Computer Systems Assignment Sample

Computer Systems Assignment by New Assignment Help

  • 54000+ Project Delivered
  • 500+ Experts 24x7 Online Help
  • No AI Generated Content
GET 35% OFF + EXTRA 10% OFF
- +
35% Off
£ 6.69
Estimated Cost
£ 4.35
10 Pages 2394Words

Introduction of Computer Systems Assignment

Get free written samples from subject experts and Assignment Writing in UK.

Researchers refer to a network connection as a structure (made up of both hard and soft elements) that links several workstations and allows applications running on such machines to interact with one another. It really should be noted that the phrase "network node" is sometimes used to refer to a computational system made up of numerous workstation interconnected networks and acting as a single entity; for illustration, it will have the same usernames and passwords on all machines. On the other hand, “OPTINET Ltd” specializes in providing IT network infrastructure for medium-sized businesses all around the world. A recently bought business requires a network as the firm grows. The management is struggling with a variety of commercial and technological issues. They are also responsible for supervising the host - based firewall, evaluating the networking router's operation, ensuring that all online security technology is kept up to date, designing and executing business email policy, and managing the corporate telephone. The group has generally assigned the network design implementation tasks, and defined the network infrastructure for the “OPTINET Ltd” by consisting the three departments:

Finance

1 printer, 10 computers

Production

1 printer, 45 computers

Sales

1 printer, 60 computers

IP telephony

The desktops are provided the associated telephonic set

The network consists of three different servers such as Email, DNS and HTTP. The servers are mainly shared between the users. A unique IP address has been used within wireless networking IP address and LAN. The network availability and scalability have been maintained for improving the company security. The Packet tracer has been used for testing and designing the network functions. The Cisco packet tracer has delivered to the details and the virtual networking devices. The vital components for building the network are switches (Layer 3 has been used for performing the standard and multiport layer 2, both layers are performed the basic interaction between the LAN and also accessed the points where PCs and any devices have used for accessing the internet, routers which has promoted the interaction within internetwork and it has chosen how the packets are transmitted for arriving at the destination (Trabelsi and Saleous, 2019). Three various types of the networks have been used:

  • “LAN (Local area network)” has referred to the buildings and a set of the connected buildings
  • “MAN (Metropolitan Area Network)” has interconnected the users in “the geographic territory and the region larger than converted by LAN but smaller than WAN”.
  • “WAN (Wide Area Network)” has referred to the countries, continents and also cities.

Several LANs have been constructed to build the networks in accordance with the assignments, ensuring that the channel's speed, adaptability, and protection are all at a high standard (Alfarsi et al. 2019).

2. Knowledge and understanding

2.1 Build design network

When it talks about networking, we're talking about two or more interconnected computers which may share information like information, an Internet service, programs, and printers, or a combination among these. In Network Simulator, a preparation inquiry to construct a networking for a small enterprise “OPTINET Ltd” , has been developed based on the homework and circumstance. This networking has been built through using traditional hierarchical architecture since this architecture makes it easier to establish a sustainable, dependable, and much less affordable hierarchical ethernet connection since it concentrates on the three essential levels of the network rather than package generation (Almalki, 2020).

2.2 Understanding the network

IP address has defined as an address for connecting with the networking device on the IP network and configured the IP address for the PC1. the IP address has associated with the PC1 for receiving and transmitting the packets from the other packets. IP addresses are mainly separated in the different classes of 32 bits. Apart from that, the basic principles of the router IOS has been defined for the implementation of the networking construction. The packet tracer has been loaded for observing the panel network connection (Demeter et al. 2019). The routers, end devices and the different types of the connection have been established. The configuration panel for this router has been defined and also divided into three different sections such as Config, CLI and also physical. In the Physical section, the physical interface on the router has been implemented and the active configuration of the router has been also maintained. “The command line interface” of the networking router has been properly configured.

Network design using packet tracer

The physical screen of the routers presents all of the access points available to the network. Two Fast Ethernet interfaces, a terminal connection, and extra functionality are all likely. Multiple LANs could be linked to Fast Ethernet interfaces, and the Control section for interconnecting one router to the other has been properly configured (Demeter et al. 2019). The IP address has been assigned 172.16.23.10 default gateway has defined the IP address 172.16.23.1. The subnet mask has been assigned a particular value 255.255.255.0. For the PC section, the network IP address has been defined as 172.16.23.0 and also the IP address has been configured. The Fast ethernet 0/0 of the router has served as the gateway. The PC has been connected to the networking router.

3. Analysis and application

3.1 Methodology of the network design

In the next section, it has been observed that the specific hierarchical design model has been divided in three layers such as core, distribution and also the access. “Hierarchical networks” properly and conveniently segment internet connectivity among divisions and customers (Demeter et al. 2019). For corporate network architecture, hierarchical system architecture delivers effective, quick, and coherent traffic routing mechanisms with lowering the expense of interconnecting many equipment at networking devices.

Network hierarchical model

Speech and visual communications are blended over a single information connection in such a converged network. Such a system is more practical to micro and large businesses, so it might be a challenging option given current technological expenditures. It provides the advantage of simply having to maintain a single connection. Generally, all network communications architecture should really be done in conjunction with an organization's network strategic plan. It is essential to follow the phases in the software development life cycle model while designing a good connection. The supplied data, including such topology of the network, traffic requirements, terminal addresses, scheduling, and etc, would be evaluated first. The capability of networking transformation pathways would be determined in the second level. The third phase outlines the goals that include minimizing traffic postponement and connection costs, as well as optimizing the networking performance/channel cost - benefit trade. The benefits of the “Network hierarchical model” have been defined for designing the network infrastructure design approaches.

  • Manageability
  • Maintainability
  • Redundancy
  • Scalability
  • Security
  • Performance

3.2 Network model

Internet model

Internet has used the TCP/IP protocol suite and also defined it as the internet suite. This has described the internet model which has holed the “four layer architecture”. Independent networks link with each other to form the computer Network, according to the Internet paradigm. Independence networks might be businesses with networked commercial companies and workers, service providers, and home Network operators.

Internet model

OSI model

Each level synchronizes all of the protocols, processes, and techniques it anticipates to be used to complete its part of the job. Emulsifying header or tail is used by all levels to distinguish their counterpart. All communication networks must comply with the Open System Interconnect specification (Hussain et al. 2019). The Internationally Accepted Organization (ISO) created the OSI model, which contains 7 layers:

OSI model

Layered Task model

Each entire network operation is separated into tiny jobs in “the Networking Model's standard algorithms”. Every little activity is then assigned to a component that is solely responsible for completing the assignment. Each layer is responsible for only one task. “The OSI model”, as well as “Open System Interoperability”, specifies “a seven-layer networking framework for key outcomes”. Beginning at the web application inside one platform, authority is sent down the chain of command to the bottom layer, across the network to the next terminal, and ultimately up to a higher level (Rashid et al. 2019).

Layered task for explaining the networking concept

4. Judgment and evaluation

4.1 Comparison and evaluation of the various networks

“Local Area Network (LAN)”

Of the different geographical categories, its “Local Area Network (LAN)” delivers the lowest prices and the smallest total capability. Computer networks are cost-effective to set up since the components of the technology are close together. Despite their lower capabilities, their proximity and inexpensive pricing usually result in the fastest tech being used on a LAN. As a result, this network configuration typically includes the most effective velocity elements and quickest interconnections hardware, and various network categories view such hardware operating at same rates (Sari et al. 2018).

“Wide Area Network (WAN)”

Due to the large distance about which WANs communicate, they require longer telecommunication routes for their connections, which increase the network's profitability.

4.2 protocols and technologies

“A VLAN (virtual local area network)” seems to be a sub network that may establish a connection on a distinct physiological “local area network (land (LANs)”. “The local area network (LAN)” seems to be a collection of desktops and laptops that connect a signal or data connection with a central server in the same geographic location. “Internet Protocol Version” has defined the cast addressing as well as the idea of the broadcasting. Apart from that, this has allowed the devices which have consented to the subnet. The DHCP server has been properly configured and the hosts can communicate with each other (Sari et al. 2018).

5. Implementation and design

5.1 Configuration and implementation of the network

The network has been composed from the routers, switches and also the multilayer’s switch.

6. Documentation and testing

Testing

Test connection

Configuration of the router configuration

(Source: Created by author)

After successfully configuration of the ping tests, VLAN has received all the packets and connected with the other VLAN. This has also resulted in the packet loss process. The ACL has been added by defining the same IP address and provided the VLAN configuration which has been stopped and easily accessible for establishing the networking connection to the ping server.

7. Reflection of the assignment scenario

“Cisco Packet Tracer” has been used to construct the network configuration for the construction domain. All of the prerequisites have been satisfied, and various LANs were created to make it easier to control and monitor Internet connectivity. The benefits of using a hierarchy network approach to build the infrastructure include additional security, efficiency, reliability, scalability, and administration.

Ultimately, two important Local Area Network technologies, Internet or Wi-Fi, have been presented in further depth. Ethernet has become the configuration of the networking configuration. Following the successful evaluation, the communication system can be simply implemented in the real world.

Reference list

Alfarsi, G., Jabbar, J., Tawafak, R.M., Malik, S.I., Alsidiri, A. and Alsinani, M., 2019. Using Cisco Packet Tracer to simulate smart home. International Journal of Engineering Research & Technology (IJERT)8(12), pp.670-674.

Almalki, F.A., 2020. Implementation of 5G IoT based smart buildings using VLAN configuration via cisco packet tracer. International Journal of Electronics Communication and Computer Engineering11(4), pp.56-67.

Demeter, R., Kovari, A., Katona, J., Heldal, I., Costescu, C., Rosan, A., Hathazi, A. and Thill, S., 2019, October. A quantitative study of using Cisco Packet Tracer simulation software to improve IT students’ creativity and outcomes. In 2019 10th IEEE International Conference on Cognitive Infocommunications (CogInfoCom) (pp. 353-358). IEEE.

Hossain, M.A. and Zannat, M., 2019. Simulation and Design of University Area Network Scenario (UANS) using Cisco Packet Tracer. Global Journal of Computer Science and Technology.

Rashid, N.A., bin Othman, Z., bin Johan, R. and Sidek, S.B.H., 2019. Cisco packet tracer simulation as effective pedagogy in Computer Networking course.

Sari, L.M.I., Hatta, P., Wihidayat, E.S. and Xiao, F.E.N.G., 2018. A comparison between the use of cisco packet tracer and graphical network simulator 3 as learning media on students’ achievement. Jurnal Pendidikan Teknologi dan Kejuruan24(1), pp.132-136.

Trabelsi, Z. and Saleous, H., 2019, April. Exploring the opportunities of cisco packet tracer for hands-on security courses on firewalls. In 2019 IEEE Global Engineering Education Conference (EDUCON) (pp. 411-418). IEEE.

 

35% OFF
Get best price for your work
  • 54000+ Project Delivered
  • 500+ Experts 24*7 Online Help

offer valid for limited time only*

×