Higher Nationals: Internal Verification of Assessment Decisions - BTEC (RQF)
Higher Nationals: Internal Verification of Assessment Decisions - BTEC (RQF)
Student’s name
List which assessment criteria Pass Merit Distinction
the Assessor has awarded.
Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction
Descripts
LO2 Explain networking devices and operations.
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades
decisions have been agreed at the assessment board.
Action Plan
Summative feedback
Assessor Date
signature
Student Date
signature
General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body
except for the before mentioned compulsory information will result in rejection of your work.
2. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
3. Ensure that you give yourself enough time to complete the assignment by the due date.
4. Excuses of any nature will not be accepted for failure to hand in the work on time.
5. You must take responsibility for managing your own time effectively.
6. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
7. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
8. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
9. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and
a reference list.
10. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course
Student Declaration
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Pearson, UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.
Issue Date
Submission Date
Submission format
The submission should be in the form of an individual reportwritten in a concise, formal business
style using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using
Harvard referencing system. Please also provide an end list of references using the Harvard
referencing system. The recommended word count is 3,000–3,500 words for the report excluding
annexures, although you will not be penalised for exceeding the total word limit.
Customer Care 10
Finance 25
Legal 5
HR 10
Developers 55
Network Team 5
• 192.168.10.0/24 is given and should be used for all the departments except the server room.
IPs should assign using DHCP.
• ERP and CRM Systems need to be implemented in Kandy branch in local servers.
• Number of servers required for the Server room need to be decided by the
Assume you have been appointed as the new network consultant of VIDCO-19 Solutions. Prepare a
Task 03
network architectural design and implement it with your suggestions and recommendations to meet
3.1 Provide VLAN and IP subnetting scheme for above scenario to satisfy user requirements.
the company requirements.
3.2 Provide a list of devices, network components and software need to design a network for above
scenario and justify your selection.
(Note: Clearly state your assumptions. You are allowed to design the network according to your
3.3 Provide a detailed network design (Diagram) for your design using modeling tool. (Ex: Microsoft
assumptions, but main requirements should not be violated)
Visio).
3.4 Design a User feedback form and get feedback from network users and analyze their feedback and
Task 01
suggestions.
1.1 Discuss the different network models/system types that can be implemented in Kandy branch
3.5 Install and configure Network services and Applications* of your choice to accomplish above
with their benefits and constraints.
user requirements. (Ex: DHCP, DNS, Active Directory, Proxy, Web, Etc.)
1.2 Discuss main IEEE Ethernet standards that can be used in above LAN and WLAN design?
(Note: Screen shots of minimum 2 services are required)
1.3 Critically analyze network protocol suites used in Network Industry and recommend suitable
3.6 Design a detailed Maintenance schedule for above Network design.
network protocol suites for above scenario and justify your selection.
1.4 Explain the difference between Logical topology and Physical topology using examples and
*Note: - Screen shots of Configuration scripts should be presented.
compare main network topologies used in network design.
1.5 Recommend a suitable network topology for above scenario and justify your answer with
valid points.
Task 04
4.1 Implement and configure all network devices* according to the requirements given in the
scenario.
Mohamed
4.2 Develop ramzeen
test cases andSafwan – HND
Test the in Computing
above Network to|Networking Assignment
verify *whether 01 objectives
the design 10 are met.
4.3 Discuss Why network monitoring is important in VIDCO-19 Kandy branch?
Explain with valid points.
Mohamed ramzeen Safwan – HND in Computing |Networking Assignment 01 11
Table of Contents
Internal verification of assessment decisions – BTEC (RQF)............................................................................
Higher Nationals - Summative Assignment Feedback Form....................................................................................
Assignment Feedback.............................................................................................................................................
Assignment Brief.....................................................................................................................................................
Acknowledgement................................................................................................................................................16
Case summary.......................................................................................................................................................17
1.1 Network models and System types...........................................................................................................18
1.2 IEEE standards for LAN and WLAN Network.............................................................................................21
1.3 Network protocols and Protocol suites.....................................................................................................25
1.4 Network Topology.....................................................................................................................................31
1.5 The most suitable network topology for the above scenario....................................................................35
2.1 Operating Principles of Network devices..................................................................................................37
2.2 Security devices...............................................................................................................................................42
2.3 Importance of networking software................................................................................................................47
2.4 The importance of Servers in computer networks Servers.............................................................................49
2.5 Network design...............................................................................................................................................58
3.1 VLAN & IP Subnetting......................................................................................................................................59
3.2 network components and software................................................................................................................60
3.3 Network design (Diagram)..............................................................................................................................60
3.4 Feedbacks for the design test..........................................................................................................................61
3.5 Configuring Network services and Applications Installing Windows server....................................................64
3.6 Maintenance schedule for VIDCO-19’s Network system.................................................................................85
4.1 Network configuration....................................................................................................................................86
4.2 VIDCO-19 Test cases for the Network design..................................................................................................88
4.3 Why network monitoring is important in VIDCO-19 Kandy branch?...............................................................91
4.4 Network monitoring tools...............................................................................................................................92
4.5 Troubleshooting..............................................................................................................................................96
4.6 Future enhancement for the networked system............................................................................................98
4.7 Conclusion.......................................................................................................................................................99
First of all, I would like to thank my parents for they gave me this opportunity to do. And our
Esoft Metro Campus gave me this valuable course from Pearson UK. And my lecturer Mr.Geeth
for all the support that he has given us from the HND session.
Thank you,
Mohamed Ramzeen Safwan
I have been appointed as the network consultant of VIDCO-19(a well-known private software
company) located in Colombo, so my task is to put together a network architectural design and
implement it with my proposals and recommendations to meet the company’s specifications, as
the management is planning to extend their branch to Kandy as it is a 3 story building and it is
expected to have around 150 employees.
Networking is the primary because we can write this weblog and send it across to tens of millions
of readers with such ease. The general photograph is explored in the concern of computer
networks. Pc networks deal with conversations between systems. At the identical time, it
additionally considers how records being sent from the supplier need to reach its destination most
correctly. It is comparable to a congested town with hundreds of site visitors.
Types of Networks:
1. Local Area Networks (LANs)
2. Wide Area Networks (WANs)
3. Wireless Local Area Network (WLANs)
The network model can handle one-to-many and many-to-many relationships, which is extremely
useful in simulating real-world scenarios and can access more data straightforward and flexible
than in a hierarchical approach. So VIDCO-19 Kandy branch can make a good relationship
between departments and the departments can easily access and share data.
This model's design or structure is not user-friendly and even while the network database model
can achieve data independence, this model fails to achieve structural independence. So VIDCO-19
Kandy branch can’t achieve data independently.
What is a system?
A system is a set of factors or additives which can be prepared for a common cause. The word
from time to time describes the enterprise or plan itself and now and again describes the parts
within the machine.
Benefits of a System:
Attackers will find it difficult to compromise all subsystems at once in isolated systems, especially
if each subsystem employs a distinct level of security. It may, however, be challenging for you to
successfully manage security for many systems and When you recognize the need for a more
coordinated organization-wide software system, you do not need to design a new expensive and
vast system from the ground up. Instead, you can employ a professional to integrate the existing
systems so that they all work together. This not only saves you money, but it also saves you
valuable time and effort that would otherwise be spent training personnel to use a new system. So
VIDCO-19 Kandy branch has mostly can cost efficiency and secure their data’s from attackers.
A system should have 3 basic constraints − A system should have some structure and behavior
that is intended to attain a predefined objective. Interconnectivity and mutuality should exist
among the system parts.
10Base-T (IEEE 802.3) – 10 Mbps with category 3 unshielded twisted pair (UTP) wiring, up to
100 meters long.
100Base-TX (IEEE 802.3u) – known as Fast Ethernet, uses category 5, 5E, or 6 UTP wiring,
up to 100 meters long.
100Base-FX (IEEE 802.3u) – a version of Fast Ethernet that uses multi-mode optical fiber. Up
to 412 meters long.
1000Base-CX (IEEE 802.3z) – uses copper twisted-pair cabling. Up to 25 meters long.
1000Base-T (IEEE 802.3ab) – Gigabit Ethernet that uses Category 5 UTP wiring. Up to 100
meters long.
1000Base-SX (IEEE 802.3z) – 1 Gigabit Ethernet running over multimode fiber-optic cable.
1000Base-LX (IEEE 802.3z) – 1 Gigabit Ethernet running over single-mode fiber.
10GBase-T (802.3.an) – 10 Gbps connections over category 5e, 6, and 7 UTP cables.
Maximum data
Protocol Frequency Channel Width MIMO rate
(theoretical)
What is a LAN?
A Local Area Network (LAN) could be an assortment of devices connected along in one
physical location, like a building, office, or home. A LAN may be tiny or giant, starting from a
home network with one user to associate enterprise network with thousands of users associated
devices in a workplace or faculty.
What is in a LAN?
A Local Area Network includes cables, access points, switches, routers, and different elements
that alter devices to attach to internal servers, net servers, and different LANs via wide space
networks. The rise of virtualization has additionally oxyacetylene the event of virtual LANs,
that alter network directors to logically cluster network nodes and partition their networks while
not having a desire for major infrastructure changes.
The advantages of a local area network (LAN) are equivalent to those for any cluster of devices
networked along. The devices will use one net association, share files, print to shared printers,
and be accessed and even controlled by each other.
Types of LANs:
1. Client / Server LANs.
2. Peer-to-Peer LANs.
What is a WLAN?
A Wireless Local-Area Network (WLAN) may be a cluster of collocated computers or
alternative devices that type a network supported radio transmissions instead of wired
connections. A Wi-Fi network may be a style of Wi-Fi; anyone connected to Wi-Fi whereas
reading this webpage is employing a WLAN.
Like broadcast media, a WLAN fidelity transmits data over radio waves. Information is
distributed in packets. The packets contain layers with labels and directions that, in conjunction
with the distinctive MAC (Media Access Control) addresses appointed to endpoints, alter
routing to intended locations.
Figure 2 WLAN
Extended reach: - WLANs change computing to happen anyplace, even once carrying high data
and advanced internet applications.
Device flexibility: - A WLAN supports the use of a large range of devices, like computers,
phones, tablets, recreation systems, and IoT devices.
Easier installation and management: - A WLAN needs less physical instrumentation than a
wired network, which saves cash, reduces installation time, and takes up less of a footprint in
workplace settings.
Scalability: - A WLAN is straightforward to scale. Adding users is as simple as distribution
login credentials.
Types of WLANs:
1. Infrastructure based wireless network.
2. Adhoc wireless network.
Connecting devices through Wi-Fi in home, office, campus, laboratory, school, and college.
Sharing Wi-Fi hotspots from smartphones to other devices like laptops, workstations, etc.
Mobile phones
Laptop and tablet computers
Internet audio systems
Gaming consoles
Other internet-enabled home appliances and devices
A network protocol is a set of rules that govern how data is exchanged between devices
connected to the same network. In essence, it enables connected devices to interact with one
another independent of internal process variances. Design or structure the fact that you can
readily communicate with others is due to network protocols. People all over the world, and
play a key part in today's digital communications. Neither local area networks (LANs) nor wide
1. Communication
2. Network Management
3. Security
Here are a few examples of the most commonly used network protocols:
Hypertext Transfer Protocol (HTTP): This Internet Protocol defines how data is transmitted
over the internet and determines how web servers and browsers should respond to commands.
This protocol (or its secure counterpart, HTTPS) appears at the beginning of various URLs or
web addresses online.
Secure Socket Shell (SSH): This protocol provides secure access to a computer, even if it’s on
an unsecured network. SSH is particularly useful for network administrators who need to
manage different systems remotely.
Short Message Service (SMS): This communications protocol was created to send and receive
text messages over cellular networks. SMS refers exclusively to text-based messages. Pictures,
The Internet protocol suite unremarkably referred to as TCP/IP, is the set of communications
protocols utilized in the net and similar computer networks. The present foundational protocols
within the suite area unit are the Transmission Control Protocol (TCP) and also Internet
Protocol (IP).
The Internet protocol suite provides end-to-end digital communication specifying however
knowledge ought to be packetized, addressed, transmitted, routed, and received. This
practicality is organized into four abstraction layers that classify all connected protocols in
keeping with every protocol's scope of networking. From lowest to highest, the layers area unit
the link layer, containing communication ways for knowledge that is still among one network
section (link); the web layer, providing internetworking between freelance networks; the
transport layer, handling host-to-host communication; and also the application layer, providing
process-to-process knowledge exchange for applications.
1. TCP/IP:- In a private computer network, TCP/IP is also used as a communications protocol (an
intranet or extranet).TCP/IP refers to the full IP suite, which includes a set of rules and
procedures. TCP and IP are the two most common protocols, although the suite also includes
others. Between internet applications and the routing and switching fabric, the TCP/IP protocol
suite serves as an abstraction layer.
2. Novell’s IPX/SPX: - Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) is
an acronym for Internetwork Packet Exchange/Sequenced Packet Exchange. IPX and SPX are
networking protocols that were first used on networks running the (now defunct) Novell
NetWare operating systems. They later became popular on networks running Microsoft
1. Four Layer TCP/IP Model: The four-layer TCP/IP model consists of 4 layers square measure
Application layer, Transport layer, web layer, and link layer. The layer range, layer name, and
protocol name square measure are shown within the below table.
Layer Layer Name Protocol Name
Number
4. Application Layer HTTP, Telnet, DNS, SNMP, DHCP
3. Transport Layer TCP, UDP
2. Internet Layer IP, ICMP, IGMP
1. Link Layer Ethernet, Wireless LAN, PPP, ARP
Table 2 Four Layer TCP/IP Model
2. Five Layer TCP/IP model: The solution of this link layer is to divide the link layer into 2
completely different layers. The information link layer and therefore the physical layer are 2 layers
and this can be however the five-layer TCP/IP model is formed. Currently, a day’s within the
business level all the individuals are victimization the five-layer TCP/IP model.
Layer Layer Name Protocol Name
Number
5. Application Layer HTTP, Telnet, DNS, SNMP, DHCP
4. Transport Layer TCP, UDP
Recommend suitable network protocol suites for the above scenario is TCP/IP Because,
It is an industry-standard model that can be successfully installed in practical
networking problems as it is designed for Wide Area Networks (WAN). It allows
cross-platform communications among various networks. For it is scalable, this
allows networks to be linked without disrupting the existing services. It assigns an
IP address to each computer on the network, therefore making each device to be
recognizable over the network. And it is compatible with every operating system, so
it can communicate with any other system. TCP/IP can be used to provide remote
login over the network, for interactive file transfer, to convey email, to distribute
webpages over the network and to remotely access a server host's file system.
Independence from specific physical network hardware. This enables TCP/IP to add
2. Ring topology: In this topology, only 1 node is allowed to transfer the information in a very
network at a given time. This mechanism is achieved by token (the node having token solely
will transmit the information in a very network) and thence the collision is avoided in a very
network.
3. P2P Topology: Point-to-point topology is the easiest of all the network topologies. In this
method, the network consists of a direct link between two computers.
4. Star Topology: all the computers connect with the assistance of a hub. This cable is termed a
central node, and every one alternative node square measure connected exploitation this central
node. It’s the hottest on local area network networks as they're cheap and straightforward to put
in.
5. Tree Topology: Tree topologies have a root node, and every alternative nodes area unit
connected that type a hierarchy. Therefore it's conjointly called hierarchic topology. This
topology integrates varied star topologies along in a very single bus, therefore it's called a Star
topology. Tree topology may be a quite common network that is analogous to a bus and network
topology.
6. Mesh Topology: The mesh topology features a distinctive network style within which every
laptop on the network connects to each alternative. It’s developing a P2P (point-to-point)
affiliation between all the devices of the network. It offers a high level of redundancy, therefore
albeit one network cable fails, still data has an alternate path to succeed in its destination.
Partial Mesh Topology: In this type of topology, most of the devices are connected almost
similar to the full topology. The only difference is that few devices are connected with just two
or three devices.
Full Mesh Topology: In this topology, every node or device is directly connected.
7. Hybrid Topology: Hybrid topology combines 2 or a lot of topologies. You’ll see within the on
below of the design in such a way that the ensuing network doesn't exhibit one among the
quality topologies. For example, as you'll see below image that in Associate in the nursing
workplace in one department, Star and P2P topology is employed. A hybrid topology is often
created once 2 different basic network topologies area units are connected.
1.5 The most suitable network topology for the above scenario
Hybrid topology
Because it is the most versatile topology out of the others and the most effective due to its
characteristics mentioned above.
Advantages:
Reliable:
It has far better fault tolerance. The section where the fault is found could probably
be singled out from the rest of the network and necessary restorative steps could be
taken, without impacting the functioning of the rest of the network.
Flexible:
One of the key advantages of this topology is its flexibility. The topology is formed
so that it can be implemented for a variety of separate network environments
Hybrid networks can be created in line with the demands of the corporation and by
maximizing the existing resources.
Effective:
The most important advantage of this topology is that the weakness of the different
Network devices are hardware devices that connect computers, printers, fax machines, and other
electronic devices to a network. These devices send data over the same or separate networks in a quick,
secure, and accurate manner. Inter-network and intra-network network devices are both possible. Some
devices are installed on the device, such as a network interface card or an RJ45 connector, while others
are part of the network, such as a router or switch.
Network devices that can be used for the above scenario:
Hub
A hub is nothing more than a multiport repeater. A hub joins many wires coming from
different branches, such as the star topology connector that connects separate stations. Data
packets are sent to all connected devices since hubs cannot filter data. In other words, all hosts
connected by Hub have the same collision domain. They also lack the intelligence to
determine the optimum routing for data packets, resulting in inefficiencies and waste.
Types of Hub:
1. Active Hub
2. Passive Hub
3. Intelligent Hub
Bridge
At the data link layer, a bridge is used. A bridge is a repeater with the added capability of
filtering material by reading the source and destination MAC addresses. It can also be used to
join two LANs that utilize the same protocol. It is a two-port device because it has only one
input and output port.
Types of bridge:
1. Transparent Bridge
2. Source Routing Bridge
Figure 17 Bridge
Switch
A switch is a multiport bridge with a buffer and a design that can improve its efficiency and
performance (having a large number of ports means less traffic). A data link layer device is a
switch. The switch can check for problems before forwarding data, which makes it incredibly
Figure 18 Switch
Router
A router, similar to a switch, is a device that directs data packets according to their IP
addresses. The router is primarily a device that operates at the Network Layer. Routers
connect LANs and WANs and use a dynamically updating routing table to decide how to route
data packets. The broadcast domains of hosts linked through it are divided by the router.
Types of Router:
1. Wired router
2. Wireless Router
Gateway
As the name implies, a gateway is a path that connects two networks that may use different
networking models. They essentially serve as messengers, taking data from one system,
interpreting it, and transferring it to another. Gateways, also known as protocol converters, can
function at any layer of the network. Switches and routers are less complicated than gateways.
Figure 20 Gateway
Repeater
A repeater is a device that works at the physical layer. Its job is to regenerate the signal across
the same network before it becomes too weak or garbled, allowing the signal to be transmitted
for long distances on the same network. The fact that repeaters do not enhance the signal is
Figure 21 Repeater
Access Point
In a typical office or large building, an access point is a device that generates a wireless local
area network, or WLAN. An access point uses an Ethernet cable to connect to a wired router,
switch, or hub and broadcasts a Wi-Fi signal to a specific region. Install an access point at the
front desk and connect an Ethernet cable through the ceiling back to the server room if you
want to allow Wi-Fi access in your company's reception area but don't have a router within
range.
Firewall
Security devices that we can use to enhance the security of VIDCO-19 Kandy Branch.
Firewalls.
Antivirus.
Content Filtering Devices.
Intrusion Detection Systems (IDS)
Intrusion Prevention System (IPS)
Firewalls:
A firewall is a network security device that monitors incoming and outgoing network traffic and
allows or disallows data packets according to a set of security rules. Its goal is to create a barrier
between your internal network and incoming traffic from other sources (such as the internet) so
that malicious traffic like viruses and hackers can't get in.
There are 2 types of Firewalls:
Antivirus:
An antivirus program is a piece of software that can detect and eradicate malware and other
potentially harmful programs.
Initially, antivirus software could only tackle viruses. But now, they provide security against
worms, Trojans, ransomware and spyware, etc. Some antivirus software can help guard against
phishing attempts made over email. Your network security devices/tools should, in theory, be
able to detect security risks coming from any source, including harmful programs and viruses
sent via email.
An intrusion prevention system (IPS) is a network security mechanism that aims to detect and
block known attacks. Intrusion prevention systems constantly monitor the network, looking for
and recording any dangerous occurrences. The IPS notifies system administrators of these
events and takes preventative measures, such as limiting access points and installing firewalls,
to prevent future assaults. IPS systems can also be used to discover problems with corporate
security policies and prevent network visitors from breaking the rules.
Basic Functionality:
User management - enables administrators to add or remove users from the network.
File management - allows administrators to define the location of data storage and user access
to that data.
Network software allows multiple devices, such as desktops. Laptops, Mobile phones, tablets, and
other systems to connect, as well as other networks.
What is a Server?
A server is a program or equipment that delivers a service to another program and its user, also
known as the client. The physical machine that a server program runs on is usually referred to as
a server in a data center. That computer could be a dedicated server or it could be utilized for
something else entirely.
Benefits of servers:
You can use a server to provide high-speed internet connectivity to multiple computers on a
network.
You get additional processing power with a server. It ‘supercharges' your network by storing
massive amounts of data, freeing up memory, and improving the performance of individual PCs.
A server allows you to rapidly and easily set up new machines, add users, and deploy new apps.
Older PCs can be given new life by offloading their files and data to a server, which allows
them to work more rapidly and effectively.
include a variety of security safeguards, data must still be transferred via the internet. Local
security can also be a problem. If you have sensitive data that will only be utilized internally,
however, it makes more sense to keep it locally on your server.
o Expandable space: - Physical business servers also enable you to swiftly extend your storage
capacity if necessary, as well as send data to redundant storage. This is especially critical if your
company handles enormous files. Although 100TB of storage is nothing to sneeze at for on-
premises servers, it can add up quickly when using a cloud solution.
o Price: - Cloud networks such as AWS and Azure, on the other hand, charge by the hour. If you
buy a server, you own it, just like any other physical or digital item, and you can use its
computing power as much as you like.
Usage of a Server:
Secure email hosting
File Sharing
Cloud Storage
Supporting multiple virtual servers
Backing-up business data
Storing and collaborating on documents
Providing virtual desktops to employees
Figure 25 Server 1
Specifications
Processer
Intel® Celeron G4930 3.2GHz, 2M cache, 2C/2T, no turbo (54W)
Operating System
Canonical® Ubuntu® Server LTS
Citrix® Hypervisor ®
Microsoft® Windows Server® with Hyper-V
Red Hat® Enterprise Linux
SUSE® Linux Enterprise Server
VMware® ESXi®
Memory
DIMM Speed up to 2666MT/s
Memory Type UDIMM
Memory Module Slots 4
Maximum RAM UDIMM 64G
Security
Cryptographically signed firmware
Silicon Root of Trust
Secure Boot
Secure Erase
System Lockdown (requires OpenManage Enterprise)
TPM 1.2/2.0, TCM 2.0 optional
Ports
Front panel: 1x USB 3.0, 1x iDRAC micro USB 2.0 management port
Back panel: 2x USB 3.0, 4x USB 2.0, VGA, serial connector
Internal USB: 1x internal USB 3.0
Storage
Up to 4 x 3.5" SAS/SATA (HDD), max 16TB
Figure 26 Server 2
Specifications
Processor
Intel® Xeon® processor 5500 and 5600 series
Six-core Intel® Xeon®
Dual-core Intel® Pentium®
Quad-core Intel® Xeon®
Operating System
Microsoft® Windows Server® 2012
Microsoft Windows® Small Business Server 2011
Microsoft Windows Small Business Server 2008
Microsoft Windows Server 2008 SP2, x86/x64 (x64 includes Hyper-V®)
Microsoft Windows Server 2008 R2 SP1, x64 (includes Hyper-V v2)
Microsoft Windows HPC Server 2008 R2
Novell® SUSE® Linux Enterprise Server
Red Hat® Enterprise Linux®
Memory
Up to 192GB
Up to 1333MT/s DDR3
12 DIMM slots: 1GB/2GB/4GB/8GB/16GB
Storage Controllers
Internal Controllers
PERC H200 (6Gb/s)
PERC H700 (6Gb/s) (nonvolatile battery-backed cache: 512MB, 1GB)
SAS 6/iRPERC 6/i (battery-backed cache: 256MB)
Figure 27 Server 3
Specifications
Processor
Intel® Xeon® Scalable 8100 series
Intel® Xeon® Scalable 6100 series
Intel® Xeon® Scalable 5100 series
Intel® Xeon® Scalable 4100 series
Intel® Xeon® Scalable 3100 series
Operating System
Canonical Ubuntu
Citrix XenServer
Microsoft Windows Server
Oracle Solaris
Red Hat Enterprise Linux
SuSE Linux Enterprise Server
Storage Controllers
Software RAID
HPE Smart Array S100i SR Gen10 SW RAID
Storage
Up to 190TB
Security
UEFI Secure Boot and Secure Start support
Immutable Silicon Root of Trust
FIPS 140-2 validation (iLO 5 certification in progress)
Common Criteria certification (iLO 5 certification in progress)
Configurable for PCI DSS compliance
Advanced Encryption Standard (AES) and Triple Data Encryption Standard (3DES)
on browser
Figure 28 Workstation 1
Specifications
Processor
Intel® Xeon® processor Scalable Operating System CPUs with up to 28 cores per
processor
Operating System
Windows 10 Pro for Workstations (up to 4 Cores)
Windows 10 Pro for Workstations (4 Cores Plus)
Memory
Up to 1.5TB 2666MHz DDR4 ECC memory with dual CPUs, up to 3TB
Graphics
NVIDIA Quadro P4000
Storage
Up to 8 x 1TB drives
2.5” SATA SSD
Figure 29 Workstation 2
Specifications
Processor
Intel Xeon E5-2643 (3.3GHz, 10MB cache, 4 cores)
Operating system
Windows 10 Pro
Memory
96GB 1600MHz DDR3
Storage
1TB SATA 7200RPM 6Gb/s 3.5" HDD
Graphics
NVIDIA Quadro K2000
Expansion slots
2 PCIe Gen3 x16
Storage controller
Integrated SATA 6.0Gb/s
I recommend the PowerEdge T140 Tower Server and the HP Z620 as the work
station for VIDCO-19 considering the company needs high-performance devices
due to its being a software company and have a large number of employees, so the
employees would have an efficient workflow without any problematic situations
such as lags which causes delays and affects the ongoing workflow.
Having a strong understanding of the many types of network devices accessible will assist you
in designing and constructing a secure network that meets the needs of your company. However,
to maintain your network's continued security and availability, you need to keep a close eye on
your network devices and the activity around them, so you can rapidly notice hardware faults,
configuration issues, and attacks.
In terms of security, maintenance, and application deployment, a flexible and programmable
network is far more manageable. Network software can power networks of all sizes, from small
offices to massive enterprise networks, and it is unquestionably a smart investment for any
company. From troubleshooting to process setup and beyond, the proper network software
solution offers a plethora of chances to cut expenses and improve customer experience. For
businesses to develop and thrive, network software is the most effective way to innovate and
upgrade networks
IP Subnetting
The preparation of breaking a network into two or smaller networks is known as subnetting. It
improves network security and minimizes the size of the broadcast domain while increasing
routing efficiency.
Putty
Putty is an open-source tool that uses network protocols like Telnet and rlogin in conjunction with
an extreme terminal emulator for Windows and UNIX platforms. Putty uses all of the
aforementioned protocols to enable a remote session on a machine across a network. It's a popular
text-based communication tool, as well as a popular program for connecting Linux servers to
computers running Microsoft's operating system.
Name Dilshan
Position Network Engineer
Poor Good Excellent
1. Does the network system fulfil the ✔
requirements?
2. The security of this network? ✔
3. User-friendliness ✔
5.Access speed ✔
6. Server responses ✔
3. User-friendliness ✔
5.Access speed ✔
6. Server responses ✔
3. User-friendliness ✔
5.Access speed ✔
6. Server responses ✔
Task 04
Test case 1
Troubleshooting
The ability to troubleshoot problems is one of the benefits of network monitoring. We can save a
lot of time by figuring out what's wrong. With network monitoring, we can immediately
determine which device is causing the issue. Our support team will be able to detect and resolve
issues before users are even aware of them. Because our monitoring is never-ending, it can assist
us in detecting specific changes in our network's performance. It can be difficult to troubleshoot
problems that occur only sporadically or during peak hours, but a network monitor will help us
better understand what is going on.
Security
Keeping our data secure is one of the most crucial aspects of network monitoring. It will keep
track of everything and notify the network administrator if there are any problems before they
become serious. A network monitor can warn us if something isn't responding, our server is down,
or our disk space is running low, to name a few things. Network monitoring is the most proactive
technique to deal with problems so that we can keep ahead of them, especially when our
organization will be monitored 24 hours a day, seven days a week.
SolarWinds Network Performance Monitor is simple to install and use, and it can be up and
running in no time. The utility detects network devices automatically and installs them within an
hour. Its straightforward approach to network management makes it one of the most intuitive and
spontaneous user interfaces available.
The product is very adaptable, and the user interface is simple to administer and update. The web-
based performance dashboards, charts, and views can all be customized. For our complete
network infrastructure, we can develop a customized topology. We can also construct
personalized dependency-aware intelligent notifications, among other things.
Solarwinds NPM provides a long range of features that make it one of the best network
monitoring options available, including:
Automatically discover and scan networks for wired and wireless computers and devices
Use the NetPathTM Critical Path visualization function to quickly pinpoint network
performance issues.
Analyze Critical Data Points and Paths Across Your Network Using an Easy-to-Use
Performance Dashboard.
Robust Alerting System with Simple/Complex Trigger Options.
Use their New Network InsightTM for CISCO ASA to keep an eye on CISCO ASA networks.
On Cisco ASA, monitor ACLs, VPN, Interface, and Monitor.
Firewall Rules Browser for monitoring firewall rules • Step-by-step analysis of critical network
Paths and components.
Create HeatMaps of Wifi Networks to pinpoint Wifi Dead Spots • Manage, Monitor, and
Analyze
Wifi Networks from the Dashboard.
Tracks the health of all servers, firewalls, routers, switches, desktops, laptops, and other
hardware.
Network and Netflow Monitoring in Real Time for Critical Network Components and Devices.
If the previous methods don't work (especially if the modem and router show that something isn't
working), it's time to contact your Internet Service Provider (ISP). It's sometimes as simple as sending
a reset command to the modem on their end. Sometimes there's a broader outage that affects a large
number of clients. The easiest approach to find out when something will be fixed is to call in.
Figure 83 troubleshoot 1
P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Compare common networking principles and how protocols
enable the effectiveness of networked systems.
P3
Discuss the operating principles of networking devices and
server types.
M2
Explore a range of server types and justify the selection of a
server, considering a given scenario regarding cost and
performance optimization.
LO 1 & LO2
D1
Considering a given scenario, identify the topology protocol
selected for the efficient utilisation of a networking system.
P5
Design a networked system to meet a given specification.
P6
Test and evaluate the design to meet the requirements and
analyze user feedback.
M3
D2
Design a maintenance schedule to support the networked
system.
P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D3
Use critical reflection to evaluate own work and justify valid
conclusions.