KEMBAR78
Network | PDF | Computer Network | Internet Protocol Suite
0% found this document useful (0 votes)
17 views8 pages

Network

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views8 pages

Network

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Introduction

In today's digital age, computer networks play a crucial role in facilitating communication, collaboration,
and data sharing within organizations. TPH Corporation, a medium-sized business specializing in
electronic goods, operates from its headquarters in Galle with several branches nationwide. To
enhance communication and file sharing among its departments and branches, the company's
IT department is tasked with designing and implementing a client-server networked
environment. This strategic move aims to improve operational efficiency and collaboration
across the organization.

Task 01
a) Understanding Computer Networks and Business Benefits

A computer network is a collection of interconnected devices, such as computers, servers,


printers, and other peripherals, that can communicate and share resources with each other.
These networks enable seamless data exchange, improved collaboration, and enhanced
productivity within organizations.

For TPH Corporation, implementing a computer network offers several benefits.

Improved Communication

Employees across different departments and branches can communicate more efficiently through email,
instant messaging, and video conferencing.

Enhanced File Sharing

Centralized file storage and sharing enable easy access to documents, presentations, and other files,
fostering collaboration and reducing redundancy.

Streamlined Operations

Networked environments allow for the automation of tasks such as inventory management, order
processing, and customer support, leading to increased efficiency.

Better Decision Making

Access to real-time data and analytics enables informed decision-making, helping the company stay agile
and competitive in the market.
b) Types of Networks and Recommendations

There are various kinds of computer networks, such as Metropolitan Area Networks (MANs),
Wireless Local Area Networks (WLANs), Wide Area Networks (WANs), and Local Area
Networks (LANs). Each variety is unique and best suited for certain business situations.

LAN

LANs are ideal for connecting devices within a single location, such as the head office and individual
branches of TPH Corporation. They offer high-speed communication and facilitate centralized resource
sharing.

WAN

WANs enable connectivity between geographically dispersed locations, allowing TPH Corporation to link
its head office with branches located across the country. This would support efficient data exchange and
collaboration on a larger scale.

c) Wireless vs. Wired Networks

Wireless Networks

Advantages:

Mobility - Wireless networks allow employees to connect to the network from anywhere within the
coverage area, facilitating flexible work arrangements and improving productivity.

Scalability - Wireless networks can easily accommodate changes in the workplace layout or the addition
of new devices without the need for extensive cabling.

Cost Savings - Wireless networks eliminate the need for expensive cabling infrastructure, reducing
installation and maintenance costs.

Disadvantages

Security Concerns - Wireless networks are more susceptible to security threats such as unauthorized
access and data interception, requiring robust encryption and authentication mechanisms.

Interference - Wireless networks are vulnerable to interference from other electronic devices or physical
obstacles, which can degrade signal quality and affect performance.

Limited Bandwidth - Wireless networks typically have lower bandwidth compared to wired networks,
which may impact the speed and reliability of data transmission, especially in high-demand
environments.
Wired Networks

Advantages

Reliability - Wired networks offer greater reliability and stability compared to wireless networks, with
consistent performance and minimal susceptibility to interference.

Security - Wired networks are inherently more secure than wireless networks, as physical access to
network infrastructure is required for unauthorized access.

Higher Bandwidth - Wired networks generally provide higher bandwidth and faster data transfer speeds,
making them suitable for bandwidth-intensive applications and large file transfers.

Disadvantages

Limited Mobility - Devices connected to wired networks are constrained by physical cable connections,
restricting mobility within the workplace.

Installation Complexity - Setting up wired networks involves the installation of cables, connectors, and
network infrastructure, which can be time-consuming and labor-intensive.

Maintenance - Wired networks may require regular maintenance to ensure the integrity of cabling and
network components, adding to operational overhead.

Task 02

a) Functions of Network Devices and Recommendations

1) Routers: Route data between different networks based on IP addresses. Essential for connecting
TPH Corporation's head office with its branches.

2) Switches: Connect multiple devices within each office's local area network (LAN) based on MAC
addresses. Required for efficient data exchange within offices.

3) Hubs: Not recommended due to limitations. They simply broadcast data to all connected
devices, leading to network congestion.

4) Servers: Provide services or resources to client computers within the network. Host centralized
services like file sharing and email for TPH Corporation.
Recommendations

Routers: Connect head office with branches.

Switches: Facilitate data exchange within offices.

Servers: Host centralized services for collaboration.

b) Mapping Devices with OSI Reference Model:

1) Physical Layer (Layer 1):

 Device: Ethernet Switch


 Protocol: Ethernet

2) Data Link Layer (Layer 2):

 Device: Ethernet Switch


 Protocol: MAC Addressing

3) Network Layer (Layer 3):

 Device: Router
 Protocol: IP (Internet Protocol)

4) Transport Layer (Layer 4):

 Protocol: TCP (Transmission Control Protocol)

5) Session Layer (Layer 5):

 Not device-specific.

6) Presentation Layer (Layer 6):

 Device: File Server

7) Application Layer (Layer 7):

 Devices: Web Server, Email Server, File Server


 Protocols: HTTP, SMTP, FTP
Task 04
a) Importance of Network Monitoring and Troubleshooting:

Proactive Issue Detection

Monitoring allows IT teams to identify and address potential issues before they escalate into major
problems, minimizing downtime and preventing disruptions to business operations.

Optimizing Performance

By monitoring network performance metrics, such as bandwidth utilization, latency, and packet
loss, IT teams can identify bottlenecks and optimize network resources for better performance.

Enhancing Security

Monitoring helps detect unauthorized access attempts, abnormal traffic patterns, and potential
security breaches, allowing IT teams to take prompt action to mitigate security risks and protect
sensitive data.

Compliance and Reporting:

Regular monitoring ensures that the network complies with regulatory requirements and
internal policies. It also provides valuable data for reporting and analysis, aiding in decision-
making and strategic planning.

b) Common Network Issues and Recommended Strategies:

1. Bandwidth Congestion:

Issue: Slow network speeds and poor application performance due to high traffic volume.

Solution: Implement Quality of Service (QoS) policies to prioritize critical traffic types, upgrade network
bandwidth, optimize data transfer protocols, and implement caching and compression techniques.

Risk Mitigation: Regularly monitor bandwidth usage trends, anticipate capacity requirements, and plan
for scalability.
2. Packet Loss:

Issue: Packet loss can lead to data retransmissions, degraded voice and video quality, and application
errors.

Solution: Identify and resolve underlying causes such as network congestion, faulty hardware, or
interference. Adjust network settings, upgrade hardware, and optimize network protocols.

Risk Mitigation: Monitor packet loss rates using diagnostic tools and establish alerts for abnormal
behavior. Implement redundancy and fault-tolerant network configurations.

3. Latency:

Issue: High latency results in slow response times, especially for real-time applications like VoIP and
video conferencing.

Solution: Optimize network routing, reduce unnecessary hops, upgrade network infrastructure, and
prioritize time-sensitive traffic. Implement traffic shaping and compression techniques.

Risk Mitigation: Monitor latency metrics regularly and investigate any deviations from normal behavior.
Implement Quality of Experience (QoE) monitoring for end-user perspectives.

4. Security Threats:

Issue: Unauthorized access, malware infections, phishing attacks, and data breaches pose significant
security risks to the network.

Solution: Deploy firewalls, intrusion detection/prevention systems (IDS/IPS), antivirus software, and
network segmentation. Regularly update security patches, conduct security audits, and enforce strong
authentication measures.

Risk Mitigation: Implement continuous monitoring for suspicious network activities, conduct regular
security assessments, and educate employees on security best practices.
5. Hardware Failures:

Issue: Failures in routers, switches, servers, or other network devices can disrupt network connectivity
and services.

Solution: Implement redundant hardware configurations, maintain up-to-date hardware warranties, and
perform regular maintenance tasks such as firmware updates and hardware inspections.

Risk Mitigation: Monitor hardware health indicators such as temperature, voltage, and fan status. Have
spare hardware components available for quick replacements in case of failures.

DNS Issues:

Issue: Domain Name System (DNS) failures can result in website unavailability, email delivery problems,
and difficulty accessing network resources.

Solution: Ensure DNS servers are properly configured, redundant, and regularly updated. Implement
DNS monitoring and caching mechanisms, use reputable DNS service providers, and employ DNSSEC for
added security.

Risk Mitigation: Monitor DNS resolution times and troubleshoot any delays or failures promptly.
Implement secondary DNS servers for failover and redundancy.

You might also like