Unit-02 Networking Assignment - CRDS - Final
Unit-02 Networking Assignment - CRDS - Final
*If ‘No’ is recorded the Internal Verifier must recommend actions detailing the issues to be
addressed. The Assessor and the Internal Verifier must then confirm that the action has been
undertaken and that the Assignment Brief is authorised for use before being issued to learners.
Action required: Target Date for Date Action
(If none then please state n/a) Completion Completed
Assessor signature
Date
Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & P1 P2 M1 D1
Distinction Descripts
LO2 Explain networking devices and operations.
Pass, Merit & P3 P4 M2
Distinction Descripts
* Please note that grade decisions are provisional. They are only confirmed once internal and
external moderation has taken place and grades decisions have been agreed at the assessment
board.
Assignment Feedback
Formative Feedback: Assessor to Student
Action Plan
Summative feedback
General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment.
Use previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No,
and Page Number on each page. This is useful if individual sheets become detached for
any reason.
5. Use word processing application spell check and grammar check function to help editing
your assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the
body except for the before mentioned compulsory information will result in rejection of
your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as
illness, you may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL.
You will then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text
citation and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade
could be reduced to A REFERRAL or at worst you could be expelled from the course
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to
present it as my own without attributing the sources in the correct form. I further understand
what it means to copy another’s work.
Submission format
The submission should be in the form of an individual report written in a concise, formal business style
using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using Harvard
referencing system. Please also provide an end list of references using the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures, although you
will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:
Alliance Health is a technology-enabled solutions company that optimizes the revenue cycle of the US
healthcare industry where its global delivery center is located in Colombo. The company is planning to
expand their business operations with their latest branch at Matara and wants it to be one of the state-
of-the-art companies in Matara with the latest facilities.
Assume you have been appointed as the new network analyst of Alliance Health to plan, design and
restructure the existing network. Prepare a network architectural design and implement it with your
suggestions and recommendations to meet the company requirements.
The floor plan of the head office in Colombo is as follows:
Floor 1:
Reception area
Sales & Marketing Department (10 employees)
Customer Services Area – with Wi-Fi facilities
Floor 2:
Administration Department (30 Employees)
HR Department (20 employees)
Accounting & Finance Department (15 employees)
Audit Department (5 employees)
Business Development Department (5 employees)
Floor 3
Video conferencing room
IT Department (60 employees)
The Server Room
The floor plan of the branch in Matara is as follows:
Floor 1:
Reception area
Customer Services Area– with Wi-Fi facilities
Floor 2:
Administration Department (10 Employees)
HR Department (7 employees)
Accounting & Finance Department (8 employees)
IT Department (50 employees)
The conferencing room of the head office and Customer Services Areas of each
branch are to be equipped with Wi-Fi connections.
Connectivity between two branches (Head Office and Matara) would allow the
intra branch connectivity between departments. (Use of VPN is not
compulsory)
The necessary IP address classes and ranges must be decided by the network
designer and should be used for all the departments except the server room.
Number of servers required for the Server room need to be decided by the
Network designer and should be assigned with 10.254.10.0/24 subnet. (Uses
static IPs)
Sales and Marketing Team also needs to access Network resources using WIFI
connectivity.
(Note: Clearly state your assumptions. You are allowed to design the network
according to your assumptions, but main requirements should not be violated)
Activity 01
Discuss the benefits and constraints of different network system types that can
be implemented in the Matara branch and the main IEEE Ethernet standards
that can be used in above LAN and WLAN design.
Discuss the importance and impact of network topologies and assess the main
network protocol suites that are used in network design using examples.
Recommend suitable network topology and network protocols for above
scenario and evaluate with valid points how the recommended topology
demonstrates the efficient utilization of the networking system of Matara
branch.
Activity 02
Discuss the operating principles of network devices (Ex: Router, Switch, Etc.)
and server types that can be used for above scenario while exploring different
servers that are available in today’s market with their specifications.
Recommend server/servers for the above scenario and justify your selection
with valid points.
Activity 03
Prepare a written network design plan to meet the above-mentioned user
requirements including a blueprint drawn using a modeling tool (Ex: Microsoft
Visio, EdrawMax) .Test and evaluate the proposed design by analyzing user
feedback with the aim of optimizing your design and improving efficiency.
(Support your answer by providing the VLAN and IP subnetting scheme for the
above scenario and the list of devices, network components and software used to
design the network for above scenario and while justifying your selections.)
Activity 04
Implement a networked system based on your prepared design with valid
evidences.
Develop test cases and conduct verification (Ex: Ping, extended ping, trace
route, telnet, SSH, etc.) to test the above Network and analyse the test results
against the expected results. Recommend potential future enhancements for the
networked system with valid justifications and critically reflect on the
implemented network, including the plan, design, configurations, tests and the
decisions made to enhance the system.
Grading Rubric
P1
Discuss the benefits and constraints of different network types and
standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Assess common networking principles and how protocols enable the
effectiveness of networked systems.
P3
Discuss the operating principles of networking devices and server
types.
P4
Discuss the interdependence of workstation hardware and relevant
networking software
M2
Explore a range of server types and justify the selection of a server for
a given scenario, regarding cost and performance optimisation
LO 1 & LO2
D1 Evaluate the topology protocol selected for a given scenario and
how it demonstrates the efficient utilisation of a networking system.
LO3 : Design efficient networked systems
P5
Design a networked system to meet a given specification.
P6
Design a maintenance schedule to support the networked system.
M3
Analyse user feedback on your designs with the aim of optimising your
design and improving efficiency.
D2
Critically reflect on the implemented network, including the design and
decisions made to enhance the system.
LO4 : Implement and diagnose networked systems
P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked systems.
D2 Critically reflect on the implemented network, including the
design and decisions made to enhance the system.
Pearson Higher Nationals in
Computing
0|Page
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Contents
1 ACTIVITY 01....................................................................................................................4
1.1 Network Integration in Matara Branch......................................................................4
1.1.1 Computer Networking........................................................................................4
1.2 Features of Computer Network..................................................................................5
1.2.1 Network Types...................................................................................................6
1.2.2 Difference Between LAN, MAN, WAN, WIRELESS & INTERNET............14
1.2.3 Which Network Types are ideal for the Alliance health Matara Branch?........15
1.3 The IEEE Standards.................................................................................................16
1.4 Ethernet Protocol (IEEE Standard 802.3)................................................................16
1.5 Wi-Fi Protocol (IEEE Standard 802.11)..................................................................16
1.6 Wireless Short Networks (IEEE standard 802.15)...................................................17
1.7 NETWORK TOPOLOGIES....................................................................................17
1.8 Implications of Network Architectures, Communication........................................18
1.8.1 The consequences of a network's topology......................................................18
1.8.2 Exchange of Topology Information in a Network...........................................18
1.8.3 Network Topology bandwidth demands..........................................................18
1.9 Evaluating the Most Popular Networking Standards...............................................21
1.10 The Protocols of Network Architecture...................................................................21
1.10.1 The Open Systems Interconnection (OSI) model............................................22
1.10.2 TCP/IP reference model...................................................................................22
1.11 Analysing h Protocols Improve Networked System Performance...........................23
1.11.1 Research into the optimal network topology for the Alliance health...............23
1.11.2 Protocol Suitability Analyses in Network Health Alliances............................23
2 ACTIVITY 2....................................................................................................................24
2.1 Operating Principles of Networking Devices..........................................................24
2.1.1 What are networking devices?.........................................................................24
2.2 Types of Networking devices...................................................................................24
2.2.1 NIC...................................................................................................................24
2.2.2 Switch...............................................................................................................25
2.2.3 Hubs.................................................................................................................25
2.2.4 Routers.............................................................................................................25
2.2.5 Gateway............................................................................................................26
2.2.6 Repeater............................................................................................................26
1|Page
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
2.2.7 Firewalls...........................................................................................................26
2.2.8 Access points....................................................................................................26
2.3 Examining the Basic Functions of the above-mentioned Networking Equipment. .27
2.4 Determining Server Types........................................................................................28
2.4.1 What is a server?..............................................................................................28
2.5 Discussion of various server types...........................................................................28
2.6 Exploring a range of server types.............................................................................30
2.6.1 Software Servers..............................................................................................30
2.6.2 Hardware Servers.............................................................................................31
2.7 The suitable servers for Alliance health...................................................................35
2.7.1 Hardware Servers.............................................................................................36
2.8 Discussing about the independence of workstation hardware in a network............36
2.9 Relevant Network Software.....................................................................................36
2.9.1 Network Designing Software...........................................................................36
2.10 Evaluation of the topology in alliance health...........................................................37
3 ACTIVITY 03..................................................................................................................39
3.1 Network Design Plan...............................................................................................39
3.2 Blueprint of the Colombo Branch network..............................................................39
3.2.1 Blueprint of the Matara Branch Network.........................................................39
3.2.2 User Feedback Questions from Client.............................................................40
3.2.3 Future Improvements.......................................................................................41
3.2.4 Colombo Branch..............................................................................................41
3.2.5 Matara Branch..................................................................................................42
3.2.6 Device Configuration.......................................................................................43
3.3 Network Maintenance Schedule..............................................................................46
3.3.1 Everyday Routine.............................................................................................46
3.3.2 Weekly Schedule..............................................................................................46
3.3.3 Monthly Schedule............................................................................................46
3.3.4 Quarterly Routine (four times a year)..............................................................46
3.3.5 Annual Schedule..............................................................................................47
4 ACTIVITY 04..................................................................................................................47
4.1 Network Design.......................................................................................................47
4.1.1 Colombo Network............................................................................................47
4.1.2 Matara Network...............................................................................................48
4.2 Test Cases.................................................................................................................48
2|Page
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
4.2.1 Developing Test Cases.....................................................................................48
4.2.2 Future Improvement Opportunities:.................................................................49
4.2.3 Test Cases Analysis with Expected Results.....................................................51
5 References........................................................................................................................54
3|Page
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
4|Page
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
1 ACTIVITY 01
1.1 Network Integration in Matara Branch
A computer network is described as the connection of at least two computer systems, either
by a cable or a wireless connection. The simplest network is a combination of two computers
connected by a cable. This type of network is called a peer-to-peer network. There is no
hierarchy in this network; both participants have equal privileges. Each computer has access
to the data of the other device and can share resources such as disk space, applications, or
peripheral devices (printers, etc.).
Today’s networks tend to be a bit more complex and don’t just consist of two computers.
Systems with more than ten participants usually use client-server networks. In these
networks, a central computer (server) provides resources to the other participants in the
network (clients).
Definition: Network
(IONOS Digital Guide) A network is a group of two or more computers or other electronic
devices that are interconnected for the purpose of exchanging data and sharing resources.
5|Page
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
1.2 Features of Computer Network
1. Communication speed
2. File sharing
We can install the applications on the main server; therefore, the user can access the
applications centrally. So, we do not need to install the software on every machine. Similarly,
hardware can also be shared.
5. Security
The network allows security by ensuring that the user has the right to access certain files and
applications.
6. Scalability
Scalability means that we can add new components to the network. A network must be
scalable so that we can extend the network by adding new devices. But this decreases the
speed of the connection and data of the transmission speed also decreases, this increases the
6|Page
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
chances of error occurring. This problem can be overcome by using routing or switching
devices.
7. Reliability
Computer networks can use an alternative source for the data communication in case of any
hardware failure.
A local area network (LAN) can be as small as a single-user home network or as large as a
business or educational institution with thousands of users and devices.
7|Page
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
It has a faster data transfer speed, but is restricted to a single building or a small
geographical area.
It saves money by not contracting with an outside internet provider.
Information is encrypted and safe.
The data can be easily organised.
WAN Characteristics
CAN Characteristics
9|Page
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
1.2.1.6 PAN is a Personal Area Network.
This is the network connecting devices within the intermediate area of a user.
PAN Specifications
BENEFITS
10 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Affordable - Can be set up for a relatively low cost.
Accessibility - It is also possible to share applications or programmes. A
single licenced programme may be utilised by all network devices.
Rapid Communication – Devices within a LAN network can communicate
directly with one another. They operate at 1 Gbps, 100 Gbps, and 10 Gbps.
Gigabit Ethernet technologies are rapidly evolving.
Data Protection - Only authorised users can access files on a local area
network.
CONSTRAINTS
BENEFITS
11 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
this network type does not necessitate costly equipment such as switches,
hubs, and routers.
• Scalability - These networks are easily expandable.
• Enhanced Productivity – WLAN is productive because it can be used to
connect devices such as laptops, tablets, and smartphones, allowing users to
access the network from anywhere within the coverage area.
CONSTRAINTS
BENIFITES
12 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
• Connectivity – This is the largest network; consequently, it can connect
multiple nations for the exchange of valuable resources and data.
CONSTRAINTS
BENEFITS
CONSTRAINTS
• Less security – Due to the vast area, securing the network against hackers may
be a difficult task.
13 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
• Wiring Necessary – A MAN typically requires cables to connect locations.
• Technical Support - Highly qualified technicians are required for network
implementation.
BENEFITS
CONSTRAINTS
BENEFITS
15 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
1.2.3 Which Network Types are ideal for the Alliance health Matara Branch?
16 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
The ideal network type for the Metropolitan Area Network (MAN) of Alliance Health.
When implementing a network in a building like Alliance Health, which houses many
different departments under one roof, a MAN is the best option. Making a network that is
both more extensive than a local area network (LAN) and less expensive to implement than a
wide area network (WAN) is helpful.
Point-to-point connections, VPNs, and wireless bridges are just some of the common ways to
link a MAN to an external network.
A large, adaptable network can rely on MAN as a solid foundation. (Biedron, 1995)
Standards for the electronics industry and computers are developed by the Institute of
Electrical and Electronics Engineers. To ensure that all networking devices can communicate
and work together without any hiccups, the IEEE has established a set of guidelines and
practises known as the IEEE standards in computer networks. (Mollenauer, 1988)
This is a technology that enables network-connected devices to send data to one another
without conflict. Ethernet's primary purpose is to prevent packet collisions.
They assist wired Local Area Networks (LANs) through the provision of various
specifications.
17 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
IEEE standard 802.11 defines the communication rules for wireless local area networks
(WLANs, or wireless local area networks).
This standard specifies how the Media Access Control (MAC) Service is supported by:
These standards aid wireless specialty networks (WSNs) such as Bluetooth, Internet of
Things (IoT) networks, Mesh networks, Body area networks, and wearables, among others.
(Anon., )
A network topology is a method that defines the structure and interconnections of a network's
components.
18 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Today, various types of topologies exist. Listed below are some primary categories.
Bus Topology
Ring Topology
Star Topology
Mesh Topology
Hybrid Topology
Different network topologies have different capacities for handling devices, different ways of
dealing with problems that may arise within the network, and different approaches to
managing the devices within the network.
Therefore, picking the best network structure is crucial for ensuring that the network is
effective, reliable, and satisfying to users' needs. (Mitchell, )
Thus, network topology completely affects how devices interact and communicate.
19 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
1.8.3 Network Topology bandwidth demands.
The bandwidth requirements of network topologies vary by type.
Large networks are not suitable for the bus topology. Individually troubleshooting a device is
difficult.
20 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
This configuration of a network creates a circular data path. Each device is linked to two
adjacent devices to create a ring-like structure.
The data flows in only one direction, reducing the likelihood of packet collisions. This
configuration is inexpensive to install and expand. The transmission of data occurs at a high
rate.
21 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
In a network with this topology, every node has a connection to every other node. These links
can be hardwired or wireless.
Both full and partial mesh topologies exist for Mesh. In a full Mesh topology, every node is
linked to every other node, but in a partial mesh, only the essential links are made.
22 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
The International Organisation for Standardisation developed this conceptual reference model
to facilitate the efficient and effective exchange of information between various
communication systems making use of established protocols.
The seven main layers of this model. The layers are explained in detail below.
1. Physical Layer: Network operation. This layer converts binary format to transport
medium.
2. Data Link Layer—Transmits data to LAN computers. LLC and MAC are its
sublayers.
3. Network Layer: Logical network implementation. This layer includes ICMP, IGMP,
and IPsec.
4. Transport Layer—This layer breaks down data packets and sends them over the
network. TCP/UDP are here.
5. Session Layer – Maintains computer-to-computer communication. The session layer
establishes, maintains, and terminates network connection communications.
6. Presentation Layer—Data is coded here. Formats and characters are included.
Encryption happens here.
7. Application layer – This layer handles client/user interaction. HTTP and SMTP
belong here.
23 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
• Host—Network Layer/Physical or Network Access Layer. The bottom layer
supports all protocols.
• Internet Layer—Routes network packets.
• ICMP, IGMP, RARP, and ARP are protocols.
• Transport Layer/Host-to-Host Layer—This layer delivers end-to-end.
Segmenting and adding a checksum validate the data.
• Application Layer – The topmost layer interfaces host programmes with
transport layer services. This layer uses HTTP, DNS, FTP, and SMTP.
These protocols make networks efficient. Network protocols help networked systems work.
• Network protocols establish fair and effective communication rules for all
devices.
• They detect, correct, and control network flow to improve reliability.
• Network protocols efficiently manage network resources.
• Network protocols provide encryption and authentication to improve network
security.
• They support networks and allow them to grow.
• Network protocols help devices exchange data by defining data formats,
message structures, and encoding schemes.
•
1.11.1 Research into the optimal network topology for the Alliance health
When the time comes, new devices can be easily integrated into the network and connected to
the existing infrastructure.
24 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
The TCP/IP protocol suite is the most applicable network protocol reference model to use
here. This is the protocol stack that can quickly and easily connect to the internet and other
networks. TCP/IP supports a large variety of network devices, software, and operating
systems and is easier to implement than the OSI model. Alliance Health precisely requires
this, and nothing more involved or costly.
2 ACTIVITY 2
Networking hardware consists of any physical devices necessary for a network's hardware to
communicate and interact with one another. (Anon., )
NIC
Switch
Hub
Router
Firewall
Access Point
Repeater
Gateway
2.2.1 NIC
2.2.2 Switch
Figure 18 A Switch
This gadget allows for the connection of various other gadgets. This gadget allows networked
devices to communicate with one another via packet switching. The MAC address of a device
is used to determine where an incoming data packet should be sent by a switch.
2.2.3 Hubs
networks.
2.2.4 Routers
26 | P a g e Figure 20 A Router
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
between them. Incoming data packets' Internet Protocol addresses are checked against an
internal routing table, and the packets are then sent to their final destinations. Routers in a
network communicate with one another using a standardised set of rules called routing
protocols to determine the most efficient path for sending data packets.
2.2.5 Gateway
A gateway is a piece of hardware that establishes a connection between two or more networks
using a translation service. A gateway connects two separate networks or protocols.
2.2.6 Repeater
Figure 21 A Repeater
2.2.7 Firewalls
Access points (APs) serve as essential components in wireless networking, acting as the
bridge between wireless devices and wired networks. They facilitate the connection of
wireless devices, such as laptops, smartphones, and tablets, to a wired network infrastructure,
enabling seamless data transmission and access to resources.
27 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Access points play a pivotal role in extending the reach of wireless networks by providing a
wireless signal coverage area, commonly referred to as a hotspot. These devices are equipped
with radio transmitters and receivers that communicate with wireless-enabled devices,
allowing data to travel between the wireless and wired segments of the network.
(Frangiadakis, et al., 2008)
The preceding section introduced common networking devices. The operation of these
devices is described in detail below.
28 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
essential devices for facilitating communication between networks and
subnetworks.
• Gateway – The network gateway resembles a bridge that connects two or more
networks. It provides Network Address Translation (NAT), which enables
devices in a network with private IP addresses to connect to the internet using
a single public IP address. With its IP address ranges, a gateway can be used to
divide a network into multiple or smaller subnetworks. This increases the
network's security and efficiency.
• Repeater – When a network device is distant, a repeater is used to amplify and
then regenerate the received data signals. A point-to-point configuration is
utilised by the repeater. These devices are straightforward and lack
intelligence. They collect and receive the data they receive and then transmit it
at a faster rate without modification.
• Firewalls – A firewall is a barrier installed between networks or the network
and the internet. They enforce access control to maintain network traffic
satisfaction. They aid in protecting the network against unauthorised access
and other malicious attacks.
• Access Points – An access point is comparable to a wireless central hub. It
connects wireless devices to a wired network as a bridge. To ensure
communication, they employ wireless security protocols such as WPA and
WPA2. They operate on distinct wireless channels within the spectrum of
unlicensed radio frequencies.
As servers grew and complexity, they were able to perform increasingly complex tasks.
Currently, cloud computing systems that are hosted online contain virtual servers.
Several distinct categories of server software exist, each of which performs a unique function
for the benefit of other networked computers.
The most common kinds of software servers found in networks today are described below.
File server
Application server
Web server
Database server
Email server
Virtualization server
DNS server
Proxy server
DHCP server
30 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Tower Servers - These less expensive servers are great for SMEs and data centres due
to their small footprint and ease of access. These servers come in a wide range of sizes
and shapes.
These expensive and space-saving blade servers are all the rage. The blade server is a
good option for the business network because of its small footprint, low price, and
efficient cooling. They are commonly used in large corporations and data centres.
Rack servers can be stored in any cabinet that is at least 19 inches deep. Most found in
large data and computing centres. Websites, databases, and virtualization are all
managed by rack servers.
31 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
2.6.1.1 File server
In a computer network, the files are stored and managed by a
central server known as a file server. Users can now safely
and securely transfer data between each other over a network,
thanks to this server.
This server needs a robust CPU, lightning-quick network connectivity, and plenty of
RAM.
32 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
2.6.1.6 Virtualization Server
These servers facilitate the management of virtual machines (VMs), which allow for
the installation and operation of multiple operating systems (OS) and versions of
software on a single physical server. Virtualization server software like Oracle,
VMware ESXi, and Microsoft Hyper V are all widely used.
By enforcing security policies and identifying malicious domain names, this server
can prevent access to harmful websites.
33 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Think System ST250 V2 Tower Server
The Think System ST250 V2 is a compact standalone tower that packs enterprise-
grade processing power for businesses on the go. It has a lot of room for
customization and is made with the expansion of your business in mind. It can quickly
adjust to new needs thanks to its flexible storage options, graphic processing unit
support, and multiple PCIe expansion slots.
This server is flexible enough to meet the storage expansion needs of growing
businesses, as well as the performance and functionality enhancements offered by
graphics processing units (GPUs) and the addition of expansion cards. With the
ThinkSystem ST250 V2's adaptability options, businesses can meet their unique needs
with minimal disruption and maximum efficiency.
SPECIFICATIONS
The HPE ProLiant ML350 Gen10 server is the best option for growing small and
medium-sized businesses (SMBs), branch offices of large companies, and enterprise data
centres because it is a secure dual-socket tower server with performance, expandability, and
proven reliability.
SPECIFICATIONS
34 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Processor speed: Max 3.6 GHz
Maximum memory :3.0 TB with 128 GB DDR4 DIMM
Number of Memory slots: 24 DIMM slots
Memory type: HPE DDR4 Smart Memory
Price: USD 2836.00 = LKR 867922.07
(HPE, 2023)
An intuitive tower server design. Developed for companies that need powerful, yet
cost-effective, enterprise capabilities to meet their ever-changing computing needs.
SPECIFICATIONS
Processors: One Intel Xeon E-2300 Series processor with up to 8 cores / Intel Pentium
processors with up to 2 cores
Memory: 4 DDR4 DIMM slots which supports maximum UDIMM 128 GB
price $3,384.86=LKR 1100303.24
35 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
This server's 2-socket, half-height modular blade design makes it well-suited for high-
performance computing (HPC), platform-as-a-service (PaaS), and virtualization. (Wright,
2005)
SPECIFICATIONS
A server that never skimps on performance, adaptability, or density is the cisco UCS
B200 M6. The Cisco UCS B200 M6 Blade Server supports a wide variety of applications,
from web and IT infrastructure to distributed databases.
SPECIFICATIONS
(Cisco, 2023)
FEATURES
36 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
2U dual-socket rack server for high usability, scalability, and cost-efficiency
Ideal for running enterprise applications, collaboration workloads as well as
traditional databases.
Modular design offers excellent expandability of up to 28 disk drives.
Up to 7.5TB memory for highest performance demands
GPGPU support for VDI and graphic-intensive computing
(FUJITSU, 2023)
The server's This four-socket server offers greater compute, local storage, and
memory footprint. Designed for maximum enterprise application performance.
FEATURES
(DELL, 2023)
File server - The Accounting and Finance departments of the network can utilise this
server to store company file data. This server can also be used by the administrative
37 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
department to store administrative files and documents pertaining to Software
Servers.
Email Server – As this server is used to manage employee and customer email
communication. Therefore, Alliance Health's Human Resources and Customer Service
departments can utilise this server.
Web Server - This server can support the Alliance Health Sales & Marketing
department's websites. The web server can also host the web-based applications of the
Business Development department of Alliance health.
Virtualization Server – This server can be utilised by any Alliance health department
based on their business requirements and the applications they wish to run in virtual
machines.
Proxy Server - The proxy server can be used in any Alliance health department to
increase security. The installations depend on the company's required level of security
and content filtering.
DNS server – This server will be used in the network to communicate over the
internet by facilitating user access to resources via domain names as opposed to IP
addresses.
DHCP server - This server assigns IP addresses, subnet masks, default gateways, and
other network configurations. Considering its network size, device types, and other
requirements, Alliance health can use this server in multiple departments.
The following Hardware servers may be used to power the Alliance health network.
38 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
improves performance, reduces reliance on the network, enhances security, and enables
trouble-free local processing. Workstations can operate independently, perform tasks without
relying too heavily on the network, and be effectively customised. This facilitates the
efficient and secure operation of the network.
Software packages that help with networking tasks like designing, deploying, managing, and
troubleshooting are known as "networking software."
Cisco Systems has made available this tool for network visualisation and simulation. The
software provides a simulated setting in which networks can be built and configured,
activities in those networks can be simulated, and users' grasp of networking principles can
be enhanced. If you want to learn about and practise managing and designing networks, this
is one of the best programmes to do so.
Routers, switches, and personal computers (PCs) can all be virtually placed on a desk in
Cisco packet tracer's user-friendly interface. They can link and configure these gadgets to
create intricate networks that mimic real-world situations.
Alliance health's network can be planned with the help of this programme. (Anon., )
39 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
2.9.1.2 GNS3
The GNS3 Network Simulator is a tool for simulating, testing, and developing real-world
networks. This is a free and public resource. (Welsh, 2013)
Network configuration tasks are made easier and more efficient with the help of SolarWinds
Network Configuration Manager, a piece of network software. All network devices can be
managed and monitored from a single location, configuration changes can be tracked, and
policy adherence can be verified with this helpful tool for network administrators.
Alliance Health is a business that will have multiple locations and a number of different
divisions. Due to the network's potential growth in the future, a tree topology will be used for
both of its forks. Alliance Health may choose to implement any number of potential topology
protocols across its network.
• STP – The Spanning Tree Protocol (STP) is a protocol used to prevent the looping or
redundancy of data within a network topology. IEEE's standard for this protocol, IEEE
802.1D, is now in effect. This protocol ensures network stability, and with the STP protocol,
the network can avoid broadcast storms and ensure network traffic flows smoothly without
becoming entangled in endless loops.
• MSTP – The Multiple spanning tree protocol (MSTP) is a more advanced version of the
STP that is used to manage multiple VLANs. IEEE 802.1s is a synonym for MSTP. As the
Alliance health network is a Metropolitan Area network (MAN), this protocol permits the
creation of multiple spanning trees within the network to increase network efficiency and
scalability.
40 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
• IP - The internet protocol (IP) is a required protocol that is essential to the network because
it enables nodes and devices to communicate with one another. The internet protocol assigns
unique identifiers (IP addresses) to each device and ensures that the data transmitted by these
devices are successfully delivered to their destinations.
• TCP – Transmission Control Protocol (TCP) is a mandatory protocol used to ensure that
data is transmitted and received between devices accurately and in the proper order. This is a
protocol that must be implemented within the network in order to facilitate the efficient
transfer of data.
41 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
3 ACTIVITY 03
42 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
3.2.1 Blueprint of the Matara Branch Network
43 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
3.2.2 Alliance Health Network Design Feedback Form
44 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
45 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
3.2.3 Future Improvements
By giving this to client company user they almost satisfied with the network design and
functionalities that we have explained to them. But some of them are recommend specially
their IT department head recommend to follow some advance security protocols inside the
network. Also, they are planning to enable VPN server in near future to automate the system
and expand using remote workers. So, in the next phase of this network implementation VPN
server and network virtual adapter it manager all the network segmentation inside the
network including VPN controls
46 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Floor1 Sales and Marketing (192.168.11.0/24) Laptop4 192.168.11.5
Floor1 Sales and Marketing (192.168.11.0/24) Laptop5 192.168.11.6
Floor1 Sales and Marketing (192.168.11.0/24) Laptop1 192.168.11.7
Floor1 Sales and Marketing (192.168.11.0/24) Laptop2 192.168.11.8
Floor1 Sales and Marketing (192.168.11.0/24) Laptop3 192.168.11.9
Floor1 Customer Service (192.168.12.0/24) Laptop0 192.168.12.2
Floor1 Customer Service (192.168.12.0/24) PC6 192.168.12.13
Floor1 Customer Service (192.168.12.0/24) Wireless 192.168.12.14
Router
0
Floor2 Server Room (10.10.10.0) Server0 10.10.10.1
Floor2 Server Room (10.10.10.0) Server1 10.10.10.22
Floor2 Server Room (10.10.10.0) Server2 10.10.10.33
Floor2 IT department (192.168.13.0/24) Pc40 192.168.13.2
Floor2 IT department (192.168.13.0/24) Pc41 192.168.13.3
Floor2 IT department (192.168.13.0/24) Pc38 192.168.13.4
Floor2 IT department (192.168.13.0/24) Pc39 192.168.13.5
Floor2 IT department (192.168.13.0/24) Pc42 192.168.13.6
Floor2 IT department (192.168.13.0/24) Printer0 192.168.13.7
Floor2 Video Conferencing (192.168.15.0/24) Pc37 192.168.15.2
47 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Floor 1 Reception Pc44 172.16.20.3
Floor 1 Reception Pc45 172.16.20.4
Floor 1 Customer service Pc46 172.16.20.5
Floor 1 Customer service Pc47 172.16.20.6
Floor 1 Customer service Laptop6 172.16.20.7
Floor 1 Customer service Wireless Router 1 172.16.20.8
Floor 2 Admin Pc48 172.16.20.9
Floor 2 Admin Pc49 172.16.20.10
Floor 2 HR Pc50 172.16.20.11
Floor 2 HR Pc51 172.16.20.12
Floor 2 Accounting and Pc52 172.16.20.13
Finance
Floor 2 Accounting and Pc53 172.16.20.14
Finance
Floor 2 IT Department Pc54 172.16.20.15
Floor 2 IT department Pc55 172.16.20.16
Floor 2 IT department Pc56 172.16.20.17
Floor 2 It department Pc57 172.16.20.18
End-point configuration
48 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Figure 24 end-point configuration
Router Configuration
49 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Figure 25 Router Configuration
Server configuration
50 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Figure 26 Server Configuration
Router Configuration
51 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
3.3 Network Maintenance Schedule
The network of alliance health requires a maintenance schedule to maintain its efficacy,
dependability, and absence of damage and conflicts. The maintenance schedule can be
executed on a daily, weekly, monthly, quarterly, or annual basis.
52 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Examine the network infrastructure for replacements or upgrades.
Consider expanding or developing the network.
Verify all backups and evaluate continuity of operations plans.
4 ACTIVITY 04
53 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
4.1.1 Colombo Network
54 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
4.1.2 Matara Network
Ping a Matara branch workstation from the main office and the other way around as a test
case.
The expected outcome involves successful pinging with low latency and no packet loss.
If the ping command is successful, the network is functioning normally and there is
communication between the two branches.
Case Study: Conduct an extended ping test from a Matara workstation to a specified IP
address in the headquarters.
55 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
The expected outcome was a successful extended ping with accurate round-trip time (RTT)
measurements and no packet loss.
The extended ping test helps determine the quality of the connection between the Matara
branch and the headquarters by monitoring RTT and ensuring reliable data transfer.
Perform a trace route from a Matara workstation to a particular IP address at the company's
headquarters.
Anticipated was a successful trace route displaying the network path and hop-by-hop latency.
The trace route test exposes the network path and latency between the two branches. It assists
in locating potential obstructions and diagnosing network issues.
Test Case: Connect a workstation in Matara to a particular server in the main office via Telnet
or SSH.
The Telnet/SSH test validates the Matara branch's ability to remotely access servers in the
main office. It ensures secure remote management and diagnostic capabilities.
Test Outcomes and Analysis: For each test scenario, the test outcomes must be compared to
the anticipated results. The network is correctly configured and operating according to plan if
all tests pass and the results are as expected. For any deviations or failures, additional
research and troubleshooting would be required to identify and resolve any underlying issues.
Introducing redundant network connections and devices would enhance the network's defect
tolerance and resilience. Virtual router redundancy protocol (VRRP) and hot standby router
protocol (HSRP) are two protocols that can be employed to configure redundant routers,
switches, and internet connections.
56 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Implement Quality of Service (QoS) policies to give essential network traffic, such as phone
and video conferencing, precedence over unimportant network traffic. This guarantees
optimal efficacy for critical applications.
Enhanced Wireless Connection: Consider strategically placing wireless access points to boost
Wi-Fi performance and coverage throughout the entire structure. To maintain secure wireless
connections, use authentication and encryption methods such as WPA2-Enterprise.
The network's strategy and architecture took into consideration the organization's needs and
included separate subnets for each department, Wi-Fi access in customer service areas, and
branch-to-branch communication. The network architecture utilised a star topology and
consisted of routers, switches, and servers, among other essential networking equipment.
The configuration and execution of the network required the selection of appropriate network
protocols, IP address ranges, and hardware components. The suggested servers were chosen
to ensure centralised file storage, user administration, email communication, and application
hosting based on the specific needs of the departments.
The execution of ping, extended ping, trace route, and Telnet/SSH tests confirmed the
network's connectivity and functionality.
57 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Name – Ping Command
Expected Result - pc01 successfully receive bytes from pc0 without any packet loss
Process -
Actual Result –
The above test shows the pinging from PC 1 with the IP address 192.168.10.3 to PC0 with
the IP address 192.168.10.2 to confirm whether they are successful in exchanging data
packets. The results were received as expected which is to send 4 packets successfully to PC0
with 0% loss.
Command Status - Success
Expected Result - pc0 successfully receive bytes from pc1 without any packet loss.
Process -
58 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Actual Result –
The above test shows the pinging from PC 0 with the IP address 192.168.10.2 to PC1 with
the IP address 192.168.10.3 in order to confirm whether there is a continuous response
received from PC1.
Expected Result – pc1 successfully access the remote router2 by using password and
username
Process -
Actual Result –
Connection Timeout and remote host not working.
Command status - Not Success
59 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
4.2.3.4 Test Case 4
Inputs – The above test shows the trace route test from PC0 with the IP address
192.168.10.2with PC2 having the IP address 192.168.10.3
Process -
Actual Result –
The above test shows the trace route test from PC0 with the IP address 192.168.10.3 with
PC1 having the IP address 192.168.10.3 The test completed successfully with the expected
result of tracing the route successfully.
60 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
5 References
Anon., . Cisco Packet Tracer 5.3. [Online]
Available at: http://www.cisco.com/web/offer/emea/7130/docs/PT5.pdf
[Accessed 14 7 2023].
Anon., . IEEE 802.11-2012. [Online]
Available at: http://standards.ieee.org/getieee802/802.11.html
[Accessed 14 7 2023].
Anon., . Network Connectivity: Advanced Networking Services — Teaming. [Online]
Available at: http://www.intel.com/support/network/sb/CS-009747.htm
[Accessed 14 7 2023].
Anon., . Picking a Proxy Server. [Online]
Available at: http://www.slideshare.net/bryan_call/choosing-a-proxy-server-apachecon-2014
[Accessed 14 7 2023].
Biedron, W. S., 1995. Metropolitian area network services comprised of virtual local area
networks running over hybrid fiber-coax and asynchronous transfer mode technologies.
Proceedings of SPIE, , 2609(), pp. 50-57.
Boland, H. & Mousavi, H., 2004. Security issues of the IEEE 802.11b wireless LAN. [Online]
Available at: https://ieeexplore.ieee.org/document/1345023/?reload=true
[Accessed 14 7 2023].
Canonical, 2016. Ubuntu Server - for scale out workloads. [Online]
Available at: https://www.ubuntu.com/server
[Accessed 14 7 2023].
Frangiadakis, N. et al., 2008. Virtual access points for vehicular networks. [Online]
Available at: http://eurecom.fr/~camara/files/vapsmobilware08.pdf
[Accessed 14 7 2023].
Johnson, R., Kinnear, K. & Stapp, M., 2008. DHCP Server Identifier Override Suboption.
[Online]
Available at: https://tools.ietf.org/html/rfc5107
[Accessed 14 7 2023].
Mitchell, B., . Introduction to Computer Network Topology. [Online]
Available at: http://compnetworking.about.com/od/networkdesign/a/topologies.htm
[Accessed 14 7 2023].
61 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Mollenauer, J., 1988. Metropolitan area networks: where may standards meet. [Online]
Available at: https://ieeexplore.ieee.org/document/4752
[Accessed 14 7 2023].
Teare, D. & Paquet, C., 2005. Campus Network Design Fundamentals. [Online]
Available at:
https://amazon.com/campus-network-design-fundamentals-diane/dp/1587052229
[Accessed 14 7 2023].
Welsh, C., 2013. Gns3 Network Simulation Guide. [Online]
Available at: https://amazon.com/network-simulation-guide-rednectar-chris/dp/1782160809
[Accessed 14 7 2023].
Wright, J., 2005. Blades have the edge [blade servers]. IEEE Spectrum, , 42(4), pp. 24-29.
Younis, O. et al., 2012. A framework for evaluating network optimization techniques.
[Online]
Available at: https://ieeexplore.ieee.org/document/6222712
[Accessed 14 7 2023].
15 Different Types of Servers in Computing - zenarmor.com (2023). Available at:
https://www.zenarmor.com/docs/network-basics/types-of-servers (Accessed: 24 November
2023).
Claudia F. (no date) Types of Networks: LAN, WAN, WLAN, MAN, SAN, PAN, EPN &
VPN - Video & Lesson Transcript, study.com. Available at:
https://study.com/academy/lesson/types-of-networks-lan-wan-wlan-man-san-pan-epn-
vpn.html (Accessed: 21 November 2023).
‘Computer Networks | How They Work, Error Detection’ (no date). Available at:
https://teachcomputerscience.com/networks/ (Accessed: 23 November 2023).
62 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
Explain the Impact of Network Topology, Communication and Bandwidth Requirements (no
date). Available at: https://www.ukessays.com/essays/information-systems/explain-the-
impact-of-network-topology-communication-and-bandwidth-requirements.php (Accessed:
22 November 2023).
Gateway and router: what is the difference and similarity | FS Community (2021)
Knowledge. Available at: https://community.fs.com:7003/article/router-vs-gateway-what-is-
the-similarity-and-difference.html (Accessed: 23 November 2023).
Server Types: Blade Server vs. Rack Server vs. Tower Server | FS Community (2022)
Knowledge. Available at: https://community.fs.com:7003/article/server-types-rack-server-vs-
blade-server-vs-tower-server.html (Accessed: 24 November 2023).
Types of Computer Network: What is LAN, MAN and WAN (2023). Available at:
https://www.guru99.com/types-of-computer-network.html (Accessed: 21 November 2023).
What is a network? Definition, explanation, and examples (2020) IONOS Digital Guide.
Available at: https://www.ionos.com/digitalguide/server/know-how/what-is-a-network/
(Accessed: 19 November 2023).
What is network bandwidth and how is it measured? (no date) Networking. Available at:
https://www.techtarget.com/searchnetworking/definition/bandwidth (Accessed: 22
November 2023).
63 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02
‘What Is Network Software? Definition, Types, Components, and Best Practices’ (no date)
Spiceworks. Available at: https://www.spiceworks.com/tech/networking/articles/what-is-
network-software/ (Accessed: 30 November 2023).
64 | P a g e
Chamara Rasanjana De Silva | 0020933 Networking
Unit 02