100% found this document useful (3 votes)
3K views64 pages

Unit 02 Networking - Assignment

The document provides an assignment brief for designing and implementing a LAN for Enclave Films Company. Enclave Films is a movie company that produces movies and delivers high quality video through the VividZone website. The company currently has disconnected networks that need to be consolidated into an efficient LAN. The assignment requires designing a LAN that meets Enclave Films' needs, selecting networking devices, and providing implementation and troubleshooting plans. The report should be 3,000-3,500 words and reference the scenario, learning outcomes, and assignment guidance using the Harvard referencing style.

Uploaded by

Chamith gamage
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (3 votes)
3K views64 pages

Unit 02 Networking - Assignment

The document provides an assignment brief for designing and implementing a LAN for Enclave Films Company. Enclave Films is a movie company that produces movies and delivers high quality video through the VividZone website. The company currently has disconnected networks that need to be consolidated into an efficient LAN. The assignment requires designing a LAN that meets Enclave Films' needs, selecting networking devices, and providing implementation and troubleshooting plans. The report should be 3,000-3,500 words and reference the scenario, learning outcomes, and assignment guidance using the Harvard referencing style.

Uploaded by

Chamith gamage
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 64

Higher Nationals

Internal verification of assessment decisions – BTEC (RQF)


INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Programme title

Assessor Internal
Verifier
Unit 02: Networking
Unit(s)
Networking
Assignment title
B.G.Chamil Shwanka
Student’s name
List which assessment Pass Merit Distinction
criteria the Assessor has
awarded.
INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded match


those shown in the assignment brief? Y/N
Is the Pass/Merit/Distinction grade awarded
justified by the assessor’s comments on the Y/N
student work?
Has the work been assessed
Y/N
accurately?
Is the feedback to the student:
Give details:
• Constructive? Y/N
• Linked to relevant assessment Y/N
criteria? Y/N
• Identifying opportunities for
improved performance? Y/N
• Agreeing actions?
Does the assessment decision need
Y/N
amending?

Assessor signature Date

Internal Verifier signature Date


Programme Leader signature (if
required) Date

Confirm action completed


Remedial action taken
Give details:

Assessor signature Date


Internal
Verifier Date

B.G.Chamil Shiwanka Networking 9898


signature
Programme Leader
signature (if Date
required)

B.G.Chamil Shiwanka Networking 9898


Higher Nationals - Summative Assignment Feedback Form
Student Name/ID B.G.Chamil Shiwanka
Unit 02: Networking
Unit Title
Assignment Number 1 Assessor
Date
Submission Date Received 1st
submission
Date Received 2nd
Re-submission Date submission

Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction P1 P2 M1
Descripts

LO2 Explain networking devices and operations.


Pass, Merit & Distinction P3 P4 M2 D1
Descripts

LO3 Design efficient networked systems.


Pass, Merit & Distinction P5 P6 M3 D2
Descripts

LO4 Implement and diagnose networked systems.


Pass, Merit & Distinction P7 P8 M4 D3
Descripts

Grade: Assessor Signature: Date:

Resubmission Feedback:

Grade: Assessor Signature: Date:

Internal Verifier’s Comments:

Signature & Date:

* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.

B.G.Chamil Shiwanka Networking 9898


Pearson Higher Nationals in
Computing
Unit 02: Networking
Assignment 01

B.G.Chamil Shiwanka Networking 9898


General Guidelines

1. A cover page or title page should be attached to your assignment. Use page 1 of this assignment
brief as your cover page and make sure all details are accurately filled.
2. The entire assignment brief should be attached as the first section of your assignment.
3. The assignment should be prepared using a word processing software.
4. The assignment should be word processing in an A4 sized paper.
5. Allow 1” margin on top, bottom and right sides of the paper and 1.25” on the left side (for
binding).

Word Processing Rules

1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Set line spacing to 1.5. Justify all paragraphs.
3. Ensure that all headings are consistent in terms of size and font style.
4. Use footer function on the word processor to insert your name, unit, assignment no, and page
number on each page. This is useful if individual sheets get detached from the submission.
5. Use the spell check and grammar check function of the word processing application to review
the use of language on your assignment.

B.G.Chamil Shiwanka Networking 9898


Important Points:

1. Carefully check carefully the hand in date and the instructions given with the assignment. Late
submissions will not be accepted.
2. Ensure that sufficient time is spent to complete the assignment by the due date.
3. Do not wait till the last minute to get feedback on the assignment. Such excuses will not be
accepted for late submissions.
4. You must be responsible for efficient management of your time.
5. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
6. Failure to achieve at least a PASS grade will result in a REFERRAL grade.
7. Non-submission of work without valid reasons will lead to an automatic REFERRAL. You will
then be asked to complete an alternative assignment.
8. If you use other people’s work or ideas in your assignment, it must be properly referenced, using
the HARVARD referencing system, in your text or any bibliography. Otherwise, you’ll be found
guilty of committing plagiarism.
9. If you are caught plagiarising, your grade will be reduced to a REFERRAL or at worst, you could
be excluded from the course.

B.G.Chamil Shiwanka Networking 9898


Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct form. I further understand what it means to
copy another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of Edexcel UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my
own, and where I have made use of another’s work, I will attribute the source in the correct
way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Edexcel UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.

[email protected] 16.11.2019
Student’s Signature: Date:
(Provide E-mail ID) (Provide Submission Date)

B.G.Chamil Shiwanka Networking 9898


Higher National Diploma in Business
Assignment Brief
Student Name /ID Number B.G Chamil Shwanka
Unit Number and Title Unit 2: Networking
Academic Year 2017/18
Unit Tutor
Assignment Title LAN Design & Implementation for Enclave Films Company
Issue Date
Submission Date
IV Name & Date

Submission format

The submission is in the form of an individual written report. This should be written in a concise,
formal business style using single spacing and font size 12. You are required to make use of headings,
paragraphs and subsections as appropriate, and all work must be supported with research and
referenced using the Harvard referencing system. Please also provide an end list of references using
the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures,
although you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:

LO1 Examine networking principles and their protocols.

LO2 Explain networking devices and operations.

LO3 Design efficient networked systems.

LO4 Implement and diagnose networked systems.


Assignment Brief and Guidance:

B.G.Chamil Shiwanka Networking 9898


Scenario :
Enclave Films is an eminent movie company which composes movies and delivers
high quality video to make it download through VividZone company website. The
original movie company management has decided to consolidate the contract with
VividZone by adding more efficient staff and appliances.

Enclave Films is in building B and the web team is positioned in the same building
while majority of the administration, sales, accounts and management functions are
supported in building A. Both buildings are located in the same premises. Movie
company plans to aggregate all their staff and resources in one building. Therefore
when adjacent office space becomes available in building A, these groups will be
accommodated together. Building A has a reception and a customer area as well.

About the Network

The branch network of Enclave Films has grown without proper planning. The LAN
cabling in both offices is Cat5e Ethernet. The office complex provides an Ethernet
link between the two buildings.

The current network is a flat network design with minimal redundancy. A small
wireless LAN is used occasionally by few project managers with laptops and the
guests at Building B.

a) Building A - general office and managers, including reception, accounts, and


administration. It consists of 12 PCs and 02 printers.
b) Building B - production suites and provides networking for the media development
and storage. It consists of 09 high-performance workstations, 05 office PCs, and 02
printers.

The Management expects to enhance the network based on following major


criteria:

a) Separate the network into VLANs.


b) Data traffic expected to increase by 80%
c) Possibly consider connecting directly to the VividZone network; must be a fast and
reliable connection
d) High network availability with redundant links and technology
e) Wireless network access at Building B
f) QoS to support video applications
g) High network reliability with network monitoring and security

B.G.Chamil Shiwanka Networking 9898


Task 01
You are newly recruited as a Network Engineer by the movie company to redesign
the network.
You need to produce a report for the company that includes the following:

1. An an overview of your report.


2. An explanation of;
 networking principles, protocols and devices, including benefits and
constraints of networked solutions
 the impact of network topology, communication and bandwidth
requirements, effectiveness of networking systems
 operating principles of networking devices and server types and
networking software

Task 02

1. Prepare a written plan of how you are going to design a Local Area
Network including a blueprint of your LAN.
2. Justify the security requirements and quality of services needed for
selection of accessories
3. Design a networked system to meet a given specification
4. Provide the IP address allocation table for the redesigned network.
5. Install & configure network services and applications of your choice.
6. Conduct a test and evaluate the design to meet the requirements and analyse
user feedback.
7. Suggest a maintenance schedule to support the networked system.

LO4 Implement and diagnose networked systems

1. Implement a networked system based on your prepared design.


2. Conduct verification with e.g. Ping, extended ping, trace route, telnet, SSH,
etc.
3. Record the test results and analyze these against expected results.
4. Investigate what functionalities would allow the system to support device
growth and the addition of communication devices.

B.G.Chamil Shiwanka Networking 9898


B.G.Chamil Shiwanka Networking 9898
Grading Rubric

Grading Criteria Achieved Feedback

LO1 : Examine networking principles and their protocols.

P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Compare common networking principles and how protocols
enable the effectiveness of networked systems.
LO2 : Explain networking devices and operations

P3
Discuss the operating principles of networking devices and
server types.
P4
Discuss the inter-dependence of workstation hardware with
relevant networking software.

B.G.Chamil Shiwanka Networking 9898


M2
Explore a range of server types and justify the selection of a
server, considering a given scenario regarding cost and
performance optimization.
LO 1 & LO2
D1
Considering a given scenario, identify the topology protocol
selected for the efficient utilisation of a networking system.

LO3 : Design efficient networked systems

P5
Design a networked system to meet a given specification.
P6
Test and evaluate the design to meet the requirements and
analyze user feedback.
M3
Install and configure network services and applications on your
choice.
D2
Design a maintenance schedule to support the networked

B.G.Chamil Shiwanka Networking 9898


system.
LO4 : Implement and diagnose networked systems

P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D3
Use critical reflection to evaluate own work and justify valid
conclusions.

B.G.Chamil Shiwanka Networking 9898


Acknowledgement

We have taken efforts in this assignment. However, it would not have been possible without
the kind support and help of many individuals. We would like to extend our sincere thanks to
all of them.

We are highly indebted to “ESOFT Metro Campus” for their guidance and constant
supervision as well as for providing necessary information regarding the assignment & for
their support in completing the assignment.

We would like to express our gratitude to our lecturer Sir Nirmal who gave us the opportunity
to fulfill this assignment. She gave us moral support and guided in different matters regarding
the professional practice project. She had been very kind and patiently while suggesting us the
outline of this report. We thank her for her overall support.

We would like to express our gratitude towards our parent and members of our family for their
kind co-operation and encouragement, which help us in completion of this assignment.

Our thanks and appreciation also go to the people who are directly or indirectly helped us in
the assignment to finish it successfully. We are also thankful to everyone who supported to
This project.

B.G.Chamil Shiwanka Networking 9898


Task 01

1. You are newly recruited as a Network Engineer by the movie company to redesign the
network.

You need to produce a report for the company that includes the following:

1.1An an overview of your report.

This is a movie company. I am newly recruited as a Network Engineer by this movie


company to redesign the network. In this report, I had to identify and describe,

 What are the networking principles, protocols and devices?


 Benefits and constraints of networked solutions
 Network topologies, communication bandwidth requirements
 Network system
 How to design the network system?

After the fact gathering is complete, I had to investigate and present feasibility. For the first
part of the assignment, I identify the old network system and then I prepared a new plan of
how to design the new network system for this company. This movie company desires to
install a new Local Area Network update the Virtual Local Area Network where necessary in
all locations due to recent company changes.

I have worked up a feasibility report that details the current analysis this company and what
the company needed in order to install and configure network services and applications. In this
report I explained the interdepended of workstation hardware with relevant networking
software. In this report, I explained and showed how to design and work the network system.

B.G.Chamil Shiwanka Networking 9898


1.2.1 An explanation of,

Networking principles

The greatest advancement in technology and communication over the past 20 years
has been the development and advancement of computer networks.

From e-mailing a friend to on-line bill paying to data off the internet to ecommerce,
networking has made our world much smaller and changed the way we
communicate forever.

Data communication

Data communication is transferring the data or refers to the transmission of data.


Transmission medium can be wired or wireless.

 Sender-Device which sends data


 Receiver-Device which receives data
 Transmission-Physical path by which a massage travels from sender to
receiver
 Message-Information being communicated(e.g. text,pictures,audio,video,etc)

B.G.Chamil Shiwanka Networking 9898


Data flow

 Simplex - Communication is unidirectional.


E.g. Keyboard
 Half Duplex - Devices let you send and receive but only one way at a time
E.g. Walkie-talkie
 Full Duplex - Devices let you send and receive data at the same time.

E.g. Telephone network

B.G.Chamil Shiwanka Networking 9898


Types of connection

When we connected the two devices and to the same link at the same time. We had to learn
two types of connections.

 Point to point connection - The link between 2 devices and reserved for
transmission.
E.g. This connection between remote control and the television control system.
 Multi point connection - A single link share more than two devices and shared
spatially or temporally.

B.G.Chamil Shiwanka Networking 9898


1.2.2 What is networking protocols?

 Network protocols are formal standards and policies comprised of rules,


procedures and formats that define communication between two or more
devices over a network. Network protocols govern the end-to-end processes
of timely, secure and managed data or network communication.

Types of network protocols.

Transmission Control Protocol (TCP):


 TCP is a popular communication protocol which is used for communicating over
a network. It divides any message into series of packets that are sent from source
to destination and there it gets reassembled at the destination.

Internet Protocol (IP):


 IP is designed explicitly as addressing protocol. It is mostly used with TCP. The
IP addresses in packets help in routing them through different nodes in a network
until it reaches the destination system. TCP/IP is the most popular protocol
connecting the networks.

 There are two versions in IPs, IPv4 and IPv6.


IPv4
 IPv4 version is commonly used to communicated in different types of data.
Manual and Automatic configurations including all kinds of IPv4.
IPv6
 IPv6 version developed by the Internet Engineering Task Force (IETF). Basics
of this version like IPv4.
Advantages of IPv4 Advantages of IPv6
-More efficient routing -New options
-Multicast function -Faster routing

User Datagram Protocol (UDP):


 UDP is a substitute communication protocol to Transmission Control Protocol
implemented primarily for creating loss-tolerating and low-latency linking
between different applications.

B.G.Chamil Shiwanka Networking 9898


Post office Protocol (POP):
 POP3 is designed for receiving incoming E-mails.

Advantages of POP

-We can read the mails without logging to the internet.


-All the messages are stored into hard drive.

Simple mail transport Protocol (SMTP):


 SMTP is designed to send and distribute outgoing E-Mail.

Advantages of SMTP
-It is a simple protocol
-It is to implement

File Transfer Protocol (FTP):


 FTP allows users to transfer files from one machine to another. Types of files
may include program files, multimedia files, text files, and documents, etc

Advantages of FTP
-Easy to transfer large files
-Security can be maintained
-Transfer of a file can be scheduled

B.G.Chamil Shiwanka Networking 9898


Hyper Text Transfer Protocol (HTTP):
 HTTP is designed for transferring a hypertext among two or more systems.
HTML tags are used for creating links. These links may be in any form like text
or images. HTTP is designed on Client-server principles which allow a client
system for establishing a connection with the server machine for making a
request. The server acknowledges the request initiated by the client and responds
accordingly.

Hyper Text Transfer Protocol Secure (HTTPS):

 HTTPS is abbreviated as Hyper Text Transfer Protocol Secure is a standard


protocol to secure the communication among two computers one using the
browser and other fetching data from web server. HTTP is used for transferring
data between the client browser (request) and the web server (response) in the
hypertext format, same in case of HTTPS except that the transferring of data is
done in an encrypted format. So it can be said that https thwart hackers from
interpretation or modification of data throughout the transfer of packets.

Telnet:
 Telnet is a set of rules designed for connecting one system with another. The
connecting process here is termed as remote login. The system which requests
for connection is the local computer, and the system, which accepts the
connection, is the remote computer.

Advantages of Telnet

-It is versatile
-Can be used cross platform
-Unlimited access

Gopher:
 Gopher is a collection of rules implemented for searching, retrieving as well as
displaying documents from isolated sites. Gopher also works on the client/server
principle.

B.G.Chamil Shiwanka Networking 9898


1.2.3 Networking devices

A computer network is basically a group of multiple networking devices connected together


for data sharing. Collectively networking devices have single purpose “securely transfer data
as fast as they can”. To achieve this goal every networking device has its own functionality.
Let’s see some networking devices.

 HUB
HUB is used to connect multiple computers in a single workgroup LAN network. HUBs
generally have LED indicator lights on each port to indicate the status of link, collisions,
and other information. There is a HUB which has four ports. Ports share everything. One
port received data signal from its connected device. It will make three copies of data
signal from HUB and give one copy to each port. Receiver port doesn’t need a copy of
data signal for itself as it has it the original version.

Figure 4: Hub

B.G.Chamil Shiwanka Networking 9898


 Switch

Switch makes their switching decisions in hardware by using application specific


integrated circuits. Unlike generic processor such as we have in our PC, ASICs are
specialized processors built only to perform very few particular tasks. In cisco switch
ASICs has single task, switch frames blazingly fast. For example an entry level catalyst
2960 switch has frame rate of 2.7 million frames per second. Higher end switches have
higher FPS rate such as Catalyst 6500 has a rate of 400 million FPS rate.

Figure 5: Switch

 Router

Router is a layer three device which forwards data packet from one logical network
segment to another. Router forwards packets on the bases of their destination address.
For this, router keeps record of the path that packets can use as they move across the
network. These records are maintained in a database table known as routing table.
Routing table can be built statically or dynamically.

Figure 6: Router

B.G.Chamil Shiwanka Networking 9898


1.2.4 Network system types

There are many types of networks. They provide different services. When the two or more
computers connected. We should identify these network system types and their benefits.

 Peer to Peer - Peer to Peer network is a group of computers. A network of


computers to allow certain files and folders to shared with everyone or selected
users.

Benefits of a Peer-to-Peer network

• Peer to Peer networks are very cheap

• It is easy to set up

• It has a wide range of operating system

• It is more reliable

Picture1

Client Sever - Client Server networks are larger networks. Central computer or
server storage location for files and applications. Sever computers provide
services and information. These services are file services, web services, email
services, domain name look up services, internet-sharing services etc.

Benefits of a Client server network

• Better security

• Less time to maintain the software

• Network administrator has a high level of IT skills

Picture2

B.G.Chamil Shiwanka Networking 9898


1.2.5 Network Topologies

 Network Topology is the schematic description of a network arrangement, connecting


various nodes (sender and receiver) through lines of connection.

1) BUS Topology

 Bus topology is a network type in which every computer and network device is
connected to single cable. When it has exactly two endpoints, then it is called Linear
Bus topology.

Advantages of Bus Topology

 It is cost effective.
 Cable required is least compared to other network topology.
 Used in small networks.
 It is easy to understand.
 Easy to expand joining two cables together.

Disadvantages of Bus Topology

 Cables fails then whole network fails.


 If network traffic is heavy or nodes are more the performance of the network decreases.
 Cable has a limited length.
 It is slower than the ring topology.

2) RING Topology

B.G.Chamil Shiwanka Networking 9898


 It is called ring topology because it forms a ring as each computer is connected to
another computer, with the last one connected to the first. Exactly two neighbors for
each device.

Advantages of Ring Topology

 Transmitting network is not affected by high traffic or by adding more nodes, as only
the nodes having tokens can transmit data.
 Cheap to install and expand

Disadvantages of Ring Topology

 Troubleshooting is difficult in ring topology.


 Adding or deleting the computers disturbs the network activity.
 Failure of one computer disturbs the whole network.

3) STAR Topology
B.G.Chamil Shiwanka Networking 9898
 In this type of topology all, the computers are connected to a single hub through a
cable. This hub is the central node and all others nodes are connected to the central
node.

Advantages of Star Topology

 Fast performance with few nodes and low network traffic.


 Hub can be upgraded easily.
 Easy to troubleshoot.
 Easy to setup and modify.
 Only that node is affected which has failed, rest of the nodes can work smoothly.

Disadvantages of Star Topology

 Cost of installation is high.


 Expensive to use.
 If the hub fails then the whole network is stopped because all the nodes depend on the
hub.
 Performance is based on the hub that is it depends on its capacity

4) HYBRID Topology

B.G.Chamil Shiwanka Networking 9898


 It is two different types of topologies, which is a mixture of two or more topologies.
For example, if in an office in one department, ring topology is used and in another
star topology is used; connecting these topologies will result in Hybrid Topology (ring
topology and star topology).

Advantages of Hybrid Topology

 Reliable as Error detecting and trouble shooting is easy.


 Effective.
 Scalable as size can be increased easily.
 Flexible.

Disadvantages of Hybrid Topology

 Complex in design.
 Costly.

5) TREE Topology

B.G.Chamil Shiwanka Networking 9898


 It has a root node and all other nodes are connected to it forming a hierarchy. It is also
called hierarchical topology. It should at least have three levels to the hierarchy.

Advantages of Tree Topology

 Extension of bus and star topologies.


 Expansion of nodes is possible and easy.
 Easily managed and maintained.
 Error detection is easily done.

Disadvantages of Tree Topology

 Heavily cabled.
 Costly.
 If more nodes are, added maintenance is difficult.
 Central hub fails, network fails.
 Costly.

1.2.6 Communication requirements.


B.G.Chamil Shiwanka Networking 9898
If we wants to transfer data from one Pc to another requires some types of link through which
the data can be transmitted. This link called as the communication channel.
This communication channel requires transmission media; there are two types of transmission
media.

1.2.6.1 Physical media.

Physical media are the cables that are tangible or have physical existence and are limited by
the physical geography. Popular physical transmission media in use are twisted pair cable,
co-axial cable and fiber optical cable. Each of them has its own characteristics like
transmission speed, effect of noise, physical appearance, cost etc.

1.2.6.2 Coaxial cable

Coaxial cable is a two-conductor cable in which one conductor forms an electromagnetic


shield around the other. The two conductors are separated by insulation. It is a constant
impedance transmission cable. This media is used in base band and broadband transmission.
Coaxial cables do not produce external electric and magnetic fields and are not affected by
them. This makes them ideally suited, although more expensive, for transmitting signals.

B.G.Chamil Shiwanka Networking 9898


1.2.6.3 Fiber optic cable.

A fiber optic cable is a network cable that contains strands of glass fibers inside an
insulated casing. They're designed for long distance, high-performance data networking,
and telecommunications.

Compared to wired cables, fiber optic cables provide higher bandwidth and can transmit
data over longer distances. Fiber optic cables support much of the world's internet, cable
television, and telephone systems.

1.2.6.4 Twisted pair cable

Twisted pair cable is a type of cable made by putting two separate insulated wires
together in a twisted pattern and running them parallel to each other. This type of cable is
widely used in different kinds of data and voice infrastructures.

1.2.6.5 Wireless Media

Unbound transmission media are the ways of transmitting data without using any cables.
These media are not bounded by physical geography. This type of transmission is called
Wireless communication. Nowadays wireless communication is becoming popular.
Wireless LANs are being installed in office and college campuses. This transmission uses
Microwave, Radio wave, are some of popular unbound transmission media.

B.G.Chamil Shiwanka Networking 9898


1.2.7 Bandwidth requirements

Bandwidth is the network communication transmit the maximum amount of data from one
point to another in each time period. Bandwidth is maximum amounts of available and critical
to network performance and describes the data transfer rate. It is not a measure of network
speed. Its connections can be symmetrical, data download or upload in same directions or
asymmetrical.

How to Bandwidth works, it can be sent and receive the more data at one time. Bandwidth like
a water pipe, because it works on the same principle. The more data flow through it per second,
higher capacity of the communication.

Importance of Bandwidth

• Limited by physics and technology

• It is not free

• They are growing at a rapid rate

• It is critical to network performance

B.G.Chamil Shiwanka Networking 9898


1.2.8 Effectiveness of networking systems

If you run a growing business, you probably understand that quality IT solutions can be
crucial to company efficiency. And computer networks are one of the most important
IT solutions you can implement in your company.

A computer network is just a multitude of connected computers. This allows the computers
in the network to share data and resources with each other. An IT technician can set up your
computer network to work on a “peer to peer” basis. This is where computers connect
directly to each other. They may also configure the network to go through a central file
server. If you hire a quality IT provider, you can consult beforehand to help you decide
which option is best for your needs.

1.2.8.1 Highly security level.

Company data can never be fully secure without protected access to network resources
and files. Inspired Techs employs IT technicians that are experts in securing IT. They can
properly design security features on your network following the highest security standards.
You can choose the employees who will get access to sensitive data, equipment and other
resources of your company.

1.2.8.2 Efficiency of data storage.

After you network all of your business computers, the nature of storing data will change for
you. First of all, you get the combined storage volume of all the computers in the network.
To illustrate this in simple terms, let’s do some simplified math. Let’s say that your business
has 20 computers with 2 terabyte drives each. When you network these computers, you can
say you now have 40 terabytes of combined storage.

B.G.Chamil Shiwanka Networking 9898


1.2.9 What are the networking devices

Network devices are components used to connect computers or other electronic devices
together so that they can share files or resources like printer or fax machines. Devices used
to setup a Local Area Network (LAN) are the most common type of network devices used
by the public. A LAN requires a Hub, Switch, and Router.

Networking devices are also called Communicating Devices.

Repeater – A repeater operates at the physical layer. Its job is to regenerate the signal over
the same network before the signal becomes too weak or corrupted so as to extend the
length to which the signal can be transmitted over the same network. An important point to
be noted about repeaters is that they do not amplify the signal. When the signal becomes
weak, they copy the signal bit by bit and regenerate it at the original strength. It is a 2-port
device.

B.G.Chamil Shiwanka Networking 9898


Bridge

A bridge operates at data link layer. A bridge is a repeater; with add on the functionality of
filtering content by reading the MAC addresses of source and destination. It is also used for
interconnecting two LANs working on the same protocol. It has a single input and single
output port, thus making it a 2-port device.

Types of Bridges

Transparent Bridges: -

These are the bridge in which the stations are completely unaware of the
Bridge’s existence i.e. whether or not a bridge is added or deleted from the network,
reconfiguration of the stations is unnecessary. These bridges make use of two processes
i.e. bridge forwarding and bridge learning.

Source Routing Bridges:-

In these bridges, routing operation is performed by source station and the frame specifies
which route to follow. The hot can discover frame by sending a special frame called
discovery frame, which spreads through the entire network using all possible paths to
destination
B.G.Chamil Shiwanka Networking 9898
1.2.11.1 Modem

A Modem is somewhat a more interesting network device in our daily life. So if you have
noticed around, you get an internet connection through a wire (there are different types of
wires) to your house. This wire is used to carry our internet data outside to the internet
world. However, our computer generates binary data or digital data in forms of 1s and 0s
and on the other hand, a wire carries an analog signal and that’s where a modem comes in.

1.2.10 What is a server


A server is a computer, a device or a program that is dedicated to managing network
resources. Servers are often referred to as dedicated because they carry out hardly any
other tasks apart from their server tasks.

There are a number of categories of servers, web server, file servers, Application Sever,
network servers and database servers. In theory, whenever computers share resources
with client machines they are considered servers.

B.G.Chamil Shiwanka Networking 9898


Types of Servers

 Web Server – Web server are servers up web pages. Every web server has an IP address
and domain name. This process is an example of the client/ server model. Web server
include, how to work the operating system, how to handle the server-side programming.

 Proxy Server – Proxy server is boost performance of the network. Its cache can serve
all users and helpful for troubleshooting.

 Database Server – Database is dedicated to database storage and retrieval and sever
computer runs database software.

 Application Server – Application server is an install, operate, host applications and


associated servers for end users.

1.2.12 What is network software

Network software is an extremely broad term for a range of software aimed at the design
and implementation of modern networks. Various types of network software support the
creation, calibration and operation of networks.

In using network software, the size and scope of a network plays a key role in decision-
making. Companies or other parties can choose specific network software tools for setup
and installation. Other network software resources help administrators and security
personnel to monitor a network to protect it against a range of attacks, to prevent data
breaches, or to limit unauthorized access. Other tools help to make network operations work
better.

B.G.Chamil Shiwanka Networking 9898


There are three types of network software

• Client Software – This is a part of computer hardware or software.

• Sever Software – Sever software is built to saver’s hardware infrastructure. We can


identify these types severs software
-Web server software
- Application server software
-Database server software
-Cloud computing server software
-File server software
• Software firewall – A firewall is the first line of network. It will protect computer from
outside attempts. Many software firewalls control for safe files and unsafe applications
in computer. It has three types of firewall.

 Packet filter
 Circuit level
 Proxy server
 Application gateway

 This is useful to remote access to a network. A good software firewall will run in the
background on system and system resources.

Work Stations

 A workstation is a computer dedicated to use by a single user. It includes one or more


high-resolution displays and more capacity than a personal computer. Workstation has
multiple capability because of additional random-access memory and drive capacity. It
has a higher-speed graphics adapters and more connected peripherals. Windows severs
have a user interface that very similar to Windows workstation. The term workstation
used to mainframe terminal on a local area network.

B.G.Chamil Shiwanka Networking 9898


Activity 02

2.1 Written plan of Local Area Network designing.

1. Study the current network of movie Company.


2. Discuss with management about their requirements.
3. Gathering information of new technology and security requirements.
4. Planning the network design.
5. List down the required devices.
6. Draw a plan on a book.
7. Implement the network design on packet tracer.
8. Assigning the IP addresses.
9. Separate the network into VLANs.
10. Router configuration.
11. Testing the network system.
12. Create a maintenance schedule.

B.G.Chamil Shiwanka Networking 9898


2.1.1 Blueprint of LAN

B.G.Chamil Shiwanka Networking 9898


Figure 17: Blueprint of LAN

2.2 Justifying the security requirements.

2.2.1 Access control list

Basically, ACL is the integrated feature of IOS software that is used to filter the network
traffic passing through the IOS devices. Network traffic flows in the form of packets. A
packet contains small piece of data and all necessary information, which are required to
deliver it. By default when a router receives a packet in interface, it takes following actions.

This default behavior does not provide any security. Anyone who know the correct
destination address can send his packet through the router.

B.G.Chamil Shiwanka Networking 9898


Figure 18: Configuring ACL

B.G.Chamil Shiwanka Networking 9898


2.2.2 Implementing console password.

When assign the password to switches, cannot configure anybody who haven’t permission.
This is one of a way network system security.

Figure 19: Console password

[Left Space Intentionally]

B.G.Chamil Shiwanka Networking 9898


2.2.3 What is Quality of service (QoS)

The quality of service refer to the capability of a network to provide better service to selected
network traffic over various technologies. This is ensure quality performance for critical
applications. The primary goal of QoS is to provide priority including dedicated bandwidth,
controlled jitter and latency and improved loss characteristics. Internet service providers need
to apply techniques and technologies to provide the best service possible before their
competitors beat them to it.

Figure 20: QoS policies

[Left Space Intentionally]

B.G.Chamil Shiwanka Networking 9898


2.3 Design of networked system.

Figure 21: Design of networked system

B.G.Chamil Shiwanka Networking 9898


2.4 IP address allocation table.

Department IP Address Subnet mask Gateway IP address


range class
General office & 192.168.1.2 – 255.255.255.0 192.168.1.1 C
Manager office 192.168.1.4
Reception 192.168.1.5 – 255.255.255.0 192.168.1.1 C
192.168.1.7
Accounts 192.168.1.9 – 255.255.255.0 192.168.1.1 C
192.168.1.11
Administration 192.168.1.12 – 255.255.255.0 192.168.1.1 C
192.168.1.14
Media 192.168.2.2 – 255.255.255.0 192.168.2.1 C
development 192.168.2.10
Office 192.168.2.11 – 255.255.255.0 192.168.2.1 C
192.168.2.15
Project managers 192.168.2.16 – 255.255.255.0 192.168.2.1 C
room 192.168.2.17

2.5 Installing & configuring network services and applications.

I installed and configured windows server software, using VMware workstation.

Figure 22Windows installing

B.G.Chamil Shiwanka Networking 9898


Figure 23: server manager dashboard

Figure 24: Server Configuring

B.G.Chamil Shiwanka Networking 9898


Figure 25: sever configuration

[Left Space Intentionally]

B.G.Chamil Shiwanka Networking 9898


2.6 User feedback form.

Figure 26: feedback form

B.G.Chamil Shiwanka Networking 9898


2.7 Maintenance Schedule
System Maintenance Time Notice

General office and reception 8.00am – 5.00pm, Sunday, Will provide 12–24 hours,
systems. only as needed. notice when taking down
Our system.
Accounts and administrative 5.30am – 8.30am, Will provide 24 – 48 hours,
system Saturdays, only as needed. Notice when taking down
our system.
Network services and access 9.00am – 5.00pm, When a longer down time is
point. Saturdays. required, will provide 12-24
Hours, notice.
Workstations 4.00am – 8.30am, Monday, No additional notice.
Only as needed.
Pcs and printers. No weekly schedule No additional notice.
Required, only as needed.

[Left Space Intentionally]

B.G.Chamil Shiwanka Networking 9898


Activity 3

3.1 Implementing a networked system on my design.

3.1.1 Separate into VLANs.

I separated every department into the VLANs. This picture shows Switch1 VLAN status.

Figure 27: VLAN Status

B.G.Chamil Shiwanka Networking 9898


3.1.2 IP configuration.

Figure 28: IP configuration

[Left Space Intentionally]

B.G.Chamil Shiwanka Networking 9898


3.1.3 Trucking.

Figure 29: Trunking

[Left Space Intentionally]

B.G.Chamil Shiwanka Networking 9898


3.2 Conduct verification.

3.2.1 Ping.

The ping command is a very simple connectivity-testing tool. Ping verifies connectivity by
sending Internet Control Message Protocol (ICMP) echo packets to a host and listening for an
echo reply.

The ping command waits for each packet sent and prints the number of packets transmitted
and received. Each received packet is validated against the sent packet. The default setting
will send four echo packets containing 64 bytes of data. You can use the ping utility to test
both the host name and IP address of the host for DNS resolution. A successful IP ping
and failed host name ping could indicate name resolution issues.

3.2.2 Telnet.

Telnet comes from the combination of the words telephone and network. It was originally
designed to allow for command line remote management over slower connection types.

It is a TCP based protocol that can also be used to test a variety of services for connectivity.
You can use it to test for SMTP, SQL or Remote Desktop connectivity. This is a good test to
use for service or port blocks resulting from a firewall configuration.

3.2.3 Trace route.

Trace route is the Windows implementation of the trace route tool that originated on UNIX
and Cisco systems. Trace route is a Windows command-line tool that displays the path a
packet takes to reach a destination from the machine that it is executed on. It does this by
sending Internet Control Message Protocol (ICMP) echo request messages to the destination.
It does this by incrementally increasing the Time to Live (TTL) values to find the path taken
to the destination address. The path is displayed as a list in the order of which it heard back
from each node that it passed through on its way to the destination.

B.G.Chamil Shiwanka Networking 9898


3.2.4 SSH

Secure shell is a cryptographic system protocol for secure information correspondence,


remote summons line login, remote order execution, and other secure system benefits
between two organized machines. The encryption utilized by SSH is planned to give secrecy
and uprightness of information over an unsecured system, for example, the internet.

3.3 Record the test results and analyze these against expected results.

3.3.1 Testing the result with ping command.

This picture shows successfully pinged in reception pcs.

Figure 30: Ping command

B.G.Chamil Shiwanka Networking 9898


3.3.2 Testing the result with Telnet.

Figure 31: Telnet


3.3.3 Trace router result.

B.G.Chamil Shiwanka Networking 9898


Figure 32: Trace route

B.G.Chamil Shiwanka Networking 9898


3.3.4 IP Configure test result

Figure 33: IP configure

[Left Space Intentionally]

B.G.Chamil Shiwanka Networking 9898


3.4 Investigate what functionalities would allow the system to support
device growth and the addition of communication devices.

I suggesting some devises. It will helpful for future improvement of this network system.

3.4.1 Firewall.

A firewall is a network security device that monitors incoming and outgoing network traffic
and decides whether to allow or block specific traffic based on a defined set of security rules.

Firewalls have been a first line of defense in network security for over 25 years. They
establish a barrier between secured and controlled internal networks that can be trusted and
untrusted outside networks, such as the Internet.

3.4.2 Backup servers.

A backup server is generally implemented in an enterprise IT environment where computing


systems across an organization are connected by a network to one or more backup servers.

A backup server consists of standard hardware server with substantial storage capacity,
mostly with redundant storage drives and a purpose built backup server application. The
backup schedule for each computer may be installed with a client utility application or
configured within the host operating system (OS). At the scheduled time, the host connects
with the backup server to initiate the data backup process. The backup may be retrieved or
recovered in the event of data loss, data corruption or disaster recovery.

3.4.3 Cloud backup

Cloud backup is a type of service through which cloud computing resources and
infrastructure are used to create, edit, manage and restore data, services or application
backup. This is done remotely over the internet.

B.G.Chamil Shiwanka Networking 9898


Harvard Referencing.

 Study-ccnacom. 2018. Study-ccnacom. [Online]. [27 November 2018]. Available from:


https://study-ccna.com/what-is-a-vlan/
 Lifewirecom. 2018. Lifewire. [Online]. [27 November 2018]. Available from:
https://www.lifewire.com/future-trends-computer-networking-4108007
 Techopediacom. 2018. Techopediacom. [Online]. [27 November 2018]. Available from:
https://www.techopedia.com/definition/26186/wireless-network
 Ciscopresscom. 2018. Ciscopresscom. [Online]. [27 November 2018]. Available from:
http://www.ciscopress.com/articles/article.asp?p=471096
 Paesslercom. 2018. Paesslercom. [Online]. [27 November 2018]. Available from:
https://www.paessler.com/learn/whitepapers/security
 Techopediacom. 2018. Techopediacom. [Online]. [27 November 2018]. Available from:
https://www.techopedia.com/definition/12938/network-protocols
 Computernetworkingnotescom. 2018. ComputerNetworkingNotes. [Online]. [27 November 2018].
Available from: https://www.computernetworkingnotes.com/networking-tutorials/computer-
networking-devices-explained-with-function.html
 Kbiuedu. 2018. Kbiuedu. [Online]. [27 November 2018]. Available from: https://kb.iu.edu/d/aick
 Networklessonscom. 2017. NetworkLessonscom. [Online]. [27 November 2018]. Available from:
https://networklessons.com/cisco/ccna-routing-switching- icnd1-100-105/introduction-to-wans-
wide-area-network/
 Techopediacom. 2018. Techopediacom. [Online]. [27 November 2018]. Available from:
https://www.techopedia.com/definition/5538/network-topology
 Dinesh thakur. 2018. Ecomputernotescom. [Online]. [27 November 2018]. Available from:
http://ecomputernotes.com/computernetworkingnotes/communication- networks/describe-the-
different-transmission-media
 Dinesh thakur. 2018. Ecomputernotescom. [Online]. [27 November 2018]. Available from:
http://ecomputernotes.com/computernetworkingnotes/communication- networks/what-is-
transmission-media-and-types-of-transmission-media

B.G.Chamil Shiwanka Networking 9898


 Techtargetcom. 2018. SearchNetworking. [Online]. [27 November 2018]. Available from:
https://searchnetworking.techtarget.com/definition/bandwidth
 Inspiredtechscomau. 2017. Inspired Techs. [Online]. [27 November 2018]. Available from:
https://www.inspiredtechs.com.au/computer-networking/
 Amar shekhar. 2016. Fossbytes. [Online]. [27 November 2018]. Available from:
https://fossbytes.com/networking-devices-and-hardware-types/
 Techopediacom. 2018. Techopediacom. [Online]. [27 November 2018]. Available from:
https://www.techopedia.com/definition/2282/server
 Dinesh thakur. 2018. Ecomputernotescom. [Online]. [27 November 2018]. Available from:
http://ecomputernotes.com/computernetworkingnotes/computer-network/what- are-the-different-
types-of-servers
 Techopediacom. 2018. Techopediacom. [Online]. [27 November 2018]. Available from:
https://www.techopedia.com/definition/4317/network-software
 Computernetworkingnotescom. 2018. ComputerNetworkingNotes. [Online]. [27 November 2018].
Available from: https://www.computernetworkingnotes.com/ccna- study-guide/access-control-list-
explained-with-examples.html
 Maximumaspcom. 2018. Maximumaspcom. [Online]. [27 November
2018]. Available from: https://help.maximumasp.com/KB/a445/connectivity-testing- with-ping-telnet-tracert-
and-pathping-.aspx
 Techopediacom. 2019. Techopediacom. [Online]. [4 January 2019]. Available from:
https://www.techopedia.com/definition/4190/backup-server/cloud-backup
Ciscocom. 2019. Cisco. [Online]. [4 January 2019]. Available from:
https://www.cisco.com/c/en/us/products/security/firewalls/what-is-a-firewall.html

B.G.Chamil Shiwanka Networking 9898


References
https://www.webopedia.com. (n.d.).

[ CITATION htt1 \l 2057 ][ CITATION htt2 \l 2057 ]

[ CITATION htt3 \l 2057 ]

[ CITATION www \l 2057 ]

[ CITATION htt4 \l 2057 ]

[ CITATION www1 \l 2057 ][ CITATION htt5 \l 2057 ]

B.G.Chamil Shiwanka Networking 9898


B.G.Chamil Shiwanka Networking 9898

You might also like