0% found this document useful (0 votes)
39 views102 pages

Higher Nationals: Internal Verification of Assessment Decisions - BTEC (RQF)

Uploaded by

safwan ramzeen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views102 pages

Higher Nationals: Internal Verification of Assessment Decisions - BTEC (RQF)

Uploaded by

safwan ramzeen
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 102

Higher Nationals

Internal verification of assessment decisions – BTEC (RQF)


INTERNAL VERIFICATION – ASSESSMENT DECISIONS

Programme title HND in Computing

Assessor Internal Verifier


Unit 02: Networking
Unit(s)
LAN Design & Implementation for VIDCO
Assignment title

Student’s name
List which assessment criteria Pass Merit Distinction
the Assessor has awarded.

INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded match


those shown in the assignment brief?
Y/N
Is the Pass/Merit/Distinction grade awarded
justified by the assessor’s comments on the Y/N
student work?
Has the work been assessed
accurately? Y/N
Is the feedback to the student:
Give details:
• Constructive?
Y/N
• Linked to relevant assessment criteria?
Y/N
• Identifying opportunities for improved Y/N
performance?
• Agreeing actions? Y/N
Does the assessment decision need
amending? Y/N

Assessor signature Date

Internal Verifier signature Date

Programme Leader signature (if required) Date

Confirm action completed

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 1


Remedial action taken
Give details:

Assessor signature Date


Internal Verifier
signature Date
Programme Leader
signature (if required) Date

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 2


Higher Nationals - Summative Assignment Feedback Form
Student Name/ID

Unit Title Unit 02: Networking

Assignment Number 1 Assessor


Date Received 1st
Submission Date submission
Date Received 2nd
Re-submission Date submission

Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction
Descripts
LO2 Explain networking devices and operations.

Pass, Merit & Distinction


Descripts

LO3 Design efficient networked systems.


Pass, Merit & Distinction
Descripts

LO4 Implement and diagnose networked systems.


Pass, Merit & Distinction
Descripts

Grade: Assessor Signature: Date:


Resubmission Feedback:

Grade: Assessor Signature: Date:


Internal Verifier’s Comments:

Signature & Date:

* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades
decisions have been agreed at the assessment board.

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 3


Assignment Feedback
Formative Feedback: Assessor to Student

Action Plan

Summative feedback

Feedback: Student to Assessor

Assessor Date
signature

Student Date
signature

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 4


Pearson Higher Nationals in
Computing
Unit 02: Networking Assignment
01

General Guidelines

1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 5


3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.

Word Processing Rules

1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.

Important Points:

1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body
except for the before mentioned compulsory information will result in rejection of your work.
2. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
3. Ensure that you give yourself enough time to complete the assignment by the due date.
4. Excuses of any nature will not be accepted for failure to hand in the work on time.
5. You must take responsibility for managing your own time effectively.
6. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
7. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
8. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
9. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and
a reference list.
10. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course

Student Declaration

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 6


I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my
own without attributing the sources in the correct form. I further understand what it means to copy
another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of Edexcel UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my
own, and where I have made use of another’s work, I will attribute the source in the correct way.

5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Pearson, UK.

6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.

Student’s Signature: Date:


(Provide E-mail ID) (Provide Submission Date)

Higher National Diploma in Computing

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 7


Assignment Brief
Student Name /ID Number

Unit Number and Title Unit 2: Networking

Academic Year 2020/21


Unit Tutor

Assignment Title LAN Design & Implementation for VIDCO -19

Issue Date

Submission Date

IV Name & Date

Submission format

The submission should be in the form of an individual reportwritten in a concise, formal business
style using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using
Harvard referencing system. Please also provide an end list of references using the Harvard
referencing system. The recommended word count is 3,000–3,500 words for the report excluding
annexures, although you will not be penalised for exceeding the total word limit.

Unit Learning Outcomes:

LO1 Examine networking principles and their protocols.

LO2 Explain networking devices and operations.

LO3 Design efficient networked systems.

LO4 Implement and diagnose networked systems.

Assignment Brief and Guidance:

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 8


Case Study

VIDCO-19 is a privately owned, well-known Software company located in Colombo. The


Management of VIDCO-19 has purchased a 3 story building in the heart of Kandy. They are planning
to make it one of the state-of-the-art companies in Kandy with the latest facilities.

It is expected to have nearly 150 employees in Kandy branch.


Department Number of Users

Customer Care 10

Sales and Marketing 20

Finance 25

Legal 5

HR 10

Developers 55

Network Team 5

Server Room Servers +ISP connections

Following requirements are given by the Management;


• All the departments must be separated with unique subnet and should not communicate with
each other unless there is a special requirement.

• 192.168.10.0/24 is given and should be used for all the departments except the server room.
IPs should assign using DHCP.

• ERP and CRM Systems need to be implemented in Kandy branch in local servers.

• Number of servers required for the Server room need to be decided by the

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 9


Task 02
2.1 Discuss the operating principles of network devices that can be used for above scenario.
Ex: Router, Switch, Etc.
2.2 Explore and describe the devices which we can use to enhance security of VIDCO-19 Kandy
Network designer and should be assigned with 10.254.1.0/24 subnet. (Uses static IPs)
Branch.
2.3 • Critically
High level of redundancy
analyze is expected
the importance in network
of networking design and
software to eliminate single point
provide examples forofnetworking
failures
and traffic
software canbottle
be usednecks.
in above network design.
2.4 • Sales Discuss the importance
and Marketing of Servers
Team need in Network
to access computerresources
networksusing
and research on
WIFI connectivity.
Servers that are available in today’s market with their specifications and Recommend
• Proper methods for networking monitoring and troubleshooting need to be established.
server/servers and workstations for above scenario and justify your selection with valid points.
2.5 • Discuss
All possible
why itnetwork security
is important mechanisms
to have should
compatible be implemented.
devices and related software in network design.

Assume you have been appointed as the new network consultant of VIDCO-19 Solutions. Prepare a
Task 03
network architectural design and implement it with your suggestions and recommendations to meet
3.1 Provide VLAN and IP subnetting scheme for above scenario to satisfy user requirements.
the company requirements.
3.2 Provide a list of devices, network components and software need to design a network for above
scenario and justify your selection.
(Note: Clearly state your assumptions. You are allowed to design the network according to your
3.3 Provide a detailed network design (Diagram) for your design using modeling tool. (Ex: Microsoft
assumptions, but main requirements should not be violated)
Visio).
3.4 Design a User feedback form and get feedback from network users and analyze their feedback and
Task 01
suggestions.
1.1 Discuss the different network models/system types that can be implemented in Kandy branch
3.5 Install and configure Network services and Applications* of your choice to accomplish above
with their benefits and constraints.
user requirements. (Ex: DHCP, DNS, Active Directory, Proxy, Web, Etc.)
1.2 Discuss main IEEE Ethernet standards that can be used in above LAN and WLAN design?
(Note: Screen shots of minimum 2 services are required)
1.3 Critically analyze network protocol suites used in Network Industry and recommend suitable
3.6 Design a detailed Maintenance schedule for above Network design.
network protocol suites for above scenario and justify your selection.
1.4 Explain the difference between Logical topology and Physical topology using examples and
*Note: - Screen shots of Configuration scripts should be presented.
compare main network topologies used in network design.
1.5 Recommend a suitable network topology for above scenario and justify your answer with
valid points.

Task 04
4.1 Implement and configure all network devices* according to the requirements given in the
scenario.
Mohamed
4.2 Develop ramzeen
test cases andSafwan – HND
Test the in Computing
above Network to|Networking Assignment
verify *whether 01 objectives
the design 10 are met.
4.3 Discuss Why network monitoring is important in VIDCO-19 Kandy branch?
Explain with valid points.
Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 11
Table of Contents
Internal verification of assessment decisions – BTEC (RQF)............................................................................
Higher Nationals - Summative Assignment Feedback Form....................................................................................
Assignment Feedback.............................................................................................................................................
Assignment Brief.....................................................................................................................................................
Acknowledgement................................................................................................................................................16
Case summary.......................................................................................................................................................17
1.1 Network models and System types...........................................................................................................18
1.2 IEEE standards for LAN and WLAN Network.............................................................................................21
1.3 Network protocols and Protocol suites.....................................................................................................25
1.4 Network Topology.....................................................................................................................................31
1.5 The most suitable network topology for the above scenario....................................................................35
2.1 Operating Principles of Network devices..................................................................................................37
2.2 Security devices...............................................................................................................................................42
2.3 Importance of networking software................................................................................................................47
2.4 The importance of Servers in computer networks Servers.............................................................................49
2.5 Network design...............................................................................................................................................58
3.1 VLAN & IP Subnetting......................................................................................................................................59
3.2 network components and software................................................................................................................60
3.3 Network design (Diagram)..............................................................................................................................60
3.4 Feedbacks for the design test..........................................................................................................................61
3.5 Configuring Network services and Applications Installing Windows server....................................................64
3.6 Maintenance schedule for VIDCO-19’s Network system.................................................................................85
4.1 Network configuration....................................................................................................................................86
4.2 VIDCO-19 Test cases for the Network design..................................................................................................88
4.3 Why network monitoring is important in VIDCO-19 Kandy branch?...............................................................91
4.4 Network monitoring tools...............................................................................................................................92
4.5 Troubleshooting..............................................................................................................................................96
4.6 Future enhancement for the networked system............................................................................................98
4.7 Conclusion.......................................................................................................................................................99

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 12


Table of Figures
Figure 1 LAN..........................................................................................................................................................25
Figure 2 WLAN......................................................................................................................................................26
Figure 3 Network Protocols...................................................................................................................................28
Figure 4 2 Novell’s IPX/SPX....................................................................................................................................30
Figure 5 Apple Talk................................................................................................................................................30
Figure 6 Internet Protocol Suite Layers.................................................................................................................31
Figure 7 Network protocol suites used in Network Industry.................................................................................32
Figure 8 Bus Topology...........................................................................................................................................35
Figure 9 Ring Topology..........................................................................................................................................35
Figure 10 P2P Topology.........................................................................................................................................35
Figure 11 Star Topology........................................................................................................................................35
Figure 12 Tree Topology........................................................................................................................................36
Figure 13 Partial Mesh Topology...........................................................................................................................36
Figure 14 Partial Mesh Topology...........................................................................................................................36
Figure 15 Hybrid Topology....................................................................................................................................37
Figure 16 Hub........................................................................................................................................................39
Figure 17 Bridge....................................................................................................................................................40
Figure 18 Switch....................................................................................................................................................40
Figure 19 Router...................................................................................................................................................41
Figure 20 Gateway................................................................................................................................................42
Figure 21 Repeater................................................................................................................................................42
Figure 22 Access Point...........................................................................................................................................43
Figure 23 Fire Wall................................................................................................................................................43
Figure 24 Fire Wall................................................................................................................................................46
Figure 25 Server 1.................................................................................................................................................52
Figure 26 Server 2.................................................................................................................................................54
Figure 27 Server 3.................................................................................................................................................55
Figure 28 Workstation 1........................................................................................................................................57
Figure 29 Workstation 2........................................................................................................................................58
Figure 30 Network design (Diagram).....................................................................................................................61
Figure 31 Network services and Applications 1.....................................................................................................65
Figure 32 Network services and Applications 2.....................................................................................................65
Figure 33 Network services and Applications 3.....................................................................................................66
Figure 34 Network services and Applications 4.....................................................................................................66
Figure 35 Network services and Applications 5.....................................................................................................67
Figure 36 Configuration of Active Directory, DHCP and DNS 1..............................................................................67
Figure 37 Configuration of Active Directory, DHCP and DNS 2..............................................................................68
Figure 38 Configuration of Active Directory, DHCP and DNS 3..............................................................................68
Figure 39 Configuration of Active Directory, DHCP and DNS 4..............................................................................69
Figure 40 Configuration of Active Directory, DHCP and DNS 5..............................................................................69
Figure 41 Configuration of Active Directory, DHCP and DNS 6..............................................................................70
Figure 42 Configuration of Active Directory, DHCP and DNS 7..............................................................................70

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 13


Figure 43 Configuration of Active Directory, DHCP and DNS 8..............................................................................71
Figure 44 Configuration of Active Directory, DHCP and DNS 9..............................................................................71
Figure 45 Configuration of Active Directory, DHCP and DNS 10............................................................................72
Figure 46 Configuration of Active Directory, DHCP and DNS 11............................................................................72
Figure 47 Configuration of Active Directory, DHCP and DNS 12............................................................................73
Figure 48 Configuration of Active Directory, DHCP and DNS 13............................................................................73
Figure 49 Configuration of Active Directory, DHCP and DNS 14............................................................................74
Figure 50 Configuration of Active Directory, DHCP and DNS 15............................................................................74
Figure 51 Configuration of Active Directory, DHCP and DNS 16............................................................................75
Figure 52 Configuration of Active Directory, DHCP and DNS 17............................................................................75
Figure 53 Configuration of Active Directory, DHCP and DNS 18............................................................................76
Figure 54 Configuration of Active Directory, DHCP and DNS 19............................................................................76
Figure 55 Configuration of Active Directory, DHCP and DNS 20............................................................................77
Figure 56 Configuration of Active Directory, DHCP and DNS 21............................................................................77
Figure 57 Configuration of Active Directory, DHCP and DNS 22............................................................................78
Figure 58 Configuration of Active Directory, DHCP and DNS 23............................................................................78
Figure 59 Configuration of Active Directory, DHCP and DNS 24............................................................................79
Figure 60 Configuration of Active Directory, DHCP and DNS 25............................................................................79
Figure 61 Configuration of Active Directory, DHCP and DNS 26............................................................................80
Figure 62 Configuration of Active Directory, DHCP and DNS 27............................................................................80
Figure 63 Configuration of Active Directory, DHCP and DNS 28............................................................................81
Figure 64 Configuration of Active Directory, DHCP and DNS 29............................................................................81
Figure 65 Configuration of Active Directory, DHCP and DNS 30............................................................................82
Figure 66 Configuration of Active Directory, DHCP and DNS 30............................................................................82
Figure 67 Configuration of Active Directory, DHCP and DNS 31............................................................................83
Figure 68 Configuration of Active Directory, DHCP and DNS 32............................................................................83
Figure 69 Configuration of Active Directory, DHCP and DNS 33............................................................................84
Figure 70 Configuration of Active Directory, DHCP and DNS 34............................................................................84
Figure 71 Configuration of Active Directory, DHCP and DNS 35............................................................................85
Figure 72 Configuration of Active Directory, DHCP and DNS 36............................................................................85
Figure 73 VLAN configuration 1.............................................................................................................................87
Figure 74 VLAN configuration 2.............................................................................................................................87
Figure 75 VLAN configuration 3.............................................................................................................................88
Figure 76 VLAN configuration 4.............................................................................................................................88
Figure 77 Test case 1.............................................................................................................................................89
Figure 78 Test case 2.............................................................................................................................................90
Figure 79 Test case 3.............................................................................................................................................91
Figure 80 Network Monitoring 1...........................................................................................................................94
Figure 81 Network Monitoring 2...........................................................................................................................95
Figure 82 Network Monitoring 3...........................................................................................................................95
Figure 83 troubleshoot 1.......................................................................................................................................98
Figure 84 troubleshoot 2.......................................................................................................................................99

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 14


Table of Tables
Table 1 Main IEEE WLAN standards......................................................................................................................24
Table 2 Four Layer TCP/IP Model..........................................................................................................................31
Table 3 Five Layer TCP/IP Model...........................................................................................................................31
Table 4 difference between Physical and Logical Topology..................................................................................33
Table 5 The VLAN and IP subnetting scheme........................................................................................................60
Table 6 Feedback 1................................................................................................................................................62
Table 7 Feedback 2................................................................................................................................................63
Table 8 Feedback 3................................................................................................................................................64
Table 9 Maintenance schedule.............................................................................................................................86

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 15


Acknowledgement

First of all, I would like to thank my parents for they gave me this opportunity to do. And our
Esoft Metro Campus gave me this valuable course from Pearson UK. And my lecturer Mr.Geeth
for all the support that he has given us from the HND session.

Thank you,
Mohamed Ramzeen Safwan

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 16


Case summary

I have been appointed as the network consultant of VIDCO-19(a well-known private software
company) located in Colombo, so my task is to put together a network architectural design and
implement it with my proposals and recommendations to meet the company’s specifications, as
the management is planning to extend their branch to Kandy as it is a 3 story building and it is
expected to have around 150 employees.

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 17


Task 01
1.1 Network models and System types

Networking is the primary because we can write this weblog and send it across to tens of millions
of readers with such ease. The general photograph is explored in the concern of computer
networks. Pc networks deal with conversations between systems. At the identical time, it
additionally considers how records being sent from the supplier need to reach its destination most
correctly. It is comparable to a congested town with hundreds of site visitors.

The objective of Networking:


1. Hardware
2. Firmware
3. Software
4. Routing
5. Topology
6. Transmission Technology

Types of Networks:
1. Local Area Networks (LANs)
2. Wide Area Networks (WANs)
3. Wireless Local Area Network (WLANs)

What is Network models?


 A network model is a database version that is designed as a flexible method to represent objects
and their relationships. A unique feature of the community model is its schema that is viewed as
a graph wherein courting types are arcs and object sorts are nodes.

Types of Network model:


1. Open Systems Interconnection (OSI) Model
2. Transmission Control Protocol/Internet Protocol (TCP/IP) Model

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 18


Benefits of Network models:
 This model is quite simple and clean to design like the model of the hierarchical record.
 This model can manage multiple sorts of relationships which can assist in modelling actual-
existence programs, for example, 1:1, 1: M, M: N relationship.
 In this model, we can get admission to the records without problems, and also there may be a
danger that the utility can get the right of entry to the proprietor’s and the member’s information
inside a hard and fast.
 This community does not allow a member to exist without an owner, leading to information
integrity.
 Like a hierarchical version, this model also no longer has any genera.

 Benefits of Network models that are implemented in VIDCO-19 Kandy branch.

The network model can handle one-to-many and many-to-many relationships, which is extremely
useful in simulating real-world scenarios and can access more data straightforward and flexible
than in a hierarchical approach. So VIDCO-19 Kandy branch can make a good relationship
between departments and the departments can easily access and share data.

 Constraints of Network models that are implemented in VIDCO-19 Kandy branch.

This model's design or structure is not user-friendly and even while the network database model
can achieve data independence, this model fails to achieve structural independence. So VIDCO-19
Kandy branch can’t achieve data independently.

What is a system?
 A system is a set of factors or additives which can be prepared for a common cause. The word
from time to time describes the enterprise or plan itself and now and again describes the parts
within the machine.

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 19


Systems are classified in numerous ways that. Common classifications are:

1. Physical or abstract systems


2. Open or closed systems
3. Deterministic or probabilistic systems
4. Man-made information systems

Benefits of a System:

 Ease of accessibility. (Modern computer networks are easy to explore.)


 Flexibility. (Here, flexibility means that different people will be able to explore different things
as per their requirements.)
 Convenient resource sharing.
 Connectivity.
 Security.
 Great storage capacity.
 Reduced cost.

 Benefits of Systems that are implemented in VIDCO-19 Kandy branch.

Attackers will find it difficult to compromise all subsystems at once in isolated systems, especially
if each subsystem employs a distinct level of security. It may, however, be challenging for you to
successfully manage security for many systems and When you recognize the need for a more
coordinated organization-wide software system, you do not need to design a new expensive and
vast system from the ground up. Instead, you can employ a professional to integrate the existing
systems so that they all work together. This not only saves you money, but it also saves you
valuable time and effort that would otherwise be spent training personnel to use a new system. So
VIDCO-19 Kandy branch has mostly can cost efficiency and secure their data’s from attackers.

 Constraints of Systems that are implemented in VIDCO-19 Kandy branch.

A system should have 3 basic constraints − A system should have some structure and behavior
that is intended to attain a predefined objective. Interconnectivity and mutuality should exist
among the system parts.

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 20


1.2 IEEE standards for LAN and WLAN Network

What is IEEE standards?


 The Institute of Electrical and Electronic Engineers (IEEE) is a global professional association
dedicated to the creation, implementation, and maintenance of technology-based goods and
services. IEEE is a non-profit organization that was established in 1963. Its main purpose is to
advance the electrical and electronic development sector through innovation, education, and
standardization. It is best recognized for developing IEEE 802.11 wireless standards. "Eye-
Triple E" is how IEEE is pronounced.
 IEEE primarily develops new electronic goods and services, creates industry standards, and
disseminates, publishes, and promotes industrial information through journals, conferences, and
collaborations with academic institutions. Electrical, electronics, computer engineering,
computer science, information technology, and most of their associated fields are IEEE's
primary areas of interest.
 IEEE is well-known in the computing world for developing standards for computer networking
and related services. IEEE creates a variety of standards, including IEEE 802 and IEEE 802.11
(often known as Wi-Fi), and provides continuing innovation, revisions, and maintenance for
these standards. IEEE also boasts hundreds of student and professional chapters around the
world, as well as various focus societies and conferences and seminars. Despite the fact that the
organization is established in the United States, its standards are frequently accepted abroad.

Main IEEE LAN standards:

 10Base-T (IEEE 802.3) – 10 Mbps with category 3 unshielded twisted pair (UTP) wiring, up to
100 meters long.
 100Base-TX (IEEE 802.3u) – known as Fast Ethernet, uses category 5, 5E, or 6 UTP wiring,
up to 100 meters long.
 100Base-FX (IEEE 802.3u) – a version of Fast Ethernet that uses multi-mode optical fiber. Up
to 412 meters long.
 1000Base-CX (IEEE 802.3z) – uses copper twisted-pair cabling. Up to 25 meters long.
 1000Base-T (IEEE 802.3ab) – Gigabit Ethernet that uses Category 5 UTP wiring. Up to 100
meters long.
 1000Base-SX (IEEE 802.3z) – 1 Gigabit Ethernet running over multimode fiber-optic cable.
 1000Base-LX (IEEE 802.3z) – 1 Gigabit Ethernet running over single-mode fiber.
 10GBase-T (802.3.an) – 10 Gbps connections over category 5e, 6, and 7 UTP cables.

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 21


Main IEEE WLAN standards:

Maximum data
Protocol Frequency Channel Width MIMO rate
(theoretical)

20, 40, 80, Multi-User (MU-


802.11ax 2.4 or 5GHz 2.4 Gbps1
160MHz MIMO)

802.11ac 20, 40, 80, Multi-User (MU-


5 GHz 1.73 Gbps2
wave2 160MHz MIMO)

802.11ac Single User (SU-


5 GHz 20, 40, 80MHz 866.7 Mbps2
wave1 MIMO)

Single User (SU-


802.11n 2.4 or 5 GHz 20, 40MHz 450 Mbps3
MIMO)

802.11g 2.4 GHz 20 MHz N/A 54 Mbps

802.11a 5 GHz 20 MHz N/A 54 Mbps

802.11b 2.4 GHz 20 MHz N/A 11 Mbps

Legacy 802.11 2.4 GHz 20 MHz N/A 2 Mbps


Table 1 Main IEEE WLAN standards

What is a LAN?

 A Local Area Network (LAN) could be an assortment of devices connected along in one
physical location, like a building, office, or home. A LAN may be tiny or giant, starting from a
home network with one user to associate enterprise network with thousands of users associated
devices in a workplace or faculty.
What is in a LAN?

 A Local Area Network includes cables, access points, switches, routers, and different elements
that alter devices to attach to internal servers, net servers, and different LANs via wide space
networks. The rise of virtualization has additionally oxyacetylene the event of virtual LANs,
that alter network directors to logically cluster network nodes and partition their networks while
not having a desire for major infrastructure changes.

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 22


Figure 1 LAN

What are the benefits of a LAN?

 The advantages of a local area network (LAN) are equivalent to those for any cluster of devices
networked along. The devices will use one net association, share files, print to shared printers,
and be accessed and even controlled by each other.
Types of LANs:
1. Client / Server LANs.
2. Peer-to-Peer LANs.

Some examples of LAN are:-

 Networking in home, office.


 Networking in school, laboratory and university campuses.
 Networking between two computers.

What is a WLAN?
 A Wireless Local-Area Network (WLAN) may be a cluster of collocated computers or
alternative devices that type a network supported radio transmissions instead of wired
connections. A Wi-Fi network may be a style of Wi-Fi; anyone connected to Wi-Fi whereas
reading this webpage is employing a WLAN.

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 23


How does a WLAN work?

 Like broadcast media, a WLAN fidelity transmits data over radio waves. Information is
distributed in packets. The packets contain layers with labels and directions that, in conjunction
with the distinctive MAC (Media Access Control) addresses appointed to endpoints, alter
routing to intended locations.

Figure 2 WLAN

What are the benefits of a WLAN?

 Extended reach: - WLANs change computing to happen anyplace, even once carrying high data
and advanced internet applications.
 Device flexibility: - A WLAN supports the use of a large range of devices, like computers,
phones, tablets, recreation systems, and IoT devices.
 Easier installation and management: - A WLAN needs less physical instrumentation than a
wired network, which saves cash, reduces installation time, and takes up less of a footprint in
workplace settings.
 Scalability: - A WLAN is straightforward to scale. Adding users is as simple as distribution
login credentials.

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 24


 Network Management: - Nearly all management of a WLAN is handled nearly. One computer
code interface will offer visibility, manage users, monitor network health, and collect
knowledge.

Types of WLANs:
1. Infrastructure based wireless network.
2. Adhoc wireless network.

Some examples of WLAN are:-

 Connecting devices through Wi-Fi in home, office, campus, laboratory, school, and college.
 Sharing Wi-Fi hotspots from smartphones to other devices like laptops, workstations, etc.

Some examples of WLAN Devices are:-

 Mobile phones
 Laptop and tablet computers
 Internet audio systems
 Gaming consoles
 Other internet-enabled home appliances and devices

1.3 Network protocols and Protocol suites

What is a network protocol and how does it work?

 A network protocol is a set of rules that govern how data is exchanged between devices
connected to the same network. In essence, it enables connected devices to interact with one
another independent of internal process variances. Design or structure the fact that you can
readily communicate with others is due to network protocols. People all over the world, and
play a key part in today's digital communications. Neither local area networks (LANs) nor wide

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 25


area networks (WANs) are capable of performing the same tasks. Without the usage of network
protocols, in the same manner, they do now.

Figure 3 Network Protocols

List of Network Protocols:

1. Communication
2. Network Management
3. Security

Here are a few examples of the most commonly used network protocols:

 Hypertext Transfer Protocol (HTTP): This Internet Protocol defines how data is transmitted
over the internet and determines how web servers and browsers should respond to commands.
This protocol (or its secure counterpart, HTTPS) appears at the beginning of various URLs or
web addresses online.
 Secure Socket Shell (SSH): This protocol provides secure access to a computer, even if it’s on
an unsecured network. SSH is particularly useful for network administrators who need to
manage different systems remotely.
 Short Message Service (SMS): This communications protocol was created to send and receive
text messages over cellular networks. SMS refers exclusively to text-based messages. Pictures,

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 26


videos or other media require Multimedia Messaging Service (MMS), an extension of the SMS
protocol.

What is network protocol suites?

 The Internet protocol suite unremarkably referred to as TCP/IP, is the set of communications
protocols utilized in the net and similar computer networks. The present foundational protocols
within the suite area unit are the Transmission Control Protocol (TCP) and also Internet
Protocol (IP).
 The Internet protocol suite provides end-to-end digital communication specifying however
knowledge ought to be packetized, addressed, transmitted, routed, and received. This
practicality is organized into four abstraction layers that classify all connected protocols in
keeping with every protocol's scope of networking. From lowest to highest, the layers area unit
the link layer, containing communication ways for knowledge that is still among one network
section (link); the web layer, providing internetworking between freelance networks; the
transport layer, handling host-to-host communication; and also the application layer, providing
process-to-process knowledge exchange for applications.

Main 3 protocol suites:

1. TCP/IP:- In a private computer network, TCP/IP is also used as a communications protocol (an
intranet or extranet).TCP/IP refers to the full IP suite, which includes a set of rules and
procedures. TCP and IP are the two most common protocols, although the suite also includes
others. Between internet applications and the routing and switching fabric, the TCP/IP protocol
suite serves as an abstraction layer.
2. Novell’s IPX/SPX: - Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) is
an acronym for Internetwork Packet Exchange/Sequenced Packet Exchange. IPX and SPX are
networking protocols that were first used on networks running the (now defunct) Novell
NetWare operating systems. They later became popular on networks running Microsoft

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 27


Windows LANs when they supplanted NetWare LANs, although they are no longer frequently
used. Prior to and up until the Windows XP era, IPX/SPX was widely used, but later Windows
versions did not support the protocols, and TCP/IP took over for networking.

Figure 4 2 Novell’s IPX/SPX


3. Apple Talk: - AppleTalk is a collection of proprietary networking protocols created by Apple
specifically for its computers. AppleTalk was incorporated in the first Macintosh computer,
which was introduced in 1984. With the introduction of Mac OS X v10.6, it became
unsupported and was replaced by TCP/IP networking, which allows Apple machines to
communicate with other computers using the same standard.

Figure 5 Apple Talk

Internet Protocol Suite Layers:

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 28


 The TCP/IP model is classified into two types they are four-layer TCP/IP model and five
TCP/IP models. The layer numbers start from the bottom and go up. The classification of the
TCP/IP model is shown in the below figure,

Figure 6 Internet Protocol Suite Layers

1. Four Layer TCP/IP Model: The four-layer TCP/IP model consists of 4 layers square measure
Application layer, Transport layer, web layer, and link layer. The layer range, layer name, and
protocol name square measure are shown within the below table.
Layer Layer Name Protocol Name
Number
4. Application Layer HTTP, Telnet, DNS, SNMP, DHCP
3. Transport Layer TCP, UDP
2. Internet Layer IP, ICMP, IGMP
1. Link Layer Ethernet, Wireless LAN, PPP, ARP
Table 2 Four Layer TCP/IP Model

2. Five Layer TCP/IP model: The solution of this link layer is to divide the link layer into 2
completely different layers. The information link layer and therefore the physical layer are 2 layers
and this can be however the five-layer TCP/IP model is formed. Currently, a day’s within the
business level all the individuals are victimization the five-layer TCP/IP model.
Layer Layer Name Protocol Name
Number
5. Application Layer HTTP, Telnet, DNS, SNMP, DHCP
4. Transport Layer TCP, UDP

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 29


3. Network Layer IP, ICMP, IGMP
2. Datalink Layer LAN, PPP, ARP
1. Physical Layer Ethernet, Wireless
Table 3 Five Layer TCP/IP Model

Advantages of Protocol Suite:


 Scalable
 Interoperable
 Easy to understand
 Stability
 Reliability
 Availability of public IP’s are limited

Network protocol suites used in Network Industry:

Figure 7 Network protocol suites used in Network Industry

Recommend suitable network protocol suites for the above scenario is TCP/IP Because,
 It is an industry-standard model that can be successfully installed in practical
networking problems as it is designed for Wide Area Networks (WAN). It allows
cross-platform communications among various networks. For it is scalable, this
allows networks to be linked without disrupting the existing services. It assigns an
IP address to each computer on the network, therefore making each device to be
recognizable over the network. And it is compatible with every operating system, so
it can communicate with any other system. TCP/IP can be used to provide remote
login over the network, for interactive file transfer, to convey email, to distribute
webpages over the network and to remotely access a server host's file system.
 Independence from specific physical network hardware. This enables TCP/IP to add

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 30


many different kinds of networks. TCP/IP can be run over an Ethernet, a DSL
connection, a dial-up line, an optical network, and virtually any other kind of
physical transmission medium, so this would be much easier for the company to
handle the network with any complications.
1.4 Network Topology

What are the Network Topologies?


 The configuration, or topology, of a network, is vital to decisive its performance. Constellation
is the method a network is organized, together with the physical or logical description of
however links and nodes square measure started to relate to every alternative.

Types of network topologies:


1. Star Topology
2. Bus Topology
3. Ring Topology
4. Tree Topology
5. Mesh Topology
6. Hybrid Topology
7. P2P Topology

Two main categories of network topology,


1) Logical Topology
2) Physical Topology

Given below is the difference between Physical and Logical Topology:


Physical Topology Logical Topology
Depicts the physical layout of the Depicts logistics of the network
network. concerned with the transmission of data.

The layout can be modified based on There is no interference and


needs. manipulation involved here.
It can be arranged in star, ring, mesh and It exists in bus and ring topologies.
bus topologies.
Has Major impact on cost, scalability Has a major impact on the speed and
and bandwidth capacity of network delivery of data packets. It also handles
based on selection and availability of flow control and ordered delivery of
devices. data packets.

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 31


It is an actual route concerned with the It is a high-level representation of data
transmission. flow.
The physical connection of the network. Data path followed of the network.
Table 4 difference between Physical and Logical Topology

What is Logical topology?


 A topology could be a construct in networking that defines the design of the communication
mechanism for all nodes in a very network. Victimization network instrumentation like routers
and switches, the topology of a network are often dynamically maintained and reconfigured.
Two of the most common logical topologies are:

1. Logical Bus topology


The logical bus topology is used by Ethernet to transfer data in a linear fashion. A node in a bus
topology transmits data throughout the whole network. The data is received by all other nodes
on the network, which checks to see if it is intended for them.
2. Logical Ring topology
In this type of topology, the data moves in a circular manner in this architecture, and only one
node can transport data in a network at a time. This approach is performed by tokens (only
nodes with tokens can send data in a network), and so network crashes can be prevented.
Example for Logical Topology:
 Ethernet networks
 Scanners and printers that are connected to the network
 Data movement in a client-server network
 Logical topology is used in Wide area networks also
 Also used in the metropolitan area network

What is Physical Topology?


 Physical topology is the placement of the varied parts of a network and therefore the different
connectors typically represent the physical network cables, and therefore the nodes represent
typically the physical network devices (like switches).

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 32


The most common physical topologies are:
1. Bus Topology: Ethernet uses the logical bus topology to transfer information. Below a bus
topology, a node broadcasts the information to the complete network. All different nodes on the
network hear the information and check if the information is meant for them.

Figure 8 Bus Topology

2. Ring topology: In this topology, only 1 node is allowed to transfer the information in a very
network at a given time. This mechanism is achieved by token (the node having token solely
will transmit the information in a very network) and thence the collision is avoided in a very
network.

Figure 9 Ring Topology

3. P2P Topology: Point-to-point topology is the easiest of all the network topologies. In this
method, the network consists of a direct link between two computers.

Figure 10 P2P Topology

4. Star Topology: all the computers connect with the assistance of a hub. This cable is termed a
central node, and every one alternative node square measure connected exploitation this central
node. It’s the hottest on local area network networks as they're cheap and straightforward to put
in.

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 33


Figure 11 Star Topology

5. Tree Topology: Tree topologies have a root node, and every alternative nodes area unit
connected that type a hierarchy. Therefore it's conjointly called hierarchic topology. This
topology integrates varied star topologies along in a very single bus, therefore it's called a Star
topology. Tree topology may be a quite common network that is analogous to a bus and network
topology.

Figure 12 Tree Topology

6. Mesh Topology: The mesh topology features a distinctive network style within which every
laptop on the network connects to each alternative. It’s developing a P2P (point-to-point)
affiliation between all the devices of the network. It offers a high level of redundancy, therefore
albeit one network cable fails, still data has an alternate path to succeed in its destination.

Types of Mesh Topology:

 Partial Mesh Topology: In this type of topology, most of the devices are connected almost
similar to the full topology. The only difference is that few devices are connected with just two
or three devices.

Figure 13 Partial Mesh Topology

 Full Mesh Topology: In this topology, every node or device is directly connected.

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 34


Figure 14 Partial Mesh Topology

7. Hybrid Topology: Hybrid topology combines 2 or a lot of topologies. You’ll see within the on
below of the design in such a way that the ensuing network doesn't exhibit one among the
quality topologies. For example, as you'll see below image that in Associate in the nursing
workplace in one department, Star and P2P topology is employed. A hybrid topology is often
created once 2 different basic network topologies area units are connected.

Figure 15 Hybrid Topology

1.5 The most suitable network topology for the above scenario

Hybrid topology

Because it is the most versatile topology out of the others and the most effective due to its
characteristics mentioned above.
Advantages:
 Reliable:
It has far better fault tolerance. The section where the fault is found could probably
be singled out from the rest of the network and necessary restorative steps could be
taken, without impacting the functioning of the rest of the network.
 Flexible:
One of the key advantages of this topology is its flexibility. The topology is formed
so that it can be implemented for a variety of separate network environments
Hybrid networks can be created in line with the demands of the corporation and by
maximizing the existing resources.
 Effective:
The most important advantage of this topology is that the weakness of the different

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 35


topologies connected are disregarded and only the strengths are taken into concern.
For instance, ring topology has good data reliability and star topology has high
tolerance capability, so these two function quite well in hybrid star-ring topology.
 Scalable:
Hybrid networks are built in a manner that enables for easy combination of new
hardware components like additional concentration points. It’s quite simple to
extend the size of the network with the addition of new elements, without
interrupting the existing architecture.
Disadvantages:
 Expensive:
The network hubs required for hybrid topology networking are expensive to
purchase and maintain. The cost of this topology is higher in comparison to the
other topologies. The hubs used to connect two distinct networks are expensive.
These hubs are not the same as usual hubs since they have to be smart enough to
work with different types of architectures and should be able to function even when
a portion of the network is down. As hybrid architectures are usually larger in scale,
they may require a lot of cables, advanced network devices, etc.
 Complexity:
Due to the fact that different topologies connect in a hybrid topology, handling the
topology gets complicated. It is not easy to design this type of architecture and it’s a
difficult job for designers. Configuration and installation procedure needs to be very
well-organized.

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 36


Task 02
2.1 Operating Principles of Network devices

Network devices are hardware devices that connect computers, printers, fax machines, and other
electronic devices to a network. These devices send data over the same or separate networks in a quick,
secure, and accurate manner. Inter-network and intra-network network devices are both possible. Some
devices are installed on the device, such as a network interface card or an RJ45 connector, while others
are part of the network, such as a router or switch.
Network devices that can be used for the above scenario:
 Hub
A hub is nothing more than a multiport repeater. A hub joins many wires coming from
different branches, such as the star topology connector that connects separate stations. Data
packets are sent to all connected devices since hubs cannot filter data. In other words, all hosts
connected by Hub have the same collision domain. They also lack the intelligence to
determine the optimum routing for data packets, resulting in inefficiencies and waste.

Types of Hub:
1. Active Hub
2. Passive Hub
3. Intelligent Hub

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 37


Figure 16 Hub

 Bridge
At the data link layer, a bridge is used. A bridge is a repeater with the added capability of
filtering material by reading the source and destination MAC addresses. It can also be used to
join two LANs that utilize the same protocol. It is a two-port device because it has only one
input and output port.

Types of bridge:
1. Transparent Bridge
2. Source Routing Bridge

Figure 17 Bridge

 Switch
A switch is a multiport bridge with a buffer and a design that can improve its efficiency and
performance (having a large number of ports means less traffic). A data link layer device is a
switch. The switch can check for problems before forwarding data, which makes it incredibly

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 38


efficient because it doesn't transfer packets with mistakes and only forwards good packets to
the correct port. To put it another way, the switch separates the collision domain of hosts while
keeping the broadcast domain the same.

Figure 18 Switch

 Router
A router, similar to a switch, is a device that directs data packets according to their IP
addresses. The router is primarily a device that operates at the Network Layer. Routers
connect LANs and WANs and use a dynamically updating routing table to decide how to route
data packets. The broadcast domains of hosts linked through it are divided by the router.

Types of Router:
1. Wired router
2. Wireless Router

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 39


Figure 19 Router

 Gateway
As the name implies, a gateway is a path that connects two networks that may use different
networking models. They essentially serve as messengers, taking data from one system,
interpreting it, and transferring it to another. Gateways, also known as protocol converters, can
function at any layer of the network. Switches and routers are less complicated than gateways.

Figure 20 Gateway

 Repeater
A repeater is a device that works at the physical layer. Its job is to regenerate the signal across
the same network before it becomes too weak or garbled, allowing the signal to be transmitted
for long distances on the same network. The fact that repeaters do not enhance the signal is

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 40


vital to remember. They replicate the signal bit by bit and renew it at the original strength
when it becomes faint. It's a device with two ports.

Figure 21 Repeater

 Access Point
In a typical office or large building, an access point is a device that generates a wireless local
area network, or WLAN. An access point uses an Ethernet cable to connect to a wired router,
switch, or hub and broadcasts a Wi-Fi signal to a specific region. Install an access point at the
front desk and connect an Ethernet cable through the ceiling back to the server room if you
want to allow Wi-Fi access in your company's reception area but don't have a router within
range.

Figure 22 Access Point

 Firewall

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 41


A firewall is a network security device that monitors and filters incoming and outgoing
network traffic according to security regulations set by an organization. A firewall, at its most
basic level, is the barrier that separates a private internal network from the public Internet. The
primary goal of a firewall is to allow non-threatening traffic in while keeping harmful traffic
out.

Figure 23 Fire Wall

2.2 Security devices

What is Network Security?


 Your network and data are protected by network security against breaches, intrusions, and other
dangers. This is a broad word that encompasses hardware and software, as well as processes,
regulations, and configurations relating to network use, accessibility, and overall threat
protection.

Benefits of Network Security:


 Protecting client data and information, keeping shared data secure, guaranteeing reliable access
and network performance, and protecting against cyber-attacks all require network security. A

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 42


well-designed network security solution lowers operating costs and protects businesses from
severe losses caused by data breaches or other security incidents. Having legitimate access to
systems, apps, and data allows businesses to run smoothly and provide services and goods to
customers.

Threats on the cyber landscape:


 Adware
 Data interception and theft
 Denial of service and distributed denial of service attacks
 Hackers
 Ransomware
 Spam
 Spyware
 Trojan horses
 Viruses
 Zero-day (or “zero-hour”) attacks

What is Network Security Devices?


 Your data and network are protected by network security from intrusions, data breaches, and
other cyber threats. It's a broad term that encompasses software and hardware solutions, as well
as network accessibility, use, and overall threat protection rules, processes, and configurations.
Network security protects against unauthorized access by creating a secure environment in
which devices, users, and applications may work safely.

Benefits of Network Security devices:


 Build Trust- When it comes to huge systems, security means security for everyone. Client and
customer confidence is boosted, and your company is protected from the reputational and legal
consequences of a security breach.
 Mitigates Risk- The correct network security solution will keep your company compliant with
industry and government standards, as well as reduce the commercial and financial
consequences of a data breach if one occurs.
 Protects proprietary information- Your clients and consumers trust you to keep their personal
information safe. That same security is essential for your company. Information and data shared
across a network are protected by network security.

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 43


 Enables a more modern workplace- Network security gives alternatives to enable the future
of work, from allowing employees to work securely from any location with VPN to fostering
cooperation with secure network access. Effective network security also provides multiple
levels of security that may be scaled to meet the needs of your developing company.

What are the types of Network Security Devices?


 Access control
 Anti-malware software
 Anomaly detection
 Application security
 Data loss prevention (DLP)
 Email security
 Endpoint security
 Firewall
 Intrusion prevention systems
 Network segmentation
 Security information and event management (SIEM)
 Virtual private network (VPN)
 Web security
 Wireless security

Security devices that we can use to enhance the security of VIDCO-19 Kandy Branch.
 Firewalls.
 Antivirus.
 Content Filtering Devices.
 Intrusion Detection Systems (IDS)
 Intrusion Prevention System (IPS)

Firewalls:
 A firewall is a network security device that monitors incoming and outgoing network traffic and
allows or disallows data packets according to a set of security rules. Its goal is to create a barrier
between your internal network and incoming traffic from other sources (such as the internet) so
that malicious traffic like viruses and hackers can't get in.
There are 2 types of Firewalls:

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 44


1. Hardware Firewalls: - A hardware firewall is a self-contained unit. They communicate with
network devices using ports, which each firewall has at least four. Larger businesses might use
higher-end firewall devices with more ports and more complex security features.
2. Software Firewalls: - Firewall software is a set of apps that you install on your computer to
protect your data. They provide customizable settings that assist you in configuring your
firewall for the best security. The software keeps track of every network packet you send and
receive over the internet.

Figure 24 Fire Wall

Antivirus:
 An antivirus program is a piece of software that can detect and eradicate malware and other
potentially harmful programs.
Initially, antivirus software could only tackle viruses. But now, they provide security against
worms, Trojans, ransomware and spyware, etc. Some antivirus software can help guard against
phishing attempts made over email. Your network security devices/tools should, in theory, be
able to detect security risks coming from any source, including harmful programs and viruses
sent via email.

Content Filtering Devices:


 Online content that is possibly harmful or objectionable is filtered out using content filtering
devices. Incoming emails, frequent spam, and even web pages are all examples of this. As the
name implies, these gadgets scan web information and verify its safety by running it through
their blacklist of phrases. Some CFDs can also save and warn you about well-known spam sites
and email addresses before you interact with them.

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 45


When someone tries to view unverified, potentially harmful content on these devices, they get
an "Access Denied" error.
This network security device's default setting filters pornographic or hostile content. Aside from
that, your company can ban product-selling spam and unsolicited newsletters.

Intrusion Detection Systems (IDS):


 IDS, also known as Intrusion Detection and Prevention Systems, are devices that monitor
hostile activity on a network, log in, and, if it’s part of their feature set, take action to stop it. An
IDS will, at the very least, provide you with useful reports on your network's behaviour. You
can use these reports to improve the security of your network.
If malicious network packets attempt to destroy your network, the IDPs can raise an alarm,
forcefully drop the packets, and reset the network channel connection to prevent your network
from blocking all future, lawful network traffic.

Intrusion Prevention System (IPS):

 An intrusion prevention system (IPS) is a network security mechanism that aims to detect and
block known attacks. Intrusion prevention systems constantly monitor the network, looking for
and recording any dangerous occurrences. The IPS notifies system administrators of these
events and takes preventative measures, such as limiting access points and installing firewalls,
to prevent future assaults. IPS systems can also be used to discover problems with corporate
security policies and prevent network visitors from breaking the rules.

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 46


2.3 Importance of networking software

What is networking software?

 Any network's basis is built on networking software. It aids network administrators in


deploying, managing, and monitoring a network. Traditional networks are comprised of
specialized hardware, such as routers and switches, which include networking software.

Types of networking software:


 Software-defined networking- (SDN) isolates the software from the hardware, making it
easier to innovate and adapt the network to meet changing network demands.
 Network functions virtualization- (NFV) separates functions from hardware, such as
firewalls and load balancing.

Basic Functionality:

 User management - enables administrators to add or remove users from the network.
 File management - allows administrators to define the location of data storage and user access
to that data.

Network software allows multiple devices, such as desktops. Laptops, Mobile phones, tablets, and
other systems to connect, as well as other networks.

The impotence of networking software:


 When opposed to desktop software, network software offers centralized management and fewer
end-user technical support issues. If a desktop software application keeps all of its data on a
network share, for example, the risk of data loss when a user accidentally destroys his computer
is reduced.

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 47


List of Network Software:

 SolarWinds Network Performance Monitor


 Cisco internetwork Operating System (IOS)
 Datadog Network Performance Monitoring
 Auvik
 OpManager
 Site24x7 Network Monitoring
 Checkmk
 Progress WhatsUp Gold
 HelpSystems Intermapper
 Paessler PRTG Network Monitor
 Nagios Core

Networking software can be used in the network design is,

Cisco internetwork Operating System (IOS)


Cisco's IOS (Internetwork Operating System) is a proprietary operating system with routing,
switching, and internetworking capabilities. It supervises and controls the hardware it operates on.
Technically, it is a user-to-hardware interface that allows the user to provide commands to setup
and administer the Cisco equipment. The IOS was originally designed for Cisco routers, but Cisco
decided to deploy it on other platforms, notably Catalyst switches, a few years later. Most Cisco
routers and a rising number of Cisco Catalyst switches, such as the Catalyst 2960 and 3560 series
switches, currently run the IOS.
Functions of the IOS are,

 To transfer network protocols and functions


 To connect between different data link layer technologies
 To connect high-speed traffic between device
 To secure network resources
 To control unauthorized access
 To provide scalability for ease of network growth
 To keep the network stable and reliable

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 48


2.4 The importance of Servers in computer networks Servers

What is a Server?
 A server is a program or equipment that delivers a service to another program and its user, also

known as the client. The physical machine that a server program runs on is usually referred to as
a server in a data center. That computer could be a dedicated server or it could be utilized for
something else entirely.

Benefits of servers:
 You can use a server to provide high-speed internet connectivity to multiple computers on a

network.
 You get additional processing power with a server. It ‘supercharges' your network by storing
massive amounts of data, freeing up memory, and improving the performance of individual PCs.
 A server allows you to rapidly and easily set up new machines, add users, and deploy new apps.
 Older PCs can be given new life by offloading their files and data to a server, which allows
them to work more rapidly and effectively.

Importance of servers in computer networks:


o Security: - One of the most important reasons is security. Even though cloud servers typically

include a variety of security safeguards, data must still be transferred via the internet. Local
security can also be a problem. If you have sensitive data that will only be utilized internally,
however, it makes more sense to keep it locally on your server.
o Expandable space: - Physical business servers also enable you to swiftly extend your storage
capacity if necessary, as well as send data to redundant storage. This is especially critical if your
company handles enormous files. Although 100TB of storage is nothing to sneeze at for on-
premises servers, it can add up quickly when using a cloud solution.
o Price: - Cloud networks such as AWS and Azure, on the other hand, charge by the hour. If you
buy a server, you own it, just like any other physical or digital item, and you can use its
computing power as much as you like.

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 49


Types of Server:
 Webserver
 Application server
 Proxy server
 Mail server
 Virtual server
 Blade server
 File server
 Policy server
 Database server
 Print server
 Gaming server

Usage of a Server:
 Secure email hosting
 File Sharing
 Cloud Storage
 Supporting multiple virtual servers
 Backing-up business data
 Storing and collaborating on documents
 Providing virtual desktops to employees

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 50


Servers and their specifications that are available in today’s market:

PowerEdge T140 Tower Server

Figure 25 Server 1

Specifications

Processer
 Intel® Celeron G4930 3.2GHz, 2M cache, 2C/2T, no turbo (54W)
Operating System
 Canonical® Ubuntu® Server LTS
 Citrix® Hypervisor ®
 Microsoft® Windows Server® with Hyper-V
 Red Hat® Enterprise Linux
 SUSE® Linux Enterprise Server
 VMware® ESXi®

Memory
 DIMM Speed up to 2666MT/s
 Memory Type UDIMM
 Memory Module Slots 4
 Maximum RAM UDIMM 64G

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 51


Storage Controllers
Internal Controllers
 PERC H330, H730p, HBA330

External Controllers (non-RAID)


 12 Gbps SAS HBA
 Software RAID
 S140
 Internal BOOT
 Boot Optimized Storage Subsystem (BOSS):
 2 x M.2 240GB (RAID 1 or No RAID)
 1 x M.2 240GB (No RAID only)

Security
 Cryptographically signed firmware
 Silicon Root of Trust
 Secure Boot
 Secure Erase
 System Lockdown (requires OpenManage Enterprise)
 TPM 1.2/2.0, TCM 2.0 optional
Ports
 Front panel: 1x USB 3.0, 1x iDRAC micro USB 2.0 management port
 Back panel: 2x USB 3.0, 4x USB 2.0, VGA, serial connector
 Internal USB: 1x internal USB 3.0
Storage
 Up to 4 x 3.5" SAS/SATA (HDD), max 16TB

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 52


Dell PowerEdge R610

Figure 26 Server 2

Specifications
Processor
 Intel® Xeon® processor 5500 and 5600 series
 Six-core Intel® Xeon®
 Dual-core Intel® Pentium®
 Quad-core Intel® Xeon®
Operating System
 Microsoft® Windows Server® 2012
 Microsoft Windows® Small Business Server 2011
 Microsoft Windows Small Business Server 2008
 Microsoft Windows Server 2008 SP2, x86/x64 (x64 includes Hyper-V®)
 Microsoft Windows Server 2008 R2 SP1, x64 (includes Hyper-V v2)
 Microsoft Windows HPC Server 2008 R2
 Novell® SUSE® Linux Enterprise Server
 Red Hat® Enterprise Linux®
Memory
 Up to 192GB
 Up to 1333MT/s DDR3
 12 DIMM slots: 1GB/2GB/4GB/8GB/16GB
Storage Controllers
Internal Controllers
 PERC H200 (6Gb/s)
 PERC H700 (6Gb/s) (nonvolatile battery-backed cache: 512MB, 1GB)
 SAS 6/iRPERC 6/i (battery-backed cache: 256MB)

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 53


External Controllers
 PERC H800 (6Gb/s) (non-volatile battery-backed cache: 512MB, 1G)
 PERC 6/E (battery-backed cache:256MB, 512MB)
 External HBAs (non-RAID): 6Gb/s SAS HBA SAS 5/E HBA
 LSI2032 PCIe SCSI HBA
Storage
 Hot-plug Hard Drive Options:
 2.5” SAS SSD, SATA SSD, SAS (10K, 15K), near line SAS (7.2K), SATA (7.2K)
 Max Up to 12TB

HPE ProLiant DL380 Gen10

Figure 27 Server 3

Specifications
Processor
 Intel® Xeon® Scalable 8100 series
 Intel® Xeon® Scalable 6100 series
 Intel® Xeon® Scalable 5100 series
 Intel® Xeon® Scalable 4100 series
 Intel® Xeon® Scalable 3100 series
Operating System
 Canonical Ubuntu
 Citrix XenServer
 Microsoft Windows Server
 Oracle Solaris
 Red Hat Enterprise Linux
 SuSE Linux Enterprise Server

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 54


Memory
 12 DDR4
 Up to 2666 MT/s

Storage Controllers
Software RAID
 HPE Smart Array S100i SR Gen10 SW RAID

Essential RAID Controller


 HPE Smart Array E208i-a SR Gen10 Controller
 HPE Smart Array E208i-p SR Gen10 Controller
 HPE Smart Array E208e-p SR Gen10 Controller Performance RAID Controller
 HPE Smart Array P408i-a SR Gen10 Controller

 HPE Smart Array P408i-p SR Gen10 Controller

 HPE Smart Array P408e-p SR Gen10 Controller

 HPE Smart Array P816i-a SR Gen10 Controller

Storage
 Up to 190TB
Security
 UEFI Secure Boot and Secure Start support
 Immutable Silicon Root of Trust
 FIPS 140-2 validation (iLO 5 certification in progress)
 Common Criteria certification (iLO 5 certification in progress)
 Configurable for PCI DSS compliance
 Advanced Encryption Standard (AES) and Triple Data Encryption Standard (3DES)
on browser

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 55


Workstations

Dell Precision 7920

Figure 28 Workstation 1

Specifications
Processor
 Intel® Xeon® processor Scalable Operating System CPUs with up to 28 cores per
processor
Operating System
 Windows 10 Pro for Workstations (up to 4 Cores)
 Windows 10 Pro for Workstations (4 Cores Plus)

Memory
 Up to 1.5TB 2666MHz DDR4 ECC memory with dual CPUs, up to 3TB
Graphics
 NVIDIA Quadro P4000
Storage
 Up to 8 x 1TB drives
 2.5” SATA SSD

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 56


HP Z620

Figure 29 Workstation 2

Specifications
Processor
 Intel Xeon E5-2643 (3.3GHz, 10MB cache, 4 cores)
Operating system
 Windows 10 Pro
Memory
 96GB 1600MHz DDR3
Storage
 1TB SATA 7200RPM 6Gb/s 3.5" HDD
Graphics
 NVIDIA Quadro K2000
Expansion slots
 2 PCIe Gen3 x16
Storage controller
 Integrated SATA 6.0Gb/s

 I recommend the PowerEdge T140 Tower Server and the HP Z620 as the work
station for VIDCO-19 considering the company needs high-performance devices
due to its being a software company and have a large number of employees, so the
employees would have an efficient workflow without any problematic situations
such as lags which causes delays and affects the ongoing workflow.

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 57


2.5 Network design

What network design?


 Any enterprise-grade network must have a well-designed network. The architecture of a
network has an impact on network monitoring and overall system performance, making it just as
vital as the infrastructure itself. Because your topology structure will serve as the foundation for
quality of service monitoring and troubleshooting, it's critical to understand how it works. As a
result, knowing your topology and how to properly build a network is critical to the success of
your network.

Importance of compatible devices and related software in network design:

 Having a strong understanding of the many types of network devices accessible will assist you
in designing and constructing a secure network that meets the needs of your company. However,
to maintain your network's continued security and availability, you need to keep a close eye on
your network devices and the activity around them, so you can rapidly notice hardware faults,
configuration issues, and attacks.
In terms of security, maintenance, and application deployment, a flexible and programmable
network is far more manageable. Network software can power networks of all sizes, from small
offices to massive enterprise networks, and it is unquestionably a smart investment for any
company. From troubleshooting to process setup and beyond, the proper network software
solution offers a plethora of chances to cut expenses and improve customer experience. For
businesses to develop and thrive, network software is the most effective way to innovate and
upgrade networks

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 58


Task 03
3.1 VLAN & IP Subnetting

VLAN (Virtual LAN)


 A VLAN (virtual local area network) is a subnetwork that can connect devices on different
physical local area networks (LANs). A local area network (LAN) is a collection of computers
and devices that share a communications line or wireless connection to a server in the same
physical location.
 Without having to construct new cables or make major changes to the current network
infrastructure, network administrators can easily segment a single switched network to fulfil the
functional and security requirements of their systems using VLANs. Larger enterprises
frequently use VLANs to re-partition devices for better traffic management.

IP Subnetting
 The preparation of breaking a network into two or smaller networks is known as subnetting. It
improves network security and minimizes the size of the broadcast domain while increasing
routing efficiency.

The VLAN and IP subnetting scheme for the above scenario:


Department No of Users VLAN Subnet mask IP range
Developers 55 100 255.255.255.192 192.168.10.1–
192.168.10.62
Finance 25 200 255.255.255.224 192.168.10.65–
192.168.10.95
Sales and 25 300 255.255.255.224 192.168.10.97-
Marketing 192.168.10.126
HR 10 400 255.255.255.240 192.168.10.129-
192.168.10.142
Customer Care 10 500 255.255.255.240 192.168.10.145-
192.168.10.158
Legal 5 600 255.255.255.248 192.168.10.161-
192.168.10.166
Network Team 5 700 255.255.255.248 192.168.10.169-
192.168.10.174
Server Room 2
Table 5 The VLAN and IP subnetting scheme

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 59


3.2 network components and software
List of devices, network components and software need to design a network for the above scenario:

Cisco packet tracer


Packet Tracer is a Cisco Systems cross-platform visual simulation application for creating
network topologies and simulating modern computer networks. Users can use the software to
replicate Cisco router and switch configurations using a simulated command-line interface. Packet
Tracer's user interface is drag-and-drop, allowing users to add and remove simulated network
devices as needed.

Putty
Putty is an open-source tool that uses network protocols like Telnet and rlogin in conjunction with
an extreme terminal emulator for Windows and UNIX platforms. Putty uses all of the
aforementioned protocols to enable a remote session on a machine across a network. It's a popular
text-based communication tool, as well as a popular program for connecting Linux servers to
computers running Microsoft's operating system.

3.3 Network design (Diagram)

Detailed network design (Diagram) for my design:

Figure 30 Network design (Diagram)

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 60


3.4 Feedbacks for the design test

Name Dilshan
Position Network Engineer
Poor Good Excellent
1. Does the network system fulfil the ✔
requirements?
2. The security of this network? ✔

3. User-friendliness ✔

4. The performance of this network? ✔

5.Access speed ✔

6. Server responses ✔

Opinion Improve the security system in the


network
Date 01/03/2022
Signature [email protected]
Table 6 Feedback 1

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 61


Name Nimesh
Position Network Engineer
Poor Good Excellent
1. Does the network system fulfil the ✔
requirements?
2. The security of this network? ✔

3. User-friendliness ✔

4. The performance of this network? ✔

5.Access speed ✔

6. Server responses ✔

Opinion Improve the security system in the


network
Date 03/03/2022
Signature [email protected]
Table 7 Feedback 2

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 62


Name Hema
Position Network Engineer
Poor Good Excellent
1. Does the network system fulfil the ✔
requirements?
2. The security of this network? ✔

3. User-friendliness ✔

4. The performance of this network? ✔

5.Access speed ✔

6. Server responses ✔

Opinion Improve the security system in the


network
Date 05/03/2022
Signature [email protected]
Table 8 Feedback 3

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 63


3.5 Configuring Network services and Applications Installing Windows server

Figure 31 Network services and Applications 1

Figure 32 Network services and Applications 2

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 64


Figure 33 Network services and Applications 3

Figure 34 Network services and Applications 4

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 65


Figure 35 Network services and Applications 5

Configuration of Active Directory, DHCP and DNS

Figure 36 Configuration of Active Directory, DHCP and DNS 1

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 66


Figure 37 Configuration of Active Directory, DHCP and DNS 2

Figure 38 Configuration of Active Directory, DHCP and DNS 3

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 67


Figure 39 Configuration of Active Directory, DHCP and DNS 4

Figure 40 Configuration of Active Directory, DHCP and DNS 5

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 68


Figure 41 Configuration of Active Directory, DHCP and DNS 6

Figure 42 Configuration of Active Directory, DHCP and DNS 7

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 69


Figure 43 Configuration of Active Directory, DHCP and DNS 8

Figure 44 Configuration of Active Directory, DHCP and DNS 9

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 70


Figure 45 Configuration of Active Directory, DHCP and DNS 10

Figure 46 Configuration of Active Directory, DHCP and DNS 11

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 71


Figure 47 Configuration of Active Directory, DHCP and DNS 12

Figure 48 Configuration of Active Directory, DHCP and DNS 13

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 72


Figure 49 Configuration of Active Directory, DHCP and DNS 14

Figure 50 Configuration of Active Directory, DHCP and DNS 15

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 73


Figure 51 Configuration of Active Directory, DHCP and DNS 16

Figure 52 Configuration of Active Directory, DHCP and DNS 17

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 74


Figure 53 Configuration of Active Directory, DHCP and DNS 18

Figure 54 Configuration of Active Directory, DHCP and DNS 19

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 75


Figure 55 Configuration of Active Directory, DHCP and DNS 20

Figure 56 Configuration of Active Directory, DHCP and DNS 21

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 76


Figure 57 Configuration of Active Directory, DHCP and DNS 22

Figure 58 Configuration of Active Directory, DHCP and DNS 23

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 77


Figure 59 Configuration of Active Directory, DHCP and DNS 24

Figure 60 Configuration of Active Directory, DHCP and DNS 25

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 78


Figure 61 Configuration of Active Directory, DHCP and DNS 26

Figure 62 Configuration of Active Directory, DHCP and DNS 27

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 79


Figure 63 Configuration of Active Directory, DHCP and DNS 28

Figure 64 Configuration of Active Directory, DHCP and DNS 29

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 80


Figure 65 Configuration of Active Directory, DHCP and DNS 30

Figure 66 Configuration of Active Directory, DHCP and DNS 30

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 81


Figure 67 Configuration of Active Directory, DHCP and DNS 31

Figure 68 Configuration of Active Directory, DHCP and DNS 32

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 82


Figure 69 Configuration of Active Directory, DHCP and DNS 33

Figure 70 Configuration of Active Directory, DHCP and DNS 34

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 83


Figure 71 Configuration of Active Directory, DHCP and DNS 35

Figure 72 Configuration of Active Directory, DHCP and DNS 36

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 84


3.6 Maintenance schedule for VIDCO-19’s Network system

Tasks Daily Weekly Monthly Annually


Scanning for threats and errors ✔
Data backup check ✔
Network Cables and Switches check ✔
System Update check ✔
Hardware devices check ✔
Troubleshooting ✔
System Password update ✔
Internet connection Check ✔
Software check ✔
Update Network diagram ✔
Table 9 Maintenance schedule

Task 04

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 85


4.1 Network configuration
VLAN configuration

Figure 73 VLAN configuration 1

Figure 74 VLAN configuration 2

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 86


Figure 75 VLAN configuration 3

Figure 76 VLAN configuration 4

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 87


4.2 VIDCO-19 Test cases for the Network design

Test case 1

DHCP check successful

Figure 77 Test case 1

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 88


Test case 2
Pinging from Sales and Marketing to Developers department successful

Figure 78 Test case 2

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 89


Test case 3
User access verification successful

Figure 79 Test case 3

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 90


4.3 Why network monitoring is important in VIDCO-19 Kandy branch?
Without a doubt, network monitoring is certainly necessary for the firm. Its sole aim is to keep track of
the computer network's usage and performance, as well as to look for slow or malfunctioning systems.
The system will then send an alarm or an email to the network administrator if there are any
performance issues or errors. This technique will save a lot of money and eliminate a lot of issues. It's
the most reliable technique to ensure that the business is running well. The criteria listed below are also
taken into account.

 Troubleshooting
The ability to troubleshoot problems is one of the benefits of network monitoring. We can save a
lot of time by figuring out what's wrong. With network monitoring, we can immediately
determine which device is causing the issue. Our support team will be able to detect and resolve
issues before users are even aware of them. Because our monitoring is never-ending, it can assist
us in detecting specific changes in our network's performance. It can be difficult to troubleshoot
problems that occur only sporadically or during peak hours, but a network monitor will help us
better understand what is going on.

 Save Time & Money


We will save a lot of time and money by using network monitoring. Without it, a significant
amount of time would be spent inspecting, resulting in more hours being worked. Not only would
this cost more money, but it will also reduce efficiency. We increase our revenues when we can
promptly identify and resolve network faults. When things function more smoothly, we have more
time to manage our business. We can detect what needs additional disk space when we understand
how all of our devices are used, allowing us to increase capacity fast and effectively.

 Security
Keeping our data secure is one of the most crucial aspects of network monitoring. It will keep
track of everything and notify the network administrator if there are any problems before they
become serious. A network monitor can warn us if something isn't responding, our server is down,
or our disk space is running low, to name a few things. Network monitoring is the most proactive
technique to deal with problems so that we can keep ahead of them, especially when our
organization will be monitored 24 hours a day, seven days a week.

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 91


 Planning for any changes
We can use network monitoring to see whether a device is nearing its limit and needs to be
replaced. It allows us to plan ahead of time and make any necessary modifications quickly. All of
the reports that we'll get demonstrating our activities and the state of our system's health will be
useful as tools for our business. They'll make it simple for us to demonstrate what's going on and
why one of our gadgets needs to be repaired or replaced.

4.4 Network monitoring tools

What is Network monitoring?


The term "network monitoring" is widely used in the IT world. Network monitoring is a critical IT
process that involves regularly monitoring and evaluating all networking components such as
routers, switches, firewalls, and servers for faults and performance in order to maintain and
maximize their availability. One of the most significant features of network monitoring is that it
must be practical. Finding performance concerns and roadblocks is a practical way of detecting
problems early on. Network outages and failures can be avoided with effective active monitoring.

Significant benefits of network monitoring are as follows,

 A clear picture of the network


Administrators can use network monitoring to gain a detailed view of all the linked devices in the
network, observe how data moves between them, and quickly discover and diagnose faults that
can degrade performance and cause outages.

 More efficient use of IT resources


Network monitoring solutions use hardware and software to help IT workers do less human work.
As a result, the company's valued IT professionals will have more time to devote to important
tasks.

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 92


 Early identification of future set-up requirements
Reports on how network components performed over time can be generated by network
monitoring systems. Network administrators can anticipate when the organization may need to
upgrade or install new IT setups by evaluating these reports.

 The capacity to detect security threats more quickly


Network monitoring aids companies in determining what constitutes "normal" network
performance. As a result, when unusual activity occurs, such as an inexplicable surge in network
traffic levels, administrators may rapidly identify the problem and decide whether it poses a
security risk.

The Network Monitoring which could be installed and configured is,

Solarwinds Network Performance Monitor

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 93


Figure 80 Network Monitoring 1

SolarWinds Network Performance Monitor is simple to install and use, and it can be up and
running in no time. The utility detects network devices automatically and installs them within an
hour. Its straightforward approach to network management makes it one of the most intuitive and
spontaneous user interfaces available.
The product is very adaptable, and the user interface is simple to administer and update. The web-
based performance dashboards, charts, and views can all be customized. For our complete
network infrastructure, we can develop a customized topology. We can also construct
personalized dependency-aware intelligent notifications, among other things.

Figure 81 Network Monitoring 2

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 94


Figure 82 Network Monitoring 3

Solarwinds NPM provides a long range of features that make it one of the best network
monitoring options available, including:

 Automatically discover and scan networks for wired and wireless computers and devices
 Use the NetPathTM Critical Path visualization function to quickly pinpoint network
performance issues.
 Analyze Critical Data Points and Paths Across Your Network Using an Easy-to-Use
Performance Dashboard.
 Robust Alerting System with Simple/Complex Trigger Options.
 Use their New Network InsightTM for CISCO ASA to keep an eye on CISCO ASA networks.
 On Cisco ASA, monitor ACLs, VPN, Interface, and Monitor.
 Firewall Rules Browser for monitoring firewall rules • Step-by-step analysis of critical network
Paths and components.
 Create HeatMaps of Wifi Networks to pinpoint Wifi Dead Spots • Manage, Monitor, and
Analyze
Wifi Networks from the Dashboard.
 Tracks the health of all servers, firewalls, routers, switches, desktops, laptops, and other
hardware.
 Network and Netflow Monitoring in Real Time for Critical Network Components and Devices.

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 95


4.5 Troubleshooting

Steps for following situation


 Everything is working normally but suddenly the connection goes
away, and then comes back, and then goes away again on client
computer.

 Step 1: Restart the modem and router


The modem and router can both freeze and require a reboot, much like a PC. If either device has
stopped working, a simple restart may be all that is required to get it back up and running.
Disconnect the modem and router from the power for at least 15 seconds after unplugging them. Then
reconnect them, modem first, router second. Look for a Power button if they don't start charging right
away. The majority of smartphones take roughly 2 minutes to fully boot up. If the devices still don't
operate after this, proceed to Step 2. Make sure not to RESET the modem, since this will erase all of
the modem's key Internet connection settings, necessitating a reconfiguration.

 Step 2: Check the lights


Indicator lights on the modem and router may indicate whether they are operational. If that's the case,
take a look at these. Move to Step 3 if they say they're working but the gadgets still don't have
internet.

 Step 3: Forget and rejoin the wireless network


The phone or tablet saves information about the wireless network in order to rejoin fast. However, if
the network goes down, the devices may recall some incorrect information. Look for a setting on the
device that allows you to forget about the wireless network. After that, I'll rejoin. If that doesn't work,
proceed to Step 4.

 Step 4: Call the ISP(Internet Service Provider)

If the previous methods don't work (especially if the modem and router show that something isn't
working), it's time to contact your Internet Service Provider (ISP). It's sometimes as simple as sending
a reset command to the modem on their end. Sometimes there's a broader outage that affects a large
number of clients. The easiest approach to find out when something will be fixed is to call in.

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 96


 Network cable plugged in, but getting no connection.
 Step 1: Install the latest drivers
If the network adapter does not have the essential drivers loaded, this problem can occur.
 Step 2: Replacing the Ethernet cable
If the problem persists, we may need to replace the Ethernet wire. Before buying a new cable, we
should test it on another computer to verify if it works. If the problem happens on two or more
devices, the cable should be replaced.
 Step 3: Restart / reset the router
This error can happen in some circumstances if the router setup is incorrect, and it is recommended
that the router be restarted to resolve the issue. To do so, simply switch the router off and on again to
see if the problem reappears. If the problem persists, the router may need to be reset. Check the
router's instruction manual for instructions on how to properly reset the router. If the network adapter
does not have the essential drivers loaded, this problem can occur.
 Step 4: Run the network troubleshooter

Figure 83 troubleshoot 1

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 97


Figure 84 troubleshoot 2

4.6 Future enhancement for the networked system

 Software and firmware updates


Technology advancements and the software that operates on them do not always keep up with one
another. It's possible that we'll have new programs running on old machines, or old programs
running on new ones, but it's unlikely that they'll get along.
 VPN (Virtual Private Network) server configuration
Because VPNs utilize advanced encryption algorithms to protect online data when we browse the
web, they must be used in the network system. With the use of VPN, the network can be
expanded. The use of VPN has the advantage of allowing information to be accessed remotely
from any location, which can boost productivity.
 Set up a separate network for visitors.
The corporation can set up a separate network for visitors to connect to the internet while keeping
corporate resources separate.
 Make load balancing a priority.
Its extensive traffic management capabilities can direct business requests to the most appropriate
resources for each end user.

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 98


4.7 Conclusion

In conclusion, a network is two or more computers connected together using a telecommunication


system for the purpose of communicating and sharing resources. Without having a network, VIDCO-19
would not be able to share resources and increase productivity more efficiently. The WAN network
allowed VIDCO-19 to use the internet over large areas. This allowed the company to have meetings
overseas and share data over the network. As you can see, networks have many benefits for the end
user. Networks are an important part of technology, whether the network is wired or wireless. In this
case, design, planning, configuration, and testing of the network are the key factors which are
considered when it comes to building a network. The company’s requirements must be met to run a
successful network, such as managing the employees’ traffic and separating the network according to
the departments that come under planning. The next factor to consider will be the network design. The
design has a big impact on the system, so it is a major factor to be considered. Next will be configuring
the network design. In order to make the network work as per meeting the requirements of VIDCO-19,
each and every module must be checked properly for an error-free network, so that the devices may
operate efficiently. And after that, the network must be tested before being implemented. In order to
test the network, it is required to go through every module looking for any faults that may cause a
problem. After every step is completed successfully, the network will be implemented in VIDCO-19 as
shown above.

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 99


Grading Rubric

Grading Criteria Achieved Feedback

LO1 : Examine networking principles and their protocols.

P1
Discuss the benefits and constraints of different network types
and standards.

P2
Explain the impact of network topology, communication and
bandwidth requirements.

M1
Compare common networking principles and how protocols
enable the effectiveness of networked systems.

LO2 : Explain networking devices and operations

P3
Discuss the operating principles of networking devices and
server types.

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 100


P4
Discuss the inter-dependence of workstation hardware with
relevant networking software.

M2
Explore a range of server types and justify the selection of a
server, considering a given scenario regarding cost and
performance optimization.

LO 1 & LO2
D1
Considering a given scenario, identify the topology protocol
selected for the efficient utilisation of a networking system.

LO3 : Design efficient networked systems

P5
Design a networked system to meet a given specification.
P6
Test and evaluate the design to meet the requirements and
analyze user feedback.

M3

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 101


Install and configure network services and applications on your
choice.

D2
Design a maintenance schedule to support the networked
system.

LO4 : Implement and diagnose networked systems

P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.

D3
Use critical reflection to evaluate own work and justify valid
conclusions.

Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 102

You might also like