0% found this document useful (0 votes)
71 views

Networking Design and Implementation For Bio Tek Company

Network protocols allow devices to communicate by establishing rules for formatting, transmitting, and receiving data. The main network types are LAN (local area network), PAN (personal area network), MAN (metropolitan area network), and WAN (wide area network). LAN connects devices in a small area like a building using Ethernet or Wi-Fi. PAN connects personal devices within 10 meters of an individual. MAN connects computers within a metropolitan area, larger than LAN but smaller than WAN. WAN interconnects LANs over a wide geographic area, such as between business offices or using the internet. Network protocols ensure successful data exchange regardless of infrastructure differences between devices.

Uploaded by

Diaconu Hermina
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views

Networking Design and Implementation For Bio Tek Company

Network protocols allow devices to communicate by establishing rules for formatting, transmitting, and receiving data. The main network types are LAN (local area network), PAN (personal area network), MAN (metropolitan area network), and WAN (wide area network). LAN connects devices in a small area like a building using Ethernet or Wi-Fi. PAN connects personal devices within 10 meters of an individual. MAN connects computers within a metropolitan area, larger than LAN but smaller than WAN. WAN interconnects LANs over a wide geographic area, such as between business offices or using the internet. Network protocols ensure successful data exchange regardless of infrastructure differences between devices.

Uploaded by

Diaconu Hermina
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 24

NETWORKING DESIGN AND

IMPLEMENTATION FOR BIO TEK


COMPANY
Unit 9: Networking

2022
HND DIGITAL TECHNOLOGIES GBS
Student:
Tutor: David Oyebisi
June 2022 Cohort – Group A1 or B1

Word Count: x,xxx


Table of Contents
Introduction........................................................................................................................................3
Part 1: Networking Principles, Protocols and Operations for BioTek.................................4
LO1: Networking principles and their protocols...................................................................4
Types of Networks......................................................................................................................4
Network benefits and constraints..............................................................................................4
Network Standards...................................................................................................................4
Impact of different types of network topologies...............................................................4
Communication and bandwidth requirements..................................................................5
Common networking principles............................................................................................5
Network protocols....................................................................................................................5
LO2 Networking devices and operations................................................................................5
Operating principles network devices.................................................................................5
Operating principles end devices.........................................................................................5
Relationship between network terminal hardware and network software..................6
Suitable Servers for the given scenario..............................................................................6
Recommendation of topology for BioTek Company........................................................6
Part 2: Design and Implementation of BioTek Network System...........................................6
Conclusion and recommendations..............................................................................................7
References.........................................................................................................................................8

pg. 1
Junior Phipps
STUDENT NAME AND ID NUMBER
228871

Pearson BTEC Level 4 Higher National Certificate


Qualification
in Digital Technologies (General)

Academic Year 2021-2022

Unit Number & Name Unit 9: Networking

Unit Leader David Oyebisi

David Oyebisi, Marzieh Farahani, Teza Soe,


Unit Lecturer
Kayode Adenuga, Ayodeji Ajani
Network Design and Implementation for BioTek
Assignment Title
Company

Type of Assignment Report

Weighting 100%

Issue Date Week Commencing 25/04/2022


19/08/2022
Summative Submission Date (19th August at 14:00 using Summative
submission link on Moodle).

David Oyebisi, Marzieh Farahani, Teza Soe,


Assessor
Kayode Adenuga, Ayodeji Ajani

IV name Sunita Kotta

pg. 2
Student Declaration

This is to confirm that this submission is my own work, produced without any external help

except for acceptable support from my lecturer. It has not been copied from any other

person’s work (published or unpublished) and has not previously been submitted for

assessment either at GBS or elsewhere. I confirm that I have read and understood the

‘GBS Academic Good Practice and Academic Misconduct: Policy and Procedure’ available

on Moodle.

I confirm I have read and understood the above Student Declaration.

Student Name (print) Junior Phipps

Signature J phipps

Date 09/08/2022

Report: Covering LO1 and LO2


Networking Principles, Protocols and Operations for BioTek
Report: Covering LO3 and LO4
Design and Implementation of BioTek Network System

pg. 3
Introduction

pg. 4
Part 1: Networking Principles, Protocols and Operations for BioTek

LO1: Networking principles and their protocols

How network protocols work:

Network protocol is a set of established rules that dictate how to format, transmit
and receive data so that computer network devices -- from servers and routers to
endpoints -- can communicate, regardless of the differences in their underlying
infrastructures, designs or standards.

To successfully send and receive information, devices on both sides of a


communication exchange must accept and follow protocol conventions. In
networking, support for protocols can be built into software, hardware or both.

Without computing protocols, computers and other devices would not know how to
engage with each other. As a result, except for specialty networks built around a
specific architecture, few networks would be able to function, and the internet as we
know it wouldn't exist. Virtually all network end users rely on network protocols for
connectivity.

The physical level is therefore a module that allows the transmission of a string of
bits between two devices directly connected to each other. Constructively, the
physical level is

consisting of: the electric cable, the optical fibre or, as the case may be, the
transmitting and receiving antennas, any amplifiers or repeaters, the network cards
in the computers and the drivers of the network cards. The construction of the
physical level is studied in chapter 3.

Types of Networks

LAN (local area network) This network is used to interconnect computers on a


small area usually in the same building. LAN usually connects to the Internet at a
central point: a router. Home LANs often use a single router, while LAN in a larger

pg. 5
space may use network switches for more efficient packet delivery. LAN almost
always use Ethernet, Wi-Fi or both in order to connect devices to the network.
Ethernet is a protocol for physical network connections that requires the use of
Ethernet cables. Wi-Fi is a protocol for connecting to a network through radio waves.
A variety of devices can be connected to LAN, including servers, desktop computers,
laptops, printers, and even game consoles. In offices, LAN is often used to provide
shared access to internal computers to connected printers or servers.

Local area network – Bing images

PAN (personal area network) This network connects devices to the users own
personal workspace. PAN is the interconnection of devices within the range of an
individual person, usually within a range of 10 meters. For example, a person
traveling with a laptop, a personal digital assistant (PDA), and a portable printer
could connect them without having to plug anything in, using wireless technology.
Usually, this kind of personal area network could also be connected without wires to
the Internet or other networks.

pg. 6
PAN Network Diagram - Bing
images

MAN (metropolitan area network) This network connects computers in areas the
size of a metropolitan area. A metropolitan area network is a computer network that
that could be a single large city, multiple cities and towns, or any large area with
multiple buildings. A MAN is larger than a local area network (LAN) but smaller than
a wide area network (WAN). MAN does not have to be in urban areas; the term
"metropolitan" describes the size of the network, not the demographics of the area
that it serves.

Metropolitan area network – Bing image

WAN (wide area network) This is a network, interconnecting devices on a wider


area than LAN WAN is often used by big businesses to connect their office networks;
each office usually has its own local area network, or LAN, and these LANs connect
via a WAN. These long connections may be constructed in many different ways,
including VPN or IP tunnels.
The definition of what constitutes a WAN is quite broad. Technically, any large
network that spreads out over a large or wide geographic area is a WAN. The
internet itself is considered a WAN.

pg. 7
Wide area network – Bing image

Benefits of LAN
Cheap transmission media.
It can simplify the physical association of a device to the media.
It is used to transmit data at high rates
Network data transmission is independent of the connected devices rates, making it
accessible for the one-speed device to send data to another speed device.
A large rate of interconnection between devices.
Each device has the potential to interact with another device on the network.
File locking is enabled.
It provides security system against illegal access to data.
Disadvantages of LAN
LAN software needed a memory area in each of the mainframe used on the network.
This decreases the memory space available for the user’s program.
Local area networking adds another phase of difficulty to the computer operation.
Users can have a problem in understanding the network commands. The installation
and authority of a LAN require far more technical and regulatory skills than installing
and handling multiple computers that are not networked.

Benefits of PAN
Personal area network does not require extra wires or space. For connecting two
devices you only need to activate the Bluetooth in both devices to start sharing data
together. For example, connecting a wireless keyboard and mouse with the tablet
through Bluetooth.
Many devices can be connected to one device simultaneously in a personal area
network. You can connect one mobile to many other mobiles or tablets to share files.
Disadvantages of PAN
Signal range is maximum of 10 meters, so it limits long distance sharing.
As personal area network uses infrared so it can interfere with radio signals and data
can be dropped.
Bluetooth and infrared have a slower data transfer rate as compared to other types
of networks like LAN (local area network).
In other cases, PAN uses microwave signals in some devices which have a bad
effect on the human body such as brain and heart problems can occur

pg. 8
Personal area network is used in digital devices that are expensive. Examples are
smartphones, PDA, laptops, and digital cameras.

Network Standards

Networking standards make up the rules for data


communication that are needed for interoperability of
networking technologies and processes. Standards help in
making and maintaining open markets and allow different
organisations to compete on the quality of their products while
being compatible with existing market products. During data
communication, standards may be used at the same time at the
different layers.
https://www.bing.com/images/search

The most frequently used standards of each layer are:

Application layer − HTTP, HTML, POP, H.323, IMAP


Transport layer − TCP, SPX
Network layer −IP, IPX
Data link layer − Ethernet IEEE 802.3, X.25, Frame Relay
Physical layer −RS-232C (cable), V.92 (modem

impact of different types of network topologies


Network topology is an arrangement of network consisting of several devices or
nodes. There are many different topologies each with its own
advantages/disadvantages,

1/Bus topology- A network in which every device is connected to a single main cable
and data is sent from one point to the other when a topology has exactly two end
points it is called linear bus topology and is used in small networks, it is cost effective
and easy to understand but if the main cable fails ...the whole network fails

(Figure 2.4 A network organised as a buss)


___________________________________________________________________

2/ Ring topology- Every computer is joined to another computer on each side. The
benefits of this topology, is that it is cheap to install, and network does not have

pg. 9
heavy traffic and the disadvantages are it is hard to troubleshoot and if one computer
crashes...
( Figure 2.6 A network organised as a ring)

___________________________________________________________________
_______________

3/ Star topology- A network where all devices are connected to a hub.The


advantages are it has low network traffic and is very easy to solve issues. The
disadvantages are it is expensive to use, and all devices depend on the hub.

(Figure A network organised as a star)

4/ Mesh topology- This network resembles a mesh look and uses two different
ways of transmitting data. Benefits are that it is robust and easy to problem
solve ...but is hard to install and a lot of cabling is needed.

(Figure A network organised as a mesh)


___________________________________________________________________
_______________

5/ Tree topology- Where the nodes are linked with all nodes connected to the
topmost devices also known as a root hub. It is easy to install and easy to maintain
and manage. Disadvantages are very expensive to set up and if the root device fails,
the entire network fails.

pg. 10
(Figure a network organised as a tree )

___________________________________________________________________
_______________

6/ Hybrid topology- This consists of two different topologies combined. This


topology is easy to troubleshoot, and the size of the network can easily be made
bigger but is costly and not easy to install.
Figure a network organised as a hybrid

https://www.bing.com/images/search?
view=detailV2&ccid=zs8nHtQw&id=19B4D3883D07AEE9BC7E530E5D4B6E01BE8
9AFF6&thid=OIP.zs8nHtQwjbKdzA_HbPfJRwHaFi&mediaurl=https%3a%2f
%2fth.bing.com%2fth%2fid%2fR.cecf271ed4308db29dcc0fc76cf7c947%3frik%3d9q
%252bJvgFuS10OUw%26riu%3dhttp%253a%252f%252fwww.conceptdraw.com
%252fHow-To-Guide%252fpicture%252fComputer-and-networks-Common-network-
topologies.png%26ehk%3d%252fU2aCagdk
%252bL5Lv9fn43Ul3g4qcnxZcimntnFvpjOo1c%253d%26risl%3d%26pid
%3dImgRaw%26r
%3d0&exph=807&expw=1080&q=network+topology+types&simid=60803319047049
2552&FORM=IRPRST&ck=77AFC207942701A53D0DBAA99434D216&selectedInd
ex=7

Communication and bandwidth requirements

pg. 11
Clearly, to transmit a signal with reasonable fidelity over a communication channel,
the channel bandwidth must match and be at least equal to the signal bandwidth.
Proper conditioning of a signal, such as modulation or coding, however, can increase
or decrease the bandwidth of the processed signal. Thus, it is possible to transmit
the information of a signal over a channel of bandwidth larger or smaller than that of
the original signal.

Amplitude modulation (AM) with double sidebands (DSB), for example, doubles the
signal bandwidth. If the audio signal to be transmitted has a bandwidth of 5 kHz, the
resulting AM signal bandwidth using DSB is 10 kHz. Amplitude modulation with a
single sideband (SSB), on the other hand, requires exactly the same bandwidth as
that of the original signal. In broadcast frequency modulation (FM), on the other
hand, audio signal bandwidth is 15 kHz (for high fidelity), but the corresponding
frequency-modulated signal bandwidth is 200 kHz

Paragraph 1- impact of topology on communication bandwidth The bandwidth is


shared between all nodes connected to the bus.

Common networking principles

Paragraph 1 (Design networks for a roaming user base)


Government is increasingly distributed, with people from your department working
from home or in other government buildings. This use case should be at the heart of
network design. Designing ‘on net’ solutions which only work in your own premises
will limit staff mobility and be at odds with your own corporate policies.

Paragraph 2 (Design services to be accessed wider than your own department)


Design services that can be accessed by a wider user base. This may be other
government departments and also corporate partners. Develop tools that can be
accessed without extra client software and that can be accessed from other
government buildings. This will mean making it possible to access the service from
the internet, the PSN or other shared government networks.

See the following link for more information:


https://www.gov.uk/government/publications/network-principles/network-principles

Network protocols

These are the seven layers of the OSI model:

Physical layer −It is the first layer that physically connects the two systems that need
to communicate. It transmits data in bits and manages simplex or duplex
transmission by modem. It also manages Network Interface Card’s hardware
interface to the network, like cabling, cable terminators, topography, voltage levels,
etc.

pg. 12
Data link layer − It is the firmware layer of Network Interface Card. It assembles
datagrams into frames and adds start and stop flags to each frame. It also resolves
problems caused by damaged, lost or duplicate frames.

Network layer − It is concerned with routing, switching and controlling flow of


information between the workstations. It also breaks down transport layer datagrams
into smaller datagrams.

Transport layer − Till the session layer, file is in its own form. Transport layer breaks
it down into data frames, provides error checking at network segment level and
prevents a fast host from overrunning a slower one. Transport layer isolates the
upper layers from network hardware.

Session layer − This layer is responsible for establishing a session between two
workstations that want to exchange data.

Presentation layer − This layer is concerned with correct representation of data, i.e.
syntax and semantics of information. It controls file level security and is also
responsible for converting data to network standards.

Application layer − It is the topmost layer of the network that is responsible for
sending application requests by the user to the lower levels. Typical applications
include file transfer, E-mail, remote logon, data entry, etc.

See the following link for more information:


https://www.manageengine.com/network-monitoring/network-protocols.html

LO2 Networking devices and operations

Operating principles network devices

1. Repeater – A repeater operates at the physical layer. Its job is to regenerate the
signal over the same network before the signal becomes too weak or corrupted so
as to extend the length to which the signal can be transmitted over the same
network. An important point to be noted about repeaters is that they do not amplify
the signal. When the signal becomes weak, they copy the signal bit by bit and
regenerate it at the original strength. It is a 2-port device.

2. Hub – A hub is basically a multiport repeater. A hub connects multiple wires


coming from different branches, for example, the connector in star topology which
connects different stations. Hubs cannot filter data, so data packets are sent to all
connected devices. In other words, the collision domain of all hosts connected
through Hub remains one. Also, they do not have the intelligence to find out the best
path for data packets which leads to inefficiencies and wastage.

Types of Hub

Active Hub: - These are the hubs that have their own power supply and can clean,
boost, and relay the signal along with the network. It serves both as a repeater as

pg. 13
well as a wiring center. These are used to extend the maximum distance between
nodes.
Passive Hub:- These are the hubs that collect wiring from nodes and power supply
from the active hub. These hubs relay signals onto the network without cleaning and
boosting them and can’t be used to extend the distance between nodes.
Intelligent Hub:- It works like active hubs and includes remote management
capabilities. They also provide flexible data rates to network devices. It also enables
an administrator to monitor the traffic passing through the hub and to configure each
port in the hub.
3. Bridge – A bridge operates at the data link layer. A bridge is a repeater, with add
on the functionality of filtering content by reading the MAC addresses of source and
destination. It is also used for interconnecting two LANs working on the same
protocol. It has a single input and single output port, thus making it a 2-port device.

Types of Bridges

Transparent Bridges: - These are the bridge in which the stations are completely
unaware of the bridge’s existence i.e., whether a bridge is added or deleted from the
network, reconfiguration of the stations is unnecessary. These bridges make use of
two processes i.e. bridge forwarding and bridge learning.
Source Routing Bridges: - In these bridges, routing operation is performed by the
source station and the frame specifies which route to follow. The host can discover
the frame by sending a special frame called the discovery frame, which spreads
through the entire network using all possible paths to the destination.
4. Switch – A switch is a multiport bridge with a buffer and a design that can boost its
efficiency (many ports imply less traffic) and performance. A switch is a data link
layer device. The switch can perform error checking before forwarding data, which
makes it very efficient as it does not forward packets that have errors and forward
good packets selectively to the correct port only. In other words, the switch divides
the collision domain of hosts, but broadcast domain remains the same.

5. Routers – A router is a device like a switch that routes data packets based on their
IP addresses. The router is mainly a Network Layer device. Routers normally
connect LANs and WANs together and have a dynamically updating routing table
based on which they make decisions on routing the data packets. Router divide
broadcast domains of hosts connected through it.

pg. 14
Operating principles end devices

The networks devices that people are most familiar with are called end devices. All
computers connected to a network that participate directly in network communication
are classified as hosts. These devices form the interface between users and the
underlying communication network.

Some examples of end devices are:


computers (workstations, laptops, file servers, and web servers)
network printers
VoIP phones
TelePresence endpoints
security cameras
mobile handheld devices (smartphones, tablets, PDAs, and wireless debit/credit card
readers and barcode scanners) sensors such as thermometers, weight scales, and
other devices that will be connected to the IoE.
End devices are either the source or destination of data transmitted over the
network. In order to distinguish one end device from another, each end device on a
network is identified by an address. When an end device initiates communication, it
uses the address of the destination end device to specify where the message should
be sent.

A server is an end device that has software installed that enables it to provide
information, like email or web pages, to other end devices on the network. For
example, a server requires web server software to provide web services to the
network.

A client is an end device that has software installed to enable it to request and
display the information obtained from a server. An example of client software is a
web browser, like internet Explorer. Figure 8 provides a brief description of each.
Press each plus symbol to view the end device to server interaction.
___________________________________________________________________
______
Relationship between network terminal hardware and network software

Paragraph 1. Relation between network terminals and network software


Hardware consists of the physical devices associated with a computer system.
Software is the set of instructions that the hardware executes to carry out specific
tasks.

Suitable Servers for the given scenario

OpenStack is composed of function blocks that manage each virtual resource and
those that integrate other function blocks. Figure 1 shows OpenStack function
blocks. Neutron manages virtual networks. The open virtual switch (OVS) [19] and
other software switches can be used as virtual switches. Nova manages compute
servers. Hypervisors usages are general, but containers, such as Docker containers
and bare metal servers provisioned by Ironic, can also be controllable. OpenStack
provides two storage management function blocks; Cinder for block storage and
Swift for object storage. Glance manages image files for compute servers. Heat [20]

pg. 15
orchestrates these function blocks and provisions multiple resources according to a
template text file. Ceilometer is a monitoring function of resource usage. Keystone is
a function block that enables single sign-on authentication among other OpenStack
function blocks. The functions of OpenStack are used through Representational
State Transfer (REST) APIs. There is also a Web GUI called Horizon that uses the
functions of OpenStack. To utilize cloud APIs [21] and Web services technologies
such as [22,23,24,25,26,27,28], users can coordinate other systems easily.

Recommendation of topology for BioTek Company

Buss topology cheap and easy to install its great for bioTek this topology doesn’t
require to many cables for installing and its cheap for maintenance.

Part 2: Design and Implementation of BioTek Network System

pg. 16
LO3 Designing of efficient networked systems

Network Design Goal for Bio Tek

Evaluation of network design

the primary reason of the emergence of converged network. The reason is because
company wants to reduce investment and maintenance cost by investing on single
integrated network rather than traditional separated telecommunication, broadcasting
and internet network. In this research, we use top-down network design approach to
create converged network design that tailored to fulfil the requirement from business
and technical aspects. It is started by analysing design requirement, perform logical
and physical design, and perform design testing. Both data and voice traffic should
be working well in converged network. In order to optimize the network design, the
quality of service (QoS) will be considered. It will be used to accommodate various
kind of traffic in this network. Simulation and experiment results show that the
proposed network design can satisfy required QoS of converged service network.
The proposed network design also performs better availability compared to the
existing network design.

pg. 17
Scalability: Scalability is the ability for IT systems – such as applications, storage,
databases and networking – to continue to function properly when changed in size or
volume. It often refers to increasing or decreasing resources as needed to meet the
higher or lower demands of a business.

Vertical (scale-up) scalability increases the capacity of hardware or software by


adding resources to a physical system, such as adding processing power to a server
to make it faster. For scale-up storage, this means adding more devices, such as
disk drives, to an existing system when more capacity is required.

Horizontal (scale-out) scalability connects multiple items in order to work as a single


logical unit. For scale-out storage, this means adding devices in connected arrays or
clusters. Each cluster can have many nodes (devices), and nodes can be separated
geographically. Scale-out NAS (network-attached storage) grows by adding
clustered nodes. Because each node includes storage capacity, processing power
and I/O (input/output) bandwidth, performance increases along with storage
capacity. In a scale-out storage system, new hardware can be added and configured
as the need arises. When a scale-out system reaches its storage limit, another array
can be added to expand the system capacity. Scale-out storage can use the added
storage across arrays. A scale-out architecture allows the initial storage investment
to be small, because future storage can be added as needed.

Software-defined storage (SDS) creates a virtualized network of storage resources


by separating the management software from its underlying storage hardware. SDS
resources may be spread across multiple servers and shared as if they reside on
one physical device. This type of storage enables unlimited scalability on demand.
SUSE Enterprise Storage is an SDS solution that provides limitless storage capacity
and scalability.
Availability
High availability means that an IT system, component, or application can operate at
a high level, continuously, without intervention, for a given time period. High-
availability infrastructure is configured to deliver quality performance and handle
different loads and failures with minimal or zero downtime.

Security:
The battle against hackers is a war without an end, and as security experts often
quip tha thackers only need to be right once, while data security professionals need
to win every day.
Security is not an area in which you want to experiment or take any risks. There are
established data security best practices that are constantly being updated and
improved on to ward off existing risks while anticipating new ones. When it comes to
surveys, you want to be sure that you are ensuring the privacy and security of your
survey respondents and adhering to relevant regulations such as HIPAA, GDPR,
and CCPA. 

pg. 18
Manageability

The Risk Management Process is a clearly defined method of understanding what


risks and opportunities are present, how they could affect a project or organization,
and how to respond to them. 
The 4 essential steps of the Risk Management Process are:
Identify the risk.
Assess the risk.
Treat the risk.
Monitor and Report on the risk.

Installation and configuration of network services (DHCP Server)

pg. 19
Network system maintenance schedule

Design a maintenance schedule to support the networked system.


In this section, you are required to develop a network maintenance schedule for the network
You may want to use the following table:
Tasks Maintenance Schedule Checking Schedule

(day/week/month)

Fault Management

Configuration
Management

Accounting
Management
Security
Management

pg. 20
LO4 Implementing and diagnosing networked systems

Implementation of network system

In this section, you are required to implement your network based on the design. At least
you should configure all computers to use dynamic IP addresses (IP configuration
should be a DHCP) in all the Units (Departments).
Take screenshots of the IP configuration of at least two computers from each Unit.

Documentation and analysis of test results

Use network commands Ping, IPConfig, and Tracert. PathPing etc. to test your network
and provide screenshots of your test results.
E.g. ping screenshots from each Unit.

Investigate test results against expected results. Here you should briefly explain how
your test results meet the expected result.
1. Your expected result may be…..all computers should be able to communicate
with other computers in the Head office and other centres
2. Actual test results may be… you ping a computer in the Head Office using a
command prompt and the ping result shows: how many packets were sent?
how many packets were received? how many packets were lost?

Network Enhancement

You should demonstrate and recommend how the network system can be enhanced
(improved). E.g. Use of any necessary upgrades and/or Updates of network hardware or
software, implantation of VLAN, Monitoring tools etc.

Conclusion and recommendations

Should be completed after you have completed all the Formative activities
Conclusion

pg. 21
Use critical reflection to evaluate your network design, installation, configuration, and testing
procedure for the given scenario, while justifying the valid conclusions.

pg. 22
References

pg. 23

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy