Unit 02 Networking - Assignment
Unit 02 Networking - Assignment
Assessor Internal
Verifier
Unit 02: Networking
Unit(s)
Networking
Assignment title
B.G.Chamil Shwanka
Student’s name
List which assessment Pass Merit Distinction
criteria the Assessor has
awarded.
INTERNAL VERIFIER CHECKLIST
Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction P1 P2 M1
Descripts
Resubmission Feedback:
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.
1. A cover page or title page should be attached to your assignment. Use page 1 of this assignment
brief as your cover page and make sure all details are accurately filled.
2. The entire assignment brief should be attached as the first section of your assignment.
3. The assignment should be prepared using a word processing software.
4. The assignment should be word processing in an A4 sized paper.
5. Allow 1” margin on top, bottom and right sides of the paper and 1.25” on the left side (for
binding).
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Set line spacing to 1.5. Justify all paragraphs.
3. Ensure that all headings are consistent in terms of size and font style.
4. Use footer function on the word processor to insert your name, unit, assignment no, and page
number on each page. This is useful if individual sheets get detached from the submission.
5. Use the spell check and grammar check function of the word processing application to review
the use of language on your assignment.
1. Carefully check carefully the hand in date and the instructions given with the assignment. Late
submissions will not be accepted.
2. Ensure that sufficient time is spent to complete the assignment by the due date.
3. Do not wait till the last minute to get feedback on the assignment. Such excuses will not be
accepted for late submissions.
4. You must be responsible for efficient management of your time.
5. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
6. Failure to achieve at least a PASS grade will result in a REFERRAL grade.
7. Non-submission of work without valid reasons will lead to an automatic REFERRAL. You will
then be asked to complete an alternative assignment.
8. If you use other people’s work or ideas in your assignment, it must be properly referenced, using
the HARVARD referencing system, in your text or any bibliography. Otherwise, you’ll be found
guilty of committing plagiarism.
9. If you are caught plagiarising, your grade will be reduced to a REFERRAL or at worst, you could
be excluded from the course.
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct form. I further understand what it means to
copy another’s work.
[email protected] 16.11.2019
Student’s Signature: Date:
(Provide E-mail ID) (Provide Submission Date)
Submission format
The submission is in the form of an individual written report. This should be written in a concise,
formal business style using single spacing and font size 12. You are required to make use of headings,
paragraphs and subsections as appropriate, and all work must be supported with research and
referenced using the Harvard referencing system. Please also provide an end list of references using
the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures,
although you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:
Enclave Films is in building B and the web team is positioned in the same building
while majority of the administration, sales, accounts and management functions are
supported in building A. Both buildings are located in the same premises. Movie
company plans to aggregate all their staff and resources in one building. Therefore
when adjacent office space becomes available in building A, these groups will be
accommodated together. Building A has a reception and a customer area as well.
The branch network of Enclave Films has grown without proper planning. The LAN
cabling in both offices is Cat5e Ethernet. The office complex provides an Ethernet
link between the two buildings.
The current network is a flat network design with minimal redundancy. A small
wireless LAN is used occasionally by few project managers with laptops and the
guests at Building B.
Task 02
1. Prepare a written plan of how you are going to design a Local Area
Network including a blueprint of your LAN.
2. Justify the security requirements and quality of services needed for
selection of accessories
3. Design a networked system to meet a given specification
4. Provide the IP address allocation table for the redesigned network.
5. Install & configure network services and applications of your choice.
6. Conduct a test and evaluate the design to meet the requirements and analyse
user feedback.
7. Suggest a maintenance schedule to support the networked system.
P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Compare common networking principles and how protocols
enable the effectiveness of networked systems.
LO2 : Explain networking devices and operations
P3
Discuss the operating principles of networking devices and
server types.
P4
Discuss the inter-dependence of workstation hardware with
relevant networking software.
P5
Design a networked system to meet a given specification.
P6
Test and evaluate the design to meet the requirements and
analyze user feedback.
M3
Install and configure network services and applications on your
choice.
D2
Design a maintenance schedule to support the networked
P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D3
Use critical reflection to evaluate own work and justify valid
conclusions.
We have taken efforts in this assignment. However, it would not have been possible without
the kind support and help of many individuals. We would like to extend our sincere thanks to
all of them.
We are highly indebted to “ESOFT Metro Campus” for their guidance and constant
supervision as well as for providing necessary information regarding the assignment & for
their support in completing the assignment.
We would like to express our gratitude to our lecturer Sir Nirmal who gave us the opportunity
to fulfill this assignment. She gave us moral support and guided in different matters regarding
the professional practice project. She had been very kind and patiently while suggesting us the
outline of this report. We thank her for her overall support.
We would like to express our gratitude towards our parent and members of our family for their
kind co-operation and encouragement, which help us in completion of this assignment.
Our thanks and appreciation also go to the people who are directly or indirectly helped us in
the assignment to finish it successfully. We are also thankful to everyone who supported to
This project.
1. You are newly recruited as a Network Engineer by the movie company to redesign the
network.
You need to produce a report for the company that includes the following:
After the fact gathering is complete, I had to investigate and present feasibility. For the first
part of the assignment, I identify the old network system and then I prepared a new plan of
how to design the new network system for this company. This movie company desires to
install a new Local Area Network update the Virtual Local Area Network where necessary in
all locations due to recent company changes.
I have worked up a feasibility report that details the current analysis this company and what
the company needed in order to install and configure network services and applications. In this
report I explained the interdepended of workstation hardware with relevant networking
software. In this report, I explained and showed how to design and work the network system.
Networking principles
The greatest advancement in technology and communication over the past 20 years
has been the development and advancement of computer networks.
From e-mailing a friend to on-line bill paying to data off the internet to ecommerce,
networking has made our world much smaller and changed the way we
communicate forever.
Data communication
When we connected the two devices and to the same link at the same time. We had to learn
two types of connections.
Point to point connection - The link between 2 devices and reserved for
transmission.
E.g. This connection between remote control and the television control system.
Multi point connection - A single link share more than two devices and shared
spatially or temporally.
Advantages of POP
Advantages of SMTP
-It is a simple protocol
-It is to implement
Advantages of FTP
-Easy to transfer large files
-Security can be maintained
-Transfer of a file can be scheduled
Telnet:
Telnet is a set of rules designed for connecting one system with another. The
connecting process here is termed as remote login. The system which requests
for connection is the local computer, and the system, which accepts the
connection, is the remote computer.
Advantages of Telnet
-It is versatile
-Can be used cross platform
-Unlimited access
Gopher:
Gopher is a collection of rules implemented for searching, retrieving as well as
displaying documents from isolated sites. Gopher also works on the client/server
principle.
HUB
HUB is used to connect multiple computers in a single workgroup LAN network. HUBs
generally have LED indicator lights on each port to indicate the status of link, collisions,
and other information. There is a HUB which has four ports. Ports share everything. One
port received data signal from its connected device. It will make three copies of data
signal from HUB and give one copy to each port. Receiver port doesn’t need a copy of
data signal for itself as it has it the original version.
Figure 4: Hub
Figure 5: Switch
Router
Router is a layer three device which forwards data packet from one logical network
segment to another. Router forwards packets on the bases of their destination address.
For this, router keeps record of the path that packets can use as they move across the
network. These records are maintained in a database table known as routing table.
Routing table can be built statically or dynamically.
Figure 6: Router
There are many types of networks. They provide different services. When the two or more
computers connected. We should identify these network system types and their benefits.
• It is easy to set up
• It is more reliable
Picture1
Client Sever - Client Server networks are larger networks. Central computer or
server storage location for files and applications. Sever computers provide
services and information. These services are file services, web services, email
services, domain name look up services, internet-sharing services etc.
• Better security
Picture2
1) BUS Topology
Bus topology is a network type in which every computer and network device is
connected to single cable. When it has exactly two endpoints, then it is called Linear
Bus topology.
It is cost effective.
Cable required is least compared to other network topology.
Used in small networks.
It is easy to understand.
Easy to expand joining two cables together.
2) RING Topology
Transmitting network is not affected by high traffic or by adding more nodes, as only
the nodes having tokens can transmit data.
Cheap to install and expand
3) STAR Topology
B.G.Chamil Shiwanka Networking 9898
In this type of topology all, the computers are connected to a single hub through a
cable. This hub is the central node and all others nodes are connected to the central
node.
4) HYBRID Topology
Complex in design.
Costly.
5) TREE Topology
Heavily cabled.
Costly.
If more nodes are, added maintenance is difficult.
Central hub fails, network fails.
Costly.
Physical media are the cables that are tangible or have physical existence and are limited by
the physical geography. Popular physical transmission media in use are twisted pair cable,
co-axial cable and fiber optical cable. Each of them has its own characteristics like
transmission speed, effect of noise, physical appearance, cost etc.
A fiber optic cable is a network cable that contains strands of glass fibers inside an
insulated casing. They're designed for long distance, high-performance data networking,
and telecommunications.
Compared to wired cables, fiber optic cables provide higher bandwidth and can transmit
data over longer distances. Fiber optic cables support much of the world's internet, cable
television, and telephone systems.
Twisted pair cable is a type of cable made by putting two separate insulated wires
together in a twisted pattern and running them parallel to each other. This type of cable is
widely used in different kinds of data and voice infrastructures.
Unbound transmission media are the ways of transmitting data without using any cables.
These media are not bounded by physical geography. This type of transmission is called
Wireless communication. Nowadays wireless communication is becoming popular.
Wireless LANs are being installed in office and college campuses. This transmission uses
Microwave, Radio wave, are some of popular unbound transmission media.
Bandwidth is the network communication transmit the maximum amount of data from one
point to another in each time period. Bandwidth is maximum amounts of available and critical
to network performance and describes the data transfer rate. It is not a measure of network
speed. Its connections can be symmetrical, data download or upload in same directions or
asymmetrical.
How to Bandwidth works, it can be sent and receive the more data at one time. Bandwidth like
a water pipe, because it works on the same principle. The more data flow through it per second,
higher capacity of the communication.
Importance of Bandwidth
• It is not free
If you run a growing business, you probably understand that quality IT solutions can be
crucial to company efficiency. And computer networks are one of the most important
IT solutions you can implement in your company.
A computer network is just a multitude of connected computers. This allows the computers
in the network to share data and resources with each other. An IT technician can set up your
computer network to work on a “peer to peer” basis. This is where computers connect
directly to each other. They may also configure the network to go through a central file
server. If you hire a quality IT provider, you can consult beforehand to help you decide
which option is best for your needs.
Company data can never be fully secure without protected access to network resources
and files. Inspired Techs employs IT technicians that are experts in securing IT. They can
properly design security features on your network following the highest security standards.
You can choose the employees who will get access to sensitive data, equipment and other
resources of your company.
After you network all of your business computers, the nature of storing data will change for
you. First of all, you get the combined storage volume of all the computers in the network.
To illustrate this in simple terms, let’s do some simplified math. Let’s say that your business
has 20 computers with 2 terabyte drives each. When you network these computers, you can
say you now have 40 terabytes of combined storage.
Network devices are components used to connect computers or other electronic devices
together so that they can share files or resources like printer or fax machines. Devices used
to setup a Local Area Network (LAN) are the most common type of network devices used
by the public. A LAN requires a Hub, Switch, and Router.
Repeater – A repeater operates at the physical layer. Its job is to regenerate the signal over
the same network before the signal becomes too weak or corrupted so as to extend the
length to which the signal can be transmitted over the same network. An important point to
be noted about repeaters is that they do not amplify the signal. When the signal becomes
weak, they copy the signal bit by bit and regenerate it at the original strength. It is a 2-port
device.
A bridge operates at data link layer. A bridge is a repeater; with add on the functionality of
filtering content by reading the MAC addresses of source and destination. It is also used for
interconnecting two LANs working on the same protocol. It has a single input and single
output port, thus making it a 2-port device.
Types of Bridges
Transparent Bridges: -
These are the bridge in which the stations are completely unaware of the
Bridge’s existence i.e. whether or not a bridge is added or deleted from the network,
reconfiguration of the stations is unnecessary. These bridges make use of two processes
i.e. bridge forwarding and bridge learning.
In these bridges, routing operation is performed by source station and the frame specifies
which route to follow. The hot can discover frame by sending a special frame called
discovery frame, which spreads through the entire network using all possible paths to
destination
B.G.Chamil Shiwanka Networking 9898
1.2.11.1 Modem
A Modem is somewhat a more interesting network device in our daily life. So if you have
noticed around, you get an internet connection through a wire (there are different types of
wires) to your house. This wire is used to carry our internet data outside to the internet
world. However, our computer generates binary data or digital data in forms of 1s and 0s
and on the other hand, a wire carries an analog signal and that’s where a modem comes in.
There are a number of categories of servers, web server, file servers, Application Sever,
network servers and database servers. In theory, whenever computers share resources
with client machines they are considered servers.
Web Server – Web server are servers up web pages. Every web server has an IP address
and domain name. This process is an example of the client/ server model. Web server
include, how to work the operating system, how to handle the server-side programming.
Proxy Server – Proxy server is boost performance of the network. Its cache can serve
all users and helpful for troubleshooting.
Database Server – Database is dedicated to database storage and retrieval and sever
computer runs database software.
Network software is an extremely broad term for a range of software aimed at the design
and implementation of modern networks. Various types of network software support the
creation, calibration and operation of networks.
In using network software, the size and scope of a network plays a key role in decision-
making. Companies or other parties can choose specific network software tools for setup
and installation. Other network software resources help administrators and security
personnel to monitor a network to protect it against a range of attacks, to prevent data
breaches, or to limit unauthorized access. Other tools help to make network operations work
better.
Packet filter
Circuit level
Proxy server
Application gateway
This is useful to remote access to a network. A good software firewall will run in the
background on system and system resources.
Work Stations
Basically, ACL is the integrated feature of IOS software that is used to filter the network
traffic passing through the IOS devices. Network traffic flows in the form of packets. A
packet contains small piece of data and all necessary information, which are required to
deliver it. By default when a router receives a packet in interface, it takes following actions.
This default behavior does not provide any security. Anyone who know the correct
destination address can send his packet through the router.
When assign the password to switches, cannot configure anybody who haven’t permission.
This is one of a way network system security.
The quality of service refer to the capability of a network to provide better service to selected
network traffic over various technologies. This is ensure quality performance for critical
applications. The primary goal of QoS is to provide priority including dedicated bandwidth,
controlled jitter and latency and improved loss characteristics. Internet service providers need
to apply techniques and technologies to provide the best service possible before their
competitors beat them to it.
General office and reception 8.00am – 5.00pm, Sunday, Will provide 12–24 hours,
systems. only as needed. notice when taking down
Our system.
Accounts and administrative 5.30am – 8.30am, Will provide 24 – 48 hours,
system Saturdays, only as needed. Notice when taking down
our system.
Network services and access 9.00am – 5.00pm, When a longer down time is
point. Saturdays. required, will provide 12-24
Hours, notice.
Workstations 4.00am – 8.30am, Monday, No additional notice.
Only as needed.
Pcs and printers. No weekly schedule No additional notice.
Required, only as needed.
I separated every department into the VLANs. This picture shows Switch1 VLAN status.
3.2.1 Ping.
The ping command is a very simple connectivity-testing tool. Ping verifies connectivity by
sending Internet Control Message Protocol (ICMP) echo packets to a host and listening for an
echo reply.
The ping command waits for each packet sent and prints the number of packets transmitted
and received. Each received packet is validated against the sent packet. The default setting
will send four echo packets containing 64 bytes of data. You can use the ping utility to test
both the host name and IP address of the host for DNS resolution. A successful IP ping
and failed host name ping could indicate name resolution issues.
3.2.2 Telnet.
Telnet comes from the combination of the words telephone and network. It was originally
designed to allow for command line remote management over slower connection types.
It is a TCP based protocol that can also be used to test a variety of services for connectivity.
You can use it to test for SMTP, SQL or Remote Desktop connectivity. This is a good test to
use for service or port blocks resulting from a firewall configuration.
Trace route is the Windows implementation of the trace route tool that originated on UNIX
and Cisco systems. Trace route is a Windows command-line tool that displays the path a
packet takes to reach a destination from the machine that it is executed on. It does this by
sending Internet Control Message Protocol (ICMP) echo request messages to the destination.
It does this by incrementally increasing the Time to Live (TTL) values to find the path taken
to the destination address. The path is displayed as a list in the order of which it heard back
from each node that it passed through on its way to the destination.
3.3 Record the test results and analyze these against expected results.
I suggesting some devises. It will helpful for future improvement of this network system.
3.4.1 Firewall.
A firewall is a network security device that monitors incoming and outgoing network traffic
and decides whether to allow or block specific traffic based on a defined set of security rules.
Firewalls have been a first line of defense in network security for over 25 years. They
establish a barrier between secured and controlled internal networks that can be trusted and
untrusted outside networks, such as the Internet.
A backup server consists of standard hardware server with substantial storage capacity,
mostly with redundant storage drives and a purpose built backup server application. The
backup schedule for each computer may be installed with a client utility application or
configured within the host operating system (OS). At the scheduled time, the host connects
with the backup server to initiate the data backup process. The backup may be retrieved or
recovered in the event of data loss, data corruption or disaster recovery.
Cloud backup is a type of service through which cloud computing resources and
infrastructure are used to create, edit, manage and restore data, services or application
backup. This is done remotely over the internet.