0% found this document useful (0 votes)
51 views39 pages

Unit 2 Assignment

The document is a report submitted by Ho Nguyen Minh Phong for their BTEC Level 5 HND Diploma in Computing unit on networking. The report includes an assignment front sheet, assignment brief sheet, and assessment criteria. The report discusses designing a network for an educational institute with 200 students, 15 teachers, and other staff. It examines networking principles, protocols, and devices. It also includes designing, implementing, testing, and diagnosing the proposed networked system.

Uploaded by

Nguyen Manh Tai
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
Download as docx, pdf, or txt
0% found this document useful (0 votes)
51 views39 pages

Unit 2 Assignment

The document is a report submitted by Ho Nguyen Minh Phong for their BTEC Level 5 HND Diploma in Computing unit on networking. The report includes an assignment front sheet, assignment brief sheet, and assessment criteria. The report discusses designing a network for an educational institute with 200 students, 15 teachers, and other staff. It examines networking principles, protocols, and devices. It also includes designing, implementing, testing, and diagnosing the proposed networked system.

Uploaded by

Nguyen Manh Tai
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 39

NET WORKING

REPORT

HO NGUYEN MINH PHONG


ASSIGNMENT FRONT SHEET
Qualification BTEC Level 5 HND Diploma in Computing
Unit number and
Unit 2: Networking
title
Date Received 1st
Submission date December, 30th 2019 December, 25th 2019
submission
Date Received 2nd
Re-submission Date
submission
Student Name Hồ Nguyễn Minh Phong Student ID GCS 17225

Class Networking(1619) Assessor name Hồ Nguyễn Phú Bảo

Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the
consequences of plagiarism. I understand that making a false declaration is a form of malpractice.
Student’s signature

Grading grid

P1 P2 P3 P4 P5 P6 P7 P8 M1 M2 M3 M4 D1 D2 D3
❒ Summative Feedback:

❒ Resubmission Feedback:

Grade: Assessor Signature: Date:

Signature & Date:


ASSIGNMENT BRIEF SHEET

Qualification BTEC Level 5 HND Diploma in Computing

Unit number Unit 2: Networking

Assignment title Networking Infrastructure

Academic Year Fall 2019 (Part 2)

Unit Tutor Hồ Nguyễn Phú Bảo

Issue date Submission date December, 30th 2019

IV name and date Hồ Nguyễn Minh Phong

Submission format

Part 1
The submission is in the form of an individual written report. This should be written in a concise,
formal business style using single spacing and font size 12. You are required to make use of headings,
paragraphs and subsections as appropriate, and all work must be supported with research and referenced
using the Harvard referencing system. Please also provide a bibliography using the Harvard referencing
system. The recommended word limit is 2,000–2,500 words, although you will not be penalized for
exceeding the total word limit.
Part 2
The submission is in the form of an individual evidence portfolio. This assignment can be completed as
a group, but each student must produce their own portfolio, which will contain:
 A LAN design plan and blueprint and justification document.
 A fully completed test plan including an evaluation of results and recommendations for
improvements to LAN.
 A proposed and justified maintenance schedule.
Part 3
 Evidence of an implemented network.
You are required to make use of headings, paragraphs, subsections and illustrations as appropriate, and
all work must be supported with research and referenced using the Harvard referencing system.

Unit Learning Outcomes


LO1: Examine networking principles and their protocols.
LO2: Explain networking devices and operations.
LO3: Design efficient networked systems.
LO4: Implement and diagnose networked systems.
Assignment Brief

You are employed as a Network Engineer by Nguyen Networking Limited, a high-tech networking
solution development company, which have branches in Hồ Chí Minh City, Hà Nội, Đà Nẵng and Cần
Thơ.
The company has been contracted to implement a networking project from a local educational institute.
The specification of the project is given below:
People: 200 students, 15 teachers, 12 marketing and administration staff, 05 higher managers including
the head of academics and the program manager, 03 computer network administrators.
Resources: 50 student lab computers, 35 staff computers, 03 printers.
Building: 03 floors, all computers and printers are on the ground floor apart from the IT labs – one lab
located on the first floor and another located on the second floor.
As a first task, the CEO of the company Mr. Nguyen has asked you to investigate and explain
networking principles, protocols and devices and submit a report.

Part 1
You will need to produce a report that includes the following:
1. An introduction to provide an overview of your report.
2. Benefits and constraints of different types of networks and networking standards.
3. The impact of network topology, speed of communication and bandwidth requirements.
4. Effectiveness of networking systems.
5. Discussion on operating principles of networking devices and server types and networking software.
6. Discuss the relationship of workstation hardware with networking software.
7. Explore a range of server types and justify the selection of a server, considering a given scenario
regarding cost and performance optimization.
8. For the given specification, identify the topology protocol for the efficient utilization of a networking
system.

The CEO Mr. Nguyen is happy with your first report and now he has asked you to analyze the
specification from the institution, as given earlier.
You need to design and implement the networking project within a given time frame:

Part 2 - Design efficient networked systems


1. Prepare a written step-by-step plan of how you are going to design a Local Area Network including a
blueprint of your LAN.
2. Justify your choice of devices for your network design.
3. Produce a test plan to evaluate this design for the requirements of bandwidth and cost constraints as
per user specifications.
4. Justify the security requirements and quality of services needed for selection of accessories.
5. Suggest a maintenance schedule to support the networked system.
Part 3 - Implement test and diagnose networked systems
1. Implement a networked system based on your prepared design.
2. Conduct verification with e.g. Ping, extended ping, trace route, telnet, SSH, etc.
3. Record the test results and analyze these against expected results.
4. Investigate what functionalities would allow the system to support device growth and the addition of
communication devices.
5. Discuss the significance of upgrades and security requirements in your recommendations.

ASSESMENT CRITERIA

Learning Outcomes and Assessment Criteria

Pass Merit Distinction

LO1 Examine networking principles and their protocols. LO1 & 2


D1 Considering a given
P1 Discuss the benefits and constraints M1 Compare common
scenario, identify the
of different network types and networking principles and how
topology protocol selected for
standards. protocols enable the
the efficient utilization of a
effectiveness of networked
networking system.
P2 Explain the impact of network systems.
topology, communication and
bandwidth requirements.

LO2 Explain networking devices and operations

P3 Discuss the operating principles of M2 Explore a range of server


networking devices and server types. types and justify the selection
of a server, considering a given
P4 Discuss the inter-dependence of scenario regarding cost and
workstation hardware with relevant performance optimisation.
networking software.

LO3 Design efficient networked systems

P5 Design a networked system to meet M3 Install and configure D2 Design a maintenance


a given specification. network services and schedule to support the
applications on your choice. networked system.
P6 Test and evaluate the design to meet
the requirements and analyse user
feedback.

LO4 Implement and diagnose networked systems

P7 Implement a networked system M4 Recommend potential D3 Use critical reflection to


based on a prepared design. enhancements for the evaluate own work and justify
networked systems. valid conclusions.
P8 Document and analyse test results
against expected results.

P1 Discuss the benefits and constraints of different network types and standards…8
P2 Explain the impact of network topology, communication and bandwidth requirements…13
P3 Discuss the operating principles of networking devices and server types…14
P4 Discuss the inter-dependence of workstation hardware with relevant networking software…19
P5 Design a networked system to meet a given specification…20
P6 Test and evaluate the design to meet the requirements and analyse user feedback…24
P7 Implement a networked system based on a prepared design…26
P8 Document and analyse test results against expected results…27
References…39

P1 Discuss the benefits and constraints of different network types and standards.
Network system or computer network is a mixture of computers in a particular structure and computers
via networked devices and media (network protocol, transmission environment) that exchange
information back and forth.
The development of computer network systems has many benefits for society, such as:
-There are a lot of people who can share the same utility software.
-A group of people working on a sentence, if they connect the network, use the same case data,
use the master file file file in the process, and exchange information easily.
-Data is concentrated to ensure security, exchange between people who are advantageous, quick,
backup data is better.
-Using the same printer, scanner, hard disk and other equipment.
-User and exchange information via e-mail, chat services (FTP), web services (FTP), web services

-Delete the geographic distance between computers on the network that want to share and share
data together.
-Some users do not need to be equipped with expensive computer costs (low cost and operating
costs).
-Allows the programmer in a computer center to use the utility programs, the memory of another
computer center to increase the system economy.
-Safe data and software because it manages access to user accounts (depending on the Internet
administrators).
*There are 4 main types that can be specified: LAN, WAN, INTRANET, SAN
1. local area network(LAN)

LAN also known as the "local network," a private network in a building, an area (for example, schools or
agencies) of approximately a few kilometers in size. We link servers and workstations in offices and
factories to share resources and exchange information. LAN has the following 3 characteristics:
-The limit on the size ranges from a few meters to 1 km.
In addition to ever-increasing technological developments, LANs are increasingly being developed and
operated in many other forms, such as WANs-LANs are connected together via routers or WLAN
(Wireless Local Network Area) wireless LANs-computers connected to the network via Wi-Fi.

2. wide area network(WAN)


MAN Network is a network model that is connected from many LANs together through cables,
transmission equipment, etc.The connection range is as wide as in a city.

The main goal of using the MAN network model is that organizations and businesses have many affiliates
or divisions. The purpose of using MAN networks for businesses is that this network model will help
provide businesses with a variety of value-added services at the same time on the voice-data video link.
On top of that, this service also makes it easier for professional applications to be deployed.
3.Urban network(MAN)
MAN network LAN-like pattern connection. It is connected LANs together through the
transmission medium, the cable....communication devices connected together in a certain area of
the city as the first...
MAN offers the ability to simultaneously use three types of services: VOICE -DATA -Video:
Data Transfer. / Videoconferencing / Watching movies on demand / Cable / Education from
remote/Can diagnose remote / phone / high-speed Internet access ...
Target Customers: are organizations, businesses have many branches, parts connected together
and can connect to intercity, international, industrial parks, gigantic malls, software parks, high-
tech zones, new urban areas, the high office building ...
4. Storage area network (SAN).
A Storage Area Network (SAN) is a specialized, high-speed network that provides block-level
network access to storage. SANs are typically composed of hosts, switches, storage elements, and
storage devices that are interconnected using a variety of technologies, topologies, and protocols.
SANs may also span multiple sites.
A SAN presents storage devices to a host such that the storage appears to be locally attached. This
simplified presentation of storage to a host is accomplished through the use of different types of
virtualization.

*Constraints:
Local area network (LAN):
-Install High cost: The cost of the initial setup of the installation of Local Area Networks is high
because of special software necessary to implement a server. In addition, the device
communications as an ethernet cable, switches, hubs, routers, cables are expensive.
-Privacy violations: Governance of LAN can view and check the personal data file of each LAN
user. Moreover, he can view the computer history and Internet of LAN users.
-Data Security Threat: Unauthorised users can access important data of an office or facility if a
hard disk server is not secured properly by a LAN administrator.
-LAN maintenance work: Local Area Network requires a LAN administrator because there are
problems such as software installation, program errors or hardware failures or cable disturbances
in the Local Area Network. A LAN administrator is necessary to maintain these problems.
-Inclusive of LIMITED area: LAN is limited in size they consist of a small area such as a single
office, single building or a group of nearby buildings.
Wide Area Network (WAN):
-Security issues: Wide Area networks face security issues more as compared to LANs and Mans.
One of the main drawbacks of WANs is a security problem when different people with the ability
to use information from other computers.
- Need a firewall and antivirus software: as it faces security issues, so it is a basic need of WANs
use a firewall and anti-virus software to protect data transmission on the Internet that can be
accessed and changed by a hacker. Also, some people may inject a virus into the computer for
antivirus software is required for installation.
-Cost setup is high: a WAN covers a large geographic area, it is very costly to set up in the early
stages. It may be related to the purchase of various network devices, ie routers, switches, and
additional security software.

- Problem Troubleshooting: a WAN covers a large geographical area, so fix the problems in a
network is a very difficult job. Most wireless WANs go into the sea and if the broken wire. It
involves a lot of hard work to repair undersea lines.
-The maintenance problem: after setting up, maintaining WAN is a full-time job requires high
technological skills of supervisors and network technicians.
Metropolitan Area Network (MAN):
-Difficult To Manage: It is very difficult to manage if the size and increasing the number of the
LAN network. This is due to security issues and additional configuration.
-Internet speed difference: Because it can’t work on copper telephone wires. Copper wire affect
the speed of the high cost MAN .So is necessary for the optical fiber.
-Hackers Attack: In this network, there is a high risk of hacker attacks compared to LANs. Thus,
data can be leaked. Appreciate security personnel is needed in MAN.
-Technical Staff Requirements to Set Up: high technical people requires set MAN. Technical
people is network administrator and troubleshooter.
-Need more strings: In more MAN LAN, cabling requirements. As you know, it's a combination
of the two LANs.
Wireless LAN (WLAN):
-Exclusive Solution: slow standardization process led to many proprietary solutions only work in
heterogeneous environments.
-Safety and security: use radio waves to transmit data may interfere with the other high-tech
equipment.
-QoS: The WLAN provides lower QoS in terms of time. Lower bandwidth due to the limitations
of radio transmission (1-10 Mbit / s) and a higher error rate due to noise.
-Cost: The ethernet adapter and wireless LAN.
Storage Area Network (SAN):
-Not good for high traffic: If the client computer to transfer data intensive then SAN is not the
right choice. SANs are good for low data traffic.
-sensitive data can leak: Like all client computers sharing the same set of storage devices are very
sensitive data can leak. It is better to not store sensitive data on the network.
Standard:
-Emergency high level of technology and the technology works distinguished. Standards help to
create and maintain open markets and allow other vendors to compete based on the quality of their
products, while it is compatible with existing products on the market.

-Limited data communications, a number of criteria that can be used simultaneously in other
classes.
1. Application layer: HTTP, HTML, POP, H.323, IMAP
2. Transport layer: TCP, SPX
3. Network layer: IP, IPX
4. Data link layer: Ethernet IEEE 802.3, X.25, frame relay
5. Physical layer: RS-232C (cable), V.92 (modem).
Types of Standards
Standards are of two types:
-Fact: These are standards that are followed without any formal planning or consent of any
organization. They were born because of tradition or truth. For example, HTTP started as a real
standard.
-De Jure: These standards are standards that have been adopted by law by any official recognized
standards organization. Most of the communication standards used today are de jure standards.
Standards Organizations
            Some of the noted standards organizations are:

+International Standards Organization (ISO)


+ International Telecommunication Union (ITU)
+ Institute of Electronics and Electrical Engineers (IEEE)
+ American National Standards Institute (ANSI)
+ Internet Research Task Force (IETF)
+ Electronic Industries Association (EIA)
P2 Explain the impact of network topology, communication and bandwidth requirements.
The network topology arrangement of the various elements (links, nodes, etc.) of the
computer network. Mostly, it is the topological structure of a computer network, and can be
described in terms of physical and logical. Structured physical link (link structure of physics) is
the arrangement of the other network elements, including storage and installation of cable
connections, while topology logic (structure link topology) shows how data flows in the network.
Distances between network nodes, the physical delivery point, transmission speed or signal types
may be different between the two network topology although they may be identical.
There are 3 types of network topologies
1.Star Topology:
Network Star (Star Network) Both stations are linked to the central station and are responsible for
receiving signals from the station and switching to the destination station. Based on the
specifications of the network communication center equipment, there may be a node, switch,
router or link server. The central device's job is to connect Point-to-Point.
The benefit is the quick setup of the network, the easy re-configuration of the network (add,
uninstall stations), the easy monitoring and correction of the problem, using the full transfer rate
of the actual transmission line.
The length of the transmission line connecting the center station equipment is reduced (a distance
of about 100 meters with current technology).

2. Bus Topology:
All stations are part of a common bus route. At both ends, the key current is limited by two
different connectors called end points. Through station is connected to the main shaft by means of
a T connector or a transceiver. The bus network model operates via Point to Multipoint or
Broadcast links. The backbone network is easy to design and cost-effective, but has low
reliability, and when it's hard to detect, only one broken node can operate across the entire
network.
3. Topology ring:
On the Internet, within transmitted in one direction only. Each of the network stations are
connected together by a relay signal received and then forwarded to the next station on the ring.
Therefore, the signal is circulated in a loop in a chain link standard Destinations transmitter. Ring
network has advantages and disadvantages similar to the network stars, but the ring network
protocol requires a more complex network access network stars. There are also connections
between architecture mixed networks such as Star or Star Ring Bus.

P3 Discuss the operating principles of networking devices and server types.


There are 6 most popular network devices, including Repeater, Hub, Switch, Bridge,
Router and Gateway
->Repeater
In the field of space, the transmission of signals between hearing aids is often historic. The sources of
remote computer signals will highlight more devices nearby. Therefore, you need equipment that can
amplify the signal, so that the signal can be transmitted farther but stronger. A repeater is a device in layer
1 (physical layer) of the OSI model. When we use the Repeater, the physical signal at the input will be
amplified, thus providing a stronger signal and a more stable output, so that it can reach farther locations.
If you want to ensure a fast connection to a large office area or use it in telegrams, communications over
fiber optic cables, etc., then you should choose Repeater.
->Hub
Hub can be viewed as a repeater with more ports. One Hub with 4 to 24 ports and may more. In most
cases, the Hub is used in 10BASE-T networks or 100BASE-T. When the network configuration is a star
(Star topology), Hub acts as the center of the network. With a hub, when information on a port and will be
taken to all the other ports.

Hub 2 types is Active Hub and Smart Hub. Active Hub Hub is the type commonly used, it should be
powered to operate, used to amplify the incoming signal and the signal for the remaining ports, securing
the necessary signals. Smart Hub (Intelligent Hub) has similar functions Active Hub, but has integrated
chip capable of automatically detecting errors - very useful in case detection and error detection in the
network.

-> Switch
Switch can be considered a multi-port Bridge. Switch can link together multiple Segment. Segment
number depends on the port (Port) on the switch. Similar to the operation of the Bridge, the Switch also
copy the packets it receives from the machine in the network, then, Switch aggregate packets on the board
switch, this table has a role in providing information to help the packet is sent to the correct address in the
network.

In addition, the switch also has an ability of creating virtual LANs (VLANs) to improve the effectiveness
of using LAN system through increased security, maximizing the benefits of use of the portal (Port) or
enhancing the flexibility to add or delete machines on the network.
-> Bridge
A bridge operates at data link layer. A bridge is a repeater, with add on the functionality of filtering
content by reading the MAC addresses of source and destination. It is also used for interconnecting two
LANs working on the same protocol. It has a single input and single output port, thus making it a 2 port
device.

Types of Bridges

Transparent Bridges: - These are the bridge in which the stations are completely unaware of the
bridge’s existence i.e. whether or not a bridge is added or deleted from the network, reconfiguration of
the stations is unnecessary. These bridges make use of two processes i.e. bridge forwarding and bridge
learning.
Source Routing Bridges: - In these bridges, routing operation is performed by source station and the
frame specifies which route to follow. The hot can discover frame by sending a special frame called
discovery frame, which spreads through the entire network using all possible paths to destination.

-> Router
A router is a device like a switch that routes data packets based on their IP addresses. Router is mainly a
Network Layer device. Routers normally connect LANs and WANs together and have a dynamically
updating routing table based on which they make decisions on routing the data packets. Router divide
broadcast domains of hosts connected through it.
Server type:
• Web
• File
• Database
• Combination
• Virtualization
• Terminal services server.
The operating principles of server types:
1. Application Servers
Sometimes referred to as a type of middleware, application servers occupy a large chunk of computing
territory between database servers and the end user, and they often connect the two.
2. Client Servers
In the client / server programming model, a server is a program that awaits and fulfills requests from
client programs in the same or other computers. A given application in a computer may function as a
client with requests for services from other programs and also as a server of requests from other
programs.
3. Collaboration Servers
In many ways, collaboration software, once called ‘groupware, 'demonstrates the original power of the
Web. Collaboration software designed to enable users to collaborate, regardless of location, via the
Internet or a corporate intranet and to work together in a virtual atmosphere.
4. FTP Servers
One of the oldest of the Internet services, File Transfer Protocol, makes it possible to move one or more
files securely between computers while providing file security and organization as well as transfer
control.
5. List Servers
List servers offer a way to better manage mailing lists, whether they are interactive discussions open to
the public or one-way lists that deliver announcements, newsletters or advertising.
6. Mail Servers
Almost as ubiquitous and crucial as Web servers, mail servers move and store mail over corporate
networks (via LANs and WANs) and across the Internet.
7. Open Source Servers
From your underlying open source server operating system to the server software that help you get your
job done, open source software is a critical part of many IT infrastructures.
8. Proxy Servers
Proxy servers sit between a client program (typically a Web browser) and an external server
(Typically another server on the Web) to filter requests, improve performance, and share connections.
9. Real-Time Communication Servers
Real-time communication servers, formerly known as chat servers or IRC Servers, and still sometimes
referred to as instant messaging (IM) servers, enable large numbers users to exchange information near
instantaneously.
10. Server Platforms
A term often used synonymously with operating system, a platform is the underlying hardware or
software for a system and is thus the engine that drives the server.
11. Telnet Servers
A Telnet server enables users to log on to a host computer and perform tasks as if they fairly working on
the remote computer itself.
12. Virtual Servers
In 2009, the number of virtual servers deployed exceeded the number of physical servers. Today, server
virtualization has become near ubiquitous in the data center. From hypervisors to hybrid clouds,
ServerWatch looks at the latest virtualization technology trends.

13. Web Servers


At its core, a Web server serves static content to a Web browser by loading a file from a disk and serving
it across the network to a user’s Web browser. This entire exchange is mediated by the browser and server
talking to each other using HTTP.
P4 Discuss the inter-dependence of workstation hardware with relevant networking software.
A workstation is a device designated for users or classes of users involved in commercial or
technical activities. This requires one or more high resolution displays and processors that are quicker
than a personal computer (PC). Workstations also have improved multitasking capacities due to the
addition of random access memory (RAM), disk space and disk space. A workstation may also have a
higher-speed graphics adapter and more wired peripherals. Workstations are usually built with an
integrated architecture for complex data processing and visualization. Example: involve image rendering
and processing, computer-aided design (CAD), animation and mathematical plotting. Workstations were
the first product group to build customer engagement technologies and innovative upgrades and
improvements. These include 3D mice, multiple displays and high-performance data storage devices.
These latter computers are sometimes referred to as workstation level PCs and provide features
such as:
1. Error-correcting memory code (EEC) support
2. Optional memory slots for approved module
3. Several processor slots for more efficient CPU
4. Several of the shows
5. Reliable operating systems (OS) and advanced features
6. High-performance video machine
Network infrastructure is a key component of any network. It allows administrators to install,
maintain and track the network. Current networks are made up of advanced equipment, such as routers
and switches, and network software packages. Software-defined networks (SDNs) distinguish software
from hardware, making it easy to develop and change the network to respond quickly to evolving network
needs basic functions of the network program include:
+ User management-allows the administrator to attach or delete users from the network.
+ File Management-allows managers to evaluate the position and control of the data stored by the
customer.
 
 -Relation between workstation and networking software:
+ Computer software controls the hardware of your computer. Such two elements are compatible
and can’t function in a variety of ways. To order for the machine to successfully manipulate data and
produce usable output, the hardware and software will operate together. Computer hardware is useless
without software. Computer software, on the other hand, can’t be used without hardware support. In the
same way, computer software must first be mounted onto computer hardware and then implemented.
There are several types of software, both of which are operating system software, making usable
hardware and application software useful.
Workstation hardware interdependence with related networking software: + Workstation is a
device for casual use that is quicker and more powerful than personal computers. Because they are PCs, a
number of mainframes can also be used as long as they have their own software built and their own hard
disks mounted. The network interface card is a computer hardware that allows computers to be connected
to each other on a network that is usually a local area network. Networked computers always
communicate with each other using the protocol specified for transmitting data packets. The network
interface card serves as an interpreter that enables the computer to transmit and retrieve data to the LAN.
Information system experts often use these cards to set up wireless or wired networks. When a request is
sent from a device, via the internet to a server, there are some scheduling algorithms that decide what or
what resource is to be offered for that request. In this manner, the program interfaces with the equipment
of the workstation.

P5 Design a networked system to meet a given specification


Introduce:

If I had to plan to build a 3-storey company network, I would present the network design of a 3-storey
building like this. Building: 3 floors, all computers and printers are on the ground floor outside the IT lab

-One lab is on the first floor and another lab is on the second floor. The network devices I use in this
design include: DNS server, FTP, DHCP, Mail server, syslog server, NTP, Web server and 3 Switches.

Logical:

FIRST FLOOR including: internet, ASA, Cable-modem, Main server (right) and Staff (left)
SECOND FLOOR:

THIRD FLOOR:
will use the following types:
- 39 PC x 12.550.000 = 489.450.000 VNĐ
- 5 Switch x 1.490.000= 7.450.000 VNĐ
- 2 Router x 5.616.000 = 11.232.000 VNĐ
- 150m Cable x 22.000 = 3.300.000 VNĐ
- 3 Printer x 3.790.000 = 11.370.000 VNĐ
 The total value of a building is: 522.802.000VNĐ.

P6 Test and evaluate the design to meet the requirements and analyse user feedback.
_Performance testing:
+Performance testing is a form of software testing that focuses on how a system running the system is
performing under a specific load. It's not about finding bugs or defects in the software. Measures for
performance testing in line with benchmarks and standards. Performance testing should provide
developers with the diagnostic information they need to remove bottlenecks.
+Seven steps for performance testing:
1. Identify the environment of the test.
Identifying the available hardware, software, network configurations and tools allows the test team to
design the test and identify the challenges of performance testing early on. Performance testing
environment options include:
-Production system subset with lower specification servers
-Production system subset with lower specification servers
-Production system replica
-Actual manufacturing system
2. Identify measurements of performance.
Identify the success criteria for performance testing in addition to identifying metrics such as response
time, throughput and constraints.
3. Plan and design tests for performance.
Identify scenarios for performance tests that take user variability, test data and target metrics into account.
One or two models will be created.
4. Configure the environment for the test.
Prepare the test environment elements and the tools needed to monitor resources.
5. Implement the design of your test.
The tests should be developed.
6. Perform tests.
In addition to performance testing, the generated data is monitored and captured.
7. Analyze, report, try again.
Analyze the results and share them. Use the same parameters and different parameters to run the
performance tests again.
_Stress testing:
-Stress testing is defined as a type of software testing to verify the system's stability and reliability. This
test mainly determines the system under extremely heavy load conditions for its robustness and error
handling.
-It even tests beyond the normal point of operation and evaluates how the system operates under such
extreme conditions. Stress testing is done to ensure that in crunch situations the system would not crash.
Stress testing can be performed in five major steps:
1. Stress test planning. Here you collect the system data, analyze the system, define the stress test goals
2. Create Automation Scripts: in this phase, you create the automatic stress test scripts, generate the stress
test data.
3. Script execution: Stress testing automation scripts are executed at this stage and stress results are
stored.
4. Results Analysis: Stress test results are analyzed at this stage and bottlenecks are identified.
5. Tweaking and Optimization: You can fine-tune the system at this stage, change configurations,
optimize the code with a goal that meets the desired benchmark.
_Failure Analysis Testing:
-Usually a multidisciplinary process is the root cause of failure analysis. During an analysis, the NTS
tools used include visual inspections, metallography, environmental and chemical analysis and simulation
testing. The specific tests used depend on the product type and mode of failure. Root cause failure tests
are designed to determine the cause of the failure and the necessary corrective actions to prevent it.
Product failure, however, may be a complicated process. Device failure, in our experience, is rarely
caused by a single event.
- The most obvious are the physical signs of failure, such as a component of cracked metal or a
malfunctioning electronic device. These signs, however, are often little more than failure symptoms. NTS
is searching for the root cause of failure.
Step 1: Data Collection
-The collection of data is the first step in a root cause analysis of failure. NTS will gather information
about how the device failed and when it happened during this step.
-We will be conducting tests on the product being analyzed during this phase. Testing a representative
sample of failed devices and those that work properly is common. This can help determine which
components will fail and when the failure will occur.
Step 2: Analyze the data collected to determine the root cause of failure
-The next step in the process of failure analysis is to determine the root cause of the failure. The failure of
the device is seldom the result of a single incident. Our experience has shown that even a "simple" failure
has multiple inputs. This indicates that there are often different ways to avoid future failure.
-Electronic failure analysis tests show the short circuits of the component because the metal used is of the
wrong hardness depending on where the metal is located in the part.
Step 3: Determining Corrective Actions
-The most important part of a root cause failure analysis is determining corrective actions for most
organizations. You will receive a comprehensive report on both the causes and effects of device failure
when using NTS for root cause analysis. NTS can also provide recommendations for troubleshooting.
-We can also help you determine if corrective action is needed. It is unnecessary for some organizations
to decide the economic costs of correcting rare product failure. If device failure is rare and has minimal
effects, it may be more cost-effective to replace failed components than to change the production process.

P7 Implement a networked system based on a prepared design.

ASS2-PHONG.pkt
P8 Document and analyse test results against expected results.
Performance test.
- I will access random computer, choose desktop and press Command Prompt.

Then I will enter the ping command on a computer that has a specific IP address. It’s like a way of
transferring data between devices and helps me know if the connection is good.

Computer (pc 46) ping (pc 26) (ping 192.168.3.14)


The result:
To make sure all computers are possible, I will check again with another computer (PC 30) at (PC 11)
The test is similar to the previous one, so I only show the test results

PC 11 (192.168.4.11)

The result:
I will continue to check if I can connect to the Internet:

Here is the implementation:

I will choose pc40 as a template. First, go to Pc46 and select the desktop, then select the web browser
Stress Test :

I will first choose the machine (PC33) and (PC 15) (192.168.4.15). To perform this test
go to (PC3) select the desktop then select Command Prompt. Then enter the command line

ping -t 192.168.4.28 and press the ctrl c key to complete the command
Failure test

 The following test goes to the failure test stage


 To complete this test, you must turn off the router and schedule a ping to any computer to another
room and another floor.

 I turned off the router


When I turned off the main router, I started to check connections of machines of the same floor (PC46)
and (PC47)
Desktop PC 46 Choose Command Prompt:

(PC 47: 192.168.4.12)

Ping 192.168.4.12
References

1. Anon, (2019). [online] Available at: http://www.srinfosolutions.in/latest-update/computer-networking-/8


[Accessed 30 Dec. 2019].
2. software4win.com. (2019). Mạng LAN là gì? Các loại mạng LAN và lịch sử phát triển. [online] Available at:
https://software4win.com/mang-lan-la-gi/ [Accessed 30 Dec. 2019].
3. Am7s. (2019). What is a WAN? How Does it Work?am7s. [online] Available at:
https://www.am7s.com/what-is-a-wan-its-work/ [Accessed 30 Dec. 2019].
4. Vi.wikipedia.org. (2019). Mạng máy tính. [online] Available at: https://vi.wikipedia.org/wiki/M%E1%BA
%A1ng_m%C3%A1y_t%C3%ADnh [Accessed 30 Dec. 2019].
5. Vi.wikipedia.org. (2019). Cấu trúc liên kết mạng. [online] Available at: https://vi.wikipedia.org/wiki/C
%E1%BA%A5u_tr%C3%BAc_li%C3%AAn_k%E1%BA%BFt_m%E1%BA%A1ng [Accessed 30 Dec.
2019].
6. Repeater, 2. (2019). 2-Port Gigabit High-Power PoE+ Extender Repeater. [online] Intellinetnetwork.eu.
Available at: https://intellinetnetwork.eu/intellinet-en-2-port-gigabit-high-power-poe-extender-repeater-
561266.html [Accessed 30 Dec. 2019].
7. Trọng, Đ. and Trọng, Đ. (2019). Tìm hiểu về Hub, Repeater, Router, Switch, Bridge, Gateway. - Em Yêu
Tin Học. [online] Em Yêu Tin Học. Available at: https://emyeutinhoc.com/chuyen-muc/tim-hieu-ve-hub-
repeater-router-switch-bridge-gateway.html [Accessed 30 Dec. 2019].
8. GeeksforGeeks. (2019). Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter)
- GeeksforGeeks. [online] Available at: https://www.geeksforgeeks.org/network-devices-hub-repeater-
bridge-switch-router-gateways/ [Accessed 30 Dec. 2019].
9. | (2019). Bridges – What is Bridges? Bridge Protocols. [online] Ecomputernotes.com. Available at:
http://ecomputernotes.com/computernetworkingnotes/communication-networks/bridges [Accessed 30 Dec.
2019].
10. GeeksforGeeks. (2019). Network Devices (Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter)
- GeeksforGeeks. [online] Available at: https://www.geeksforgeeks.org/network-devices-hub-repeater-
bridge-switch-router-gateways/ [Accessed 30 Dec. 2019].
11. Reserved., C. (2019). Máy tính chơi PUBG-FO4 | Vi Tính Miền Nam. [online] Vitinhmiennam.com.
Available at: https://vitinhmiennam.com/may-tinh-choi-pubg-fo4.html?gclid=CjwKCAiAuqHwBRAQEiwAD-
zr3c82m1WzbRCFkKTf8EfKch5zP2pdCo_GNO1-
6RydbELDwrDw43B5JBoCrSQQAvD_BwE&regid=19871315701577692328 [Accessed 30 Dec. 2019].
12. Phongvu.vn. (2019). [online] Available at: https://phongvu.vn/macbook-1061.cat?pv_medium=m-macbook
[Accessed 30 Dec. 2019].
13. Phongvu.vn. (2019). [online] Available at: https://phongvu.vn/Hub---Switch-909.cat?pv_medium=m-Hub---
Switch [Accessed 30 Dec. 2019].
14. Phongvu.vn. (2019). [online] Available at: https://phongvu.vn/may-in-hp-883.cat?pv_medium=m-may-in-hp
[Accessed 30 Dec. 2019].
15. Sieu Thi Vien Thong. (2019). Camera,camera ip - SIEU THI VIEN THONG. [online] Available at:
https://www.sieuthivienthong.com/searchresult.html [Accessed 30 Dec. 2019].
16. OM2, C. (2019). Cáp quang multimode AMP 4 core OM2 | Cáp quang AMP. [online] Dây cáp quang - Cáp
quang multimode - Cáp quang single-mode. Available at: http://daycapquang.net/san-pham/cap-quang-
multimode-amp-4-core-om2/ [Accessed 30 Dec. 2019].

You might also like