0% found this document useful (0 votes)
128 views84 pages

Networking Assignment Final PDF Free

This document provides guidelines and rules for submitting an assignment for a networking course. It specifies formatting requirements like margins, font, spacing and covers that must be included. It also provides important points about following instructions, managing time, and not submitting late work without a valid reason.

Uploaded by

Mahe Clicks
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
128 views84 pages

Networking Assignment Final PDF Free

This document provides guidelines and rules for submitting an assignment for a networking course. It specifies formatting requirements like margins, font, spacing and covers that must be included. It also provides important points about following instructions, managing time, and not submitting late work without a valid reason.

Uploaded by

Mahe Clicks
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 84

INTERNAL VERIFICATION – ASSIGNMENT BRIEF

Programme Title: HND in Computing

Assessor Name: Wajira de alwis

Internal Verifier Name:

Unit or Component Number and Title: Unit 02 - Networking

Assignment title: LAN Design & Implementation for Alliance Health

Assessment criteria targeted by this


LO1, LO2, LO3, LO4
assignment brief:

Is this an Authorised Assignment Brief N/A


published by Pearson? If so, has it
been amended by the Assessor in any
way? Please give details.
(If using the Authorised Assignment Brief ‘off
the shelf’ with no amendments, please answer
the question marked * in the checklist only)

Has this assignment been submitted to Yes No


the Assignment Checking Service?
(If Yes, please keep a copy of the ACS √
feedback with this form)

INTERNAL VERIFIER CHECKLIST Y/N

Are the programme and unit details accurate? Y

*Are clear deadlines for assessment given? TBC

Is the time frame of an appropriate duration? Y

Is there a suitable vocational scenario or context? Y

Are the assessment criteria to be addressed stated accurately? Y

Does each task show which criteria are being addressed? Y

Do the tasks meet the assessment requirements of the unit/s? Y

Is it clear what evidence the learner needs to generate? Y

Is it likely to generate evidence that is valid and sufficient? Y

1
D.C.B.Thinuka Thiyasara - Networking
Overall, is the Assignment fit for purpose? Yes √ No

*If ‘No’ is recorded the Internal Verifier must recommend actions detailing the issues to be addressed. The Assessor and the
Internal Verifier must then confirm that the action has been undertaken and that the Assignment Brief is authorised for use before
being issued to learners.

2
D.C.B.Thinuka Thiyasara - Networking
Action required: Target Date for Date Action
(If none then please state n/a) Completion Completed

General Comments (if appropriate)

Assignment Brief Authorised for Use:

Internal Verifier signature Date

Assessor signature
Date

Lead Internal Verifier signature (if


appropriate)
[email protected] Date 2022/06/13

3
D.C.B.Thinuka Thiyasara - Networking
Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)

INTERNAL VERIFICATION – ASSESSMENT DECISIONS

Programme title BTEC Higher National Diploma in Computing

Wajira de alwis

Assessor Internal
Verifier
Unit 02: Networking

Unit(s)
LAN Design & Implementation for Alliance Health
Assignment title
D.C.B.Thinuka Thiyasara

Student’s name

List which assessment criteria Pass Merit Distinction


the Assessor has awarded.

INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded match


those shown in the assignment brief?

Y/N

Is the Pass/Merit/Distinction grade awarded


justified by the assessor’s comments on the Y/N
student work?

Has the work been assessed


accurately? Y/N

Is the feedback to the student:


Give details:
• Constructive?
• Linked to relevant assessment criteria? Y/N
• Identifying opportunities for improved Y/N
performance? Y/N
• Agreeing actions?

Y/N

Does the assessment decision need

4
D.C.B.Thinuka Thiyasara - Networking
amending? Y/N

Assessor signature Date

Internal Verifier signature Date

Programme Leader signature (if required)


Date

Confirm action completed


Remedial action taken
Give details:

Assessor signature Date

Internal Verifier
signature Date

Programme Leader
signature (if required) Date

5
D.C.B.Thinuka Thiyasara - Networking
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID D.C.B.Thinuka Thiyasara

Unit Title Unit 02: Networking

Assignment Number 1 Assessor


13.04.2023 Date Received
Submission Date 1st submission

Date Received 2nd


Re-submission Date submission

Assessor Feedback:
LO1 Examine networking principles and their protocols.

Pass, Merit & DistinctionP1 P2 M1 D1


Descripts

LO2 Explain networking devices and operations.


Pass, Merit & DistinctionP3 P4 M2
Descripts

LO3 Design efficient networked systems.


Pass, Merit & DistinctionP5 P6 M3 D2
Descripts

LO4 Implement and diagnose networked systems.


Pass, Merit & DistinctionP7 P8 M4
Descripts

Grade: Assessor Signature: Date:

Resubmission Feedback:

6
D.C.B.Thinuka Thiyasara -
Grade: Assessor Signature: Date:

Internal Verifier’s Comments:

Signature & Date:

* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades
decisions have been agreed at the assessment board.

Assignment Feedback
Formative Feedback: Assessor to Student

Action Plan

Summative feedback

Feedback: Student to Assessor

7
D.C.B.Thinuka Thiyasara -
Assessor Date
signature

Student Date
signature

Pearson Higher Nationals in

Computing

8
D.C.B.Thinuka Thiyasara -
Unit 02: Networking
Assignment 01

General Guidelines

1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.

9
D.C.B.Thinuka Thiyasara -
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.

Word Processing Rules

1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No,
and Page Number on each page. This is useful if individual sheets become detached for any
reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.

Important Points:

1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory
information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the
before mentioned compulsory information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation
and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course

1
D.C.B.Thinuka Thiyasara -
1
D.C.B.Thinuka Thiyasara -
Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct form. I further understand what it means to copy
another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of Pearson UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my
own, and where I have made use of another’s work, I will attribute the source in the correct way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Pearson, UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.

Student’s Signature: Date:

[email protected] 2023.04.13

1
D.C.B.Thinuka Thiyasara -
Higher National Diploma in Computing
Assignment Brief
Student Name /ID Number

Unit Number and Title Unit 2: Networking

Academic Year 2022/23

Unit Tutor

Assignment Title LAN Design & Implementation for Alliance Health

Issue Date

Submission Date

IV Name & Date

Submission format

The submission should be in the form of an individual report written in a concise, formal business style
using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using Harvard
referencing system. Please also provide an end list of references using the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures, although
you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:

LO1 Examine networking principles and their protocols.

LO2 Explain networking devices and operations.

LO3 Design efficient networked systems.

1
D.C.B.Thinuka Thiyasara -
LO4 Implement and diagnose networked systems.

Assignment Brief and Guidance:

Scenario

Alliance Health is a technology-enabled solutions company that optimizes the revenue cycle of the US
healthcare industry where its global delivery center is located in Colombo. The company is planning to
expand their business operations with their latest branch at Matara and wants it to be one of the state-
of-the-art companies in Matara with the latest facilities.

Assume you have been appointed as the new network analyst of Alliance Health to plan, design and
restructure the existing network. Prepare a network architectural design and implement it with your
suggestions and recommendations to meet the company requirements.
The floor plan of the head office in Colombo is as follows:
Floor 1:
 Reception area
 Sales & Marketing Department (10 employees)
 Customer Services Area – with Wi-Fi facilities

Floor 2:
 Administration Department (30 Employees)
 HR Department (20 employees)
 Accounting & Finance Department (15 employees)
 Audit Department (5 employees)
 Business Development Department (5 employees)

Floor 3

1
D.C.B.Thinuka Thiyasara -
 Video conferencing room
 IT Department (60 employees)
 The Server Room

The floor plan of the branch in Matara is as follows:


Floor 1:
 Reception area
 Customer Services Area– with Wi-Fi facilities

Floor 2:
 Administration Department (10 Employees)
 HR Department (7 employees)
 Accounting & Finance Department (8 employees)
 IT Department (50 employees)

Following requirements are given by the Management.


 All the departments must be separated with unique subnet .

 The conferencing room of the head office and Customer Services Areas of each
branch are to be equipped with Wi- Fi connections .

 Connectivity between two branches ( Head Office and Matara) would allow the
intra branch connectivity between departments. ( Use of VPN is not compulsory)

 The necessary IP address classes and ranges must be decided by the network
designer and should be used for all the departments except the server room .

 Number of servers required for the Server room need to be decided by the
Network designer and should be assigned with 10 . 254 . 10 . 0 / 24 subnet. ( Uses static
IPs )

 Sales and Marketing Team also needs to access Network resources using WIFI

1
D.C.B.Thinuka Thiyasara -
connectivity.

( Note: Clearly state your assumptions. You are allowed to design the network according to your
assumptions, but main requirements should not be violated)

Activi ty 01
 Discuss the benefits and constraints of different network system types that can be
implemented in the Matara branch and the main IEEE Ethernet standards that can be
used in above LAN and WLAN design.

 Discuss the importance and impact of network topologies and assess the main
network protocol suites that are used in network design using examples. Recommend
suitable network topology and network protocols for above scenario and evaluate
with valid points how the recommended topology demonstrates the efficient
utilization of the networking system of Matara branch.

Activi ty 02
 Discuss the operating principles of network devices ( Ex: Router, Switch, Etc.) and
server types that can be used for above scenario while exploring different servers
that are available in today’ s market with their specifications. Recommend
server/ servers for the above scenario and justify your selection with valid points.

 Discuss the inter- dependence of workstation hardware and networking software and
provide examples for networking software that can be used in above network design.

Activi ty 03
 Prepare a written network design plan to meet the above- mentioned user requirements
including a blueprint drawn using a modeling tool ( Ex: Microsoft Visio,

1
D.C.B.Thinuka Thiyasara -
Edraw Max) . Test and evaluate the proposed design by analyzing user feedback
with the aim of optimizing your design and improving efficiency.

( Support your answer by providing the VLAN and IP subnetting scheme for the above
scenario and the l ist of devices, network components and software used to design the
network for above scenario and while justifying your selections.)

 Install and configure Network services, devices and applications ( Ex: VLAN, Wi Fi,
DNS, Proxy, Web, Etc.) according to the proposed design to accomplish the user
requirements and design a detailed Maintenance schedule for above Network.

* Note: - Screen shots of Configuration scripts should be presented.

Activi ty 04
 Implement a networked system based on your prepared design with valid evidences.

 Develop test cases and conduct verification ( Ex: Ping, extended ping, trace route,
telnet, SSH, etc.) to test the above Network and analyse the test results against the
expected results. Recommend potential future enhancements for the networked
system with valid justifications and critically reflect on the implemented network,
including the plan, design, configurations, tests and the decisions made to enhance
the system.

1
D.C.B.Thinuka Thiyasara -
18
D.C.B.Thinuka Thiyasara -
Grading Rubric

Grading Criteria Achieved Feedback

LO1 : Examine networking principles and their protocols.

P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Assess common networking principles and how protocols enable
the effectiveness of networked systems.
LO2 : Explain networking devices and operations

P3
Discuss the operating principles of networking devices and server
types.
P4
Discuss the interdependence of workstation hardware and
relevant networking software
M2
Explore a range of server types and justify the selection of a
server for a given scenario, regarding cost and performance
optimisation

LO 1 & LO2
D1 Evaluate the topology protocol selected for a given scenario and
how it demonstrates the efficient utilisation of a networking system.

1
D.C.B.Thinuka Thiyasara -
LO3 : Design efficient networked systems

P5
Design a networked system to meet a given specification.
P6
Design a maintenance schedule to support the networked system.
M3
Analyse user feedback on your designs with the aim of
optimising your design and improving efficiency.
D2
Critically reflect on the implemented network, including the
design and decisions made to enhance the system.
LO4 : Implement and diagnose networked systems

P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.

M4
Recommend potential enhancements for the networked systems.
D2 Critically reflect on the implemented network, including the
design and decisions made to enhance the system.

2
D.C.B.Thinuka Thiyasara -
Table of Contents
Table of figures.........................................................................................................................23
What is a network?..................................................................................................................25
Network Types.........................................................................................................................25
Local area networks.............................................................................................................25
Benefits of LAN.................................................................................................................26
Constraints of LAN...........................................................................................................26
Metropolitan area networks................................................................................................26
Benefits of MAN...............................................................................................................27
Constraints of MAN..........................................................................................................27
Wide area networks.............................................................................................................27
Benefits of wide area networks:......................................................................................28
Constraints of wide area networks:.................................................................................28
Virtual local area networks..................................................................................................28
Benefits of VLAN...............................................................................................................29
Constraints of VLAN.........................................................................................................29
IEEE standards......................................................................................................................29
Network standards...................................................................................................................31
What are the layers in networking?.....................................................................................31
Physical Layer...................................................................................................................32
Data-Link Layer.................................................................................................................32
Network Layer..................................................................................................................32
Network protocols....................................................................................................................32
Network Topologies.................................................................................................................33
Main topology types:...............................................................................................................34
Logical topologies:............................................................................................................34
Physical topologies:..........................................................................................................34
Ring topology....................................................................................................................34
Bus topology.....................................................................................................................35
Star topology....................................................................................................................36
Mesh topology..................................................................................................................37
Tree topology...................................................................................................................38
Network devices.......................................................................................................................39
Hub.......................................................................................................................................39

2
D.C.B.Thinuka Thiyasara -
Switch...................................................................................................................................40
Router...................................................................................................................................40
Modem.................................................................................................................................41
Repeater...............................................................................................................................41
Server types..............................................................................................................................42
Proxy servers........................................................................................................................42
Application servers...............................................................................................................42
File servers............................................................................................................................43
Database servers..................................................................................................................43
Web servers..........................................................................................................................43
Mail servers..........................................................................................................................43
Hardware selection for Alliance health....................................................................................44
Designing the networked system.............................................................................................47
Assigning and Configuring IPs to the network.........................................................................56
Assigning IP Adresses...............................................................................................................56
Serverpool Configuration.........................................................................................................62
Ping testing...............................................................................................................................62
Trace route testing...................................................................................................................63
DHCP testing.............................................................................................................................64
Implementing Microsoft server 2008 R2.................................................................................65
CC proxy installation.................................................................................................................73
Proxy permission creation....................................................................................................73
CC Proxy............................................................................................................................73
Wireshark installation and configuration.................................................................................77
Maintainance Shedule..............................................................................................................78
Why a maintance schedule is important.............................................................................78
The Maintance Shedule........................................................................................................79
Feed back on the networked system.......................................................................................80
Analysis feedbacks from the customers and employees.................................................82
References................................................................................................................................83

2
D.C.B.Thinuka Thiyasara -
Table of figures
Figure 1Network......................................................................................................................25
Figure 2LAn network...............................................................................................................25
Figure 3Man network...............................................................................................................26
Figure 4 Wan network..............................................................................................................27
Figure 5Vlan network...............................................................................................................28
Figure 6Network layers............................................................................................................31
Figure 7network protocols.......................................................................................................33
Figure 8Ring Topology............................................................................................................34
Figure 9 Bus Topology.............................................................................................................35
Figure 10 Star topology............................................................................................................36
Figure 11 Mesh Topology........................................................................................................37
Figure 12 tree Topology...........................................................................................................38
Figure 13 HUb..........................................................................................................................39
Figure 14switch........................................................................................................................40
Figure 15router.........................................................................................................................40
Figure 16modem......................................................................................................................41
Figure 17repeater......................................................................................................................41
Figure 18 Types Of Servers.....................................................................................................42
Figure 19 Selected server.........................................................................................................44
Figure 20Specs of the Server...................................................................................................45
Figure 21Workstaion selection for the networks.....................................................................46
Figure 22Visio Drawing for the colombo branch....................................................................52
Figure 23 Visio drawing for the matara branch.......................................................................53
Figure 24Cisco drawing for te colombo branch\......................................................................54
Figure 25cisco drawing for the matara branch.........................................................................55
Figure 26Assigning IP 1...........................................................................................................56
Figure 27Assigning IP2............................................................................................................57
Figure 28Assigning IP3............................................................................................................58
Figure 29Assigning IP4 Interfaciong range.............................................................................59
Figure 30Configuration of assigned IP....................................................................................60
Figure 31 assigned valns with IPs for the matara branch.........................................................61
Figure 32Serverpool.................................................................................................................62
Figure 33Ping testing 1............................................................................................................63
Figure 34Trace route testing....................................................................................................63
Figure 35 Dhcp configuration..................................................................................................64
Figure 36 Ms server 2008 R2 installation 1..............................................................................65
Figure 37Ms server 2008 R2 installation 2...............................................................................66
Figure 38Ms server 2008 R2 installation 3...............................................................................66
Figure 39Ms server 2008 R2 installation 4..............................................................................67
Figure 40Ms server 2008 R2 installation 5...............................................................................68
Figure 41Ms server 2008 R2 installation 6...............................................................................68
Figure 42Ms server 2008 R2 installation 7...............................................................................69
Figure 43Ms server 2008 R2 installation 8..............................................................................69

2
D.C.B.Thinuka Thiyasara -
Figure 44Ms server 2008 R2 installation 9...............................................................................69
Figure 45Ms server 2008 R2 installation 10............................................................................70
Figure 46Ms server 2008 R2 installation 11............................................................................70
Figure 47Ms server 2008 R2 installation 12............................................................................71
Figure 48Ms server 2008 R2 installation 13............................................................................71
Figure 49Ms server 2008 R2 installation 14............................................................................72
Figure 50Ms server 2008 R2 installation 15.............................................................................72
Figure 51 CC proxy installation 1..............................................................................................73
Figure 52CC proxy installation 2..............................................................................................74
Figure 53CC proxy installation 3..............................................................................................74
Figure 54CC proxy installation 4.............................................................................................75
Figure 55CC proxy installation 5..............................................................................................75
Figure 56CC proxy installation 6.............................................................................................76
Figure 57Wireshark installation 1............................................................................................77
Figure 58wireshark installation 2.............................................................................................77
Figure 59Wireshark running....................................................................................................78
Figure 63Feedback form page 1...............................................................................................80
Figure 64 Feedback form page 2..............................................................................................81
Figure 65 Analysis of feedback 1.............................................................................................82
Figure 66Analysis of feedback 2..............................................................................................82

2
D.C.B.Thinuka Thiyasara -
What is a network?

Network is a connection of two or more computers connected to share resources.

Figure 1Network

Network Types

Mainly there are few different types of networks based on their physical
They are,
LAN (Local area networks)
MAN (Metropolitan area networks)
WAN (Wide area networks)
VLAN (virtual local area networks)

Local area networks

2
D.C.B.Thinuka Thiyasara -
Figure 2LAn network

A local network area is designed to operate over a small physical area such as a building.
Normally we use LANs only to connect two or more computers. And for the medium,
coaxial and twisted pair cables are commonly used. But LANs can also be connected
wirelessly. Also, Ethernet LANs are more commonly used than others.

Benefits of LAN

1. Easy file transfer and file access

2. Resource or peripherals sharing

3. Personal computing

4. Document distribution

Constraints of LAN

1. The cost must be high if the media used is cables


2. Some hardware might not operate properly

Metropolitan area networks

Figure 3Man network

2
D.C.B.Thinuka Thiyasara -
A bigger version of LAN is called a MAN and it covers a lot more area. It also can be
connected through cables and optical fiber cables are commonly used. MANs can be
spanned even over a whole city. The cable television and telephone network of a city is a
good example. Generally, MANs can be built as private or public networks.

Benefits of MAN:

1. Large area cover


2. Low propagation delay than LAN
3. High-speed data connectivity

Constraints of MAN:

1. Higher cost to implement


2. More congestion
3. Hard to design and maintain

Wide area networks

Figure 4 Wan network

The largest spread network yet is WAN and it even covers the whole globe. As
a result of wide area networks two computers from a long distance like across
countries can yet be connected. Most commonly wireless media are used to
connect a WAN and they may span beyond the 100km range.

2
D.C.B.Thinuka Thiyasara -
The best example of a wide area network is the internet. Also, the WWW
(World Wide Web) is a good example.

Benefits of wide area networks:

1. Increase efficiency
2. Easy of communication
3. Large network coverage
4. Centralized IT infrastructure

Constraints of wide area networks:

1. High initial investment costs


2. More errors and issues due to more coverage
3. Requires skilled technicians

Virtual local area networks

Figure 5Vlan network

VLAN which stands for virtual local area networks is a network which consist multiple
LAN networks. It gives the opportunity to establish a connection between multiple networks
and to function as a one logical networks. VLAN s are most commonly used in a limited

2
D.C.B.Thinuka Thiyasara -
area such as school office or a building because its’ main purpose is to communicate and
share resources easily to different groups.
As an example we can use a VLAN to connect multiple departments’ networks to function
as a one main network. U can have different virtual networks for each department such as
HR marketing sales and all of them connected to the companies’ main network.

Benefits of VLAN

1. Lets us easily segment our network


2. Helps to enhance network security
3. Can keep hosts separated by
4. Makes device management easier

Constraints of VLAN

1. Packet leaks can occur


2. Requires additional routers
3. Problems in interoperability can be seen.

In conclusion different system types that can be implemented on matara branch are above. In
this scenario it’s a LAN implemented in matara branch of alliance health.
Because it only spreads in three floors

(Solutions, 2009-2023)

IEEE standards

IEEE standards in computer networking are used to ensure the communication between
various devices. Those standards make sure that internet and network service and all related
technologies follows the guidelines and practices them so that devices can work properly.
IEEE society started the project 802 in 1985 to establish a standard communication between
various devices. And IEEE 802 is a collection of standards that deal with datalink layer and
physical layer technologies like Ethernet and wireless communication.

2
D.C.B.Thinuka Thiyasara -
Some of them are as follows with descriptions;

IEEE 802 It is used for the overview and architecture of LAN/MAN.


IEEE 802.1 It is used for bridging and management of LAN/MAN.
IEEE 802.1s It is used in multiple spanning trees.
IEEE 802.1 w It is used for rapid reconfiguration of spanning trees.
IEEE 802.1x It is used for network access control of ports.
IEEE 802.2 It is used in Logical Link Control (LLC).
IEEE 802.3 It is used in Ethernet (CSMA/CD access method).
IEEE 802.3ae It is used for 10 Gigabit Ethernet.
IEEE 802.7 It is used in broadband LAN.
IEEE 802.8 It is used in fiber optics.
IEEE 802.9 It is used in isochronous LANs.

So as for the scenario some of those standards will be used in Alliance health Company.

(https://www.scaler.com/, 2022)

3
D.C.B.Thinuka Thiyasara -
Network standards

What are the layers in networking?

Figure 6Network layers

It is the organization of programming into separate functional components that interact in


some sequential and hierarchical way
1. Physical Network Layer
2. Datalink Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer

3
D.C.B.Thinuka Thiyasara -
Physical Layer

The physical network layer specifies the characteristics of the hardware to be used for the
network. For example, it specifies the physical characteristics of the communications media.
The physical layer of TCP/IP describes hardware standards such as IEEE 802.3, the
specification for Ethernet network media, and RS-232, the specification for standard pin
connectors.

Data-Link Layer

The data-link layer identifies the network protocol type of the packet, in this case TCP/IP. It
also provides error control and "framing." Ethernet IEEE 802.2 framing and Point-to-Point
Protocol (PPP) are examples of data-link layer protocols.

Network Layer

This layer, also known as the network layer, accepts and delivers packets for the network. It
includes the powerful Internet protocol (IP), the Address Resolution Protocol (ARP)
protocol, and the Internet Control Message Protocol (ICMP) protocol.

(Imperva, 2022)

Network protocols

Application layer: - NFS, NIS+, DNS, telnet, ftp, rlogin, rsh, rcp , RIP, RDISC, SNMP
Transport layer: - TCP, UDP
Network layer: - IP, ARP, ICMP
Data Link Layer: - PPP, IEEE 802.2
Lnk (Physical) Layer: - Ethernet Token Ring, RS-232

(Anon., 2022)

3
D.C.B.Thinuka Thiyasara -
Figure 7network protocols

Network Topologies

Simply topologies helps us to understand the different elements of the network , how
the devices are connected and the structure of the network. Because of it we can take a proper
understanding of what to expect from the network and how to enhance the performance and
efficiency of the network.
So we need to carefully place and connect devises to the network. Establishing the best
suitable topologies to the network matters so much and can make a big difference to the
network.
We should compare and study network topologies to choose the most suitable topology to our
network.

3
D.C.B.Thinuka Thiyasara -
Main topology types:

Logical topologies:

Ethernet

Physical topologies:

Ring topology
Bus topology
Star topology
Mesh topology
Tree topology.

Ring topology

Figure 8Ring Topology

This connects devices to each other in a line that it turns into a closed loop. So data traffics
need to travel through all devices in its path to reach the destination.

Advantages: Fast execution, less chance of packet collision. A network server is not needed.
Disadvantages: If one device fail entire network is impacted

3
D.C.B.Thinuka Thiyasara -
Also because of it can be difficult to architect the necessary cabling; this topology does not
suits well to our requirements.

Bus topology

It connects every device on the network to a cable that runs through the network structure
providing a central point of access just like working as a central hub. And the specialty is that
the network fully depends on this cable and any vulnerability of this cable can directly break
down the network.

Figure 9 Bus Topology

Advantages: High efficiency on a small network, easy to connect the nodes to the network
without affecting the entire network
Disadvantages: Not suitable for large networks, additional devices may slow down the
network

So as mentioned considering the above reasons I decided not to use this


topology as well.

3
D.C.B.Thinuka Thiyasara -
Star topology

Figure 10 Star topology

This is a type of network which connects all the devices to a central node known as the
switch or hub which makes a physical appearance of a star .

Advantages: It is very reliable and high performing as no data collision can occur, Easier to
put in, and robust in nature
Disadvantages: Require more cables compared to others, more expensive and need a server
computer
Considering the pluses and minuses of this topology and due to the lack of cost-efficiency
My decision is to not to use this topology as well because we need be considered about the
overall cost of the network.

3
D.C.B.Thinuka Thiyasara -
Mesh topology

Figure 11 Mesh Topology

This is a topology type that interconnects every node to each and every other nodes .

Advantages: Adding new devices does not affect the network, almost impossible to take
down
Disadvantages: It's costly as compared to the opposite network topologies, Difficult to set up
initially.
In my opinion simply this is not suitable at all because with the number of networks and
computers we have ; implementing this topology could make serious problems And also
considering the potential high cost of cables this topology is not suitable.

3
D.C.B.Thinuka Thiyasara -
Tree topology

Figure 12 tree Topology

Tree topology incorporates elements of both bus and star topologies and it is very important
at some scenarios .It is basically star topologies connected as a bus type.
Advantages: The other nodes in a network are not affected if one of their nodes gets damaged
or does not work, simplicial ty of operation
Disadvantages: This network is very difficult to configure as compared to the other network
topologies, and the length of a segment is limited.

(javatpoint, 2022)

Considering the situation at Alliance health and referring to the cost limitations we’ll have; I
have decided to choose this topology to our network. Because we can easily divide the sub
networks physically and also as the leaf of a tree we can add computers to the network. It
makes the network more scalable which is important in the growth of the matara branch.
As a common problem companies have network malfunctioning is so far prevented by using
this topology because if a computer or a few go down it will never effect the network .Star
topology is also a topology full of benefits me are using star topologies as connected to a tree
pattern so Alliance health matara branch can have many more advantages of using this
topology. In my point of view as we are breaking the network into several departments and
because of the lack of space and because we are only using a one server it might not be easy
to manage the cabling and establishing the connections. So by using this topology it provides

3
D.C.B.Thinuka Thiyasara -
a better hierarchical with a neat central data arrangement. With the help of those benefits we
can have a well-managed and designed network for matara branch.

Network devices

Network devices are physical devices that are required for a network to communicate and
interact with other hardware on a network.

Here are some common types of network devices:

Hub
Switch
Router
Modem
Repeater

Hub

Figure 13 HUb

This is a simple network device that connects multiple computers together. Hub broadcasts
the data to every computer c, meaning it has no intelligence to share data separately to
different computers.

3
D.C.B.Thinuka Thiyasara -
Switch

Figure 14switch

switch is a device that connects devices in to a network to communicate with each other. The
specialty is that we can control the data receiving and sending.

Router

Figure 15router

this is used to establish a connection between two or more networks using IP addresses.

4
D.C.B.Thinuka Thiyasara -
Modem

Figure 16modem

- This is used to modulate and demodulate analog signals and encode and decode digital
signals.

Repeater

Figure 17repeater

- use of this device is to amplify the strength of the signals. It receives signals ans simply
restrains them at a higher level of strength.

(Melnick, 2022)

4
D.C.B.Thinuka Thiyasara -
Server types

Figure 18 Types Of Servers

Server types are often defined by the workloads they can manage. Nowadays there are many
server types out in the world.

Some of them are;

Proxy servers

– Proxy server is basically used for security and privacy purposes. And also it is used to
control bandwidth, load balance and internet usage.

Application servers

– This servers are used as platform middleware which resides between OS and other external
resources

4
D.C.B.Thinuka Thiyasara -
File servers

– It is responsible for the storage and management of all the files of a network so every other
device can access them.

Database servers

– this runs database software which helps to organize and retreat data from the databases
stored in there.

Web servers

– This provides the ability to web connected devices to exchange files such as HTML
documents website’s component files and programming script files through the web.

Mail servers

– Its’ duty is to receive incoming emails and deliver outgoing emails correctly.
(networkstraining, 2022)

So above are the most common server types out there. After researching for the options out
there and considering the margins of the scenario I have decided to connect only one server to
Alliance healths’ system.

4
D.C.B.Thinuka Thiyasara -
Hardware selection for Alliance health.

I have decided to use only one server is because with the recent inflation issues in srilanka the
market price for electronic devices has gone so up. And as a growing company it is better to
have a balanced budget. On the other hand it also minimalize the power consumption which
isa solid advantage of managing the whole company with a one server .So I have carefully
chosen some hardware for the server and for the workstations.

Following are the screenshots of what I have decided to buy for the server.

Figure 19 Selected server

And following screenshot is of the specs of the server selected.

4
D.C.B.Thinuka Thiyasara -
Figure 20Specs of the Server

4
D.C.B.Thinuka Thiyasara -
For the server OS there is a massive list of operating systems out in the market under
several companies. After researching I decided to install a Microsoft OS in the server and
bellow is the recently released list of server operating systems by Microsoft.

Windows Server 2022


Windows Server 2019
Windows Server 2016
Windows Server 2012
(Anon., 2023)

From the list of above it is very important to choose the most efficient server OS.
All Microsoft windows server operating systems are highly secured and technologically
advance. The latest version (2022) is the best out in the market but there is not much
companies or organizations started to use it yet. So my decision is to install ‘windows server
2019’ although it is the most stable server OS yet and it is also well known for the energy
consumption saving.

As for the computers across the matara branch it has to be a good selection in order to get
the maximum performance under an affordable budget to the company. With the bellow
being the chosen hardware and for the OS I decided to install windows 11 64bit version for
all the computers. With it being the latest and most secured operating system available right
now in the market.

Figure 21Workstaion selection for the networks

4
D.C.B.Thinuka Thiyasara -
I have selected this for all the departments because managing a lot of models and types of
computers can be a bit inefficient to the company.

Both the server and the workstation are from a well rated organization which has a a great
service so the management of IT department will be easy.

Designing the networked system

First of all i had to make a list of devices and IP addresses of how they are going to be
separated for departments between two branches.

Following is the IP sub-netting scheme for both branches and the devices list for matara
branch
IP Scheme for head office located in colombo.

IP: 192.168.20.0 / 24
Block sizes:
2 / 4 / 8 / 16 / 32 / 64 / 128

Department Required hosts Actual size & Block size

IT 60 62-64

HR 20 22-32

Accounting and finance 15 17-32

Administration 30 32-32

Sales 10 12-16

Audit 5 7-8

Business Development 5 7-8

4
D.C.B.Thinuka Thiyasara -
192.168.20.0 -Network ID
192.168.20.1 -First usable IP IT

192.168.20.62 -Last usable IP


192.168.20.63 -Broadcast IP

192.168.20.64 -Network ID

192.168.20.65 -First usable Human resources


IP 192.168.20.94 -Last usable
IP

192.168.20.95 -Broadcast IP

192.168.20.128 -Network ID Accounting & finance


192.168.20.129 -First usable IP

192.168.20.142 -Last usable IP


192.168.20.143 -Broadcast IP

192.168.20.144 -Network ID

192.168.20.145 -First usable Administration


IP 192.168.20.174 -Last usable
IP

192.168.20.175 -Broadcast IP

192.168.20.176 -Network ID
192.168.20.177 -First usable IP Sales

192.168.20.190 -Last usable IP


192.168.20.191 -Broadcast IP

4
D.C.B.Thinuka Thiyasara -
4
D.C.B.Thinuka Thiyasara -
192.168.20.192 -Network ID
192.168.20.193 -First usable IP Audit
192.168.20.198 -Last usable IP

192.168.20.199 -Broadcast IP

192.168.20.200 -Network ID

192.168.20.201 -First usable IP Business Development


192.168.20.206 -Last usable IP

192.168.20.207 -Broadcast IP

IP scheme for the matara branch.

IP: 192.168.30.0 / 24

Block sizes:
2 / 4 / 8 / 16 / 32 / 64 / 128

Department Required hosts Actual size & Block size

IT 50 52-64

HR 7 9-16

Accounting and finance 8 10-16

Administration 10 12-16

5
D.C.B.Thinuka Thiyasara -
192.168.30.0 -Network ID
192.168.30.1 -First usable IP IT
192.168.30.62 -Last usable IP

192.168.30.63 -Broadcast IP

192.168.30.64 -Network ID

192.168.30.65 -First usable


IP 192.168.30.94 -Last usable Human resources
IP

192.168.30.95 -Broadcast IP

192.168.30.128 -Network ID Accounting & finance


192.168.30.129 -First usable IP

192.168.30.142 -Last usable IP


192.168.30.143 -Broadcast IP

192.168.30.144 -Network ID

192.168.30.145 -First usable


IP 192.168.30.174 -Last usable Administration
IP

192.168.30.175 -Broadcast IP

5
D.C.B.Thinuka Thiyasara -
Following list contains the hardware selection for the alliance health Headoffice.

Device Quantity Model and brand

Servers 1 Dell – EMC PowerEdge T550

Computers 145 Dell – precision 3660

Switches 7 Cisco Catalyst 9200 Series


Switch

Wireless routers 1 Cisco 880 series

Cables Enough cabling for 3 floors Network cables and connectors

Network Routers 1 Cisco ISR 4221

Following list contains the hardware selection for the alliance health matara branch.

Device Quantity Model and brand

Servers 1 Dell – EMC PowerEdge T550

Computers 75 Dell – precision 3660

Switches 4 Cisco Catalyst 9200 Series


Switch

Wireless routers 1 Cisco 880 series

Cables Enough cabling for 2 floors Network cables and connectors

Network Routers 1 Cisco ISR 4221

5
D.C.B.Thinuka Thiyasara -
Following screenshot represents the drawn plan for the allians health matara and Colombo
branches.

Figure 22Visio Drawing for the colombo branch

5
D.C.B.Thinuka Thiyasara -
Figure 23 Visio drawing for the matara branch

5
D.C.B.Thinuka Thiyasara -
I started creating the network to meet the requirements using Cisco packet tracer.
Divided the networks into departments and created VLANs per each department and
connected all of them through a multilayer switch and assigned IP addresses to all the
VLANs and devices.
The following screenshot shows the created system using cisco packet Tracer.

Figure 24Cisco drawing for te colombo branch\

5
D.C.B.Thinuka Thiyasara -
Figure 25cisco drawing for the matara branch

5
D.C.B.Thinuka Thiyasara -
Assigning and Configuring IPs to the network.

Assigning IP Adresses

Following Screenshots are the codings of te ip assigning process.

Figure 26Assigning IP 1

5
D.C.B.Thinuka Thiyasara -
Figure 27Assigning IP2

5
D.C.B.Thinuka Thiyasara -
Figure 28Assigning IP3

5
D.C.B.Thinuka Thiyasara -
Figure 29Assigning IP4 Interfaciong range

6
D.C.B.Thinuka Thiyasara -
Figure 30Configuration of assigned IP

6
D.C.B.Thinuka Thiyasara -
Figure 31 assigned valns with IPs for the matara branch

6
D.C.B.Thinuka Thiyasara -
Serverpool Configuration.

Figure 32Serverpool

Ping testing

Test NO 1:
Status = successful

6
D.C.B.Thinuka Thiyasara -
Figure 33Ping testing 1

Trace route testing.

Status = successful

Figure 34Trace route testing

6
D.C.B.Thinuka Thiyasara -
DHCP testing.

Test status = Unsuccessful

Figure 35 Dhcp configuration

6
D.C.B.Thinuka Thiyasara -
Implementing Microsoft server 2008 R2

Step 01 - right click on the network ican in server os desktop

Figure 36 Ms server 2008 R2 installation 1

6
D.C.B.Thinuka Thiyasara -
Step 02 – click on the network and sharing center.

Figure 37Ms server 2008 R2 installation 2

Step 03 – Click on the change adapter settings option


Step 04 – Double click on the local area network.

Figure 38Ms server 2008 R2 installation 3

6
D.C.B.Thinuka Thiyasara -
Step 05 – Click properties option of local area connection window.

Figure 39Ms server 2008 R2 installation 4

Step 06 – Double click IP version

6
D.C.B.Thinuka Thiyasara -
Figure 40Ms server 2008 R2

Step 07 - Select “use the following IP address” option and give IP address as
192.168.10.1 for server OS and 255.255.255.0 is the subnet mask and also 10.0.0.1 for
use as chosen DNS server IP.

Figure 41Ms server 2008 R2 installation 6

Step 08 - In desktop click “Windows key + R” to execute run command box.

6
D.C.B.Thinuka Thiyasara -
Figure 42Ms server 2008 R2

Step 09 - Then type “dcpromo” command to get active directory domain service
Installation.

Figure 43Ms server 2008 R2 installation 8

Step 10 - An active directory domain services installation wizard, click “use advanced
installation” and click next option.n wizard.
Step 11- Select “create a new domain in a new forest” and click next.

Figure 44Ms server 2008 R2 installation 9

7
D.C.B.Thinuka Thiyasara -
Step 12- Type ALLIANCE HEALTH domain name.

Figure 45Ms server 2008 R2 installation 10

Step 13- Select windows 2003 as the domain functional level in domain functional level drop
down list and click next.

Figure 46Ms server 2008 R2 installation 11

7
D.C.B.Thinuka Thiyasara -
Step 14 - Tick DNS server for additional domain controller options and click next.

Figure 47Ms server 2008 R2 installation 12

Step -15 Select location for database, log files and SYSVQL. Use file paths in system
defaults and click next.

Figure 48Ms server 2008 R2 installation 13

7
D.C.B.Thinuka Thiyasara -
Step 16 - Type a strong password for directory services store mode administrator
.Password

Figure 49Ms server 2008 R2 installation 14

Step 17- The final process of active directory domain services installation is creating the
domain. In creating window, tick “reboot on completion” option.

Figure 50Ms server 2008 R2 installation 15

7
D.C.B.Thinuka Thiyasara -
CC proxy installation

Proxy permission creation.

CC Proxy.

With the well-liked proxy server program CC Proxy, your local network can be configured to
share an internet connection. Internet sharing, bandwidth control, access control, logging, and
monitoring are common uses for CC Proxy. CC Proxy is an effective tool for controlling
internet usage and access within a local network.
Windows-based CC Proxy is a simple-to-use proxy server program. It offers a 3-user free
version for individuals and household users to quickly and easily create their proxy server.
Below is a step-by-step tutorial for you.

Step 01 – proxy server installation - Select on the ‘Account’

Figure 51 CC proxy installation 1

7
D.C.B.Thinuka Thiyasara -
Step 2 - Create Accounts for Client Computers on the Proxy Server - Select permit only form
the permit drop down box.

Figure 52CC proxy installation 2

Figure 53CC proxy installation 3

7
D.C.B.Thinuka Thiyasara -
Then select the correct settings under the Auth Type

Figure 54CC proxy installation 4

Step 3 - Select new button on the right side.

Figure 55CC proxy installation 5

7
D.C.B.Thinuka Thiyasara -
Figure 56CC proxy installation 6

7
D.C.B.Thinuka Thiyasara -
Wireshark installation and configuration.

Figure 57Wireshark installation 1

Figure 58wireshark installation 2

7
D.C.B.Thinuka Thiyasara -
Figure 59Wireshark running

Maintainance Shedule

Why a maintance schedule is important

Well-maintained networks encounter fewer problems and are much easier to troubleshoot
than those left without consistent upkeep. To ensure that you don’t find yourself running with
faulty settings, risking damage to both software and hardware over time, you will need to
clean up your network regularly. That is where network maintenance comes in, and it is often
most effective through a comprehensive third-party platform.

Network cybersecurity: Implementing robust and up-to-date network defense layers, such
as traffic-managing firewalls, virtual private networks, user access controls, double
authentication measures, log inspections for usage documentation, real-time breach
notifications and auto-generated security reports.

Network performance: Analyzing top network performance concerns influencing the speed
and reliability of your devices, including bandwidth usage, traffic patterns, bottlenecks,
frequently down or crashed servers, connection lags, delays and more.

7
D.C.B.Thinuka Thiyasara -
Network scalability: Ensuring proper software and hardware systems fitting your current
operations, number of network users, endpoint locations and businesses functions.
Regular hardware and software updates: Scheduling updates prorated across network
components and interfaces, which in turn bolsters both a network’s overall performance and
security defenses.

IT infrastructure compliance: Maintaining internal compliance with company practices as


well as external government regulations and industry policies.

Preemptive network repairs: Using auto-generated reports and analytics to spot and patch
usage problems across the IT ecosystem — or at the very least troubleshooting them —
before they turn existential.
(services, September 27th, 2018)

The Maintance Shedule

Subject

Check Cabling
Check Disk usage Check hardware errors
and ports

Sequence Weekly Monthly Monthly Hardware


Maintenance
Day Monday Tuesday Wednesday

Time 10:00 10:00 10:00


Responsible
Network administrator Hardware engineer Network administrator
person

Check and
Check System Security Change Passwords
update
Applications
Sequence Daily Monthly Twice a week Software
Wednesday and Maintenance
Day Everyday Thursday Saturday
Time 10:00 10:00 10:00
Responsible Network security Network security
Network administrator
person engineer engineer

8
D.C.B.Thinuka Thiyasara -
Feed back on the networked system.

Following is the online feedback form I made for the system.

Figure 60Feedback form page 1

8
D.C.B.Thinuka Thiyasara -
Figure 61 Feedback form page 2

8
D.C.B.Thinuka Thiyasara -
Analysis feedbacks from the customers and employees..

Figure 62 Analysis of feedback 1

Figure 63Analysis of feedback 2

8
D.C.B.Thinuka Thiyasara -
References

Anon., 2022. cloudflare. [Online]


Available at: https://www.cloudflare.com/learning/network-layer/what-is-a-protocol/
[Accessed 30 january 2023].
Anon., 2023. Microsoft fandom. [Online]
Available at: https://microsoft.fandom.com/wiki/List_of_Microsoft_Windows_versions
[Accessed 30 January 2023].
https://www.scaler.com/, 2022. https://www.scaler.com/. [Online]
Available at: https://www.scaler.com/topics/computer-network/ieee-standards-in-computer-
networks/
[Accessed 29 january 2023].
Imperva, 2022. Imperva. [Online]
Available at: https://www.imperva.com/learn/application-security/osi-model/
[Accessed 20 january 2023].
javatpoint, 2022. javatpoint. [Online]
Available at: https://www.javatpoint.com/computer-network-topologies
[Accessed 30 January 2023].
Melnick, J., 2022. netwrix. [Online]
Available at: https://blog.netwrix.com/2019/01/08/network-devices-explained/
[Accessed 29 january 2023].
networkstraining, 2022. 8 Different Types of Servers in Computer Networks. [Online]
Available at: https://www.networkstraining.com/different-types-of-servers/
[Accessed 29 january 2023].
services, W. w., September 27th, 2018. World wide services. [Online]
Available at:
https://worldwideservices.net/network-maintenance-guide-upkeep/#:~:text=Well
%2Dmaintained%20networks%20encounter%20fewer,clean%20up%20your%20network
%20regularly.
[Accessed 13 04 2023].
Solutions, S., 2009-2023. https://www.simplilearn.com/. [Online]
Available at: https://www.simplilearn.com/tutorials/networking-tutorial/

8
D.C.B.Thinuka Thiyasara -

You might also like