Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Network writing and analysis, Study notes of Network Analysis

in the period i starting this for all students

Typology: Study notes

2020/2021

Uploaded on 11/17/2021

thamindu-sharitha
thamindu-sharitha 🇮🇳

11 documents

1 / 73

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
0
MG66405
NETWORK
Networking
Unit 02
W. GAYAN DARSHANA BOTHEJU
| MG66405
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21
pf22
pf23
pf24
pf25
pf26
pf27
pf28
pf29
pf2a
pf2b
pf2c
pf2d
pf2e
pf2f
pf30
pf31
pf32
pf33
pf34
pf35
pf36
pf37
pf38
pf39
pf3a
pf3b
pf3c
pf3d
pf3e
pf3f
pf40
pf41
pf42
pf43
pf44
pf45
pf46
pf47
pf48
pf49

Partial preview of the text

Download Network writing and analysis and more Study notes Network Analysis in PDF only on Docsity!

MG
NETWORK

Networking

Unit 02

W. GAYAN DARSHANA BOTHEJU| MG

NETWORK
 - MG 
  • Part - (A)........................................................................................................................... Table of Contents
    1. Introduction
    1. Benefits and Constraints of Different Types of Networks and Networking Standards
    • 2.1. Network type..........................................................................................................
      • 2.1.1. Peer-Based Network......................................................................................
      • 2.1.2. Client-Server Network...................................................................................
      • 2.1.3. Centralised Network......................................................................................
      • 2.1.4. Clustered Network
      • 2.1.5. Cloud Network.............................................................................................
    • 2.2. Benefits of Different Network Types..........................................................................
    • 2.3. Network standards...................................................................................................
    • 2.4. Conceptual Models for Network................................................................................
      • 2.4.1 OSI Layered Model.......................................................................................
      • 2.4.2 TCP/IP Layered Model.................................................................................
    • 2.5 Network Protocols..................................................................................................
      • 2.5.1 The OSI model - Network Protocols
    • 2.6 Line Configuration in Networks
    • 2.7 Network Topologies (Physical Topology)
    • 2.8 Network Devices
      • 2.8.1 Switch........................................................................................................
      • 2.8.2 Router........................................................................................................
      • 2.8.3 Hub
      • 2.8.4 Modem
      • 2.8.5 Repeater
    • 2.9 Network Cables
      • 2.9.1 Categories for Ethernet cables........................................................................
    • 2.10 Network Bandwidth............................................................................................
    • 2.11 Networking Software
  • Part – (B)
    1. Task –
    • including a blueprint of your LAN. (I). Prepare a written step-by-step plan of how you are going to design a Local Area Network
    • 1.1. Introduction and Requirements of the Network Plan
    • 1.2. The Selection of Network Topology............................................................................
    • 1.3. Selection of Network Equipment
      • 1.3.1. Selecting Switches
      • 1.3.2. Selecting Routers
      • 1.3.3. Selecting Server
      • 1.3.4. Selecting Network Cables.................................................................................
    • 1.4. Cost Analysis...........................................................................................................
    • 1.5. IP Addressing
    • 1.6. Blueprint of the Network Diagram
      • 1.6.1 Section Wise Diagrams......................................................................................
      • 1.6.2. Total Diagram of LAN
    • (II). Justify your choice of devices for your network design.
    • 1.1. Switches
    • 1.2. Routers
    • 1.3. Servers
      • 1.3.1. DNS Server.....................................................................................................
      • 1.3.2. DHCP and File Server
    • 1.4. Cables and Connectivity.............................................................................................
    • constraints as per user specifications................................................................................... (III). Produce a test plan to evaluate this design for the requirements of bandwidth and cost
    • 1.1. Planning the Installation
    • 1.2. Testing this New LAN Network
    • 1.3. Defining Policies and Procedures.................................................................................
    • 1.1. Justify the security requirements..................................................................................
      • 1.1.1. Access Control
      • 1.1.2. Firewalls
    • 1.2. Quality of Services needed for Selection of Accessories
    • 1.3. Configuration Network System (Logical)
      • 1.3.1. DNS Server Configuration
      • 1.3.2. File Server Configuration..................................................................................
      • 1.3.3. DHCP Server Configuration
    • (V). Suggest a maintenance schedule to support the networked system.
    • 1.1. Maintenance Schedule for this LAN Network
    • 1.2. Schedule Plan
    1. Task –
    • (I). Implement a networked system based on your prepared design..........................................
    • 1.1. Implement Networked with Microsoft Windows Server 2008 R2......................................
      • 1.1.1. IP Configuration
      • 1.1.2. Active Directory Domain Services Configuration..................................................
      • 1.1.3. DNS Server Configuration
      • 1.1.4. DHCP Configuration........................................................................................
    • (III). Conduct verification with e.g. Ping, extended ping, trace route, telnet, SSH, etc.
    • 1.1. Conduct Verification – Ping........................................................................................
    • 1.2. Conduct Verification – Extended Ping..........................................................................
    • 1.3. Conduct Verification – Tracert
    • 1.4. Conduct Verification – telnet
    • addition of communication devices. (IV). Investigate what functionalities would allow the system to support device growth and the
    • 1.1. Wi-Fi 6....................................................................................................................
    • 1.2. Digitized Spaces
    • 1.3. SD-WAN.................................................................................................................
    • 1.4. 5G
    • (V). Discuss the significance of upgrades and security requirements in your recommendations....
    • 1.1. Network Server Security Requirements and Procedures...................................................
  • References.......................................................................................................................
  • Figure 1- Peer-To-Peer Network Figure List
  • Figure 2 - Advantages & Disadvantages of Peer to Peer Network
  • Figure 3 - Advantages & Disadvantages of Client - Server Network
  • Figure 4- Topological constraints of Client Server Network
  • Figure 5- Server-Based Network
  • Figure 6- Centralized Network
  • Figure 7- Cluster Network
  • Figure 8 - Cloud Network
  • Figure 9- Network IEE Standards........................................................................................
  • Figure 10- OSI Layered Model
  • Figure 11- OSI model Explanation
  • Figure 12- TCP/IP Model Layer........................................................................................
  • Figure 13- Point to Point Connection.................................................................................
  • Figure 14- MultiPoint Connection
  • Figure 15- RING Topology
  • Figure 16- BUS Topology.................................................................................................
  • Figure 17- Star Topology
  • Figure 18- MESH Topology..............................................................................................
  • Figure 19- Tree Topology
  • Figure 20- Analog-Digital Waveform
  • Figure 21 - Development Department Diagram...................................................................
  • Figure 22- QA Department
  • Room............................................................................................................................... Figure 23- Network Department, PM Department, Top Level Management Section and Server
  • Figure 24- Marketing and Administration Department
  • Figure 25- Business Analyst Department...........................................................................
  • Figure 26 - Blue Print of the Network Diagram
  • Figure 27 - TP-Link 24Ports Gigabit Ethernet Switch (TL-SG1024)....................................
  • Figure 28- MikroTik- MB4011- 10Port Gigabit Ethernet Router
  • Figure 29- CAT6 Network Cable
  • Figure 30- DNS Server IP Address Configuration
  • Figure 31- DNS Server Services Configure window
  • Figure 32- File Server Authentication Setup
  • Figure 33- Transfer Test.txt file Admin Pc to File Server
  • Figure 34- Transferred Test.txt File
  • Figure 35- Downloaded File..............................................................................................
  • Figure 36- Download a File from the FTP Server Command Prompt
  • Figure 37- Setting up Server pools
  • Figure 38 - Confirmation about DHCP Configuration
  • Figure 39- DHCP Config with Router 01...........................................................................
  • Figure 40- DHCP Config with Router 01(1)
  • Figure 41- Network and Sharing Center window
  • Figure 42- Local Area Connection Window.......................................................................
  • Figure 43- LAN Properties window...................................................................................
  • Figure 44- TCP/IPv4 Property Window.............................................................................
  • Figure 45- Server Manager Window..................................................................................
  • Figure 46- Server Roles Selection and Installing Window
  • Figure 47- Active Directory Domain Service Installation Wizard
  • Figure 48- DNS Server installation Complete Window
  • Figure 49- DHCP Server Role Selection
  • Figure 50- DHCP Server Setting
  • Figure 51- DHCP Server Scope Adding window
  • Figure 52- Installation Result window
  • Figure 53- DHCP Authentication Setup
  • Figure 54- Finalize window
  • Figure 55- Verification Ping..............................................................................................
  • Figure 56- Verification Extended Ping
  • Figure 57- Verification Tracert..........................................................................................
  • Table 1- Advantages and Disadvantages of OSI Model List of Table
  • Table 2- Advantages and Disadvantages of TCP/IP Model.................................................
  • Table 3- The OSI model - Network Protocols
  • Table 4- Advantages and Disadvantages of RING Topology
  • Table 5- Advantages and Disadvantages of BUS Topology
  • Table 6- Advantages and Disadvantages of STAR Topology..............................................
  • Table 7- Advantages and Disadvantages of MESH Topology
  • Table 8- Advantages and Disadvantages of TREE Topology
  • Table 9- Advantages and Disadvantages of HYBRID Topology
  • Table 10- Username and Password List for File Server
  • Table 11- Network System Maintenances Schedule
MG
NETWORK

Part - (A)

1. Introduction

The purpose of this project is to design a suitable network system for your ABC Company (Pvt)

Ltd. in expand and improve existing LAN environment to better suite. The aim was to design

a network with high-quality security and low cost, in such a way that network devices of this

company, will meet standards associated with the top-level companies. This project will help

to enhance your IT Services in this company with easy network technologies.

There are many devices that were used in designing the network, such as routers, switches,

backup, and servers. All devices were connected to each other to make integration network

system and configured by putting IP addresses to all devices. Although the budget for this

design network was low, it needed to have a high level of security. Accordingly, it incorporated

several mechanisms including a firewall device that prevents any unfavourable data from

entering into the network.

Additionally, all devices in the network were secured by passwords, and these passwords were

encrypted to be more secure. Moreover, each computer in the network was secured by antivirus

programs and a backup system.

This report discussed in details the budget challenges that the network faced with your services.

More Companies have a limited budget that affects choosing devices in the network such as

servers. The servers used for this network design are DHCP server and DNS servers. This

presentation and design included additional components such as a web server, mail server, File

Server, etc. It also briefly describes the networking principles, protocols, benefits and

constraints of networked solutions related to the content and is d esigned to facilitate

communication.

2.1.2. Client-Server Network

Client-server networks are computer networks that use a dedicated computer (server)

to store data, manage/provide resources and control user access. The server acts as a

central point on the network upon which the other computers connect to. A client-server

network is usually preferred over a peer-to-peer network that doesn’t have a central

server to manage the network.

Figure 4 - Topological constraints of Client Server Network

Figure 5 - Server-Based Network

Figure 3 - Advantages & Disadvantages of Client - Server Network

2.1.3. Centralised Network

A type of network where all users connect to a central server, which is the acting agent

for all communications. This server would store both the communications and the user

account information. Most public instant messaging platforms use a centralized

network.

2.1.4. Clustered Network

A cluster network is two or more computing devices working together for a common

computing purpose. These networks take advantage of the parallel processing power of

the computing devices. In addition to the increased processing power, shared

computing resources in a cluster network also can provide scalability, high availability,

and failover capabilities should one computing device have a problem.

Figure 6 - Centralized Network

  • Since an extensive procedure is disintegrated into a few littler procedures and each

is taken care of by all the associated gadgets, an explicit issue can be settled in

lesser time.

  • Reliability implies backing up of information.
  • Security and protection of information is additionally settled through system

(Security through authentication).

  • It is highly flexible.

2.3. Network standards

Networking standards define a series of definitions for networks that are published by

various organizations.

2.3.1. Standards Organizations

Some of the noted standards organizations are;

a. International Standards Organization (ISO)

b. International Telecommunication Union (ITU)

c. Institute of Electronics and Electrical Engineers (IEEE)

d. American National Standards Institute (ANSI)

e. Internet Research Task Force (IETF)

f. Electronic Industries Association (EIA)

The guideline also describes the type of medium used, the speeds used on different type of

physical cable or wireless technology used. One such set of rules for the networking traffic to

follow is IEEE standards.

2.4. Conceptual Models for Network

Conceptual Models can Categorize as follows;

  1. ISO’s OSI Layered Model
  2. TCP/IP Layered Model
  3. Cisco’s Layered Model
  4. IBM’s SNA Model

2.4.1 OSI Layered Model

The Open Systems Interconnection (OSI) model is a conceptual model

created by the International Organization for Standardization which

enables diverse communication systems to communicate using

standard protocols. In plain English, the OSI provides a standard for

different computer systems to be able to communicate with each other.

The OSI model can be seen as a universal language for computer

networking. It’s based on the concept of splitting up a communication

system into seven abstract layers, each one stacked upon the last.

Figure 9 - Network IEE Standards

Figure 10 - OSI Layered Model

Transport Layer

The transport layer manages the delivery and error checking of data packets. It regulates the

size, sequencing, and ultimately the transfer of data between systems and hosts. One of the

most common examples of the transport layer is TCP or the Transmission Control Protocol.

Network Layer

The network layer is responsible for receiving frames from the data link layer, and delivering

them to their intended destinations among based on the addresses contained inside the frame.

The network layer finds the destination by using logical addresses, such as IP (internet

protocol).

Data Link Layer

At the data link layer, directly connected nodes are used to perform node-to-node data transfer

where data is packaged into frames. The data link layer also corrects errors that may have

occurred at the physical layer.

Physical Layer

The lowest layer of the OSI Model is concerned with electrically or optically transmitting raw

unstructured data bits across the network from the physical layer of the sending device to the

physical layer of the receiving device.

Advantages and Disadvantages of OSI Model

Table 1 - Advantages and Disadvantages of OSI Model

Advantages Disadvantages

It is a generic model and acts as a guidance tool

to develop any network model.

The OSI model is very complex. The initial

implementation was cumbersome, slow and

costly.

It is a layered model. Changes are one layer do

not affect other layers, provided that the

interfaces between the layers do not change

drastically.

It is purely a theoretical model that does not

consider the availability of appropriate

technology. This restricts its practical

implementation.

It supports both connection-oriented services

and connectionless services.

2.4.2 TCP/IP Layered Model

The OSI Model we just looked at is just a reference/logical model. It was designed to describe

the functions of the communication system by dividing the communication procedure into

smaller and simpler components. It stands for Transmission Control Protocol/Internet Protocol.

The TCP/IP model is a concise version of the OSI model. It contains four layers, unlike seven

layers in the OSI model.

Figure 12 - TCP/IP Model Layer

Application Layer

This is the top most layer of TCP/IP model. It is used for interaction between user and

application. There are several protocols used by the application layer for user interaction such

as: HTTP, SNMP, SMTP, DNS, TELNET, FTP etc.

2.5 Network Protocols

Network Protocols are a set of rules governing exchange of information in an easy, reliable and

secure way. Before we discuss the most common protocols used to transmit and receive data

over a network, we need to understand how a network is logically organized or designed.

2.5.1 The OSI model - Network Protocols

Application layer network protocols;

Protocol Description

DHCP : Dynamic Host

Configuration Protocol

DHCP is a communication protocol that enables network administrators to

automate the assignment of IP addresses in a network. DHCP works on a

client-server model.

DNS : Domain Name

System protocol

The DNS protocol helps in translating or mapping host names to IP addresses.

DNS works on a client-server model, and uses a distributed database over a

hierarchy of name servers.

FTP : File Transfer

Protocol

File Transfer Protocol enables file sharing between hosts, both local and

remote, and runs on top of TCP. For file transfer, FTP creates two TCP

connections: control and data connection.

HTTP : Hyper Text

Transfer Protocol

HTTP is an application layer protocol used for distributed, collaborative, and

hypermedia information systems. It works on a client-server model, where

the web browser acts as the client.

IMAP and IMAP4 :

Internet Message

Access Protocol

IMAP is an email protocol that lets end users’ access and manipulate

messages stored on a mail server from their email client as if they were

present locally on their remote device.

Telnet: Terminal

emulation protocol

Telnet is an application layer protocol that enables a user to communicate

with a remote device. A Telnet client is installed on the user's machine, which

accesses the command line interface of another remote machine that runs a

Telnet server program.

Presentation layer network protocols

Protocol Description

LPP: Lightweight

Presentation Protocol

The Lightweight Presentation Protocol helps provide streamlined support for

OSI application services in networks running on TCP/IP protocols for some

constrained environments.

Session layer network protocols

Protocol Description

RPC: Remote

Procedure Call protocol

RPC is a protocol for requesting a service f rom a program in a remote

computer through a network, and can be used without having to understand

the underlying network technologies.

Transport layer network protocols

Protocol Description

TCP: Transmission

Control Protocol

TCP is a transport layer protocol that provides a reliable stream delivery and

virtual connection service to applications through the use of sequenced

acknowledgement.

UDP: User Datagram

Protocol

UDP is a connection-less transport layer protocol that provides a simple but

unreliable message service. Unlike TCP, UDP adds no reliability, flow

control, or error recovery functions. UDP is useful in situations where the

reliability mechanisms of TCP are not necessary.

Network layer protocols

Protocol Description

IPv6: Internet Protocol

version 6

IPv6 is the latest version of the Internet Protocol, a network layer protocol

that possesses addressing and control information for enabling packets to be

routed in the network. IPv6 was created to deal with IPv4 exhaustion. It

increases the IP address size from 32 bits to 128 bits to support more levels

of addressing.

IP: Internet Protocol

(IPv4)

IPv4 is a network layer protocol that contains addressing and control

information, which helps packets be routed in a network. IP works in tandem

with TCP to deliver data packets across the network.

Data link layer network protocols

Protocol Description

ARP: Address

Resolution Protocol

The Address Resolution Protocol helps map IP addresses to physical machine

addresses (or a MAC address for Ethernet) recognized in the local network.

SLIP: Serial Line IP

SLIP is used for point-to-point serial connections using TCP/IP. SLIP is used

on dedicated serial links, and sometimes for dial-up purposes. SLIP is useful

for allowing mixes of hosts and routers to communicate with one another

Table 3 - The OSI model - Network Protocols