Unit 2 Assignment
Unit 2 Assignment
REPORT
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the
consequences of plagiarism. I understand that making a false declaration is a form of malpractice.
Student’s signature
Grading grid
P1 P2 P3 P4 P5 P6 P7 P8 M1 M2 M3 M4 D1 D2 D3
❒ Summative Feedback:
❒ Resubmission Feedback:
Submission format
Part 1
The submission is in the form of an individual written report. This should be written in a concise,
formal business style using single spacing and font size 12. You are required to make use of headings,
paragraphs and subsections as appropriate, and all work must be supported with research and referenced
using the Harvard referencing system. Please also provide a bibliography using the Harvard referencing
system. The recommended word limit is 2,000–2,500 words, although you will not be penalized for
exceeding the total word limit.
Part 2
The submission is in the form of an individual evidence portfolio. This assignment can be completed as
a group, but each student must produce their own portfolio, which will contain:
A LAN design plan and blueprint and justification document.
A fully completed test plan including an evaluation of results and recommendations for
improvements to LAN.
A proposed and justified maintenance schedule.
Part 3
Evidence of an implemented network.
You are required to make use of headings, paragraphs, subsections and illustrations as appropriate, and
all work must be supported with research and referenced using the Harvard referencing system.
You are employed as a Network Engineer by Nguyen Networking Limited, a high-tech networking
solution development company, which have branches in Hồ Chí Minh City, Hà Nội, Đà Nẵng and Cần
Thơ.
The company has been contracted to implement a networking project from a local educational institute.
The specification of the project is given below:
People: 200 students, 15 teachers, 12 marketing and administration staff, 05 higher managers including
the head of academics and the program manager, 03 computer network administrators.
Resources: 50 student lab computers, 35 staff computers, 03 printers.
Building: 03 floors, all computers and printers are on the ground floor apart from the IT labs – one lab
located on the first floor and another located on the second floor.
As a first task, the CEO of the company Mr. Nguyen has asked you to investigate and explain
networking principles, protocols and devices and submit a report.
Part 1
You will need to produce a report that includes the following:
1. An introduction to provide an overview of your report.
2. Benefits and constraints of different types of networks and networking standards.
3. The impact of network topology, speed of communication and bandwidth requirements.
4. Effectiveness of networking systems.
5. Discussion on operating principles of networking devices and server types and networking software.
6. Discuss the relationship of workstation hardware with networking software.
7. Explore a range of server types and justify the selection of a server, considering a given scenario
regarding cost and performance optimization.
8. For the given specification, identify the topology protocol for the efficient utilization of a networking
system.
The CEO Mr. Nguyen is happy with your first report and now he has asked you to analyze the
specification from the institution, as given earlier.
You need to design and implement the networking project within a given time frame:
ASSESMENT CRITERIA
P1 Discuss the benefits and constraints of different network types and standards…8
P2 Explain the impact of network topology, communication and bandwidth requirements…13
P3 Discuss the operating principles of networking devices and server types…14
P4 Discuss the inter-dependence of workstation hardware with relevant networking software…19
P5 Design a networked system to meet a given specification…20
P6 Test and evaluate the design to meet the requirements and analyse user feedback…24
P7 Implement a networked system based on a prepared design…26
P8 Document and analyse test results against expected results…27
References…39
P1 Discuss the benefits and constraints of different network types and standards.
Network system or computer network is a mixture of computers in a particular structure and computers
via networked devices and media (network protocol, transmission environment) that exchange
information back and forth.
The development of computer network systems has many benefits for society, such as:
-There are a lot of people who can share the same utility software.
-A group of people working on a sentence, if they connect the network, use the same case data,
use the master file file file in the process, and exchange information easily.
-Data is concentrated to ensure security, exchange between people who are advantageous, quick,
backup data is better.
-Using the same printer, scanner, hard disk and other equipment.
-User and exchange information via e-mail, chat services (FTP), web services (FTP), web services
…
-Delete the geographic distance between computers on the network that want to share and share
data together.
-Some users do not need to be equipped with expensive computer costs (low cost and operating
costs).
-Allows the programmer in a computer center to use the utility programs, the memory of another
computer center to increase the system economy.
-Safe data and software because it manages access to user accounts (depending on the Internet
administrators).
*There are 4 main types that can be specified: LAN, WAN, INTRANET, SAN
1. local area network(LAN)
LAN also known as the "local network," a private network in a building, an area (for example, schools or
agencies) of approximately a few kilometers in size. We link servers and workstations in offices and
factories to share resources and exchange information. LAN has the following 3 characteristics:
-The limit on the size ranges from a few meters to 1 km.
In addition to ever-increasing technological developments, LANs are increasingly being developed and
operated in many other forms, such as WANs-LANs are connected together via routers or WLAN
(Wireless Local Network Area) wireless LANs-computers connected to the network via Wi-Fi.
The main goal of using the MAN network model is that organizations and businesses have many affiliates
or divisions. The purpose of using MAN networks for businesses is that this network model will help
provide businesses with a variety of value-added services at the same time on the voice-data video link.
On top of that, this service also makes it easier for professional applications to be deployed.
3.Urban network(MAN)
MAN network LAN-like pattern connection. It is connected LANs together through the
transmission medium, the cable....communication devices connected together in a certain area of
the city as the first...
MAN offers the ability to simultaneously use three types of services: VOICE -DATA -Video:
Data Transfer. / Videoconferencing / Watching movies on demand / Cable / Education from
remote/Can diagnose remote / phone / high-speed Internet access ...
Target Customers: are organizations, businesses have many branches, parts connected together
and can connect to intercity, international, industrial parks, gigantic malls, software parks, high-
tech zones, new urban areas, the high office building ...
4. Storage area network (SAN).
A Storage Area Network (SAN) is a specialized, high-speed network that provides block-level
network access to storage. SANs are typically composed of hosts, switches, storage elements, and
storage devices that are interconnected using a variety of technologies, topologies, and protocols.
SANs may also span multiple sites.
A SAN presents storage devices to a host such that the storage appears to be locally attached. This
simplified presentation of storage to a host is accomplished through the use of different types of
virtualization.
*Constraints:
Local area network (LAN):
-Install High cost: The cost of the initial setup of the installation of Local Area Networks is high
because of special software necessary to implement a server. In addition, the device
communications as an ethernet cable, switches, hubs, routers, cables are expensive.
-Privacy violations: Governance of LAN can view and check the personal data file of each LAN
user. Moreover, he can view the computer history and Internet of LAN users.
-Data Security Threat: Unauthorised users can access important data of an office or facility if a
hard disk server is not secured properly by a LAN administrator.
-LAN maintenance work: Local Area Network requires a LAN administrator because there are
problems such as software installation, program errors or hardware failures or cable disturbances
in the Local Area Network. A LAN administrator is necessary to maintain these problems.
-Inclusive of LIMITED area: LAN is limited in size they consist of a small area such as a single
office, single building or a group of nearby buildings.
Wide Area Network (WAN):
-Security issues: Wide Area networks face security issues more as compared to LANs and Mans.
One of the main drawbacks of WANs is a security problem when different people with the ability
to use information from other computers.
- Need a firewall and antivirus software: as it faces security issues, so it is a basic need of WANs
use a firewall and anti-virus software to protect data transmission on the Internet that can be
accessed and changed by a hacker. Also, some people may inject a virus into the computer for
antivirus software is required for installation.
-Cost setup is high: a WAN covers a large geographic area, it is very costly to set up in the early
stages. It may be related to the purchase of various network devices, ie routers, switches, and
additional security software.
- Problem Troubleshooting: a WAN covers a large geographical area, so fix the problems in a
network is a very difficult job. Most wireless WANs go into the sea and if the broken wire. It
involves a lot of hard work to repair undersea lines.
-The maintenance problem: after setting up, maintaining WAN is a full-time job requires high
technological skills of supervisors and network technicians.
Metropolitan Area Network (MAN):
-Difficult To Manage: It is very difficult to manage if the size and increasing the number of the
LAN network. This is due to security issues and additional configuration.
-Internet speed difference: Because it can’t work on copper telephone wires. Copper wire affect
the speed of the high cost MAN .So is necessary for the optical fiber.
-Hackers Attack: In this network, there is a high risk of hacker attacks compared to LANs. Thus,
data can be leaked. Appreciate security personnel is needed in MAN.
-Technical Staff Requirements to Set Up: high technical people requires set MAN. Technical
people is network administrator and troubleshooter.
-Need more strings: In more MAN LAN, cabling requirements. As you know, it's a combination
of the two LANs.
Wireless LAN (WLAN):
-Exclusive Solution: slow standardization process led to many proprietary solutions only work in
heterogeneous environments.
-Safety and security: use radio waves to transmit data may interfere with the other high-tech
equipment.
-QoS: The WLAN provides lower QoS in terms of time. Lower bandwidth due to the limitations
of radio transmission (1-10 Mbit / s) and a higher error rate due to noise.
-Cost: The ethernet adapter and wireless LAN.
Storage Area Network (SAN):
-Not good for high traffic: If the client computer to transfer data intensive then SAN is not the
right choice. SANs are good for low data traffic.
-sensitive data can leak: Like all client computers sharing the same set of storage devices are very
sensitive data can leak. It is better to not store sensitive data on the network.
Standard:
-Emergency high level of technology and the technology works distinguished. Standards help to
create and maintain open markets and allow other vendors to compete based on the quality of their
products, while it is compatible with existing products on the market.
-Limited data communications, a number of criteria that can be used simultaneously in other
classes.
1. Application layer: HTTP, HTML, POP, H.323, IMAP
2. Transport layer: TCP, SPX
3. Network layer: IP, IPX
4. Data link layer: Ethernet IEEE 802.3, X.25, frame relay
5. Physical layer: RS-232C (cable), V.92 (modem).
Types of Standards
Standards are of two types:
-Fact: These are standards that are followed without any formal planning or consent of any
organization. They were born because of tradition or truth. For example, HTTP started as a real
standard.
-De Jure: These standards are standards that have been adopted by law by any official recognized
standards organization. Most of the communication standards used today are de jure standards.
Standards Organizations
Some of the noted standards organizations are:
2. Bus Topology:
All stations are part of a common bus route. At both ends, the key current is limited by two
different connectors called end points. Through station is connected to the main shaft by means of
a T connector or a transceiver. The bus network model operates via Point to Multipoint or
Broadcast links. The backbone network is easy to design and cost-effective, but has low
reliability, and when it's hard to detect, only one broken node can operate across the entire
network.
3. Topology ring:
On the Internet, within transmitted in one direction only. Each of the network stations are
connected together by a relay signal received and then forwarded to the next station on the ring.
Therefore, the signal is circulated in a loop in a chain link standard Destinations transmitter. Ring
network has advantages and disadvantages similar to the network stars, but the ring network
protocol requires a more complex network access network stars. There are also connections
between architecture mixed networks such as Star or Star Ring Bus.
Hub 2 types is Active Hub and Smart Hub. Active Hub Hub is the type commonly used, it should be
powered to operate, used to amplify the incoming signal and the signal for the remaining ports, securing
the necessary signals. Smart Hub (Intelligent Hub) has similar functions Active Hub, but has integrated
chip capable of automatically detecting errors - very useful in case detection and error detection in the
network.
-> Switch
Switch can be considered a multi-port Bridge. Switch can link together multiple Segment. Segment
number depends on the port (Port) on the switch. Similar to the operation of the Bridge, the Switch also
copy the packets it receives from the machine in the network, then, Switch aggregate packets on the board
switch, this table has a role in providing information to help the packet is sent to the correct address in the
network.
In addition, the switch also has an ability of creating virtual LANs (VLANs) to improve the effectiveness
of using LAN system through increased security, maximizing the benefits of use of the portal (Port) or
enhancing the flexibility to add or delete machines on the network.
-> Bridge
A bridge operates at data link layer. A bridge is a repeater, with add on the functionality of filtering
content by reading the MAC addresses of source and destination. It is also used for interconnecting two
LANs working on the same protocol. It has a single input and single output port, thus making it a 2 port
device.
Types of Bridges
Transparent Bridges: - These are the bridge in which the stations are completely unaware of the
bridge’s existence i.e. whether or not a bridge is added or deleted from the network, reconfiguration of
the stations is unnecessary. These bridges make use of two processes i.e. bridge forwarding and bridge
learning.
Source Routing Bridges: - In these bridges, routing operation is performed by source station and the
frame specifies which route to follow. The hot can discover frame by sending a special frame called
discovery frame, which spreads through the entire network using all possible paths to destination.
-> Router
A router is a device like a switch that routes data packets based on their IP addresses. Router is mainly a
Network Layer device. Routers normally connect LANs and WANs together and have a dynamically
updating routing table based on which they make decisions on routing the data packets. Router divide
broadcast domains of hosts connected through it.
Server type:
• Web
• File
• Database
• Combination
• Virtualization
• Terminal services server.
The operating principles of server types:
1. Application Servers
Sometimes referred to as a type of middleware, application servers occupy a large chunk of computing
territory between database servers and the end user, and they often connect the two.
2. Client Servers
In the client / server programming model, a server is a program that awaits and fulfills requests from
client programs in the same or other computers. A given application in a computer may function as a
client with requests for services from other programs and also as a server of requests from other
programs.
3. Collaboration Servers
In many ways, collaboration software, once called ‘groupware, 'demonstrates the original power of the
Web. Collaboration software designed to enable users to collaborate, regardless of location, via the
Internet or a corporate intranet and to work together in a virtual atmosphere.
4. FTP Servers
One of the oldest of the Internet services, File Transfer Protocol, makes it possible to move one or more
files securely between computers while providing file security and organization as well as transfer
control.
5. List Servers
List servers offer a way to better manage mailing lists, whether they are interactive discussions open to
the public or one-way lists that deliver announcements, newsletters or advertising.
6. Mail Servers
Almost as ubiquitous and crucial as Web servers, mail servers move and store mail over corporate
networks (via LANs and WANs) and across the Internet.
7. Open Source Servers
From your underlying open source server operating system to the server software that help you get your
job done, open source software is a critical part of many IT infrastructures.
8. Proxy Servers
Proxy servers sit between a client program (typically a Web browser) and an external server
(Typically another server on the Web) to filter requests, improve performance, and share connections.
9. Real-Time Communication Servers
Real-time communication servers, formerly known as chat servers or IRC Servers, and still sometimes
referred to as instant messaging (IM) servers, enable large numbers users to exchange information near
instantaneously.
10. Server Platforms
A term often used synonymously with operating system, a platform is the underlying hardware or
software for a system and is thus the engine that drives the server.
11. Telnet Servers
A Telnet server enables users to log on to a host computer and perform tasks as if they fairly working on
the remote computer itself.
12. Virtual Servers
In 2009, the number of virtual servers deployed exceeded the number of physical servers. Today, server
virtualization has become near ubiquitous in the data center. From hypervisors to hybrid clouds,
ServerWatch looks at the latest virtualization technology trends.
If I had to plan to build a 3-storey company network, I would present the network design of a 3-storey
building like this. Building: 3 floors, all computers and printers are on the ground floor outside the IT lab
-One lab is on the first floor and another lab is on the second floor. The network devices I use in this
design include: DNS server, FTP, DHCP, Mail server, syslog server, NTP, Web server and 3 Switches.
Logical:
FIRST FLOOR including: internet, ASA, Cable-modem, Main server (right) and Staff (left)
SECOND FLOOR:
THIRD FLOOR:
will use the following types:
- 39 PC x 12.550.000 = 489.450.000 VNĐ
- 5 Switch x 1.490.000= 7.450.000 VNĐ
- 2 Router x 5.616.000 = 11.232.000 VNĐ
- 150m Cable x 22.000 = 3.300.000 VNĐ
- 3 Printer x 3.790.000 = 11.370.000 VNĐ
The total value of a building is: 522.802.000VNĐ.
P6 Test and evaluate the design to meet the requirements and analyse user feedback.
_Performance testing:
+Performance testing is a form of software testing that focuses on how a system running the system is
performing under a specific load. It's not about finding bugs or defects in the software. Measures for
performance testing in line with benchmarks and standards. Performance testing should provide
developers with the diagnostic information they need to remove bottlenecks.
+Seven steps for performance testing:
1. Identify the environment of the test.
Identifying the available hardware, software, network configurations and tools allows the test team to
design the test and identify the challenges of performance testing early on. Performance testing
environment options include:
-Production system subset with lower specification servers
-Production system subset with lower specification servers
-Production system replica
-Actual manufacturing system
2. Identify measurements of performance.
Identify the success criteria for performance testing in addition to identifying metrics such as response
time, throughput and constraints.
3. Plan and design tests for performance.
Identify scenarios for performance tests that take user variability, test data and target metrics into account.
One or two models will be created.
4. Configure the environment for the test.
Prepare the test environment elements and the tools needed to monitor resources.
5. Implement the design of your test.
The tests should be developed.
6. Perform tests.
In addition to performance testing, the generated data is monitored and captured.
7. Analyze, report, try again.
Analyze the results and share them. Use the same parameters and different parameters to run the
performance tests again.
_Stress testing:
-Stress testing is defined as a type of software testing to verify the system's stability and reliability. This
test mainly determines the system under extremely heavy load conditions for its robustness and error
handling.
-It even tests beyond the normal point of operation and evaluates how the system operates under such
extreme conditions. Stress testing is done to ensure that in crunch situations the system would not crash.
Stress testing can be performed in five major steps:
1. Stress test planning. Here you collect the system data, analyze the system, define the stress test goals
2. Create Automation Scripts: in this phase, you create the automatic stress test scripts, generate the stress
test data.
3. Script execution: Stress testing automation scripts are executed at this stage and stress results are
stored.
4. Results Analysis: Stress test results are analyzed at this stage and bottlenecks are identified.
5. Tweaking and Optimization: You can fine-tune the system at this stage, change configurations,
optimize the code with a goal that meets the desired benchmark.
_Failure Analysis Testing:
-Usually a multidisciplinary process is the root cause of failure analysis. During an analysis, the NTS
tools used include visual inspections, metallography, environmental and chemical analysis and simulation
testing. The specific tests used depend on the product type and mode of failure. Root cause failure tests
are designed to determine the cause of the failure and the necessary corrective actions to prevent it.
Product failure, however, may be a complicated process. Device failure, in our experience, is rarely
caused by a single event.
- The most obvious are the physical signs of failure, such as a component of cracked metal or a
malfunctioning electronic device. These signs, however, are often little more than failure symptoms. NTS
is searching for the root cause of failure.
Step 1: Data Collection
-The collection of data is the first step in a root cause analysis of failure. NTS will gather information
about how the device failed and when it happened during this step.
-We will be conducting tests on the product being analyzed during this phase. Testing a representative
sample of failed devices and those that work properly is common. This can help determine which
components will fail and when the failure will occur.
Step 2: Analyze the data collected to determine the root cause of failure
-The next step in the process of failure analysis is to determine the root cause of the failure. The failure of
the device is seldom the result of a single incident. Our experience has shown that even a "simple" failure
has multiple inputs. This indicates that there are often different ways to avoid future failure.
-Electronic failure analysis tests show the short circuits of the component because the metal used is of the
wrong hardness depending on where the metal is located in the part.
Step 3: Determining Corrective Actions
-The most important part of a root cause failure analysis is determining corrective actions for most
organizations. You will receive a comprehensive report on both the causes and effects of device failure
when using NTS for root cause analysis. NTS can also provide recommendations for troubleshooting.
-We can also help you determine if corrective action is needed. It is unnecessary for some organizations
to decide the economic costs of correcting rare product failure. If device failure is rare and has minimal
effects, it may be more cost-effective to replace failed components than to change the production process.
ASS2-PHONG.pkt
P8 Document and analyse test results against expected results.
Performance test.
- I will access random computer, choose desktop and press Command Prompt.
Then I will enter the ping command on a computer that has a specific IP address. It’s like a way of
transferring data between devices and helps me know if the connection is good.
PC 11 (192.168.4.11)
The result:
I will continue to check if I can connect to the Internet:
I will choose pc40 as a template. First, go to Pc46 and select the desktop, then select the web browser
Stress Test :
I will first choose the machine (PC33) and (PC 15) (192.168.4.15). To perform this test
go to (PC3) select the desktop then select Command Prompt. Then enter the command line
ping -t 192.168.4.28 and press the ctrl c key to complete the command
Failure test
Ping 192.168.4.12
References