Networking Design and Implementation For Bio Tek Company
Networking Design and Implementation For Bio Tek Company
2022
HND DIGITAL TECHNOLOGIES GBS
Student:
Tutor: David Oyebisi
June 2022 Cohort – Group A1 or B1
pg. 1
Junior Phipps
STUDENT NAME AND ID NUMBER
228871
Weighting 100%
pg. 2
Student Declaration
This is to confirm that this submission is my own work, produced without any external help
except for acceptable support from my lecturer. It has not been copied from any other
person’s work (published or unpublished) and has not previously been submitted for
assessment either at GBS or elsewhere. I confirm that I have read and understood the
‘GBS Academic Good Practice and Academic Misconduct: Policy and Procedure’ available
on Moodle.
Signature J phipps
Date 09/08/2022
pg. 3
Introduction
pg. 4
Part 1: Networking Principles, Protocols and Operations for BioTek
Network protocol is a set of established rules that dictate how to format, transmit
and receive data so that computer network devices -- from servers and routers to
endpoints -- can communicate, regardless of the differences in their underlying
infrastructures, designs or standards.
Without computing protocols, computers and other devices would not know how to
engage with each other. As a result, except for specialty networks built around a
specific architecture, few networks would be able to function, and the internet as we
know it wouldn't exist. Virtually all network end users rely on network protocols for
connectivity.
The physical level is therefore a module that allows the transmission of a string of
bits between two devices directly connected to each other. Constructively, the
physical level is
consisting of: the electric cable, the optical fibre or, as the case may be, the
transmitting and receiving antennas, any amplifiers or repeaters, the network cards
in the computers and the drivers of the network cards. The construction of the
physical level is studied in chapter 3.
Types of Networks
pg. 5
space may use network switches for more efficient packet delivery. LAN almost
always use Ethernet, Wi-Fi or both in order to connect devices to the network.
Ethernet is a protocol for physical network connections that requires the use of
Ethernet cables. Wi-Fi is a protocol for connecting to a network through radio waves.
A variety of devices can be connected to LAN, including servers, desktop computers,
laptops, printers, and even game consoles. In offices, LAN is often used to provide
shared access to internal computers to connected printers or servers.
PAN (personal area network) This network connects devices to the users own
personal workspace. PAN is the interconnection of devices within the range of an
individual person, usually within a range of 10 meters. For example, a person
traveling with a laptop, a personal digital assistant (PDA), and a portable printer
could connect them without having to plug anything in, using wireless technology.
Usually, this kind of personal area network could also be connected without wires to
the Internet or other networks.
pg. 6
PAN Network Diagram - Bing
images
MAN (metropolitan area network) This network connects computers in areas the
size of a metropolitan area. A metropolitan area network is a computer network that
that could be a single large city, multiple cities and towns, or any large area with
multiple buildings. A MAN is larger than a local area network (LAN) but smaller than
a wide area network (WAN). MAN does not have to be in urban areas; the term
"metropolitan" describes the size of the network, not the demographics of the area
that it serves.
pg. 7
Wide area network – Bing image
Benefits of LAN
Cheap transmission media.
It can simplify the physical association of a device to the media.
It is used to transmit data at high rates
Network data transmission is independent of the connected devices rates, making it
accessible for the one-speed device to send data to another speed device.
A large rate of interconnection between devices.
Each device has the potential to interact with another device on the network.
File locking is enabled.
It provides security system against illegal access to data.
Disadvantages of LAN
LAN software needed a memory area in each of the mainframe used on the network.
This decreases the memory space available for the user’s program.
Local area networking adds another phase of difficulty to the computer operation.
Users can have a problem in understanding the network commands. The installation
and authority of a LAN require far more technical and regulatory skills than installing
and handling multiple computers that are not networked.
Benefits of PAN
Personal area network does not require extra wires or space. For connecting two
devices you only need to activate the Bluetooth in both devices to start sharing data
together. For example, connecting a wireless keyboard and mouse with the tablet
through Bluetooth.
Many devices can be connected to one device simultaneously in a personal area
network. You can connect one mobile to many other mobiles or tablets to share files.
Disadvantages of PAN
Signal range is maximum of 10 meters, so it limits long distance sharing.
As personal area network uses infrared so it can interfere with radio signals and data
can be dropped.
Bluetooth and infrared have a slower data transfer rate as compared to other types
of networks like LAN (local area network).
In other cases, PAN uses microwave signals in some devices which have a bad
effect on the human body such as brain and heart problems can occur
pg. 8
Personal area network is used in digital devices that are expensive. Examples are
smartphones, PDA, laptops, and digital cameras.
Network Standards
1/Bus topology- A network in which every device is connected to a single main cable
and data is sent from one point to the other when a topology has exactly two end
points it is called linear bus topology and is used in small networks, it is cost effective
and easy to understand but if the main cable fails ...the whole network fails
2/ Ring topology- Every computer is joined to another computer on each side. The
benefits of this topology, is that it is cheap to install, and network does not have
pg. 9
heavy traffic and the disadvantages are it is hard to troubleshoot and if one computer
crashes...
( Figure 2.6 A network organised as a ring)
___________________________________________________________________
_______________
4/ Mesh topology- This network resembles a mesh look and uses two different
ways of transmitting data. Benefits are that it is robust and easy to problem
solve ...but is hard to install and a lot of cabling is needed.
5/ Tree topology- Where the nodes are linked with all nodes connected to the
topmost devices also known as a root hub. It is easy to install and easy to maintain
and manage. Disadvantages are very expensive to set up and if the root device fails,
the entire network fails.
pg. 10
(Figure a network organised as a tree )
___________________________________________________________________
_______________
https://www.bing.com/images/search?
view=detailV2&ccid=zs8nHtQw&id=19B4D3883D07AEE9BC7E530E5D4B6E01BE8
9AFF6&thid=OIP.zs8nHtQwjbKdzA_HbPfJRwHaFi&mediaurl=https%3a%2f
%2fth.bing.com%2fth%2fid%2fR.cecf271ed4308db29dcc0fc76cf7c947%3frik%3d9q
%252bJvgFuS10OUw%26riu%3dhttp%253a%252f%252fwww.conceptdraw.com
%252fHow-To-Guide%252fpicture%252fComputer-and-networks-Common-network-
topologies.png%26ehk%3d%252fU2aCagdk
%252bL5Lv9fn43Ul3g4qcnxZcimntnFvpjOo1c%253d%26risl%3d%26pid
%3dImgRaw%26r
%3d0&exph=807&expw=1080&q=network+topology+types&simid=60803319047049
2552&FORM=IRPRST&ck=77AFC207942701A53D0DBAA99434D216&selectedInd
ex=7
pg. 11
Clearly, to transmit a signal with reasonable fidelity over a communication channel,
the channel bandwidth must match and be at least equal to the signal bandwidth.
Proper conditioning of a signal, such as modulation or coding, however, can increase
or decrease the bandwidth of the processed signal. Thus, it is possible to transmit
the information of a signal over a channel of bandwidth larger or smaller than that of
the original signal.
Amplitude modulation (AM) with double sidebands (DSB), for example, doubles the
signal bandwidth. If the audio signal to be transmitted has a bandwidth of 5 kHz, the
resulting AM signal bandwidth using DSB is 10 kHz. Amplitude modulation with a
single sideband (SSB), on the other hand, requires exactly the same bandwidth as
that of the original signal. In broadcast frequency modulation (FM), on the other
hand, audio signal bandwidth is 15 kHz (for high fidelity), but the corresponding
frequency-modulated signal bandwidth is 200 kHz
Network protocols
Physical layer −It is the first layer that physically connects the two systems that need
to communicate. It transmits data in bits and manages simplex or duplex
transmission by modem. It also manages Network Interface Card’s hardware
interface to the network, like cabling, cable terminators, topography, voltage levels,
etc.
pg. 12
Data link layer − It is the firmware layer of Network Interface Card. It assembles
datagrams into frames and adds start and stop flags to each frame. It also resolves
problems caused by damaged, lost or duplicate frames.
Transport layer − Till the session layer, file is in its own form. Transport layer breaks
it down into data frames, provides error checking at network segment level and
prevents a fast host from overrunning a slower one. Transport layer isolates the
upper layers from network hardware.
Session layer − This layer is responsible for establishing a session between two
workstations that want to exchange data.
Presentation layer − This layer is concerned with correct representation of data, i.e.
syntax and semantics of information. It controls file level security and is also
responsible for converting data to network standards.
Application layer − It is the topmost layer of the network that is responsible for
sending application requests by the user to the lower levels. Typical applications
include file transfer, E-mail, remote logon, data entry, etc.
1. Repeater – A repeater operates at the physical layer. Its job is to regenerate the
signal over the same network before the signal becomes too weak or corrupted so
as to extend the length to which the signal can be transmitted over the same
network. An important point to be noted about repeaters is that they do not amplify
the signal. When the signal becomes weak, they copy the signal bit by bit and
regenerate it at the original strength. It is a 2-port device.
Types of Hub
Active Hub: - These are the hubs that have their own power supply and can clean,
boost, and relay the signal along with the network. It serves both as a repeater as
pg. 13
well as a wiring center. These are used to extend the maximum distance between
nodes.
Passive Hub:- These are the hubs that collect wiring from nodes and power supply
from the active hub. These hubs relay signals onto the network without cleaning and
boosting them and can’t be used to extend the distance between nodes.
Intelligent Hub:- It works like active hubs and includes remote management
capabilities. They also provide flexible data rates to network devices. It also enables
an administrator to monitor the traffic passing through the hub and to configure each
port in the hub.
3. Bridge – A bridge operates at the data link layer. A bridge is a repeater, with add
on the functionality of filtering content by reading the MAC addresses of source and
destination. It is also used for interconnecting two LANs working on the same
protocol. It has a single input and single output port, thus making it a 2-port device.
Types of Bridges
Transparent Bridges: - These are the bridge in which the stations are completely
unaware of the bridge’s existence i.e., whether a bridge is added or deleted from the
network, reconfiguration of the stations is unnecessary. These bridges make use of
two processes i.e. bridge forwarding and bridge learning.
Source Routing Bridges: - In these bridges, routing operation is performed by the
source station and the frame specifies which route to follow. The host can discover
the frame by sending a special frame called the discovery frame, which spreads
through the entire network using all possible paths to the destination.
4. Switch – A switch is a multiport bridge with a buffer and a design that can boost its
efficiency (many ports imply less traffic) and performance. A switch is a data link
layer device. The switch can perform error checking before forwarding data, which
makes it very efficient as it does not forward packets that have errors and forward
good packets selectively to the correct port only. In other words, the switch divides
the collision domain of hosts, but broadcast domain remains the same.
5. Routers – A router is a device like a switch that routes data packets based on their
IP addresses. The router is mainly a Network Layer device. Routers normally
connect LANs and WANs together and have a dynamically updating routing table
based on which they make decisions on routing the data packets. Router divide
broadcast domains of hosts connected through it.
pg. 14
Operating principles end devices
The networks devices that people are most familiar with are called end devices. All
computers connected to a network that participate directly in network communication
are classified as hosts. These devices form the interface between users and the
underlying communication network.
A server is an end device that has software installed that enables it to provide
information, like email or web pages, to other end devices on the network. For
example, a server requires web server software to provide web services to the
network.
A client is an end device that has software installed to enable it to request and
display the information obtained from a server. An example of client software is a
web browser, like internet Explorer. Figure 8 provides a brief description of each.
Press each plus symbol to view the end device to server interaction.
___________________________________________________________________
______
Relationship between network terminal hardware and network software
OpenStack is composed of function blocks that manage each virtual resource and
those that integrate other function blocks. Figure 1 shows OpenStack function
blocks. Neutron manages virtual networks. The open virtual switch (OVS) [19] and
other software switches can be used as virtual switches. Nova manages compute
servers. Hypervisors usages are general, but containers, such as Docker containers
and bare metal servers provisioned by Ironic, can also be controllable. OpenStack
provides two storage management function blocks; Cinder for block storage and
Swift for object storage. Glance manages image files for compute servers. Heat [20]
pg. 15
orchestrates these function blocks and provisions multiple resources according to a
template text file. Ceilometer is a monitoring function of resource usage. Keystone is
a function block that enables single sign-on authentication among other OpenStack
function blocks. The functions of OpenStack are used through Representational
State Transfer (REST) APIs. There is also a Web GUI called Horizon that uses the
functions of OpenStack. To utilize cloud APIs [21] and Web services technologies
such as [22,23,24,25,26,27,28], users can coordinate other systems easily.
Buss topology cheap and easy to install its great for bioTek this topology doesn’t
require to many cables for installing and its cheap for maintenance.
pg. 16
LO3 Designing of efficient networked systems
the primary reason of the emergence of converged network. The reason is because
company wants to reduce investment and maintenance cost by investing on single
integrated network rather than traditional separated telecommunication, broadcasting
and internet network. In this research, we use top-down network design approach to
create converged network design that tailored to fulfil the requirement from business
and technical aspects. It is started by analysing design requirement, perform logical
and physical design, and perform design testing. Both data and voice traffic should
be working well in converged network. In order to optimize the network design, the
quality of service (QoS) will be considered. It will be used to accommodate various
kind of traffic in this network. Simulation and experiment results show that the
proposed network design can satisfy required QoS of converged service network.
The proposed network design also performs better availability compared to the
existing network design.
pg. 17
Scalability: Scalability is the ability for IT systems – such as applications, storage,
databases and networking – to continue to function properly when changed in size or
volume. It often refers to increasing or decreasing resources as needed to meet the
higher or lower demands of a business.
Security:
The battle against hackers is a war without an end, and as security experts often
quip tha thackers only need to be right once, while data security professionals need
to win every day.
Security is not an area in which you want to experiment or take any risks. There are
established data security best practices that are constantly being updated and
improved on to ward off existing risks while anticipating new ones. When it comes to
surveys, you want to be sure that you are ensuring the privacy and security of your
survey respondents and adhering to relevant regulations such as HIPAA, GDPR,
and CCPA.
pg. 18
Manageability
pg. 19
Network system maintenance schedule
(day/week/month)
Fault Management
Configuration
Management
Accounting
Management
Security
Management
pg. 20
LO4 Implementing and diagnosing networked systems
In this section, you are required to implement your network based on the design. At least
you should configure all computers to use dynamic IP addresses (IP configuration
should be a DHCP) in all the Units (Departments).
Take screenshots of the IP configuration of at least two computers from each Unit.
Use network commands Ping, IPConfig, and Tracert. PathPing etc. to test your network
and provide screenshots of your test results.
E.g. ping screenshots from each Unit.
Investigate test results against expected results. Here you should briefly explain how
your test results meet the expected result.
1. Your expected result may be…..all computers should be able to communicate
with other computers in the Head office and other centres
2. Actual test results may be… you ping a computer in the Head Office using a
command prompt and the ping result shows: how many packets were sent?
how many packets were received? how many packets were lost?
Network Enhancement
You should demonstrate and recommend how the network system can be enhanced
(improved). E.g. Use of any necessary upgrades and/or Updates of network hardware or
software, implantation of VLAN, Monitoring tools etc.
Should be completed after you have completed all the Formative activities
Conclusion
pg. 21
Use critical reflection to evaluate your network design, installation, configuration, and testing
procedure for the given scenario, while justifying the valid conclusions.
pg. 22
References
pg. 23