Networking Assignment 1st Semester
Networking Assignment 1st Semester
1
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Downloaded by GK Ashen ([email protected])
lOMoARcPSD|37054207
Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)
INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Programme title BTEC Higher National Diploma in Computing
Assessor Internal
Verifier
Unit 02: Networking
Unit(s)
LAN Design & Implementation for SYNTAX SOLUTIONS
Assignment title
List which assessment Pass Merit Distinction
criteria the Assessor has
awarded.
INTERNAL VERIFIER CHECKLIST
3
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Downloaded by GK Ashen ([email protected])
lOMoARcPSD|37054207
Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction P1 P2 M1
Descripts
Resubmission Feedback:
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken
place and grades decisions have been agreed at the assessment board.
Assignment Feedback
4
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Action Plan
Summative feedback
Assessor Date
signature
27/10/2021
Student Date
signature
5
Matheesha Nuhansi Kalamulla –Networking Assignment 01
General Guidelines
1. A Cover page or title page – You should always attach a title page to your
assignment. Use previous page as your cover sheet and make sure all the details are
accurately filled.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom, right margins and 1.25” for the left margin of each page.
1. The font size should be 12 points, and should be in the style of Time New Roman.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject,
Assignment No, and Page Number on each page. This is useful if individual sheets
become detached for any reason.
5. Use word processing application spell check and grammar check function to help
editing your assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for
the compulsory information. eg: Figures, tables of comparison etc. Adding text boxes
in the body except for the before mentioned compulsory information will result in
rejection of your work.
3. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due
date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as
illness, you may apply (in writing) for an extension.
6
Matheesha Nuhansi Kalamulla –Networking Assignment 01
10. If you use other people’s work or ideas in your assignment, reference them properly
using HARVARD referencing system to avoid plagiarism. You have to provide both in-
text citation and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade
could be reduced to A REFERRAL or at worst you could be expelled from the course
7
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to
present it as my own without attributing the sources in the correct form. I further
understand what it means to copy another’s work.
27/10/2021
Student’s Signature: Date:
Provide E-mail ID Provide Submission Date
8
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Submission format
The submission should be in the form of an individual report written in a concise, formal business
style using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using
Harvard referencing system. Please also provide an end list of references using the Harvard
referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures,
although you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:
Scenario
SYNTAX SOLUTIONS is a privately owned, well-known Software company located in Colombo. The
Management of SYNTAX SOLUTIONS has purchased a 3-story building in the heart of Matara. They
are planning to make it one of the state-of-the-art companies in Matara with the latest facilities.
9
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Customer Care 10
Finance 25
Legal 5
HR 10
Developers 55
Network Team 5
19 2.168 .1 0.0/24 is given an d sh ou ld b e use d for all the de partm ent s exce pt the
server room . I Ps sh ou ld assign us ing DHCP .
Number of s er vers required for the Ser ver room ne ed to be decide d by the
Network de signe r and sh ou ld be assigne d w it h 10 .2 54.1 .0 /2 4 sub net. (U ses
static IPs )
Sales and Marketing Tea m nee d to access Network re source s us ing W IFI
connec tivity.
10
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Assu me you have be en app ointed as th e n ew network consultant of SYNTAX SOLU TIONS .
P repa re a n etwork arch itec tural de sign and imp lem ent it wit h your sug gestions an d
re com men dations to me et th e compa ny req uirem ent s.
(Note: Clear ly state your assumptions. You ar e allowed to design the network
accor ding to your assumptions, but main requirements should not be violated)
Activity 01
D isc uss t he benefits an d const ra int s of different n etwork system type s that can be
imp le mente d in the Matara b ranc h an d the main IEEE Ethe rn et sta ndards that can
be u sed in above LAN an d WLA N design .
Activity 02
Discu ss t he op erating princ ip le s of network dev ice s (Ex : Rou ter, Switc h, Etc .) and
se rve r typ es that can be u sed for above scena rio wh ile exp lorin g different se rve rs
that are ava ilab le in today ’s market with th eir spec ification s. Recomme nd
se rve r/se r vers for the above sce nario and ju stif y you r selection with va lid point s.
Discu ss t he inte r-de pen denc e of workstation hard wa re w ith networkin g softwa re
and provide examp le s for n etworking soft ware that can be use d in above n etwork
desig n.
Activity 03
11
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Pre pare a written network desig n plan to meet th e above mentione d user
req uirem ent s inc lu ding a b lue print drawn usin g a modelin g tool. (Ex : Microsoft Visio,
Ed raw Max ).
Supp ort your answe r by prov id in g th e VLA N and IP su bletting sche me for th e above
scen ario an d the list of d evices, n etwork comp on ent s an d soft ware u sed to de sign
the n etwork for above sce nario and wh ile ju stif ying you r se lec tion s.
Test an d eva lu ate the proposed de sign to me et the re qu irements and ana lyze user
feed back by using a User feed back form.
Insta ll and configu re Network ser vices, d evices and ap plication s (E x: VLA N, DHCP,
DNS , Proxy, We b, Etc .) according to the proposed d esign to accomp lish the use r
req uirem ent s and desig n a detaile d Mainte nance sch edu le for above Network.
Activity 04
Imp le ment a networked syste m ba se d on your prep are d de sign w ith va lid ev id ence s
and re com men d potentia l fu ture enh ance ment s for th e networke d system wit h va lid
ju stification s to you r recomm endation s. Use c ritica l reflec tion to c ritically eva lu ate
the design , pla n, config uration , and te sting of you r net work while ju stif ying w it h
va lid conc lu sion s.
Deve lop te st cases and conduc t verification (Ex: P in g , ex ten ded p in g , t race route ,
telnet, SSH, etc. ) to test th e above Network and ana lyse the test results aga inst the
exp ected re su lt s.
12
Matheesha Nuhansi Kalamulla –Networking Assignment 01
13
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Table of Contents
1. Network System..............................................................................................................17
1.1. Network System Types...........................................................................................19
1.1.1. Peer – to – Peer System...................................................................................19
1.1.2. Client Server...................................................................................................20
1.2. Types of Computer Network...................................................................................20
1.2.1. Personal Area Network (PAN)........................................................................21
1.2.2. Local Area Network (LAN)............................................................................21
1.2.3. Metropolitan Area Network (MAN)................................................................21
1.2.4. Wide Area Network.........................................................................................22
1.3. Network Standards..................................................................................................22
1.3.1. The Websites for Major Standards Organizations...........................................23
1.3.2. IEEE Standards...............................................................................................23
Suitable Solutions for syntax solutions- 1...............................................................................24
1.4. Network Models.....................................................................................................25
1.4.1. ISO OSI Model...............................................................................................25
1.4.2. TCP/IP Model.................................................................................................25
1.4.3. OSI Model vs. TCP/IP Model.........................................................................26
1.4.4. Apple Talk.......................................................................................................26
1.5. Protocols.................................................................................................................27
1.1.2. Suitable protocol for Syntax Solutions branch........................................................31
1.6. Network Topology......................................................................................................31
1.6.1. Physical Topology...........................................................................................31
1.6.2. Logical Topology............................................................................................32
1.6.3. Difference between Physical topology and Logical Topology.........................32
1.7. Bandwidth...........................................................................................................33
1.8. Suitable topology for SYNTAX SOLUTIONS...................................................34
2. Hardware Devices...........................................................................................................35
2.2. Network security.........................................................................................................39
2.3. Data Transmission Media............................................................................................42
2.4. Networking software...................................................................................................44
2.5. The recommendation for SYNTAX SOLUTIONS Matara branch..............................48
2.6. Recommendation for SYNTAX SOLUTIONS branch................................................53
14
Matheesha Nuhansi Kalamulla –Networking Assignment 01
2.7. Compatibility..............................................................................................................54
2.8. VLAN.........................................................................................................................54
2.9. SYNTAX SOLUTIONS Matara branch VLAN and IP subnetting scheme.................56
3. Network Diagram for SYNTAX SOLUTIONS Matara branch.......................................58
3.1. Windows server installation........................................................................................63
3.2. DHCP.........................................................................................................................66
3.3. Creating users.............................................................................................................82
3.4. Active directory configuration....................................................................................88
3.5. Network Maintenance.................................................................................................92
4. Implementing and designing the network system...........................................................93
4.1. Network device configuration.....................................................................................93
4.3. Network monitoring..................................................................................................105
4.4. Troubleshooting........................................................................................................106
4.5. Future enhancement..................................................................................................107
4.6. Evaluating design......................................................................................................107
Reference List.......................................................................................................................108
15
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Table of Figures
16
Matheesha Nuhansi Kalamulla –Networking Assignment 01
17
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Figure 87-Result...........................................................................................................90
Figure 88- Active directory..........................................................................................91
Figure 89-Network devices configuration....................................................................93
Figure 90-IP configuration...........................................................................................93
Figure 91-Configuration...............................................................................................94
Figure 92-VLAN Switch..............................................................................................94
Figure 93-Switch ports assign to VLANS....................................................................94
Figure 94-Command Prompt........................................................................................95
Figure 95-Ping..............................................................................................................95
Figure 96-Ping..............................................................................................................96
Figure 97-Ping..............................................................................................................96
Figure 98-Ping..............................................................................................................97
Figure 99-Ping..............................................................................................................97
Figure 100-Ping............................................................................................................98
Figure 101-Ping............................................................................................................98
Figure 102- Ping...........................................................................................................99
Figure 103-Test case and test.....................................................................................100
18
Matheesha Nuhansi Kalamulla –Networking Assignment 01
1. Network System
It is a collection of computers sharing resources placed on or provided by network
nodes. The computers use common communication with one another. They’re
identified by network unique addresses, and have hostnames.[ CITATION Wik211 \l
1033 ]
A special fact to remember is that a single computer with its peripherals such as
printers, scanners etc… are not considered as a network.
The speed with which data is moved from one place on a network to another is
referred to as ‘Data transfer rate’. It is a key issue in computer networks. (Lecture
notes)
20
Matheesha Nuhansi Kalamulla –Networking Assignment 01
21
Matheesha Nuhansi Kalamulla –Networking Assignment 01
22
Matheesha Nuhansi Kalamulla –Networking Assignment 01
These networks cover a wide area. This can be inside or outside a country. The best
example for Wide Area Network is Internet.
23
Matheesha Nuhansi Kalamulla –Networking Assignment 01
These standards are essential in creating and associated maintaining an open among
the competitive world market for product manufactures and guaranteeing national and
international ability of data information and telecommunication technology and
processes. They provide tips to manufacturers, vendors, government agencies, and
different service suppliers to make sure their interconnectivity necessary in today’s
marketplace and in international communications.
24
Matheesha Nuhansi Kalamulla –Networking Assignment 01
IEEE 802.3
This is a working group and a collection of IEEE standards produced by working
group defining the physical layer and data link layer’s media access control of wired
Ethernet.[ CITATION HND21 \l 1033 ]
25
Matheesha Nuhansi Kalamulla –Networking Assignment 01
The main benefit of this network is that it uses encryption and other security
mechanisms to ensure that only authorized users can access the network and that the
data cannot be intercepted.
So, in overall I think the network types LAN, WLAN, VPN are the types
which have to be used for this scenario while the network model which must be
implemented is the Client- Server Network system.
I suggest IEEE 802.11 should be used for the interior design of this
branch here because it is especially devoted to wireless LAN. And also, IEEE 802.7-
fibre optic connection can be used for this case. These days the most popular way to
connect devices is WIFI which has the IEEE 802.11 especially in branches like this so
as I said before those are the IEEE standards which are going to useful in for this
process. Except for those IEEE standards Bluetooth (IEEE 802.15.1) also will be
useful in sharing information.
26
Matheesha Nuhansi Kalamulla –Networking Assignment 01
This is the set of communications protocols used in the internet and similar
computer networks. In long form it is transmission control protocol and internet
protocol. There are 4 layers in this model. [ CITATION Wik211 \l 1033 ]
27
Matheesha Nuhansi Kalamulla –Networking Assignment 01
28
Matheesha Nuhansi Kalamulla –Networking Assignment 01
1.5. Protocols
It is a set of rules and procedures for transmitting data between two or more devices.
A protocol defines
What is communicated?
How it is communicated?
When it is communicated?
Protocols can be categorized into 3 main groups as,
1. Application Layer Protocols
2. Transport Layer Protocols
3. Internet Layer Protocols
[ CITATION HND21 \l 1033 ]
Below are some examples for protocols
1. File Transfer Protocol (FTP) – Transfer files from the server to a client
computer. This is built on client server model.
29
Matheesha Nuhansi Kalamulla –Networking Assignment 01
3. Telnet
This protocol connects one system with another. It is types of client- server
protocol that can be used open a command line on a remote computer.
[ CITATION Tec21 \l 1033 ]
Figure 17(Process of sending and receiving email through SMTP, Wikipedia, 2021)
30
Matheesha Nuhansi Kalamulla –Networking Assignment 01
As mentioned in the above example SMTP is the protocol use in emailing but it
is not the only protocol needed in this process as in the above figure when
receiving an email, it come across the protocol POP3 which is a one version of
Post office Protocol.
31
Matheesha Nuhansi Kalamulla –Networking Assignment 01
I think for this scenario TCP/IP is the best option, since it is the open protocol
standard and the other reasons are that it is freely available and anyone can implement
in any hardware or operating system unique to the device. It is widely use in such
branches.
The geometric way of how computers are connected to each other is referred to as
Network Topology.
These topologies can be mainly divided into two categories
1. Physical Topology
2. Logical Topology
32
Matheesha Nuhansi Kalamulla –Networking Assignment 01
33
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Can be arranged in star, ring, bus, mesh Only exists in bus and ring topologies.
and bus topologies.
Figure 23(Author developed)
Both the physical and logical topologies are equally important in designing and
implementing a network. However logical topology has a negative impact on the data
transmitting in the form of packets, if not planned carefully. [ CITATION Tec211 \l
1033 ]
34
Matheesha Nuhansi Kalamulla –Networking Assignment 01
1.7. Bandwidth
In networking, this term refers to the measure of the capacity of a medium to transmit
data. A medium that has a higher capacity for example, has a high bandwidth, whereas
a medium that has limited capacity has a low bandwidth.
Importance of Bandwidth
a. Bandwidth is limited by physics and technology
b. Bandwidth is not free
c. Bandwidth requirements are growing at a rapid rate
d. Bandwidth is critical to network performance
[ CITATION HND21 \l 1033 ]
With a properly managed network topology, a business will improve the potency of
data transfer. Better efficiency, in turn can reduce cost for maintenance and
operations.
35
Matheesha Nuhansi Kalamulla –Networking Assignment 01
For this SYNTAX SOLUTIONS Matara branch, the topology I suggest is star
topology because in star topology all devices are connect to a central switch, which
makes it easy to add new nodes without rebooting all currently connected device and
this topology makes efficient use of cable and is easy to administer. Also, this is a
commonly encountered topology especially in companies like this.
2. Hardware Devices
Computer hardware means the physical components of a computer and related
devices. Hardware devices that used to connect computers, printers, and other
electronic devices are called network devices. Network devices can be inter network
or intra network. Some devices are installed on the device, as NIC card or RJ45
connector and some parts of network are;
• Router
• Switch
• Modem
• Repeater
• Access point
[ CITATION tut21 \l 1033 ]
Router
The router is a physical or virtual internet networking device that designed to
receive, analyze and forward data packets between computer networks. A router
works on the third layer of the OSI model. It is based on the IP address of the
computer and it is used for protocols such as ICMP to communicate between two or
more network. A router is used in LAN and WAN network and it ideal for officers’
connectivity. It shares information with other routers in network and used to routing
protocol to transfer the data across the network. It is more expensive than other
network devices like switches and hubs. A router reads its routing table to determine
on the best possible route the packet can take to quickly and reliably reach it
destination. There are two group of routing table; Static the routes are fed manually
inside a static routing table. It is also only suitable for very limited network with
approx. two or three routers Dynamic the router communicates with other routers
through protocols in a dynamic routing table to decide the routes are accessible. This
36
Matheesha Nuhansi Kalamulla –Networking Assignment 01
is ideal for wider networks where due to a large number of routers, feeding may not
be feasible in manually.[ CITATION jav21 \l 1033 ]
Static
Routes are fed manually in a static routing table. It is only suitable for networks with
two to three routers.
Dynamic
The routers communicate with each other through protocols to determine which
routes are free. It is suitable for lager networks where manual feeding may not be
feasible.
Figure 25-Router
Switch
The switch is a network device that connects other devices to Ethernet networks
through twisted pair cables, packet switching technique is used to receive, store and
forward data packets. The switch has a list of network addresses of those all devices
connected to it. The packet is sent to correct port. The packets are checked for
network errors before they are forwarded. In full duplex mode, the data is
transmitted.
37
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Figure 26-Switch
Figure 27-Modem
Repeater
A repeater is an electronic device that re-transmits a signal. It is used to extend
transmissions so that the signal can be received on the other side of an obstruction.
It is a type of hardware that is simple to operate. This device operates at the physical
layer of the ISO open system interconnection reference mode, which is where the
signal is received on cable segment and then transmitted onto cable segment.
[CITATION tut20 \l 1033 ]
38
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Figure 28-Repeater
Access point
A wired or wireless link in an AP is usually means a wireless device. An AP can
either act as a bridge that connects a standard wireless network to wireless devices
or as routers that send data to another access point. WAP or a wireless connection
point is a device that is used to generate a wireless LAN (WLAN) transmitter and
receiver. An access point is a machine with an integrated antenna, transmitter, and
adapter. It is usually networked in separate machines. [ CITATION EDU21 \l 1033 ]
39
Matheesha Nuhansi Kalamulla –Networking Assignment 01
40
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Firewall
A firewall is a network security device that monitors incoming and outgoing network
traffic and decides based on a set of explained security rules if allow or not to allow
specific traffic. A firewall can be hardware, software or both. Firewall can be stand
alone or can used in other devices for infrastructure, as routers or servers. Firewall
used to both corporate and consumer setting.it can installed at an organizations
network perimeter to protect against external threats or within the network to create
segmentation and protect against insider threats. Hardware firmware firewalls are
often used for setting restrictions between in home devices. Some firewalls are
available as applications which serve as the primary device that separates two
networks. It excludes unnecessary and unwanted network traffic from accessing
networks inside the company. The firewall can be completely blocked. Some or all
traffic depends on firewall policy of the organization or it can conduct a check on
some or all of the traffic. There are two types of firewall policies used in widely;
• Whitelisting
The firewall rejects all connections except for those specifically listed as acceptable
• Blacklisting
The firewall allows all connections except those specifically listed.
41
Matheesha Nuhansi Kalamulla –Networking Assignment 01
42
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Figure 31-UTP
Figure 32-STP
43
Matheesha Nuhansi Kalamulla –Networking Assignment 01
3. Coaxial cable
It consists of an electronic cable pair. The outer cable which is like a braided
copper net produces electromagnetic field around the central cable. These two
cables are separated by a plastic shield. These cables are expensive and used for
CCTV and TV antenna.
Unguided/wireless media
Data is transmitted as signal through the air without using physical medium.
Ex: -
1. Radio waves
2. Microwaves
3. Infrared
44
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Networking software is any software that interact, increases and facilitates the
functions of computer network. This is a backbone for every network. Traditional
networks were hardware based with software embedded. Network software is not
same as a software application. It is invisible to end users. It is simply used to
facilitate the access those users have to network resources in a seamless way.
Functions of network software
• Helps to set up and install computer network
• Enables users to have access to network resources in a seamless manner
• Enables virtualizations of network
• Helps to define locations of data storage and allows users to access that data
• Allows administrations to add or remove users from the network
Cisco IOS
It is world widely most developed networking software Cisco IOS main function is
to enable data communication between network nodes. It combines cutting edge
technology, business critical services and broad hardware platform support. From
these routing and switching can be used to improve the performance and security of
network traffic. Cisco IOS has the ability to share and maintain consistent features
with reusable code across the network. This help to deliver services faster and
improve innovation.
[ CITATION tec20 \l 1033 ]
Server OS
It is specifically designed to run on servers, which are specialized computer that
operate within a client or server architecture. Server operating systems help enable
and facilitate typical server roles such as Web server, mail server, file server,
database server, application server and print server. [ CITATION web20 \l 1033 ]
45
Matheesha Nuhansi Kalamulla –Networking Assignment 01
As for the SYNTAX SOLUTIONS Matara branch it has to use Microsoft server
2019.
Active directory
Active directory is database and group of service which is developed by Microsoft
for windows that connect users with the network resources they need to get their
work done. It stores data as objects. It classifies directory objects by name and
attributes. Active directory main server is Domain services. It stores directory
information and handles the interaction of the user with the Domain. Active
directory Domain server verifies access when a user signs into a device or try to
connect to over a network. Active directory Domain controls which users have
access to each resource or group of policies. [ CITATION Wik216 \l 1033 ]
Solar winds
Solar winds network show monitor can be configured quickly. Solar winds reduce
network downtime and detect, diagnose and resolve network performance issues
with affordable, easy to use network monitoring software. In an hour the tool
automatically discovers and deploys network devices. It has an intuitive interface
because it uses a straightforward approach in running a whole network. The
interface of the software is very easy to use and change. It is able to create a
topology that is customized to the entire network infrastructure and also can create
smart alerts tailored to the dependency aware and much more. [ CITATION tec21 \l
1033 ]
Server
Network server is a powerful computer that provides workstations and other servers
in a network with different shared resources. A user can set up a server to control
access to a network, send or receive email, manage printing or host a website. They
are also good at making tough calculations. Some servers are dedicated to a specific
task, often referred to as commitment. Many servers today are shared servers that
take responsibility for email, DNS, FTP and multiple websites on a web server. A
46
Matheesha Nuhansi Kalamulla –Networking Assignment 01
server may have more RAM installed than a typical workstation. [ CITATION
PAE21 \l 1033 ]
Importance of server
Remote accessibility
If employees want to work from home or elsewhere a server is very useful. And
above all of that this information is much safer because the server uses a range of
tools to ensure that all information is encrypted, allowing those who choose to
download at the other end to keep a secure file that does not in any way affect their
desktop or laptop. Geographical constrains become an issue as those who choose to
work outside of the office have access to all of their email addresses.
Increased reliability
Many servers now have an excess power supply. This means that no data is lost in
this case and the data can still be backed up during a power cut. Most servers
prevent data loss in RAID configuration and do not interfere with the workflow. As
mentioned earlier, it will make the unit look more reliable.
Expand easily
If you are looking to expand your business in the future, a client will allow you to do
so. A server allows you to easily configure a variety of devices, computers, and users
and add new applications. There for meaning there is no disruption to anyone in the
business. Servers can classify according to their intended function There are
different types of servers are available in today.
Such as;
• Application server
There are large numbers of application servers, which is also referred to as
middleware calculate the terrain between the database servers and the end sure and
often connect both.
• Mail server
It transfers and store mail over corporate networks (LAN and WAN) through the
internet, web server are also important.
47
Matheesha Nuhansi Kalamulla –Networking Assignment 01
• Web server
Simply, a web server supports a web browser with static content by loading a file
disk and servers as a web browser for a user across the network. Entire
communication is facilitated by the use of HTTP by browser and server
communication with each other. [ CITATION PAE21 \l 1033 ]
Server components
Client consists of different components and sub-components. At the hardware level,
clients usually have a rack mounted chassis that includes a power supply and
system. Keyboard, one or more CPUs, memory, storage, network interface and
power supply. Many server hardware networks support out of zone control over a
dedicated port. External management systems can be used to enable or disable the
server. Most of the hardware on the network off zone is using a dedicated port.
External management system can be used to remotely rotate the server.[ CITATION
Hyp20 \l 1033 ]
Blade server
48
Matheesha Nuhansi Kalamulla –Networking Assignment 01
49
Matheesha Nuhansi Kalamulla –Networking Assignment 01
50
Matheesha Nuhansi Kalamulla –Networking Assignment 01
51
Matheesha Nuhansi Kalamulla –Networking Assignment 01
52
Matheesha Nuhansi Kalamulla –Networking Assignment 01
rack server to configure the database because of the system required, server
installation required.
Features MySQL Oracle
Processor Windows Server 2012 or Linux7 or higher 64bit
higher Red Hat enterprise
RAM Minimum of 4GB RAM Minimum of 2GB RAM
Supported operating Minimum 30GB hard disk Typical Install Type total:
system 10GB
Hard drive space Intel® core (™) dual core Intel (×86) AMD64
2Ghz InteIEM64T
Figure 40- MySQL / Database
I recommend DNS server, DHCP server, Proxy and mail server because for the work
in this branch they are essential. Dell PowerEdge R7515 rack server can be used
because this server computer has powerful hardware therefore it can manage these
all the services and Dell PowerEdge R240 rack server for web server because web
server has lots of traffics and more load.
2.7. Compatibility
Compatibility is the ability to work together on two systems without modification to
do so. Compatible software applications use the same data formats. Compatibility
may interaction of any two products; hardware and software, same or different types
or different versions of the same product. Designed accessories compatibility with
future versions is called forward compatible.
53
Matheesha Nuhansi Kalamulla –Networking Assignment 01
• Hardware
• Operating system
• Software
If these are not compatible lot of errors will occur
Such as,
• Without minimum requirement for server OS, you install the OS for server it cab
be crash
• Routers, switches and other main networking devices are in deferent models, so it
will be a big trouble in configure that
• When install some server without there are requirements it will be not work or
crash
• Servers and clients are in deferent OS so; compatible devices must be select as
requirement.
[ CITATION tec211 \l 1033 ]
2.8. VLAN
A VLAN (Virtual LAN) is a logical subset of devices that can be grouped together
in separate physical local area network (LANs). Network virtualization is part of the
virtualization described above and it is virtualization. We use network virtualization
with VLANs on switches to allow connecting multiple broadcast domains with a
single switch with the VLANs we divide switches in to multiple switches.
[ CITATION Lif211 \l 1033 ]
54
Matheesha Nuhansi Kalamulla –Networking Assignment 01
55
Matheesha Nuhansi Kalamulla –Networking Assignment 01
1 0.10
Sales and 20 VLAN 27 192.168.1 192.168.1 192.168.
Marketing 20 0.12 0.33 1 0.13-
192.168.
1 0.32
HR 10 VLAN 27 192.168.1 192.168.1 192.168.
30 0.34 0.45 1 0.35-
192.168.
1 0.44
Legal 10 VLAN 27 192.168.1 192.168.1 192.168.
40 0.46 0.57 1 0.47-
192.168.
1 0.56
Finance 25 VLAN 27 192.168.1 192.168.1 192.168.
50 0.58 0.84 1 0.59-
192.168.
1 0.83
Developers 55 VLAN 27 192.168.1 192.168.1 192.168.
60 0.85 0.146 1 0.86-
192.168.
1 0.145
Network 5 VLAN 27 192.168.1 192.168.1 192.168.
Team 70 0.147 0.153 1 0.147-
192.168.
1 0.152
Figure 41-VIDCO-19 Kandy branch VLAN & IP subnetting scheme
Wireshark
Wireshark is the world’s leading network traffic analyst. It is an essential tool for
security system administrator. This free software allows analyzing network traffic in
real time, often the best tool for troubleshooting in network. It allows keeping
network traffic under a microscope and filtering that traffic, magnifying the root
cause of the problem. Administrators use it to detect faulty network devices that
drop packets, delays caused by machines disrupting traffic around the world and
56
Matheesha Nuhansi Kalamulla –Networking Assignment 01
57
Matheesha Nuhansi Kalamulla –Networking Assignment 01
58
Matheesha Nuhansi Kalamulla –Networking Assignment 01
network?
What do you
think about the
network
topology that
implement in
network
system?
Did you satisfy
with the speed
of the internet
in network?
How about the
security and
efficiency in this
network?
Did you satisfy
with response
time with server
room?
Overall
experience
network
topology that
implement in
network
system?
Did you satisfy
with the speed
of the internet
in network?
How about the
security and
efficiency in this
network?
Did you satisfy
with response
time with server
room?
Overall
experience
The feedback was really good as in the above forms. According to those feedbacks it
is able to conclude that the overall system was a success.
61
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Windows server is a brand name for a group of server operating system released by
Microsoft. That allows network activities such as print server, Domain controller,
Web server and file server to be performed by a computer. It is also the framework
for separately obtained server applications such as Exchange server or SQL server as
a server operating system. In SYNTAX SOLUTIONS Matara branch it can use
Windows Server OS for server machine. After creating a bootable USB or DVD
media, insert it and boot your computer. Virtual box, KVM and VMware users need
62
Matheesha Nuhansi Kalamulla –Networking Assignment 01
to attach the ISO file when creating a VM and follow the installation steps shown.
Then click install now on the install screen.
63
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Read the License term, turn on checkbox “I accept the License term” and then click
next.
64
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Select the disk you will be installing on. If you do not want to change drive option
and click Next It will then start copying files. This will take a while (could be 20
mins or so depending on hardware performance). It will reboot a couple times
(automatically)
65
Matheesha Nuhansi Kalamulla –Networking Assignment 01
The system should automatically reboot after the installation. Set Administrator
password when prompted on the next screen. Click Finish to complete the
installation.
Then use Ctrl + Alt + Del combination.
Figure 48-Desktop
3.2. DHCP
66
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Figure 49-Start
67
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Before Next
68
Matheesha Nuhansi Kalamulla –Networking Assignment 01
69
Matheesha Nuhansi Kalamulla –Networking Assignment 01
70
Matheesha Nuhansi Kalamulla –Networking Assignment 01
71
Matheesha Nuhansi Kalamulla –Networking Assignment 01
72
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Figure 56-Roles
On features Next
DHCP Net Framework Next
On the confirmation page can select to automatically restart the server if required.
Figure 57-Confirmation
73
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Click install and Finish the installation Install progress page, it will say install
succeeded when complete.
74
Matheesha Nuhansi Kalamulla –Networking Assignment 01
That completes the install of the DHCP role Move onto the next section for steps on
configuring the DHCP server.
Figure 60-Start
Click DHCP
75
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Click ‘Next’
76
Matheesha Nuhansi Kalamulla –Networking Assignment 01
77
Matheesha Nuhansi Kalamulla –Networking Assignment 01
78
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Select the first one which says ‘Yes, I want to configure DHCP options’
And click ‘Next’
79
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Enter the default gateway which is the IP of your Router then click on Next
Figure 70-DNS IP
Add DNS IP
80
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Click Finish
81
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Figure 74-Start
82
Matheesha Nuhansi Kalamulla –Networking Assignment 01
83
Matheesha Nuhansi Kalamulla –Networking Assignment 01
84
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Figure 80-Create
Click Finish
Figure 81-Users
85
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Figure 82-Properties
86
Matheesha Nuhansi Kalamulla –Networking Assignment 01
permissions. The data is stored as objects by the active directory. A single thing, like
a user, a party. A computer is an object such as a program or a printer. Objects are
usually described as user or groups of principals or a printer. As users or group of
principals or security printers such as printers or computers. The active directory
configuration follows;
Server manager Manage Add roles and features
Add roles and features Wizard Next
Select installation Type Select role based or feature based installation
Next
Select a server from the server pool. In server pool ensure that the local computer is
selected Next
After select Active Directory Domain services from roles
88
Matheesha Nuhansi Kalamulla –Networking Assignment 01
89
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Confirmation page Install -to install the roles, role services, or features on
the server
Figure 87-Result
90
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Active Directory Domain Services have been successfully installed. Machine will be
rebooted automatically.
91
Matheesha Nuhansi Kalamulla –Networking Assignment 01
It is the range of services a company intends to use to keep the work running
smoothly. [ CITATION MGl21 \l 1033 ]
Network Maintenance schedule
SYNTAX SOLUTIONS Matara branch maintain schedule
Service Occurrence Start time Duration Notice
Affected
Backup schedule
File server Daily 12.00AM 3 hours A 2-3 hours’
notice will be
given when
the
administrative
server is
taking down.
Email server Weekly 2.00AM 2 hours We will give
you 2-3
hours’ notice
on taking
down of our
server.
Database Daily 12.00AM 2 hours No additional
notes
server
Update testing
Server update Weekly 2.00AM 2 hours No additional
notes
92
Matheesha Nuhansi Kalamulla –Networking Assignment 01
93
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Figure 91-Configuration
94
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Change IP
Figure 94-Start
95
Matheesha Nuhansi Kalamulla –Networking Assignment 01
96
Matheesha Nuhansi Kalamulla –Networking Assignment 01
97
Matheesha Nuhansi Kalamulla –Networking Assignment 01
98
Matheesha Nuhansi Kalamulla –Networking Assignment 01
4.2. Ping
First go to apps and select command prompt.
99
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Figure 101-Ping
Figure 102-Ping
100
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Figure 103-Ping
Figure 104-Ping
101
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Figure 105-Ping
Figure 106-Ping
102
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Figure 107-Ping
104
Matheesha Nuhansi Kalamulla –Networking Assignment 01
It is the use of a system that constantly monitors a computer network for slow or
failing components and that notifies the network administrator in case of outages or
other trouble. The ping program is one example of s basic network monitoring
program.
Finding performance issues and barriers can help identify problems at an early stage.
Effective active monitoring can prevent network malfunctions or failures.
Important features of network monitoring;
• Monitoring the essentials
• Selecting the correct protocol
• Setting the threshold
• Optimizing the monitoring time interval
[ CITATION HND21 \l 1033 ]
105
Matheesha Nuhansi Kalamulla –Networking Assignment 01
4.4. Troubleshooting
Network administrators will need to use different resources to amplify the problem in
order to avoid network distortion.
Troubleshooting is the process use to identify and solve the problems if anything
happens in the computer network. It is the logical process that network engineers use
to resolve network problems and to improve network operations.
106
Matheesha Nuhansi Kalamulla –Networking Assignment 01
107
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Reference List
Rack Solutions, 2018. Blade server vs Rack server. [Online]
Available at: https://www.racksolutions.com/news/data-center-optimization/blade-
server-vs-rack-server/#:~:text=Rack%20servers%20in%20an%20EIA
%2019%E2%80%B3%20rack%20A,configured%20to%20support%20a%20wide
%20range%20of%20requirements.
avast, 2020. How proxy servers work. [Online]
Available at: https://www.avast.com/c-what-is-a-proxy-server
BTECH Pearson ,ESOFT METRO Campus, 2021. HND in Computing. s.l.:s.n.
comparitech, 2020. Troubleshooting. [Online]
Available at: https://www.comparitech.com/net-admin/network-troubleshooting-
tools/#:~:text=Follow%20a%20formalized%20routine%20when%20troubleshooting
%20networks%3A%201,problem%2C%20the%20solution%2C%20and
%20recommendations%20for%20procedural%20change.
EDUCBA, 2021. Network devices. [Online]
Available at: https://www.educba.com/types-of-network-devices/
GeeksForGeeks, 2021. IDS. [Online]
Available at: https://www.geeksforgeeks.org/intrusion-detection-system-ids/
Hypertec Direct, 2020. Server Components. [Online]
Available at: https://hypertecdirect.com/knowledge-base/server-components-
explained/
java point, 2021. What is Router. [Online]
Available at: https://www.javatpoint.com/router
Life Wire, 2021. VLAN. [Online]
Available at: https://www.lifewire.com/virtual-local-area-network-817357
M Global Services, 2021. What is Network Maintenence. [Online]
Available at: https://mglobalservices.com/knowledge-center/blog/what-is-network-
maintenance
PAESLER, 2021. Serever:Definition and details. [Online]
Available at: https://www.paessler.com/it-explained/server
paloalto, 2020. IPS. [Online]
Available at: https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusion-
prevention-system-ips
Quizlet, 2021. Virtual Private Network. [Online]
Available at: https://quizlet.com/6954634/virtual-private-network-flash-cards/
serverwatch, 2021. Tower server. [Online]
Available at: https://www.serverwatch.com/guides/tower-server/
Tech Differences, 2021. Difference Between Black Box and White Box Testing.
[Online]
Available at: https://techdifferences.com/difference-between-physical-and-logical-
topology.html
Tech Target , 2021. What is Telnet and How is It Used?. [Online]
Available at: https://www.techtarget.com/searchnetworking/definition/Telnet
108
Matheesha Nuhansi Kalamulla –Networking Assignment 01
109
Matheesha Nuhansi Kalamulla –Networking Assignment 01
Grading Rubric
P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Compare common networking principles and how protocols
enable the effectiveness of networked systems.
LO2 : Explain networking devices and operations
P3
Discuss the operating principles of networking devices and
server types.
P4
Discuss the inter-dependence of workstation hardware with
relevant networking software.
110
Matheesha Nuhansi Kalamulla –Networking Assignment 01
M2
Explore a range of server types and justify the selection of a
server, considering a given scenario regarding cost and
performance optimization.
LO 1 & LO2
D1 Critically evaluate the topology protocol selected for a given
scenario to demonstrate the efficient utilisation of a networking
system.
LO3 : Design efficient networked systems
P5
Design a networked system to meet a given specification.
P6
Test and evaluate the design to meet the requirements and
analyze user feedback.
M3
Install and configure network services and applications on your
choice.
D2
Design a maintenance schedule to support the networked
system.
111
Matheesha Nuhansi Kalamulla –Networking Assignment 01
P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D3
Use critical reflection to evaluate own work and justify valid
conclusions.
112
Matheesha Nuhansi Kalamulla –Networking Assignment 01