch
• PC to Hub
• Router to Switch
• Switch to Server
• Hub to Server

172 | P a g e
Shafra Fariz

173 | P a g e
Shafra Fariz

Ethernet Cross-Over Cable

In this link, sending pins of one side associate with the getting pins of the opposite side.

The wire at nail 1 to one finish of the link interfaces with pin 3 at the opposite finish of
the link. The wire at pin 2 associates with nail 6 to the opposite finish of the link.
Remaining wires interface in similar situations at the two finishes.

The accompanying table records the wire places of the get over link on the two sides.

Side A Side B

Green White Orange White

Green Orange

Orange White Green White

Blue Blue

Blue White Blue White

Orange Green

Brown White Brown White

174 | P a g e
Shafra Fariz

Brown Brown

The Image Shows Cross-Over Cable

The Cross-Over Cable used to Connecting These Devices:

• Two Computers
• Two Hubs
• A Hub to a Switch
• A Cable Modem to a Router
• Two Routers Interfaces

175 | P a g e
Shafra Fariz

(www.computernetworkingnotes.com, 2021)

176 | P a g e
Shafra Fariz

177 | P a g e
Shafra Fariz

2021

Networking

EXAMINE NETWORKING PRICIPLES AND THEIR PROTOCOLS


SHAFRA FARIZ

178 | P a g e
Shafra Fariz

Acknowledgement

I would like to take this opportunity to thank my lecturer Mr. Shakir Moulana for guiding us
and showing us the correct path throughout this assignment to make it a success. At the
same time, I would like to thank all the lecturers for fullest support and cooperation.
Thank You

179 | P a g e
Shafra Fariz

Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and
to present it as my own without attributing the sources in the correct form. I further
understand.
What it means to copy another’s work.

3. . I know that plagiarism is a punishable offence because it constitutes theft.

4. I understand the plagiarism and copying policy of Edexcel UK.

5. I know what the consequences will be if I plagiarize or copy another’s work in any
of the assignments for this program.

6. I declare therefore that all work presented by me for every aspect of my program,
will be my own, and where I have made use of another’s work, I will attribute the
source in the correct way
.
7. I acknowledge that the attachment of this document signed or not, constitutes
a binding agreement between myself and Edexcel UK.

8. I understand that my assignment will not be considered as submitted if this


document is not attached to the assignment.

(Provide E-mail ID)


(Provide Submission Date)
[email protected] 12th March 2021

Student’s Signature:

180 | P a g e
Shafra Fariz

Assignment Brief (RQF)

Course Tittle Pearson BTECH Level 5 Higher National Diploma in Computing


Unit number and Title: Unit2: Networking
Assignment Title Understanding Networking concepts according to the current industry
Name of the Leaner
Ref. No. of the Leaner Pearson Regd. No. 1016959
Assignment Number 01 Batch No & Semester CSD68 Semester 01
Issue Date 02nd February 2021 Submission Date 04th April 2021

Re-submission Date Date Received 1st Submission


Unit Assessor: Mr. Shakir Moulana Academic Year 2021

Higher National Diploma in Computing

Assessor Summative Feedback

Grade: Assessor Signature: Date:


Resubmission Feedback – Formative

Grade: Assessor Signature: Date:


Internal Verifier’s Comments

181 | P a g e
Shafra Fariz

Signature of the IV Date


Student Agreement: Student Signature:
I understand the feedback given to me and agree to carry out the actions in
future works as required and indicated. Date

Student Name: Assessor Name:

Issue Date: Submission Date: Submitted on:

Program:

Unit:

Assignment number and title:

STUDENT ASSESSMENT SUBMISSION AND DECLARATION

Plagiarism
Plagiarism is a particular from of cheating. Plagiarism must be avoided at all costs and student who
break the rules, however innocently, may be penalized. It is your responsibility to ensure that you
understand correct referencing practices. As a university level student, you are expected to use
appropriate references throughout and keep carefully detailed notes of all your sources of materials for
material you have used in your work, including any material downloaded from the internet. Please
consult the relevant unit lecturer or your course tutor if you need any further advice.

Student Declaration
Student Declaration
I certify that the assignment Submission is entirely my own work and I fully understand the
consequences of plagiarism. I understand that making a false declaration is a form of
malpractice.

Student Signature: Date:

182 | P a g e
Shafra Fariz

SUBMISSION FORMAT

Assignment Task Submission Format


Part 1 Report
1 Part 2 Report
Part 3 Report/ Presentation
Part 4 Report
Part 1 Report
2 Part 2 Report
Part 3 Report
3 Part 1 Practical and Report

4 Part 2 Practical and Report

183 | P a g e
Shafra Fariz

ASSESSMENT REVIEW PLAN

Assignment Grading Evidence Formative Comments Date


Criteria
P1 Report
P2 Report
01
M1 Report
D1 Report
P3 Report
P4 Report
02
M2 Report
D1 Report
P5 Practical / Report
P6 Practical / Report
03
M3 Practical / Report
D2 Practical / Report
P4 Report
P5 Report
04
P6 Report
D3 Report

184 | P a g e
Shafra Fariz

SUMMATIVE FEEDBACK

Assignment Grading Summative Comments Assessor


No. Criteria signature
P1
01
P2
M1
D1
P3
02 P4
M2
D1
P5
03 P6
M3
D2
P7
04 P8
M4
D3

185 | P a g e
Shafra Fariz

Pearson Higher Nationals in


Computing
Unit 2: Networking
Assignment 4

186 | P a g e
Shafra Fariz

Higher National Certificate/Diploma in Computing

Assignment Brief
Student Name/ID Number 1016959
Unit Number and Title 2: Networking
Academic Year 2021
Unit Author Mr. Shakir Moulana
Assignment Title Understanding Network Concepts according to the
current industry
Issue Date 02nd February 2021
Submission Date 04th April 2021
IV Name & Date Mr. Sai Thishok – 01st February 2021

Submission Format
The submission is in the form of an individual written report. This should be written in a concise, formal business
Style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as
Appropriate, and all work must be supported with research and referenced using the Harvard referencing system.
Please also provide a bibliography using the Harvard referencing system.

187 | P a g e
Shafra Fariz
Unit Learning Outcomes
LO1 Examine networking principles and their protocols.
LO2 Explain networking devices and operations.
Assignment Brief and Guidance
Most Universities admired in private Higher Education Institute in Colombo, Sri Lanka. Administration and the
academic staff are very much concerned about providing required facilities for the students in the field of
Network. Networking computers is not the complicated process it used to be. What used to be along drawn-out
process is now made easier and more efficient, causing less distraction and disruption in organizations.

Imagine that you are a network specialist working for your company Speed tech in a start-up level position. So
Before starting the process study the basics of Networking. Talk to the organization thinking about moving to the
Best of Networking industry taking the new technological improvement into consideration.
You will need to produce an outcome on the networking development process to the organization that includes
the

following:
1. The growth of the Network
2. Detailing of the new networking technologies introduced
3. The outcome that will be gained through Network considering the networking principles, protocols and
devices, including benefits and constraints of networked solutions, the impact of network topology,
communication and bandwidth requirements, effectiveness of networking systems, operating principles of
Networking devices and server types and networking software.

During the process in terms of working in the organization you are supposed to go through in-depth process on
Designing and implementing a local area network. You are supposed to follow the below steps below according
to the requirement by the organization

• A LAN design plan and justification document.


• A fully completed test plan including an evaluation of results and recommendations for improvements to
LAN.
• A proposed and justified maintenance schedule.
• Evidence of an implemented network.

And you are asking to analyze the specification from the institution above for completion of this project within a
given timeframe.
The LAN design that you are about to design should be well planned thinking out of the box which will make an
Effective result on the designed LAN network. After the designing process is completed.

The concept to go through with LAN design is to design a network diagram to implement to a start-up
Organization with relevant requirements and configurations. The network system should be under the
default
Gateway of 192.168.10.1 allocating 10 terminals including a server with proper configurations.

Submission Format

188 | P a g e
Shafra Fariz

Part 1- *Discuss the importance of Networking to the current trend by considering the real world on how the
industry moves and how the past network was used going through the relevant concepts in the networking sector,
with valid examples in your explanation. (note – you could also include the roles of networking, types of networking
and further more)
*Finally justify the Importance of introducing Networking to speed tech as described in the scenario.

*Further Discuss the benefits and constraints of different Networking systems types (eg. peer based, client-server)
explanation should be in brief with related networking diagrams
*With comparison discuss the pros and Cons of Networking systems discussed above (Report)

Part 2- Speed tech is planning to get a broadband (ADSL) internet connection from SLT. They are providing ZTE
ADSL wireless router (ZXV10-W300) with the internet connection. Wi-Fi is considered as the main networking
technology when it comes to implementing Wireless Local Area Networks.
*Briefly explain on the Wi-Fi technology and its standard meanwhile analyzing the features and provide strengths
and weakness of Wireless ADSL Router, in order give a brief on the transmission media and the components of it
➢ Guided media
➢ Unguided media
*You also need to discuss on some of the ISP (Internet Service Providers) in Sri Lanka on their growth and
expansion giving out some examples considering the current industry.

*Finally come to a valid justification detailing on the most suitable technology considering the Ethernet or WIFI
To be used in speed tech.

Part 3- As discussed above in the assignment brief and guidance, Imagine, with the position your holding in the
organization you are working in the networking industry and your supposed to create and present a presentation
explaining the basics of networking components to speed tech. *
In your Presentation Use appropriate images, diagrams and tables in the presentation and use technical language
accurately.
*Discuss all the factors needed to form a Networking environment according to your point of view. Information’s
should be added to the slide to the point and not more than 15 slides (Presentation) (Report)

Part 4- *Explain the term Network Topology and the uses of it in the industrial exposure through a research on the
growth of the network history.
*Describe the types of Networking Topologies briefly to the point with related diagrams and comparison. (Note:
explanations should be in detail with examples)
*Considering the topologies select a topology which is the most suitable to the scenario in order to implement the
client-server architecture in the lab with relevant diagram and Justification considering the part 1 on Networking
Systems. (Report)

LO2 - Explain networking devices and operations

Part 1- *Discuss how OSI model and network protocols enable effective utilization of different networking systems.
(Note: detailed definition for each of the OSI layers defined.

189 | P a g e
Shafra Fariz

You may discuss how it allows multiple-vendor development through standardization of network components.
*In the discussion further discuss the functions of a protocol and explain each protocol defined with examples
and short answers to the point.
* When it is a network obviously there is a data flow, finally discuss the importance of data flow and the types
of data flow in the current networking environment with related diagrams and real-world examples. (Report)

Part 2- When it is in the network environment working on with servers which is common now a days.
*Describe the term server and its key functions accordingly in your point of view and select server types that are
most suitable for the given scenario and separately discuss the role of each and every server type (Report)

Part 3 – Describe the components needed to form a network, and along with the report suggest some of the
Networking devices and its importance with a detailed explanation with valid examples.

LO3 - Design efficient networked systems

1. Prepare a written step-by-step plan of how you are planning to design a Local Area Network (Report)
(Diagram)
2. Justify your choice of devices for your network design.
3. Produce a test plan to evaluate this design for the requirements of bandwidth and cost constraints as per
user specifications. (Table) (Report)
4. Justify and include the security requirements with a new diagram under the default gateway of
192.168.15.1 for the terminals to the diagram designed above and quality of services needed for selection of
accessories.
5. Give out the steps of preparing the Networking cables for real time implementation for the below
mentioned,

➢ Straight Through Cabling


➢ Cross over cabling

Part 2 Implement test and diagnose networked systems

1. Explain What is IP and the classes of IP and justify the selection of the class of IP address to the above
designed diagram in part 1(Report)
2. Explain the term Static IP and Dynamic IP with proper steps of configuration (Add relevant screenshots
done during practical session.
3. Show the steps done to complete the process of file sharing (report) (Screenshots)
4. Implement a network you would suggest for a further development according to your point of view with
justification with a detailed diagram
5. Conduct verification and explain pinging process (screenshots)
6. Record the test results and analyze these against expected results. (screenshots)
7. Investigate what functionalities would allow the system to support device growth and the addition of
communication devices.
8. Discuss the significance of upgrades and security requirements in your recommendations. (Report)

190 | P a g e
Shafra Fariz

LO1 Examine networking principles and their protocols


P1 Discuss the benefits and M1 Compare common networking
constraints of different network principles and how protocols enable LO1 & 2
types and standards. the effectiveness of networked D1 Considering a given scenario,
systems. identify the topology protocol
P2 Explain the impact of network selected
topology, communication and for the efficient utilization of a
bandwidth requirements. networking system.
LO2 Explain networking devices and operations
P3 Discuss the operating principles M2 Explore a range of server types
of networking devices and server and justify the selection of a server,
types. considering a given scenario
regarding cost and performance
P4 Discuss the inter-dependence of optimization.
workstation hardware with relevant
networking software.
Learning Outcomes and Assessment Criteria

Pass Merit Distinction

191 | P a g e
Shafra Fariz

Learning Outcomes and Assessment Criteria

Pass Merit Distinction

LO3 Design efficient networked systems

P5 Design a networked to meet a given M3 Install and configure network D2 Design a maintenance
network services services and applications on your schedule to support the
choice. networked system.
P6 Test and evaluate the design to meet
the requirements and analyze user
feedback with the aim of improving
efficiency.
LO4 Implement and diagnose networked systems

P7 Implement a networked system based M4 Recommend potential D3 Use critical reflection to


on a prepared design. enhancements for the networked evaluate own work and justify
systems. valid conclusions.
P8 Document and analyze test results
against expected results.

192 | P a g e
Shafra Fariz

What is IP Address?

An IP (Internet Protocol) address is a mathematical name doled out to the gadgets


associated with a PC network that utilizes the IP for correspondence.

IP address go about as an identifier for a particular machine on a specific organization.


It additionally assists you with building up a virtual association between an objective and
a source. The IP address is likewise called IP number or web address. It assists you
with determining the specialized arrangement of the tending to and bundles plot. Most
organizations consolidate TCP with IP.

An IP address comprises of four numbers, each number contains one to three digits,
with a solitary spot (.) isolates each number or set of digits. (www.guru99.com, 2021)

Parts of IP Address

193 | P a g e
Shafra Fariz

Addresses in IPv4 are 32-bits in length. This takes into account a limit of 4,294,967,296
(232) special locations. Addresses in IPv6 are 128-bits, which takes into consideration
3.4 x 1038 (2128) novel locations.

The complete usable location pool of the two adaptations is decreased by different
saved locations and different contemplations.

IP addresses are parallel numbers yet are normally communicated in decimal structure
(IPv4) or hexadecimal structure (IPv6) to make perusing and utilizing them simpler for
people.

IP represents Internet Protocol and depicts a bunch of principles and prerequisites for
making and sending information bundles, or datagrams, across networks. The Internet
Protocol (IP) is essential for the Internet layer of the Internet convention suite. In the
OSI model, IP would be viewed as a feature of the organization layer. IP is customarily
utilized related to a more elevated level convention, most prominently TCP. The IP
standard is administered by RFC 791. (www.paessler.com, 2021)

Two Divided Parts in IP Address

• Prefix: The prefix a piece of IP address recognizes the actual organization to


which the PC is joined. Prefix is otherwise called an organization address.

• Postfix: The addition part distinguishes the individual PC on the organization. The
addition is likewise called the host address.
(www.guru99.com, 2021)

194 | P a g e
Shafra Fariz

IPv4 and IPv6?

What is IPv6?

IPv6 is the cutting-edge Internet Protocol (IP) address standard planned to enhance and
at last supplant IPv4, the convention numerous Internet benefits actually use today.
Each PC, cell phone, home robotization part, IoT sensor and some other gadget
associated with the Internet needs a mathematical IP address to impart between
different gadgets. The first IP address conspire, called IPv4, is running out of addresses
because of its broad use from the expansion of such countless associated gadgets.

What is IPv4?

IPv4 represents Internet Protocol rendition 4. It is the basic innovation that makes it
workable for us to interface our gadgets to the web. At whatever point a gadget gets to
the Internet, it is allocated an exceptional, mathematical IP address like 99.48.227.227.
To send information starting with one PC then onto the next through the web, an
information bundle should be moved across the organization containing the IP locations
of the two gadgets.

195 | P a g e
Shafra Fariz

Benefits and Supports of IPv6

IPv6 (Internet Protocol rendition 6) is the 6th amendment to the Internet Protocol and
the replacement to IPv4. It works correspondingly to IPv4 in that it gives the novel IP
tends to vital for Internet-empowered gadgets to convey. Nonetheless, it has one huge
distinction: it uses a 128-bit IP address.

Key advantages to IPv6 include:

✓ No more NAT (Network Address Translation)

✓ Auto-arrangement

✓ Not any more private location crashes

✓ Better multicast directing

✓ Easier header design

✓ Streamlined, more effective steering

196 | P a g e
Shafra Fariz

✓ Genuine nature of administration (QoS), additionally called "stream naming"

✓ Built-in confirmation and protection support

✓ Adaptable alternatives and expansions

✓ Simpler organization (no more DHCP)

IPv4 utilizes a 32-digit address for its Internet addresses. That implies it can offer help
for 2^32 IP addresses altogether — around 4.29 billion. That may appear to be a ton,
yet all 4.29 billion IP addresses have now been allocated, prompting the location
deficiency issues we face today.

IPv6 uses 128-digit Internet addresses. Subsequently, it can uphold 2^128 Internet
addresses—340,282,366,920,938,463,463,374,607,431,768,211,456 of them to be
accurate. The quantity of IPv6 addresses is multiple times bigger than the quantity of
IPv4 addresses. So, there are a sizable amount of IPv6 delivers to consider Internet
gadgets to extend for seemingly forever.

197 | P a g e
Shafra Fariz

The content type of the IPv6 address is xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx, where


every x is a hexadecimal digit, addressing 4 pieces. Driving zeros can be precluded.
The twofold colon (: :) can be utilized once in the content type of a location, to assign
quite a few 0 pieces.

With Dual-IP stacks, your PCs, switches, switches, and different gadgets run the two
conventions, yet IPv6 is the favored convention. An average method for organizations is
to begin by empowering both TCP/IP convention stacks on the wide territory
organization (WAN) center switches, at that point border switches and firewalls, trailed
by server farm switches lastly the work area access switches.

IPv6 Supports for Thousand Eyes

With IPv6 getting more predominant in cloud supplier and purchaser access
organizations, you may as of now be on the way to IPv6 arrangement with your
organization and applications.

In the event that you are hoping to comprehend IPv6 in your current circumstance there
are three things you ought to screen:

✓ IPv6 DNS goal

198 | P a g e
Shafra Fariz

✓ IPv6 traffic ways

✓ IPv6 BGP prefixes and courses

ThousandEyes has support for IPv6 so associations can use IPv6 across the entirety of
their test types (web, organization, voice, directing) and specialist types (cloud,
endeavor, endpoint).

ThousandEyes Cloud Agent support for IPv6 is given on six mainland’s permitting
worldwide inclusion for associations. ThousandEyes additionally upholds the utilization
of double stack IPv4 and IPv6 Enterprise Agents. Undertaking Agents can have the two
tends to allotted and executes tests dependent on a client characterized inclination for
just IPv4, just IPv6 or an inclination for IPv6.

(www.thousandeyes.com, 2021)

IPv4 Understanding and Addressing

Web Protocol form 4 (IPv4) is the fourth form of the standard that courses Internet traffic
and other bundle exchanged organizations presented in 1982 by the Internet
Engineering Task Force (IETF). IPv4 is the most generally utilized rendition of the
convention notwithstanding the constraints of its 32-digit address space. With marginally
under 4.3 billion accessible interesting locations, the accessible number of addresses
immediately started to run out. With some smart resourcefulness throughout the long

199 | P a g e
Shafra Fariz

term that all-inclusive the existence of the convention, the pool of accessible locations
didn't evaporate until 2011.

An IPv4 address is a progression of four eight-bit twofold numbers isolated by a decimal


point. Despite the fact that you may utilize any numbering framework to address an
interesting 32-digit number, most generally you see IP tends to communicated in dab
decimal documentation.
Site Dot-Decimal Binary

Google.com 172.217.168.238 10101100.1101100.10101000

Facebook.com 31.13.84.36 00011111.00001101.01010100.00100100

Pinterest.com 151.101.0.84 10010111.011100101.00000000.01010100

IPv4 Routing Early

At first, the standard characterized the main octet as an organization identifier, yet with
just 256 interesting qualities, the quantity of accessible organizations immediately ran
out. A few unique changes made over the course of the years have considered the

200 | P a g e
Shafra Fariz

augmentation of IPv4's life. First came the division of the accessible locations into five
classes: A, B, C, D, and E.

The class framework characterized which class an organization has a place in


dependent on its first octet.

• Class An organization's first octet starts with 0. The main octet distinguishes the
organization. Class A backings 127 organizations, each with 16 million hosts.

• Class B organization's first octet starts with 10. The first and second octets
recognize the organization. Class B upports 16,000 organizations, each with
65,000 hosts.

• Class C organization's first octet starts with 110. The initial three octets recognize
the organization. Class C backings 2 million organizations, each with 254 hosts.

• Class D organization's first octet starts with 1110. Class D is held for multicast
gatherings.

• Class E organization's first octet starts with 1111. Class E is held for some time
later.

201 | P a g e
Shafra Fariz

Each class utilized an alternate number of pieces to distinguish the organization


influencing the number of organizations and has each class could oblige. For instance,
Class C's initial three octets depicted the organization, while the fourth portrayed the
host on the organization. Later the IETF supplanted the class framework, named
"classful," with subnet covers that considered the dispersal of addresses on any location
bit limit.

IPv4 Today

In 1993 the presentation of Classless Inter-Domain Routing (CIDR) gave more


prominent adaptability for distributing squares of addresses. CIDR adds a postfix to the
IP address to distinguish the number of the main pieces address the organization
address. For IPv4, that implies a number somewhere in the range of 0 and 32. The
higher the postfix, the less accessible host tends to accessible on the organization.

CIDR eased back the development of directing tables and broadened the existence of
IPv4 by decreasing the quantity of squandered tends to that tormented the class
framework. CIDR is as yet the most generally utilized organization directing strategy
utilized today for both IPv4 and IPv6 steering.

Exhaustion Address of IPv4

2011 saw the last dispersion of IPv4 address squares to the five provincial Internet
vaults, one of which ran out of addresses totally inside the following not many months.

202 | P a g e
Shafra Fariz

The individual Internet specialist co-ops keep IPv4 alive by reusing addresses as they
become accessible.

As noted, before, IPv4 has a cap barely shy of 4.3 billion accessible locations. With the
Internet's blast in development and the Internet of Things, the quantity of accessible
locations immediately exhausted. To cure the circumstance, the IETF delivered IPv6
with its 128-digit address space for an almost endless 340 undecillions (340 followed by
37 zeros) accessible locations.

203 | P a g e
Shafra Fariz

Compatibility of IPv4 and IPv6

In spite of the fact that IPv4 and IPv6 use CIDR to deal with their organization and host
tending to, the two conventions are not tradable. IPv6 likewise fixes numerous other
systems administration issues inalienable in IPv4, for example, more modest directing
tables, worked on parcel headers, and utilizations multicast rather than broadcast.

A solitary gadget can uphold both IPv4 and IPv6. Double stack IP takes into account a
solitary switch, switch, or worker to measure either address space. You can't associate
with an IPv6 just gadget utilizing an IPv4 association and the other way around.

204 | P a g e
Shafra Fariz

Speed of IPv4

A portion of the things IPv4 conveys to expand the quantity of addresses influences
network speed. In the ideal IPv6 climate, IPv6 beats IPv4. Be that as it may, the IPv6
network actually requires work, thus relying upon nearby engineering, IPv4 is frequently
quicker. A calculation called Happy Eyeballs utilized by certain programs will test the
speed of both organization conventions and utilize the quicker form.

DNS for IPv4 and IPv6

The Domain Name System (DNS) upholds the two conventions. The DNS stores the IP
addresses for either or both and reacts to each demand for area name goal with both IP
addresses (A site can have different locations for one or the other convention).

DNS puts IPv4 addresses into the A record. The DNS framework stores IPv6 addresses
in the AAAA record. The customer would then be able to choose which convention to
utilize.

Ipv4 Address Monitoring


The IP address is a weak piece of the systems administration convention. On the off
chance that a programmer accesses the DNS settings, they can alter the IP addresses.
In doing as such, they can guide clients to a malignant site, or simply keep clients from
getting to an objective. To secure against hacking, a DNS screen can check the IP

205 | P a g e
Shafra Fariz

address once each moment. A DNS screen can likewise check and confirm different
records contained in your DNS, for example, MX and NS records.

IPv4 and IPv6 Monitoring Both

Since the two conventions course to a similar worker doesn't imply that the two
conventions work. Expressly observing IPv6 and IPv4 is conceivable with uptime
checking (for sites and web administrations). Pick either convention in the screen
settings and assign the observing designated spots. For IPv6 assign designated spots
that lone help IPv6 locally or use them all with IPv6 recreation over IPv4.

What Kind Protocols Support to My Site?

The free DNS Lookup Tool settle the location. That is, the device questions the DNS
framework and recovers your DNS records. Look down the outcomes and search for the
An and AAAA records. You may have various of either or none of the other.

1. On the off chance that the outcomes incorporate A record, the site upholds IPv4
(most destinations do).

206 | P a g e
Shafra Fariz

2. On the off chance that the outcomes incorporate an AAAA record, the site
upholds IPv6 (more uncommon).

3. In the event that the site has results for both, the site upholds both.

IPv4 and IPv6 Key Points

1. IPv4 is the most broadly utilized convention over IPv6.

2. IPv6 fixes the location fatigue issue with IPv4.

3. IPv4 utilizes a 32-digit tending to framework.

4. IPv6 and IPv4 can exist on a similar gadget with double stack empowered.

5. Cheerful Eyeballs is a calculation that permits the gadget or program to pick the
quicker convention from an objective.

6. IPv6 will at last supplant IPv4, and IPv6 selection develops by 5% every year.

207 | P a g e
Shafra Fariz

7. A site or administration while accessible on one convention may blunder on the other.
Screen both IPv6 and IPv4 addresses for accessibility.

(www.uptrends.com, 2021)

Networks Numbers and Netmasks

The IPv4 network address is distinguished as the piece savvy consistent AND of the 32-
bit IPv4 address with another 32-digit amount, the netmask. All frameworks with a
similar organization number offer the equivalent netmask (here and there called a
"subnet cover"). This worth is regularly mastered utilizing DHCP.

The subnet cover is coordinated so that each piece with a coherent '1' shows somewhat
in the address esteem that is a piece of the organization number, and an intelligent '0'
for each piece which is a piece of the host number. The netmask might be written in
specked decimal documentation, or then again as a hexadecimal number.

e.g., a 24-bit network number has a netmask which might be composed as


255.255.255.0, this is indistinguishable from 0xFFFFFF00.

Subsequently, the IP address 129.7.1.10 with a netmask of 255.255.255.0 shows the


organization number is 129.7.1.0.

208 | P a g e
Shafra Fariz

A 24-cycle network number leaves a host part of 8 pieces. That is an organization with
space for 254 hosts. (Recollect the host number "0" is saved for the actual organization,
and the all one's host address is saved for use as the organization broadcast address).
Some of the time the netmask is addressed by composing the IP address followed by
as a cut ('/') with the quantity of consective "1" bits used to shape the organization
number. The above netmask can therefore likewise be addressed as "/24" (i.e., there
are 24 '1's before the '0's). Here are a couple of more models:

Networks Numbers and Netmasks

209 | P a g e
Shafra Fariz

How the IP Address Works

IP is planned to work over an amazing association. This suggests that IP should work
without a central library or screen, and that it can't rely on unequivocal associations or
center points existing. IP is a connectionless show that is datagram-masterminded., so
every group ought to contain the source IP address, target IP address, and other data in
the header to be adequately passed on.

Joined, these factors make IP a problematic, best effort movement show. Bungle cure is
managed by upper-level shows taking everything into account. These shows join TCP,
which is an affiliation arranged show, and UDP, which is a connectionless show.

Most web traffic is TCP/IP. (www.paessler.com, 2021)

IP address works in an IP network like a postal area. For example, a postal area
solidifies two areas, address, or your region your home area.

The area or your domain is a get-together location of all houses that have a spot with a
specific locale. The house address is the novel area of your homes around there. Here,
your domain is tended to by a PIN code number.

In this model, the association address contains all hosts which have a spot with a
specific association. The host address is the intriguing area of a particular host around
there. (www.guru99.com, 2021)

210 | P a g e
Shafra Fariz

Examples of IP Versions

There are two adaptations of IP being used today, IPv4 and IPv6. The first IPv4
convention is as yet utilized today on both the web, and numerous corporate
organizations. Nonetheless, the IPv4 convention just considered 232 locations. This,
combined with how locations were allotted, prompted a circumstance where there would
not be sufficient one-of-a-kind locations for all gadgets associated with the web.

IPv6 was created by the Internet Engineering Task Force (IETF), and was formalized in
1998. This update considerably expanded the accessible location space and took into
account 2128 locations. Also, there were changes to improve the effectiveness of IP
parcel headers, just as enhancements to directing and security.

211 | P a g e
Shafra Fariz

4 Types of IP Classes

212 | P a g e
Shafra Fariz

Classes of IP Address

(www.paessler.com, 2021)

213 | P a g e
Shafra Fariz

Header Classes of IP

Before factor length subnet covers permitted organizations of any size to be designed,
the IPv4 address space was broken into five classes.

Class A
In a Class An organization, the initial eight pieces, or the originally dabbed decimal, is
the organization part of the location, with the leftover piece of the location being the host
part of the location. There are 128 potential Class An organization.
0.0.0.0 to 127.0.0.0

214 | P a g e
Shafra Fariz

In any case, any location that starts with 127. is viewed as a loopback address.

Class A IP Address Examples

2.134.213.2

Class B

In a Class B organization, the initial 16 pieces are the organization part of the location.
All Class B networks have their first piece set to 1 and the subsequent piece set to 0. In
dabbed decimal documentation, that makes 128.0.0.0 to 191.255.0.0 as Class B
organizations. There are 16,384 potential Class B organizations.

Class B IP Address Examples

135.58.24.17

Class C
In a Class C organization, the initial two pieces are set to 1, and the third piece is set to
0. That makes the initial 24 pieces of the location the organization address and the rest
of the host address. Class C organization delivers range from 192.0.0.0 to
223.255.255.0. There are more than 2 million potential Class C organizations.

215 | P a g e
Shafra Fariz

Class C IP Address Examples

192.168.178.1

Class D
Class D locations are utilized for multicasting applications. In contrast to the past
classes, the Class D isn't utilized for "ordinary" organizing tasks. Class D locations have
their initial three pieces set to "1" and their fourth piece set to "0". Class D locations are
32-bit network addresses, implying that every one of the qualities inside the scope of
224.0.0.0 – 239.255.255.255 are utilized to interestingly recognize multicast gatherings.
There are no host addresses inside the Class D location space, since every one of the
hosts inside a gathering share the gathering's IP address for collector purposes.

Class D IP Address Examples

227.21.6.173

Class E
Class E networks are characterized by having the initial four organization address bits
as 1. That includes addresses from 240.0.0.0 to 255.255.255.255. While this class is
held, its utilization was rarely characterized. Therefore, most organization executions
dispose of these locations as illicit or unclear. The special case is 255.255.255.255,
which is utilized as a transmission address.

216 | P a g e
Shafra Fariz

Class E IP Address Examples

243.164.89.28

Bit-Wise Representations and IP Address Classes

217 | P a g e
Shafra Fariz

Example Private Address

Inside the location space, certain organizations are held for private organizations.
Bundles from these organizations are not steered across the public web. This gives an
approach to private organizations to utilize inside IP addresses without meddling with
different organizations. The private organizations are

Example Special Address

Certain IPv4 addresses are saved for explicit employments:

(www.paessler.com, 2021)

218 | P a g e
Shafra Fariz

Static IP Address and Dynamic IP Address

ISPs (Internet specialist co-ops) relegate an IP address to every gadget on their


organization. The IP address can be static or dynamic.

Static IP Address

A static IP address is an IP address that consistently remains something very similar. In


the event that you have a web worker, FTP worker, or other Internet asset that should
have a location that can't transform, you can get a static IP address from your ISP. A
static IP address is normally more costly than a unique IP address, and some ISPs don't
supply static IP addresses. You should design a static IP address physically.

Dynamic IP Address

A Dynamic IP address is an IP address that an ISP allows you to utilize briefly. In the
event that a unique location isn't being used, it tends to be naturally allocated to an
alternate gadget. Dynamic IP addresses are appointed utilizing either DHCP or PPPoE.

About DHCP

Dynamic Host Configuration Protocol (DHCP) is an Internet convention that PCs on an


organization use to get IP addresses and other data like the default passage. At the
point when you associate with the Internet, a PC designed as a DHCP worker at the ISP
consequently allocates you an IP address. It very well may be a similar IP address you
had previously, or it very well may be another one. At the point when you close an

219 | P a g e
Shafra Fariz

Internet association that utilizes a powerful IP address, the ISP can appoint that IP
address to an alternate client.

You can arrange your Firebox as a DHCP worker for networks behind the gadget. You
allocate a scope of addresses for the DHCP worker to utilize.

About DHCP

Some ISPs relegate IP addresses through Point-to-Point Protocol over Ethernet


(PPPoE). PPPoE adds a portion of the highlights of Ethernet and PPP to a standard
dial-up association. This organization convention permits the ISP to utilize the charging,
verification, and security frameworks of their dial-up foundation with DSL modem and
link modem items. (www.watchguard.com, 2021)

220 | P a g e
Shafra Fariz

(Screen1 Static IP Address or Dynamic IP Address)

221 | P a g e
Shafra Fariz

(Screen2 Static IP Address or Dynamic IP Address)

222 | P a g e
Shafra Fariz

Show the steps done to complete the process of file sharing


Report and Screen Shots

File Sharing

Step 1: Create File


Make a record/envelope on the work area. Explore to it through document pioneer.

223 | P a g e
Shafra Fariz

Step 2: Advanced Sharing

Right-click on the document, select properties. Snap over to the "Sharing" tab and
select progressed sharing. Check the case stamped "Offer this envelope".

224 | P a g e
Shafra Fariz

225 | P a g e
Shafra Fariz

226 | P a g e
Shafra Fariz

Step 3: Permissions

Select which authorizations you need different clients to have for this document. You
will hold full access; however, others will have either perused just, alter, or executable
consents, contingent upon what you select.

227 | P a g e
Shafra Fariz

228 | P a g e
Shafra Fariz

Step 4: Open Sharing

Go to control board, select organization and web, at that point select organization and
sharing focus. Go to Advanced sharing settings. Look down, and select "Turn on
sharing so anybody with network access can peruse and compose records in the Public
organizers" and "Mood killer secret word secured sharing".

229 | P a g e
Shafra Fariz

Step 5: Note

Guarantee that you can associate with the other PC. Ping each other to check whether
you are both associated with a similar worker.

Step 6: Accessing the File

On the second PC, open document wayfarer. Go to organize. Your document ought to
be there. (www.instructables.com, 2021)

230 | P a g e
Shafra Fariz

Conduct verification and explain pinging process

What is Ping?

Ping is an association diagnostics mechanical assembly for the Windows request brief.
In network diagnostics, the request line program engages you to check if another PC is
open in a related close by or public association.

Ping is gotten to using the request line brief of a comparative name, either in blend in
with the IP address or the goal PC's host name. If the target PC isn't arranged in a
comparable area network as the source PC, it is critical to demonstrate the region.

The name ping is a likeness to sonar development – a system to discover dissents by


releasing beats of sound that was used during World War II to discover submarines.
The emanated beats of sound were seen inside the submarine as a light pounding,
which was onomatopoetically suggested as a "ping."

231 | P a g e
Shafra Fariz

How the Ping Works?

To affirm a PC's availability, ping sends in its default setting four ICMP resonation
request bundles of 32 bytes each to the area named as a limit.

ICMP (Internet Control Message Protocol) is a show that engages the exchanging of
information and misstep sees inside IPv4 associations. For PC networks using IPv6,
ICMPv6 has a substitution show that can be used therefore.

On a fundamental level and according to the show specific, PCs that assist ICMP with
welling ICMPv6 ought to normally respond to moving toward resonation requests with
an ICMP resonation answer. Before long, this doesn't for the most part work, as various
heads, for security reasons, mastermind the PCs they regulate so ICMP bundles are
excused without a response. Accordingly, the detachment of the target PC can't be
reasoned from an unanswered ICMP request.

In case the world in general objective PC doesn't respond, ICMP gives a notification
from the fitting entryway. Regularly for the present circumstance a switch responds that
either the association or the fitting host isn't available.

If there is no response from the switch, it might be normal that the PC is in all honesty
available anyway isn't normally responding to the resonation request as a result of its
arrangement.

232 | P a g e
Shafra Fariz

The ping request passes on the going with information as yield:

• Response time in milliseconds (ms)

• Authenticity period for ICMP bundles (time to live, TTL) (just with IPv4)

The response time decides how long a data package should be sent off the target PC
and back. The authenticity period demonstrated as the TTL looks at to a data package's
taken a break. The basic worth amounts to a furthest reaches of 255. Generally
speaking, executions have a hidden TTL of either 31, 63 or 127. The TTL is diminished
by 1 by every association center point that the data pack passes. This is insinuated as
bobs. Should the TTL drop to 0, the data package is excused.

The TTL that you get as yield consistently thinks about to the responding PC's hidden
worth short the number of ricochets on the course.

With a TTL of 58, for example, you can acknowledge that the response group was
dispatched with a fundamental assessment of 63 and passed five association center
points on the way back. (www.ionos.com, 2021)

233 | P a g e
Shafra Fariz

Ping Verification Process (Screen Shot)

234 | P a g e
Shafra Fariz

Functionality Networking Device

To help present day reserve, Windows is intended to utilize the perfect organization
connector at the perfect time for an Internet association. All cutting-edge backup PCs
have a Wi-Fi connector, yet a few PCs additionally have a portable broadband (MBB)
connector as well as a wired Ethernet connector. During present day reserve, Windows
consequently associates with the best accessible organization. (docs.microsoft.com,
2021)

Communication Device

A specialized gadget is an equipment gadget fit for sending a simple or advanced sign
via phone, other correspondence wire, or remotely.

An exemplary illustration of a specialized gadget is a PC modem, which changes a PC's


advanced data over to a simple
sign for transmission over a
phone line. Additionally, a modem
gets simple signals, and converts
them to advanced, for preparing
by the PC. This cycle is called
balance/demodulation, from
which the modem gets its name.

235 | P a g e
Shafra Fariz

Different instances of specialized gadgets incorporate a NIC (network interface card),


Wi-Fi gadgets, and passageways.

Examples of Communication Devices

The following is a full posting of the multitude of various kinds of specialized gadgets
you may experience when managing a PC.

• Bluetooth Device
• Infrared Device
• Modem (Over Phone Line)
• Network Card (Using Ethernet)
• Smartphones
• Wi-Fi Device (Using a Wi-Fi router)

Examples

236 | P a g e
Shafra Fariz

Why Computers Need Communication Devices?

A PC can turn out great without a specialized gadget. In any case, for a PC to speak
with different PCs, they need a specialized gadget. For instance, for your PC to
associate with the Internet to see this website page, it needs a specialized gadget.
Without a specialized gadget, you'd need to utilize a tennis shoe net to move or divide
information among PCs. (www.computerhope.com, 2021)

237 | P a g e
Shafra Fariz

238 | P a g e
Shafra Fariz

References
berty.tech, 2021. berty.tech. [Online]
Available at: https://berty.tech/blog/decentralized-distributed-centralized
[Accessed 25 02 2021].

citeseerx.ist.psu.edu/viewdoc, 2021. citeseerx.ist.psu.edu/viewdoc. [Online]


Available at: https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.581.5695&rep=rep1&type=pdf
[Accessed 24 02 2021].

link.springer.com, 2021. link.springer.com. [Online]


Available at: https://link.springer.com/chapter/10.1007/978-1-4613-0809-6_1
[Accessed 25 02 2021].

slideplayer.com, 2021. slideplayer.com. [Online]


Available at: https://slideplayer.com/slide/16383028/
[Accessed 23 02 2021].

sysgen.ca, 2021. sysgen.ca. [Online]


Available at: https://sysgen.ca/trends-in-network-devices-and-services/
[Accessed 25 02 2021].

www.cse.wustl.edu, 2005. www.cse.wustl.edu. [Online]


Available at: https://www.cse.wustl.edu/~jain/talks/ftp/icpads05.pdf
[Accessed 25 02 2021].

www.sarthaks.com, 2021. www.sarthaks.com. [Online]


Available at: https://www.sarthaks.com/1009632/explain-the-growth-of-the-computer-networking
[Accessed 25 02 2021].

www.techwalla.com, 2021. www.techwalla.com. [Online]


Available at: https://www.techwalla.com/articles/importance-of-computer-networking
[Accessed 25 02 2021].

References
berty.tech, 2021. berty.tech. [Online]
Available at: https://berty.tech/blog/decentralized-distributed-centralized
[Accessed 25 02 2021].

citeseerx.ist.psu.edu/viewdoc, 2021. citeseerx.ist.psu.edu/viewdoc. [Online]


Available at: https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.581.5695&rep=rep1&type=pdf
[Accessed 24 02 2021].

239 | P a g e
Shafra Fariz

geode.apache.org, 2021. geode.apache.org. [Online]


Available at:
https://geode.apache.org/docs/guide/12/topologies_and_comm/topology_concepts/topology_types.ht
ml#:~:text=The%20client%2Fserver%20topology%20is,server%20sys
[Accessed 25 02 2021].

link.springer.com, 2021. link.springer.com. [Online]


Available at: https://link.springer.com/chapter/10.1007/978-1-4613-0809-6_1
[Accessed 25 02 2021].

slideplayer.com, 2021. slideplayer.com. [Online]


Available at: https://slideplayer.com/slide/16383028/
[Accessed 23 02 2021].

sysgen.ca, 2021. sysgen.ca. [Online]


Available at: https://sysgen.ca/trends-in-network-devices-and-services/
[Accessed 25 02 2021].

www.cse.wustl.edu, 2005. www.cse.wustl.edu. [Online]


Available at: https://www.cse.wustl.edu/~jain/talks/ftp/icpads05.pdf
[Accessed 25 02 2021].

www.sarthaks.com, 2021. www.sarthaks.com. [Online]


Available at: https://www.sarthaks.com/1009632/explain-the-growth-of-the-computer-networking
[Accessed 25 02 2021].

www.techwalla.com, 2021. www.techwalla.com. [Online]


Available at: https://www.techwalla.com/articles/importance-of-computer-networking
[Accessed 25 02 2021].

References
www.computernetworkingnotes.com, 2021. www.computernetworkingnotes.com. [Online]
Available at: https://www.computernetworkingnotes.com/networking-tutorials/computer-networking-
devices-explained-with-function.html
[Accessed 12 03 2021].

www.guru99.com, 2021. www.guru99.com. [Online]


Available at: https://www.guru99.com/what-everybody-ought-to-know-about-test-planing.html
[Accessed 13 03 2021].

www.paessler.com, 2021. www.paessler.com. [Online]


Available at: https://www.paessler.com/it-explained/server
[Accessed 13 03 2021].

240 | P a g e
Shafra Fariz

www.techwalla.com, 2021. www.techwalla.com. [Online]


Available at: https://www.techwalla.com/articles/importance-of-data-flow-diagrams
[Accessed 13 03 2021].

References
en.ipshu.com, 2021. en.ipshu.com. [Online]
Available at: https://en.ipshu.com/ipv4/192.168.15.1
[Accessed 28 03 2021].

www.computernetworkingnotes.com, 2021. www.computernetworkingnotes.com. [Online]


Available at: https://www.computernetworkingnotes.com/ccna-study-guide/straight-through-and-
cross-over-cable.html
[Accessed 29 03 2021].

www.guru99.com, 2021. www.guru99.com. [Online]


Available at: https://www.guru99.com/what-everybody-ought-to-know-about-test-planing.html
[Accessed 13 03 2021].

www.guru99.com, 2021. www.guru99.com. [Online]


Available at: https://www.guru99.com/how-you-can-achieve-project-goals-through-test-monitoring-
control.html
[Accessed 28 03 2021].

References
docs.microsoft.com, 2021. docs.microsoft.com. [Online]
Available at: https://docs.microsoft.com/en-us/windows-hardware/design/device-
experiences/functionality-wiht-networking-devices
[Accessed 14 04 2021].

www.computerhope.com, 2021. www.computerhope.com. [Online]


Available at: https://www.computerhope.com/jargon/c/communication-devices.htm
[Accessed 14 04 2021].

www.guru99.com, 2021. www.guru99.com. [Online]


Available at: https://www.guru99.com/ip-address-
classes.html#:~:text=IP%20address%20works%20in%20a,the%20host%20into%20that%20network.
[Accessed 13 04 2021].

www.guru99.com, 2021. www.guru99.com. [Online]


Available at: https://www.guru99.com/ip-address-
classes.html#:~:text=IP%20address%20works%20in%20a,the%20host%20into%20that%20network.
[Accessed 13 04 2021].

241 | P a g e
Shafra Fariz

www.instructables.com, 2021. www.instructables.com. [Online]


Available at: https://www.instructables.com/File-Sharing/
[Accessed 14 04 2021].

www.ionos.com, 2021. www.ionos.com. [Online]


Available at: https://www.ionos.com/digitalguide/server/tools/ping-command/
[Accessed 14 04 2021].

www.paessler.com, 2021. www.paessler.com. [Online]


Available at: https://www.paessler.com/it-explained/ip-address
[Accessed 13 04 2021].

www.thousandeyes.com, 2021. www.thousandeyes.com. [Online]


Available at: https://www.thousandeyes.com/learning/techtorials/ipv4-vs-
ipv6#:~:text=IPv4%20uses%20a%2032%2Dbit%20address%20for%20its%20Internet%20addresses.&text
=IPv6%20utilizes%20128%2Dbit%20Internet,the%20number%20of%20IPv4%20addresses.
[Accessed 13 04 2021].

www.uptrends.com, 2021. www.uptrends.com. [Online]


Available at: https://www.uptrends.com/what-is/ipv4
[Accessed 12 04 2021].

www.watchguard.com, 2021. www.watchguard.com. [Online]


Available at: https://www.watchguard.com/help/docs/help-center/en-US/Content/en-
US/Fireware/overview/networksecurity/ip_address_static_dyn_c.html
[Accessed 14 04 2021].

242 | P a g e

You might also like