Professional Documents
Culture Documents
Table of Contents........................................................................................1
QUESTION 1.................................................................................................2
Question 2.................................................................................................11
Reference..................................................................................................20
Page 1 of 20
QUESTION 1
Nowadays, Internet has become one of necessity for many
people. Internet is used for various activities like online
banking, information sharing, teleworking, entertainment,
and other services. To enable Internet access, a network
connectivity is required. You were assigned to develop a
networking solution for a new condominium project. The
building has 20 floors with 10 houses per floor. Answer
following questions to prepare your solution.
The first commercial Ethernet was run on a shared thick coax cable to
which each station was attached. Thick coax provides a wide bandwidth
and good resistance to electromagnetic interference (EMI). It was denoted
as 10BASE5, signified a 10-Mbps data rate. But thick coax, which has a
diameter similar to a garden hose, is heavy and has a large minimum
bend radius. Thick coax is difficult to work with and its layout designs are
rather inflexible.
Page 2 of 20
maximum segment span. Designated 10Base2, segments cannot exceed
185 meters. No more that 30 notes are allowed per segment.
Token Ring
Token ring was created and patented by Olof S. Soderblom in the late
1960. In the 1970s, it was positioned as a LAN that did not suffer from
throughput degradation due to collisions and that had predictable and
acceptable performance under all loading conditions, accomplishments
that the Ethernet of that era could not match.
Initially token ring operate at a speed of 4Mpbs. Although this seems slow
compared to the original 10 Mbps Ethernet, but token ring was actually
faster in operation under heavy loads. This is because there are no
collisions, and every station gets a turn at a token.
In 1989, the data transfer rates for token ring was boosted to 16 Mbps and
the possibility of two token circulating at the same time. Nevertheless, it
was overtaken by Ethernet, whose steady improvements, low cost,
simplicity, ease of installation, and widespread cadre of knowledgeable
practitioners led to token ring declined in popularity.
Page 3 of 20
In 1997, a group of manufacturers tend to regain the market share. The
High Speed Token Ring Alliance was formed to push IEEE for higher speed
standards. One result was 100 Mbps token ring, released in 1998. But it
was too late. It didn’t have much of an impact in the typical business
environment, because by then Ethernet had eliminated the collision issue
and was operating at higher speeds. Later, a 1-Gbps token ring was
published but it didn’t find many takers.
ATM
Asynchronous transfer mode (ATM) is a high-speed switching technology
used to provide services for LANs and WANs alike. It is commonly used to
supply backbone network capabilities and to provide high-bandwidth
communication between nodes for transmission of full-motion video with
voice and computer-aided design applications. ATM was developed as
part of the broadband ISDN specifications. Originally, ATM speeds were
set at 155 and 622 Mbps but other speeds such as 25 and 45 Mbps are
available, and very-high-speed switches allow transmissions faster than
1Gbps.
ATM uses high-speed digital switches, fiber optic cables, and full-duplex
transmission to attain its high throughput. ATM network transmit small,
fixed-size frames called cells. A cell is 53 bytes long and usually carries 47
or 48 bytes of data; the remaining 5 or 6 bytes is called the header. The
header is used to provide flow control, cell type identification, addressing
and error-checking. In setting up ATM on a LAN, additional equipment,
such as switches, cabling and channel service unit/data service unit
(CSU/DSU), must be deployed.
Conlusion
Nowadays, the most popular networking technology is Ethernet LAN. This
is because Ethernet LAB strikes a good balance between speed, cost, and
ease of installation compared to other network technology.
Page 4 of 20
Part (B) Describe three (3) criteria for selection of a
network backbone. Draw the schematic diagram of the
network backbone that you proposed for this project.
A network backbone is a part of network infrastructure that connects
several local area networks. The performance of the LAN will be very
depending on the implementation of the network backbone. The main
criteria for selection of a network backbone are topology, protocol and
media.
Network topology
The star topology is the most common networking in today’s LANs. In star
network, a number of computer or peripheral devices are connected to a
center unit which is either a hub or a switch. If a user want to send data
to the network printer, the hub or switch provide the network connection.
Page 5 of 20
Network Protocol
Network protocol is a set of rules established for user to gain control of the
network to exchange information. In order for two computers to talk to
each other, they must be speaking the same language.
Network media
Page 6 of 20
Fiber optic cable transmits data as pulses of light through tiny tubes of
glass. It has over 26,000 times the transmission capacity of twisted pair.
However, it is significantly smaller. A fiber optic tube can be half the
diameter of a human hair. Such cables are immune to electronic
interferences, which makes them more secure. Compared to coaxial
cable, they are lighter and more liable at transmitting data. They transmit
information using beams of light at light speeds making tem far faster
than copper cable.
For the network media, we will be a using twisted pair cable as it can
provide high performance and ease of installation. Wireless medium will
be using together to provide greater mobility.
Internet
12 Port Switchs at All Floor
100Mbps
Ethernet Cable
To Each Floor
Proxy Server
Page 7 of 20
Part (C) Identify what are networking equipments that
will be used to enable access to each tenants at every
floor. Justify (explain) why you choose the network
equipments. Show in a diagram, how you connects the
network equipment to the backbone.
20th Floor
19th Floor
18th Floor
4th Floor
To
17th Floor
having the
same
layout
rd
3 Floor
Wireless Access Point
nd
2 Floor
16 Port Switch
st
RJ45 Socket 1 Floor
The above diagram shows the proposed network connection for the 20
floor condominium. The Cat-5 UTP cable will be pulled from the main
switch at the server room to the switch at each floor. At each floor the
UTP cable will be lay from the switch to each lot’s RJ45 socket and two
wireless access points.
Page 8 of 20
network.
Cisco 24 port switch
This switch provides connection to the switch at
each of the twenty floors. We are using a Cisco
switch because this is the backbone of the
network. We the best performance device.
16 ports switch
This 16 port switch will be located at each floor to
provide the network connection from the
backbone switch to the Wireless AP and RJ45
socket at every lot. We used 16 ports switch
because only 13 ports are needed at each floor.
The other three served at standby port.
Wireless Access Point
Two wireless access points will be installed at
each floor so that the whole floor will be covered
by the wireless signal. Wireless APs provide the
Wi-Fi internet to all the users in the condominium.
RJ45 socket
A RJ45 socket will be installed at every lot to
provide a more stable internet connection to the
users. The users can expand their home network
by connecting their own LAN or Wireless LAN to
the RJ45 socket to get the internet connection.
Cat-5 UTP cable
Cat-5 UTP cable is used as the networking
medium from the server room to each floor and
then into each condominium lot. UTP cables
provide high performance with lower cost. It is
more flexible to lay around as it has the minimum
bend radius.
Page 9 of 20
Part (D) List the Internet access services that are
available in Malaysia, which one that you find the best
for this project. State the reason (why?)
In Malaysia, the internet access services can mainly be divided in to two
types. The main difference of these two types is the transport media.
They are namely fixed line internet services and wireless internet services.
The fixed line internet service is provided by TM, the Malaysia dominant
telecommunication provider. TM provides several types of internet service
packages to home, business and corporate users. These services are
namely 1515 dial-up internet, Streamyx Broadband, ISDN, Lease Line,
Business Broadband and Direct Broadband. The internet access speed
range from the 1515 dial up of 56Kbps to Direct Broadband of 1Gbps.
Page 10 of 20
Question 2
Networking technology consist of various elements such as
network equipments, protocols, concepts, techniques,
standards, topology, industry player, etc. Answer following
questions.
The OSI model contains seven layers where each layer representing a
group of related logical functions. The seven layers as defined by the
group are summarized in the followings diagram.
Page 11 of 20
TCP/IP (Transmission Control Protocol/Internet Protocol) is the protocol
suite used for communications between hosts in most local area networks
and the Internet.
Page 12 of 20
TCP/IP model consists of four layers which are application, transport,
internet and network interface. Each of these layers has their own
purposes as described in the table below.
Page 13 of 20
Layering Technique
Why we need layering in the networking model? Let’s think about
communication over network. There is great complexity entailed in the
design and operation of a network. Many companies are involved in
developing and producing hardware and software to run on network.
In the layering model, the various tasks that a network has to perform
were break down into separate logical procedures, so that the network
operation was divided into a number of functions. Then, the function was
grouped and the groups interface was specified.
In that way, the means for carrying out the tasks of a function group are
left to the designers, while the connections between particular groups are
standardized so that they can operate smoothly together. This can also
help to accelerate the development of new networking technologies.
Page 14 of 20
Part (B) Explain what is Personal Area Network (PAN),
give an example of a technology that uses PAN and how
it operates.
Personal area network (PAN) is a personal connectivity to accommodate
data sharing and connectivity needs of small, often impromptu groups of
people. The “personal” in PAN refers to its very limited span, so the
devices are “close to person”
Bluetooth uses radio waves for transmission over a very short range of
around 30 to 40 feet. Recent developments have extended the range to
nearly half a mile by increasing transmission power and using special
antennas.
The original impetus for its design was to replace the clutter of desktop
cables by enabling wireless connection between keyboards and
computers, computers and printers, headphones and sound cards, and the
like. Before long, that concept expanded to the creation of a personal
area network (PAN), a mini-network among devices in close proximity.
Page 15 of 20
Bluetooth is based on the IEEE 802.11 standard, as WLANs are, and
operates in the same ISM 2.4GHz band as 802.11b and g. However,
Bluetooth does not use the 802.x LAN protocols because it is not designed
for large-scale data transmissions. Bluetooth uses FHSS. There are two
major advantages of FHSS. Firstly, the interference with and from other
spread spectrum networks within range is reduced. Secondly
eavesdropping prevention is enhanced.
Page 16 of 20
Part (C) Discuss the advantages and disadvantages of
normal LAN vs. wireless LAN.
LAN has been widely used within organizations and homes. LAN allow
different computer to share resources. Computer can be connected in a
variety of ways including electrical wiring, telephone wiring, and special
cables. Today, with the advancement of wireless technology, one of the
simplest ways to connect computers is without cable or wireless.
Both normal and wireless can claim advantages over the other. Below we
can compare advantages and disadvantages of wired and wireless
networking in few key areas.
Ease of installation
The installation for normal LAN is more difficult compared to WLAN. For
normal LAN, Ethernet cables must be run from each computer to another
computer or to the central device. It can be time-consuming and difficult
to run cables under the floor or through walls, especially when computers
sit in different rooms.
WLAN is easier to install, you no need to worry about how to run the wires
in your building. WLAN just require wireless network adapters and a
wireless access point. You just need to install in a central location where
wireless radio signals can reach your all your computers with minimal
interference. If your building area is too big, you just need to add another
wireless access point at another location as a repeater.
Total cost
WLAN cost is more expensive than normal LAN. As for normal LAN,
Ethernet cables, Ethernet card, hubs and switches are very inexpensive.
Wireless devices cost are more than the equivalent wired Ethernet
products. At full retail prices, wireless adapters and access points may
cost three or four times as much as Ethernet adapter, cable and
hubs/switches.
Performance
At the performance wise, normal LAN offer better performance compare to
WLAN. With Fast Ethernet technology, a normal LAN can easily offer
speed at range of 100Mbps to 1Gbps.
Page 17 of 20
approximately one-half the bandwidth of Fast Ethernet. Futhermore, Wi-Fi
performance is distance sensitive, the performance will degrade on
computers farther away from the access point. As more wireless devices
utilize the WLAN more heavily, performance degrades even further.
Security
In theory, WLANs are less secure than normal LANs, because wireless
communication signals travel through the air and can easily be
intercepted. But, in practical, WLANs protect their data through the Wired
Equivalent Privacy (WEP) encryption standard that makes wireless
communications reasonably as safe as wired ones.
As a conclusion, normal Ethernet LAN is probably for users that are very
cost-conscious, need maximum performance of the network system, and
don’t care much about mobility.
On the other hand, a WLAN is for users if cost is less of an issue, like being
an early adopter of leading-edge technologies and really concerned about
the task of wiring their home or small business with Ethernet cable.
Page 18 of 20
Part (D) Subnetting is a technique that can be
implemented in a LAN. Explain what is subnetting and
describe why we need to do subnetting. Give an
example of a subnetmask address for a class C IP
network.
Subnetting is a technique used to breakdown networks into subnets. The
subnets are created through the use of subnet masks. The subnet mask
identifies what bits in the IP address are to be used to represent the
network/subnet portion of an IP address.
Subnets are created by borrowing bits from the host portion of the IP
address. The network portion of the IP address and the new subnet bits
are used to define the new subnet.
o Admin 25 nodes
o Account 10 nodes
o Executive 15 nodes
o Logistic 5 nodes
o Management 10 nodes
o Training 20 nodes
From here we can see that 6 subnet is needed. We add 2(for network and
broadcast addresses) to 8. The nearest power of two is 8, which equal 23.
This means a 3-bit subnet mask is required.
Reserving three bits from the top down creates a subnet mask with the
pattern 11100000. The decimal value for this number is 128+64+32
which is equals to 224. This extends the default subnet mask for the Class
C address from 255.255.255.0 to 255.255.255.224.
The number of usable host per subnet can be calculated with the formula
2m – 2 where m is the number of host bit left. 25 – 2 = 30. Therefore, the
number of host per subnet is 30, which is enough to accommodate all the
department requirements.
Page 19 of 20
Network IP: 196.1.1.0 Subnet mask: 255.255.255.224
Reference
Barry Dumas and Morris Schwartz. Principles of computer networks and
communications, Upper Saddle River, NJ: Pearson/Prentice Hall, 2009
David A. Stamper. Local Area Networks,3rd edn. Upper Saddle River, NJ:
Pearson/Prentice Hall, 2001
Page 20 of 20