Networking Assignment Final PDF Free
Networking Assignment Final PDF Free
1
D.C.B.Thinuka Thiyasara - Networking
Overall, is the Assignment fit for purpose? Yes √ No
*If ‘No’ is recorded the Internal Verifier must recommend actions detailing the issues to be addressed. The Assessor and the
Internal Verifier must then confirm that the action has been undertaken and that the Assignment Brief is authorised for use before
being issued to learners.
2
D.C.B.Thinuka Thiyasara - Networking
Action required: Target Date for Date Action
(If none then please state n/a) Completion Completed
Assessor signature
Date
3
D.C.B.Thinuka Thiyasara - Networking
Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)
Wajira de alwis
Assessor Internal
Verifier
Unit 02: Networking
Unit(s)
LAN Design & Implementation for Alliance Health
Assignment title
D.C.B.Thinuka Thiyasara
Student’s name
Y/N
Y/N
4
D.C.B.Thinuka Thiyasara - Networking
amending? Y/N
Internal Verifier
signature Date
Programme Leader
signature (if required) Date
5
D.C.B.Thinuka Thiyasara - Networking
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID D.C.B.Thinuka Thiyasara
Assessor Feedback:
LO1 Examine networking principles and their protocols.
Resubmission Feedback:
6
D.C.B.Thinuka Thiyasara -
Grade: Assessor Signature: Date:
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades
decisions have been agreed at the assessment board.
Assignment Feedback
Formative Feedback: Assessor to Student
Action Plan
Summative feedback
7
D.C.B.Thinuka Thiyasara -
Assessor Date
signature
Student Date
signature
Computing
8
D.C.B.Thinuka Thiyasara -
Unit 02: Networking
Assignment 01
General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
9
D.C.B.Thinuka Thiyasara -
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No,
and Page Number on each page. This is useful if individual sheets become detached for any
reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory
information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the
before mentioned compulsory information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation
and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course
1
D.C.B.Thinuka Thiyasara -
1
D.C.B.Thinuka Thiyasara -
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct form. I further understand what it means to copy
another’s work.
[email protected] 2023.04.13
1
D.C.B.Thinuka Thiyasara -
Higher National Diploma in Computing
Assignment Brief
Student Name /ID Number
Unit Tutor
Issue Date
Submission Date
Submission format
The submission should be in the form of an individual report written in a concise, formal business style
using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using Harvard
referencing system. Please also provide an end list of references using the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures, although
you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:
1
D.C.B.Thinuka Thiyasara -
LO4 Implement and diagnose networked systems.
Scenario
Alliance Health is a technology-enabled solutions company that optimizes the revenue cycle of the US
healthcare industry where its global delivery center is located in Colombo. The company is planning to
expand their business operations with their latest branch at Matara and wants it to be one of the state-
of-the-art companies in Matara with the latest facilities.
Assume you have been appointed as the new network analyst of Alliance Health to plan, design and
restructure the existing network. Prepare a network architectural design and implement it with your
suggestions and recommendations to meet the company requirements.
The floor plan of the head office in Colombo is as follows:
Floor 1:
Reception area
Sales & Marketing Department (10 employees)
Customer Services Area – with Wi-Fi facilities
Floor 2:
Administration Department (30 Employees)
HR Department (20 employees)
Accounting & Finance Department (15 employees)
Audit Department (5 employees)
Business Development Department (5 employees)
Floor 3
1
D.C.B.Thinuka Thiyasara -
Video conferencing room
IT Department (60 employees)
The Server Room
Floor 2:
Administration Department (10 Employees)
HR Department (7 employees)
Accounting & Finance Department (8 employees)
IT Department (50 employees)
The conferencing room of the head office and Customer Services Areas of each
branch are to be equipped with Wi- Fi connections .
Connectivity between two branches ( Head Office and Matara) would allow the
intra branch connectivity between departments. ( Use of VPN is not compulsory)
The necessary IP address classes and ranges must be decided by the network
designer and should be used for all the departments except the server room .
Number of servers required for the Server room need to be decided by the
Network designer and should be assigned with 10 . 254 . 10 . 0 / 24 subnet. ( Uses static
IPs )
Sales and Marketing Team also needs to access Network resources using WIFI
1
D.C.B.Thinuka Thiyasara -
connectivity.
( Note: Clearly state your assumptions. You are allowed to design the network according to your
assumptions, but main requirements should not be violated)
Activi ty 01
Discuss the benefits and constraints of different network system types that can be
implemented in the Matara branch and the main IEEE Ethernet standards that can be
used in above LAN and WLAN design.
Discuss the importance and impact of network topologies and assess the main
network protocol suites that are used in network design using examples. Recommend
suitable network topology and network protocols for above scenario and evaluate
with valid points how the recommended topology demonstrates the efficient
utilization of the networking system of Matara branch.
Activi ty 02
Discuss the operating principles of network devices ( Ex: Router, Switch, Etc.) and
server types that can be used for above scenario while exploring different servers
that are available in today’ s market with their specifications. Recommend
server/ servers for the above scenario and justify your selection with valid points.
Discuss the inter- dependence of workstation hardware and networking software and
provide examples for networking software that can be used in above network design.
Activi ty 03
Prepare a written network design plan to meet the above- mentioned user requirements
including a blueprint drawn using a modeling tool ( Ex: Microsoft Visio,
1
D.C.B.Thinuka Thiyasara -
Edraw Max) . Test and evaluate the proposed design by analyzing user feedback
with the aim of optimizing your design and improving efficiency.
( Support your answer by providing the VLAN and IP subnetting scheme for the above
scenario and the l ist of devices, network components and software used to design the
network for above scenario and while justifying your selections.)
Install and configure Network services, devices and applications ( Ex: VLAN, Wi Fi,
DNS, Proxy, Web, Etc.) according to the proposed design to accomplish the user
requirements and design a detailed Maintenance schedule for above Network.
Activi ty 04
Implement a networked system based on your prepared design with valid evidences.
Develop test cases and conduct verification ( Ex: Ping, extended ping, trace route,
telnet, SSH, etc.) to test the above Network and analyse the test results against the
expected results. Recommend potential future enhancements for the networked
system with valid justifications and critically reflect on the implemented network,
including the plan, design, configurations, tests and the decisions made to enhance
the system.
1
D.C.B.Thinuka Thiyasara -
18
D.C.B.Thinuka Thiyasara -
Grading Rubric
P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Assess common networking principles and how protocols enable
the effectiveness of networked systems.
LO2 : Explain networking devices and operations
P3
Discuss the operating principles of networking devices and server
types.
P4
Discuss the interdependence of workstation hardware and
relevant networking software
M2
Explore a range of server types and justify the selection of a
server for a given scenario, regarding cost and performance
optimisation
LO 1 & LO2
D1 Evaluate the topology protocol selected for a given scenario and
how it demonstrates the efficient utilisation of a networking system.
1
D.C.B.Thinuka Thiyasara -
LO3 : Design efficient networked systems
P5
Design a networked system to meet a given specification.
P6
Design a maintenance schedule to support the networked system.
M3
Analyse user feedback on your designs with the aim of
optimising your design and improving efficiency.
D2
Critically reflect on the implemented network, including the
design and decisions made to enhance the system.
LO4 : Implement and diagnose networked systems
P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked systems.
D2 Critically reflect on the implemented network, including the
design and decisions made to enhance the system.
2
D.C.B.Thinuka Thiyasara -
Table of Contents
Table of figures.........................................................................................................................23
What is a network?..................................................................................................................25
Network Types.........................................................................................................................25
Local area networks.............................................................................................................25
Benefits of LAN.................................................................................................................26
Constraints of LAN...........................................................................................................26
Metropolitan area networks................................................................................................26
Benefits of MAN...............................................................................................................27
Constraints of MAN..........................................................................................................27
Wide area networks.............................................................................................................27
Benefits of wide area networks:......................................................................................28
Constraints of wide area networks:.................................................................................28
Virtual local area networks..................................................................................................28
Benefits of VLAN...............................................................................................................29
Constraints of VLAN.........................................................................................................29
IEEE standards......................................................................................................................29
Network standards...................................................................................................................31
What are the layers in networking?.....................................................................................31
Physical Layer...................................................................................................................32
Data-Link Layer.................................................................................................................32
Network Layer..................................................................................................................32
Network protocols....................................................................................................................32
Network Topologies.................................................................................................................33
Main topology types:...............................................................................................................34
Logical topologies:............................................................................................................34
Physical topologies:..........................................................................................................34
Ring topology....................................................................................................................34
Bus topology.....................................................................................................................35
Star topology....................................................................................................................36
Mesh topology..................................................................................................................37
Tree topology...................................................................................................................38
Network devices.......................................................................................................................39
Hub.......................................................................................................................................39
2
D.C.B.Thinuka Thiyasara -
Switch...................................................................................................................................40
Router...................................................................................................................................40
Modem.................................................................................................................................41
Repeater...............................................................................................................................41
Server types..............................................................................................................................42
Proxy servers........................................................................................................................42
Application servers...............................................................................................................42
File servers............................................................................................................................43
Database servers..................................................................................................................43
Web servers..........................................................................................................................43
Mail servers..........................................................................................................................43
Hardware selection for Alliance health....................................................................................44
Designing the networked system.............................................................................................47
Assigning and Configuring IPs to the network.........................................................................56
Assigning IP Adresses...............................................................................................................56
Serverpool Configuration.........................................................................................................62
Ping testing...............................................................................................................................62
Trace route testing...................................................................................................................63
DHCP testing.............................................................................................................................64
Implementing Microsoft server 2008 R2.................................................................................65
CC proxy installation.................................................................................................................73
Proxy permission creation....................................................................................................73
CC Proxy............................................................................................................................73
Wireshark installation and configuration.................................................................................77
Maintainance Shedule..............................................................................................................78
Why a maintance schedule is important.............................................................................78
The Maintance Shedule........................................................................................................79
Feed back on the networked system.......................................................................................80
Analysis feedbacks from the customers and employees.................................................82
References................................................................................................................................83
2
D.C.B.Thinuka Thiyasara -
Table of figures
Figure 1Network......................................................................................................................25
Figure 2LAn network...............................................................................................................25
Figure 3Man network...............................................................................................................26
Figure 4 Wan network..............................................................................................................27
Figure 5Vlan network...............................................................................................................28
Figure 6Network layers............................................................................................................31
Figure 7network protocols.......................................................................................................33
Figure 8Ring Topology............................................................................................................34
Figure 9 Bus Topology.............................................................................................................35
Figure 10 Star topology............................................................................................................36
Figure 11 Mesh Topology........................................................................................................37
Figure 12 tree Topology...........................................................................................................38
Figure 13 HUb..........................................................................................................................39
Figure 14switch........................................................................................................................40
Figure 15router.........................................................................................................................40
Figure 16modem......................................................................................................................41
Figure 17repeater......................................................................................................................41
Figure 18 Types Of Servers.....................................................................................................42
Figure 19 Selected server.........................................................................................................44
Figure 20Specs of the Server...................................................................................................45
Figure 21Workstaion selection for the networks.....................................................................46
Figure 22Visio Drawing for the colombo branch....................................................................52
Figure 23 Visio drawing for the matara branch.......................................................................53
Figure 24Cisco drawing for te colombo branch\......................................................................54
Figure 25cisco drawing for the matara branch.........................................................................55
Figure 26Assigning IP 1...........................................................................................................56
Figure 27Assigning IP2............................................................................................................57
Figure 28Assigning IP3............................................................................................................58
Figure 29Assigning IP4 Interfaciong range.............................................................................59
Figure 30Configuration of assigned IP....................................................................................60
Figure 31 assigned valns with IPs for the matara branch.........................................................61
Figure 32Serverpool.................................................................................................................62
Figure 33Ping testing 1............................................................................................................63
Figure 34Trace route testing....................................................................................................63
Figure 35 Dhcp configuration..................................................................................................64
Figure 36 Ms server 2008 R2 installation 1..............................................................................65
Figure 37Ms server 2008 R2 installation 2...............................................................................66
Figure 38Ms server 2008 R2 installation 3...............................................................................66
Figure 39Ms server 2008 R2 installation 4..............................................................................67
Figure 40Ms server 2008 R2 installation 5...............................................................................68
Figure 41Ms server 2008 R2 installation 6...............................................................................68
Figure 42Ms server 2008 R2 installation 7...............................................................................69
Figure 43Ms server 2008 R2 installation 8..............................................................................69
2
D.C.B.Thinuka Thiyasara -
Figure 44Ms server 2008 R2 installation 9...............................................................................69
Figure 45Ms server 2008 R2 installation 10............................................................................70
Figure 46Ms server 2008 R2 installation 11............................................................................70
Figure 47Ms server 2008 R2 installation 12............................................................................71
Figure 48Ms server 2008 R2 installation 13............................................................................71
Figure 49Ms server 2008 R2 installation 14............................................................................72
Figure 50Ms server 2008 R2 installation 15.............................................................................72
Figure 51 CC proxy installation 1..............................................................................................73
Figure 52CC proxy installation 2..............................................................................................74
Figure 53CC proxy installation 3..............................................................................................74
Figure 54CC proxy installation 4.............................................................................................75
Figure 55CC proxy installation 5..............................................................................................75
Figure 56CC proxy installation 6.............................................................................................76
Figure 57Wireshark installation 1............................................................................................77
Figure 58wireshark installation 2.............................................................................................77
Figure 59Wireshark running....................................................................................................78
Figure 63Feedback form page 1...............................................................................................80
Figure 64 Feedback form page 2..............................................................................................81
Figure 65 Analysis of feedback 1.............................................................................................82
Figure 66Analysis of feedback 2..............................................................................................82
2
D.C.B.Thinuka Thiyasara -
What is a network?
Figure 1Network
Network Types
Mainly there are few different types of networks based on their physical
They are,
LAN (Local area networks)
MAN (Metropolitan area networks)
WAN (Wide area networks)
VLAN (virtual local area networks)
2
D.C.B.Thinuka Thiyasara -
Figure 2LAn network
A local network area is designed to operate over a small physical area such as a building.
Normally we use LANs only to connect two or more computers. And for the medium,
coaxial and twisted pair cables are commonly used. But LANs can also be connected
wirelessly. Also, Ethernet LANs are more commonly used than others.
Benefits of LAN
3. Personal computing
4. Document distribution
Constraints of LAN
2
D.C.B.Thinuka Thiyasara -
A bigger version of LAN is called a MAN and it covers a lot more area. It also can be
connected through cables and optical fiber cables are commonly used. MANs can be
spanned even over a whole city. The cable television and telephone network of a city is a
good example. Generally, MANs can be built as private or public networks.
Benefits of MAN:
Constraints of MAN:
The largest spread network yet is WAN and it even covers the whole globe. As
a result of wide area networks two computers from a long distance like across
countries can yet be connected. Most commonly wireless media are used to
connect a WAN and they may span beyond the 100km range.
2
D.C.B.Thinuka Thiyasara -
The best example of a wide area network is the internet. Also, the WWW
(World Wide Web) is a good example.
1. Increase efficiency
2. Easy of communication
3. Large network coverage
4. Centralized IT infrastructure
VLAN which stands for virtual local area networks is a network which consist multiple
LAN networks. It gives the opportunity to establish a connection between multiple networks
and to function as a one logical networks. VLAN s are most commonly used in a limited
2
D.C.B.Thinuka Thiyasara -
area such as school office or a building because its’ main purpose is to communicate and
share resources easily to different groups.
As an example we can use a VLAN to connect multiple departments’ networks to function
as a one main network. U can have different virtual networks for each department such as
HR marketing sales and all of them connected to the companies’ main network.
Benefits of VLAN
Constraints of VLAN
In conclusion different system types that can be implemented on matara branch are above. In
this scenario it’s a LAN implemented in matara branch of alliance health.
Because it only spreads in three floors
(Solutions, 2009-2023)
IEEE standards
IEEE standards in computer networking are used to ensure the communication between
various devices. Those standards make sure that internet and network service and all related
technologies follows the guidelines and practices them so that devices can work properly.
IEEE society started the project 802 in 1985 to establish a standard communication between
various devices. And IEEE 802 is a collection of standards that deal with datalink layer and
physical layer technologies like Ethernet and wireless communication.
2
D.C.B.Thinuka Thiyasara -
Some of them are as follows with descriptions;
So as for the scenario some of those standards will be used in Alliance health Company.
(https://www.scaler.com/, 2022)
3
D.C.B.Thinuka Thiyasara -
Network standards
3
D.C.B.Thinuka Thiyasara -
Physical Layer
The physical network layer specifies the characteristics of the hardware to be used for the
network. For example, it specifies the physical characteristics of the communications media.
The physical layer of TCP/IP describes hardware standards such as IEEE 802.3, the
specification for Ethernet network media, and RS-232, the specification for standard pin
connectors.
Data-Link Layer
The data-link layer identifies the network protocol type of the packet, in this case TCP/IP. It
also provides error control and "framing." Ethernet IEEE 802.2 framing and Point-to-Point
Protocol (PPP) are examples of data-link layer protocols.
Network Layer
This layer, also known as the network layer, accepts and delivers packets for the network. It
includes the powerful Internet protocol (IP), the Address Resolution Protocol (ARP)
protocol, and the Internet Control Message Protocol (ICMP) protocol.
(Imperva, 2022)
Network protocols
Application layer: - NFS, NIS+, DNS, telnet, ftp, rlogin, rsh, rcp , RIP, RDISC, SNMP
Transport layer: - TCP, UDP
Network layer: - IP, ARP, ICMP
Data Link Layer: - PPP, IEEE 802.2
Lnk (Physical) Layer: - Ethernet Token Ring, RS-232
(Anon., 2022)
3
D.C.B.Thinuka Thiyasara -
Figure 7network protocols
Network Topologies
Simply topologies helps us to understand the different elements of the network , how
the devices are connected and the structure of the network. Because of it we can take a proper
understanding of what to expect from the network and how to enhance the performance and
efficiency of the network.
So we need to carefully place and connect devises to the network. Establishing the best
suitable topologies to the network matters so much and can make a big difference to the
network.
We should compare and study network topologies to choose the most suitable topology to our
network.
3
D.C.B.Thinuka Thiyasara -
Main topology types:
Logical topologies:
Ethernet
Physical topologies:
Ring topology
Bus topology
Star topology
Mesh topology
Tree topology.
Ring topology
This connects devices to each other in a line that it turns into a closed loop. So data traffics
need to travel through all devices in its path to reach the destination.
Advantages: Fast execution, less chance of packet collision. A network server is not needed.
Disadvantages: If one device fail entire network is impacted
3
D.C.B.Thinuka Thiyasara -
Also because of it can be difficult to architect the necessary cabling; this topology does not
suits well to our requirements.
Bus topology
It connects every device on the network to a cable that runs through the network structure
providing a central point of access just like working as a central hub. And the specialty is that
the network fully depends on this cable and any vulnerability of this cable can directly break
down the network.
Advantages: High efficiency on a small network, easy to connect the nodes to the network
without affecting the entire network
Disadvantages: Not suitable for large networks, additional devices may slow down the
network
3
D.C.B.Thinuka Thiyasara -
Star topology
This is a type of network which connects all the devices to a central node known as the
switch or hub which makes a physical appearance of a star .
Advantages: It is very reliable and high performing as no data collision can occur, Easier to
put in, and robust in nature
Disadvantages: Require more cables compared to others, more expensive and need a server
computer
Considering the pluses and minuses of this topology and due to the lack of cost-efficiency
My decision is to not to use this topology as well because we need be considered about the
overall cost of the network.
3
D.C.B.Thinuka Thiyasara -
Mesh topology
This is a topology type that interconnects every node to each and every other nodes .
Advantages: Adding new devices does not affect the network, almost impossible to take
down
Disadvantages: It's costly as compared to the opposite network topologies, Difficult to set up
initially.
In my opinion simply this is not suitable at all because with the number of networks and
computers we have ; implementing this topology could make serious problems And also
considering the potential high cost of cables this topology is not suitable.
3
D.C.B.Thinuka Thiyasara -
Tree topology
Tree topology incorporates elements of both bus and star topologies and it is very important
at some scenarios .It is basically star topologies connected as a bus type.
Advantages: The other nodes in a network are not affected if one of their nodes gets damaged
or does not work, simplicial ty of operation
Disadvantages: This network is very difficult to configure as compared to the other network
topologies, and the length of a segment is limited.
(javatpoint, 2022)
Considering the situation at Alliance health and referring to the cost limitations we’ll have; I
have decided to choose this topology to our network. Because we can easily divide the sub
networks physically and also as the leaf of a tree we can add computers to the network. It
makes the network more scalable which is important in the growth of the matara branch.
As a common problem companies have network malfunctioning is so far prevented by using
this topology because if a computer or a few go down it will never effect the network .Star
topology is also a topology full of benefits me are using star topologies as connected to a tree
pattern so Alliance health matara branch can have many more advantages of using this
topology. In my point of view as we are breaking the network into several departments and
because of the lack of space and because we are only using a one server it might not be easy
to manage the cabling and establishing the connections. So by using this topology it provides
3
D.C.B.Thinuka Thiyasara -
a better hierarchical with a neat central data arrangement. With the help of those benefits we
can have a well-managed and designed network for matara branch.
Network devices
Network devices are physical devices that are required for a network to communicate and
interact with other hardware on a network.
Hub
Switch
Router
Modem
Repeater
Hub
Figure 13 HUb
This is a simple network device that connects multiple computers together. Hub broadcasts
the data to every computer c, meaning it has no intelligence to share data separately to
different computers.
3
D.C.B.Thinuka Thiyasara -
Switch
Figure 14switch
switch is a device that connects devices in to a network to communicate with each other. The
specialty is that we can control the data receiving and sending.
Router
Figure 15router
this is used to establish a connection between two or more networks using IP addresses.
4
D.C.B.Thinuka Thiyasara -
Modem
Figure 16modem
- This is used to modulate and demodulate analog signals and encode and decode digital
signals.
Repeater
Figure 17repeater
- use of this device is to amplify the strength of the signals. It receives signals ans simply
restrains them at a higher level of strength.
(Melnick, 2022)
4
D.C.B.Thinuka Thiyasara -
Server types
Server types are often defined by the workloads they can manage. Nowadays there are many
server types out in the world.
Proxy servers
– Proxy server is basically used for security and privacy purposes. And also it is used to
control bandwidth, load balance and internet usage.
Application servers
– This servers are used as platform middleware which resides between OS and other external
resources
4
D.C.B.Thinuka Thiyasara -
File servers
– It is responsible for the storage and management of all the files of a network so every other
device can access them.
Database servers
– this runs database software which helps to organize and retreat data from the databases
stored in there.
Web servers
– This provides the ability to web connected devices to exchange files such as HTML
documents website’s component files and programming script files through the web.
Mail servers
– Its’ duty is to receive incoming emails and deliver outgoing emails correctly.
(networkstraining, 2022)
So above are the most common server types out there. After researching for the options out
there and considering the margins of the scenario I have decided to connect only one server to
Alliance healths’ system.
4
D.C.B.Thinuka Thiyasara -
Hardware selection for Alliance health.
I have decided to use only one server is because with the recent inflation issues in srilanka the
market price for electronic devices has gone so up. And as a growing company it is better to
have a balanced budget. On the other hand it also minimalize the power consumption which
isa solid advantage of managing the whole company with a one server .So I have carefully
chosen some hardware for the server and for the workstations.
Following are the screenshots of what I have decided to buy for the server.
4
D.C.B.Thinuka Thiyasara -
Figure 20Specs of the Server
4
D.C.B.Thinuka Thiyasara -
For the server OS there is a massive list of operating systems out in the market under
several companies. After researching I decided to install a Microsoft OS in the server and
bellow is the recently released list of server operating systems by Microsoft.
From the list of above it is very important to choose the most efficient server OS.
All Microsoft windows server operating systems are highly secured and technologically
advance. The latest version (2022) is the best out in the market but there is not much
companies or organizations started to use it yet. So my decision is to install ‘windows server
2019’ although it is the most stable server OS yet and it is also well known for the energy
consumption saving.
As for the computers across the matara branch it has to be a good selection in order to get
the maximum performance under an affordable budget to the company. With the bellow
being the chosen hardware and for the OS I decided to install windows 11 64bit version for
all the computers. With it being the latest and most secured operating system available right
now in the market.
4
D.C.B.Thinuka Thiyasara -
I have selected this for all the departments because managing a lot of models and types of
computers can be a bit inefficient to the company.
Both the server and the workstation are from a well rated organization which has a a great
service so the management of IT department will be easy.
First of all i had to make a list of devices and IP addresses of how they are going to be
separated for departments between two branches.
Following is the IP sub-netting scheme for both branches and the devices list for matara
branch
IP Scheme for head office located in colombo.
IP: 192.168.20.0 / 24
Block sizes:
2 / 4 / 8 / 16 / 32 / 64 / 128
IT 60 62-64
HR 20 22-32
Administration 30 32-32
Sales 10 12-16
Audit 5 7-8
4
D.C.B.Thinuka Thiyasara -
192.168.20.0 -Network ID
192.168.20.1 -First usable IP IT
192.168.20.64 -Network ID
192.168.20.95 -Broadcast IP
192.168.20.144 -Network ID
192.168.20.175 -Broadcast IP
192.168.20.176 -Network ID
192.168.20.177 -First usable IP Sales
4
D.C.B.Thinuka Thiyasara -
4
D.C.B.Thinuka Thiyasara -
192.168.20.192 -Network ID
192.168.20.193 -First usable IP Audit
192.168.20.198 -Last usable IP
192.168.20.199 -Broadcast IP
192.168.20.200 -Network ID
192.168.20.207 -Broadcast IP
IP: 192.168.30.0 / 24
Block sizes:
2 / 4 / 8 / 16 / 32 / 64 / 128
IT 50 52-64
HR 7 9-16
Administration 10 12-16
5
D.C.B.Thinuka Thiyasara -
192.168.30.0 -Network ID
192.168.30.1 -First usable IP IT
192.168.30.62 -Last usable IP
192.168.30.63 -Broadcast IP
192.168.30.64 -Network ID
192.168.30.95 -Broadcast IP
192.168.30.144 -Network ID
192.168.30.175 -Broadcast IP
5
D.C.B.Thinuka Thiyasara -
Following list contains the hardware selection for the alliance health Headoffice.
Following list contains the hardware selection for the alliance health matara branch.
5
D.C.B.Thinuka Thiyasara -
Following screenshot represents the drawn plan for the allians health matara and Colombo
branches.
5
D.C.B.Thinuka Thiyasara -
Figure 23 Visio drawing for the matara branch
5
D.C.B.Thinuka Thiyasara -
I started creating the network to meet the requirements using Cisco packet tracer.
Divided the networks into departments and created VLANs per each department and
connected all of them through a multilayer switch and assigned IP addresses to all the
VLANs and devices.
The following screenshot shows the created system using cisco packet Tracer.
5
D.C.B.Thinuka Thiyasara -
Figure 25cisco drawing for the matara branch
5
D.C.B.Thinuka Thiyasara -
Assigning and Configuring IPs to the network.
Assigning IP Adresses
Figure 26Assigning IP 1
5
D.C.B.Thinuka Thiyasara -
Figure 27Assigning IP2
5
D.C.B.Thinuka Thiyasara -
Figure 28Assigning IP3
5
D.C.B.Thinuka Thiyasara -
Figure 29Assigning IP4 Interfaciong range
6
D.C.B.Thinuka Thiyasara -
Figure 30Configuration of assigned IP
6
D.C.B.Thinuka Thiyasara -
Figure 31 assigned valns with IPs for the matara branch
6
D.C.B.Thinuka Thiyasara -
Serverpool Configuration.
Figure 32Serverpool
Ping testing
Test NO 1:
Status = successful
6
D.C.B.Thinuka Thiyasara -
Figure 33Ping testing 1
Status = successful
6
D.C.B.Thinuka Thiyasara -
DHCP testing.
6
D.C.B.Thinuka Thiyasara -
Implementing Microsoft server 2008 R2
6
D.C.B.Thinuka Thiyasara -
Step 02 – click on the network and sharing center.
6
D.C.B.Thinuka Thiyasara -
Step 05 – Click properties option of local area connection window.
6
D.C.B.Thinuka Thiyasara -
Figure 40Ms server 2008 R2
Step 07 - Select “use the following IP address” option and give IP address as
192.168.10.1 for server OS and 255.255.255.0 is the subnet mask and also 10.0.0.1 for
use as chosen DNS server IP.
6
D.C.B.Thinuka Thiyasara -
Figure 42Ms server 2008 R2
Step 09 - Then type “dcpromo” command to get active directory domain service
Installation.
Step 10 - An active directory domain services installation wizard, click “use advanced
installation” and click next option.n wizard.
Step 11- Select “create a new domain in a new forest” and click next.
7
D.C.B.Thinuka Thiyasara -
Step 12- Type ALLIANCE HEALTH domain name.
Step 13- Select windows 2003 as the domain functional level in domain functional level drop
down list and click next.
7
D.C.B.Thinuka Thiyasara -
Step 14 - Tick DNS server for additional domain controller options and click next.
Step -15 Select location for database, log files and SYSVQL. Use file paths in system
defaults and click next.
7
D.C.B.Thinuka Thiyasara -
Step 16 - Type a strong password for directory services store mode administrator
.Password
Step 17- The final process of active directory domain services installation is creating the
domain. In creating window, tick “reboot on completion” option.
7
D.C.B.Thinuka Thiyasara -
CC proxy installation
CC Proxy.
With the well-liked proxy server program CC Proxy, your local network can be configured to
share an internet connection. Internet sharing, bandwidth control, access control, logging, and
monitoring are common uses for CC Proxy. CC Proxy is an effective tool for controlling
internet usage and access within a local network.
Windows-based CC Proxy is a simple-to-use proxy server program. It offers a 3-user free
version for individuals and household users to quickly and easily create their proxy server.
Below is a step-by-step tutorial for you.
7
D.C.B.Thinuka Thiyasara -
Step 2 - Create Accounts for Client Computers on the Proxy Server - Select permit only form
the permit drop down box.
7
D.C.B.Thinuka Thiyasara -
Then select the correct settings under the Auth Type
7
D.C.B.Thinuka Thiyasara -
Figure 56CC proxy installation 6
7
D.C.B.Thinuka Thiyasara -
Wireshark installation and configuration.
7
D.C.B.Thinuka Thiyasara -
Figure 59Wireshark running
Maintainance Shedule
Well-maintained networks encounter fewer problems and are much easier to troubleshoot
than those left without consistent upkeep. To ensure that you don’t find yourself running with
faulty settings, risking damage to both software and hardware over time, you will need to
clean up your network regularly. That is where network maintenance comes in, and it is often
most effective through a comprehensive third-party platform.
Network cybersecurity: Implementing robust and up-to-date network defense layers, such
as traffic-managing firewalls, virtual private networks, user access controls, double
authentication measures, log inspections for usage documentation, real-time breach
notifications and auto-generated security reports.
Network performance: Analyzing top network performance concerns influencing the speed
and reliability of your devices, including bandwidth usage, traffic patterns, bottlenecks,
frequently down or crashed servers, connection lags, delays and more.
7
D.C.B.Thinuka Thiyasara -
Network scalability: Ensuring proper software and hardware systems fitting your current
operations, number of network users, endpoint locations and businesses functions.
Regular hardware and software updates: Scheduling updates prorated across network
components and interfaces, which in turn bolsters both a network’s overall performance and
security defenses.
Preemptive network repairs: Using auto-generated reports and analytics to spot and patch
usage problems across the IT ecosystem — or at the very least troubleshooting them —
before they turn existential.
(services, September 27th, 2018)
Subject
Check Cabling
Check Disk usage Check hardware errors
and ports
Check and
Check System Security Change Passwords
update
Applications
Sequence Daily Monthly Twice a week Software
Wednesday and Maintenance
Day Everyday Thursday Saturday
Time 10:00 10:00 10:00
Responsible Network security Network security
Network administrator
person engineer engineer
8
D.C.B.Thinuka Thiyasara -
Feed back on the networked system.
8
D.C.B.Thinuka Thiyasara -
Figure 61 Feedback form page 2
8
D.C.B.Thinuka Thiyasara -
Analysis feedbacks from the customers and employees..
8
D.C.B.Thinuka Thiyasara -
References
8
D.C.B.Thinuka Thiyasara -