Networking Assignment
Networking Assignment
Assessor signature
Date
Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)
INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Assessor Internal
Verifier
Unit(s) Unit 02: Networking
Student’s name
List which Pas Meri Distinction
assessment criteria s t
the Assessor has
awarded.
INTERNAL VERIFIER CHECKLIST
Confirm action
completed
Remedial action
taken Give details:
Internal
Date
Verifier
signature
Programme
Date
Leader signature
(if required)
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID
Assignment 1 Assessor
Number
Date
Submission Date
Received
1st
submission
Date Received
Re-submission
2nd submission
Date
Assessor Feedback:
LO1 Examine networking principles and their
protocols.
Pass, Merit & P P M1 D
Distinction 1 2 1
Descripts
LO2 Explain networking devices and
operations.
Pass, Merit & P P M
Distinction 3 4 2
Descripts
LO3 Design efficient networked
systems.
Pass, Merit & P P M D
Distinction 5 6 3 2
Descripts
LO4 Implement and diagnose networked
systems.
Pass, Merit & P P M
Distinction 7 8 4
Descripts
Resubmission Feedback:
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken
place and grades decisions have been agreed at the assessment board.
Assignment Feedback
Formative Feedback: Assessor to Student
Action Plan
Summative feedback
Assessor Date
signature
Student Date
signature
Pearson Higher Nationals in
Computing
Unit 02: Networking
Assignment 01
General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point, and should be in the style of Time New Roman.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject,
Assignment No, and Page Number on each page. This is useful if individual sheets
become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory
information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the
before mentioned compulsory information will result in rejection of your work.
3. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as
illness, you may apply (in writing) for an extension.
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in- text citation
and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your gradecould be
reduced to A REFERRAL or at worst you could be expelled from the course
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct form. I further understand what it means to copy
another’s work.
Academic Year
Unit Tutor
Issue Date
Submission format
The submission should be in the form of an individual report written in a concise, formal business
style using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using
Harvard referencing system. Please also provide an end list of references using the Harvard
referencing system.
The recommended word count is 3,000–3,500 words for the report excluding
annexures,
although you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:
Scenario
Alliance Health is a technology-enabled solutions company that optimizes the revenue cycle of the
US healthcare industry where its global delivery center is located in Colombo. The company is
planning to expand their business operations with their latest branch at Matara and wants it to be one
of the state-of-the-art companies in Matara with the latest facilities.
Assume you have been appointed as the new network analyst of Alliance Health to plan, design and
restructure the existing network. Prepare a network architectural design and implement it with your
suggestions and recommendations to meet the company requirements.
The floor plan of the head office in Colombo is as follows: Floor
1:
Reception area
Sales & Marketing Department (10 employees)
Customer Services Area – with Wi-Fi facilities
Floor 2:
Administration Department (30 Employees)
HR Department (20 employees)
Accounting & Finance Department (15 employees)
Audit Department (5 employees)
Business Development Department (5 employees)
Floor 3
Video conferencing room
IT Department (60 employees)
The Server Room
Floor 2:
Administration Department (10 Employees)
HR Department (7 employees)
Accounting & Finance Department (8 employees)
IT Department (50 employees)
Connectivity between two branches ( Head Office and Matara) would allow the
intra branch connectivity between departments. ( Use of VPN is not compulsor y)
Number of servers required for the Server room need to be d ecid ed by the
Networ k designer and should be assigned with 10. 254. 10. 0/24 subnet. ( Uses
static IPs)
( Note : Clearly state your a ss umptions . You are allowe d to design the ne twork
ac cording to your a ss umptions , but main re quire me nts should not be v iola te d)
Activity 01
Discuss the benefits and constraints of diff er ent networ k system types that can be
implement ed in the Matara branch and the main IEEE Ether net standar ds that can be
used in above LAN and WLAN design.
Discuss the impor tance and impact of networ k topologies and assess the main
networ k pr otocol suites that are used in networ k design using examples. Recommend
suitable networ k topology and networ k pr otocols for above scenar io and evaluate with
valid points how the r ecommended topology demonstrates the efficient utilization of
the net wor king system of Matara branch.
Activity 02
Discuss the operating pri nciples of network devices ( Ex: Router, Switch, Etc.) and
ser ver types that can be used for above scenar io while explor ing diff er ent servers that
are available in today’ s market with their speci fications. Rec ommend server/ servers for
the above scenario and justify your selection with valid points.
Discuss the inter- dependence of w orkstation hardware and networki ng softwar e and
pr ovide examples for networ king softwar e that can be used in above networ k design.
Activity 03
Prepare a written network design plan to meet the above- me ntione d user requireme nts
including a blueprint drawn using a modeling tool ( Ex: Mic rosoft Visio, Edraw Max) . Test
and evaluate the proposed design by a nalyzing user f eedback with the aim of optimizing
your design and impr oving efficiency.
( Support your answer by providing the VLAN and IP subnetting scheme for the above
scenario and the l ist of devices, network compone nts and software used to design the
networ k for above scenar io and while justifying your selections.)
Install and configure Network services, devices and applications ( Ex: VLAN, Wi
Fi, DNS, Proxy, Web, Etc.) according to the proposed design to accomp lis h the user
r equir ements and design a detailed Maintenance schedule for above N etwor k.
Activity 04
Imp lement a networ ked system based on your pr epar ed design with valid
evidences.
Develop test cases and conduct verification ( Ex: Ping, extended ping, trace r oute,
telnet, SSH, etc.) to test the above Networ k and analyse the test r esults against the
expected r esults. Recommend potential futur e enhancements for the networ ked
system with valid justifications and cr itically r eflect on the implement ed networ k,
including the plan, design, configurations, tests and the decisions made to enhance the
system.
Grading Rubric
LO 1 & LO2
D1 Evaluate the topology protocol selected for a given scenario and
how it demonstrates the efficient utilisation of a
networking system.
LO3 : Design efficient networked
systems
P5
Design a networked system to meet a given specification.
P6
Design a maintenance schedule to support the networkedsystem.
M3
Analyse user feedback on your designs with the aim of
optimising your design and improving efficiency.
D2
Critically reflect on the implemented network, includingthe
design and decisions made to enhance the system.
LO4 : Implement and diagnose networked
systems
P7
Implement a networked system based on a prepareddesign.
P8
Document and analyze test results against expectedresults.
M4
Recommend potential enhancements for the networked
systems.
D2 Critically reflect on the implemented network, including
the design and decisions made to enhance the system.
Acknowledgement
I am Sajidha Rimzi. I worked hard to complete this task. However, it would not have been possible without
my lecturer Mr. Ama. miss I would like Thanks to ESoft Metro Campus for guidance and constant
supervision in addition to providing the necessary information related to the task and also their support to
complete the task. I would like to express my gratitude to myself to my parents for their encouragement
which helped me complete the task.
Contents
ACTIVITY 01 . 20
Network 20
Benefits of networking 20
Types of network 21
(1) LOCAL AREA NETWORK (LAN) 21
(2) METROPOLITAN AREA NETWORK (MAN) 22
WIDE AREA NETWORK (WAN) 23
VIRTUAL PRIVATE NETWORK (VPN) 24
PERSONAL AREA NETWROK (PAN) 24
Network system types 25
Network standard 26
Institute of Electronic and Electrical Engineering (IEEE) 26
The table of IEEE standards . 26
International Standards Organization (ISO) 28
DATA COMMUNICATION MEDIA 32
Bandwidth 35
Benefits of high bandwidth 35
NETWORKING MODELS 36
Transmission Control Protocol/Internet Protocol (TCP/IP) 36
ISO OSI Model 36
OSI seven layer 37
Comparison of TCP/IP and ISO /OSI model 37
Application layer Protocol 38
DNS (Domain Name System) 38
Telnet (Telecommunication network) 38 FTP
(File Transfer Protocol) 39 SSH
(Secure Shell) 39
HTTP (Hypertext Transfer Protocol) 39
ACTIVITY 02 . 40
Network Device 40
SWITCH/HUB 40
DIFFERENT BETWEEN THE SWITCH/HUB 41
Router 41
Modem 42
SECURITY DEVICES IN NETWORK 42
Firewall 43
VPN CONCENTRATOR 43
Features of networking software 44
SERVER TYPES 44
FILE SERVER 44
Email server 45
Database server 45
Backup Server 46
Application server 46
Proxy server 47
USAGE OF DEVICES AND NETWORK SOFTWARE . 47
Servers Virtual Servers 48
Networking software 48
Advantages of networking software: 49
Anti virus 49
ACTIVITY 03 . 50
User feedback form 51
RESPONCES 53
Install and configure network service and application. 54
Installing DNS service to the local server 56
Installing Active directory in our local server 63
Maintenance schedule 68
Maintenance schedule 69
ACTIVITY 04 . 72
Different services are produced by this programme. These services allow us to demonstrate
the credibility of the network. The photographs I gave for the networkdesign topic feature a
completely operational network system in addition to just the exterior. 72
Configuration of the switch . 73
Vlans 74
Dhcp 75
Result of configuration 76
Network monitoring . 77
Network monitoring tool. 77
Troubleshoot in Networking . 81
Network Cable Fix. 82
Command line interface pic 84
Potential future enhancement. 85
References 86
ACTIVITY 01 .
Network
A network is any communication channel between two or more computers ordevices. that a
device is connected to another through a cable or a physical connection. Additionally, there
are two alternate paths for connecting.
The size of a single network can range from a single sending device to the entire internet,
the largest network currently in use. All networks share information with alltypes of devices,
small and large, thanks to a common feature.
They are used for such as :-
Benefits of networking
Refers to the process of linking computers, devices, or systems to share resources,
information, and services in the context of computers and technology. Networking has a
number of advantages, which can differ based on the type of network (such as a local area
network, wide area network, or the internet) and the network's particular objectives. Here
are some of the main advantages:
Resource sharing :-
Networking makes it simple for users to share files and documents. Users can collaborate
more easily as a result, making it simpler to work on projects together. Peripheral Sharing:
By allowing users on a network to share peripherals like printers, scanners, and external
storage, redundant hardware is no longer necessary.
Communication :-
Email: Networking enables the exchange of emails, a crucial tool for modern
business and personal communication.
Virtual meetings and conferences can be held, saving time and resources, thanks to
networking's support for video conferencing and VoIP (Voice over Internet Protocol)
conversations.
Remote access :-
By enabling remote access to resources, networking enables users to access data or
programmes hosted on distant servers while working from various places.
Resource efficiency :-
By enabling numerous users to share the same resources, networking can increaseresource
efficiency and save hardware and software costs.
Scalability :-
Networks can readily be scaled to match an organization's expansion. The network may be
expanded to accommodate more devices and users with moderate simplicity.
Internet access :-
Networks can readily be scaled to match an organization's expansion. The network may be
expanded to accommodate more devices and users with moderate simplicity.
Types of network
Local area network (LAN)
Metropolitan area network (MAN)
Wide area network (WAN)
Virtual private network (VPN)
Personal area network (PAN)
(Anon., n.d.)
Advantage Disadvantage
Easy and cheat communication . Distance limitation
Resource sharing Security problem
Sharing software application Crashes may effect
Data centralization
(Anon., n.d.)
Advantage Disadvantage
Has hight security level more Cannot work on traditional
than WAN phone copper wires .
User can share their internet If it becomes bigger it will be
connection . more difficult to use .
Can send local emails fast and free Have more chances of cracking
more than LAN
WIDE AREA NETWORK (WAN)
These networks offer extensive coverage. This may occur inside or outside of a nation. The
Internet serves as the best WAN example.
Today, there are several WAN architectures designed for use cases that practicallytouch
every facet of contemporary life. An enterprise can access a carrier network by using a WAN
router, sometimes referred to as an edge router or border router, which routes data packets
between WAN locations.
(Anon., n.d.)
Advantage Disadvantage
High bandwidth Cost is high
Global business Security problems
Can exchange more applications
Sharing if software
VIRTUAL PRIVATE NETWORK (VPN)
A private network connection is a virtual private network. Users can access a private
network through point-to-point communication. That safeguards your online privacy and
internet connection.
Increases in functionality, security, and private network administration are alladvantages of a
VPN. It often serves remote workers and gives access to resources that are unavailable on
public networks.
(Anon., n.d.)
Advantage Disadvantage
Avoid bandwidth Slow internet connection
Can hide our private information Breakdown of connection
Escape data throttling Illegal of VPNs
Some service blocked like
(Netflix)
Advantage Disadvantage
Easy to use Slow data transfer
No need of wires and cables Less distance range
No extra space required Radio signals
Used in meetings and
conferences
1. peer to peer
two or more computers connected over the internet. Peer-to-peer can be utilised at home, at
work, and any where .Peer to peer file sharing is simple and distraction- free.
2. Client server
Those who request data or information over the internet or from an area network are
referred to as clients, and those who provide that data and information are referred to as
servers. A server computer responds to the client computer connected to the server, and the
server has a network operating system installed.
Network standard
Standards are crucial for establishing and maintaining a competitive market because they
enable vendors to compete on the fundamental quality of their goodswhile remaining
competitive with those on the market now. Data communication required for network
topologies and processes is referred to as networking standards.
Benefits of standards
Reduce market risks
Increase productivity and enhance efficiency.
Reduce development time and cost
Market growth for new emerging technologies .
Network Topology
The architecture or arrangement of components, links, and nodes within a computer network
is referred to as network topology. It specifies how various gadgets or nodes are linked
together and how data is transferred throughout thenetwork. Performance, scalability, and
dependability of a network can all be significantly impacted by its topology.
Physical Topologies
The physical configuration or arrangement of components and cables in a computer network
is referred to as physical topology. It specifies the physical
connections between devices and the methods used to transfer data between them. There are 5
types of topologies:-
Star topology
Bus topology
Ring topology
Tree topology
Mesh topology
Hybrid topology (combination of above topologies )
Star topology
Failure of individual nodes or cables does not always result in network outage; hence, this is a
commonly used design and built by centralising a switch/hub and computers.
(Anon., n.d.)
Advantage Disadvantage
Hub can be upgraded easily Performance is based on hub or swich
Fast performance expensive
Easy to setup
Bus topology
Here , all the connections are established through a main cable . That is called thebackbone
because any issue with the network affects all the computers in the network. This design is
easy in networking and fewer cables are required .
However a limited number of computers can be connected
(Anon., n.d.)
Ring topology
Computers are arranged in a ring or bangle and connected by cables in this example. Data or
information circulate in a circle. One computer or cable failure canresult in the network as a
whole failing.
(Anon., n.d.)
Advantage Disadvantage
Cheap Failure of one computer destroy the
entire network
Only the node can transmit the data Trouble shooting difficult
Transmitting data not effected by high
Traffics
Tree topology
Both bus and star topologies share traits with tree topology. Several star topologies
are connected to a bus backbone wire in this configuration. One benefit of this is having
individual control over each network.
(Anon., n.d.)
Mesh topology
Both bus and star topologies' properties can be found in tree topology. A bus backbone
cable connects a number of star topologies in this system. The capabilityof controlling each
network separately is one benefit of this.
(Anon.,
n.d.)
Advantages Disadvantages
It is robust High cost
Easy connection carry its own data Installation is difficult
Default is diagnosed easily
Provide security
Hybrid topology
Mesh topology is the result of the combination of two or more topologies. While hybrid
topologies have some advantages over other topologies, they also have significant
drawbacks. This topology doesn't exhibit any of the traits associatedwith any one of the
particular
(Anon., n.d.)
Advantage Disadvantage
Flexible Complex design
Effective High cost
Reliable
Can be modified
1. Simplex mode
Only from the sender to the receiver is data sent. Printing documents, watching TV,and
listening to the radio are a few examples.
2. Half duplex mode
Data is transferred in this case in one direction at a time. This implies that followingthe
transmission of data from the sender or source to the receiver, the latter may then
communicate data back to the former. One can employ walkie-talkies used by security forces
and online browsing to obtain information as examples.
(Anon., n.d.)
PHYSICAL MEDIA
Typically, cables are used to physically connect the computers in a network.A deeper
understanding of how networks function and how data is transported from one point to
another is made possible by the different sorts of connections that canbe used within them.’’
Twisted pair
It is made up of several. pairs of insulated wire that have been twisted together. Forvarious
forms of voice and data infrastructure, this wire is quite beneficial. Twisted pair wires offer
signal interference protection. Twisted-pair cables come in two variations.
(Anon., n.d.)
Unshielded Twisted Pair (UTP) and The UTP cables is mostly used in
Ethernet Installations.
Shielded Twisted Pair (STP). The STP cables are the kinds of networks to prevent
crosstalk and electromagnetic interference.
Coaxial cable
The most popular type of network cabling was coaxial cable since it was lightweight,
affordable, and simple to use. Because coaxial cable was so widelyused, it was considered a
secure, well-supported installation.
Because coaxial cables were secure and simple to install, they quickly gained popularity.
The cable was made up of an exterior jacket, a metal shield, and solidcopper insulation. The
TC uses coax wires because of their higher bandwidth.
(Anon., n.d.)
(Anon., n.d.)
Bandwidth
The amount of data sent through a network in a particular amount of time is knownas
bandwidth. The amount of digital data that may be transferred or received at once is referred
to as bandwidth. This is referred to as the data transmission rate occasionally.
Circuit is particularly effective in using bandwidth for data, voice, and video. On your
network, the typical bandwidth usage per user should be as follows:
Audio – Variable. Limited to 64 Kbps
Video – Variable. Limited to 512 Kbps
Screen share – Variable. Limited to 512 Kbps (static content uses less)
NETWORKING MODELS
(Anon., n.d.)
ISO OSI Model
This conceptual approach, which allows two dissimilar systems to connect
independent of their underlying architecture, encompasses all facets of network
communication.
OSI is a model for comprehending and creating a flexible network
architecture, not a protocol.
Benefits of the OSI model include: standardising interfaces, accelerating
evolution, and reducing complexity.
It is a compilation of organisational norms from 146 different nations.
They can be quite helpful in resolving network issues. Their aim is to build
worldwide technological standards to allow global exchange and barrier-freetrade.
OSI seven layer
(Anon., n.d.)
TCP/IP ISO/OSI
Horizontal approach 7 layers
Only 4 layers Vertical approach
Implementation of OSI Reference model
Protocol
They are a series of procedures that must be followed in a formal way, conductedin a
systemic manner. These guidelines specify the types of data that may be delivered, the
instructions that may be used to send and receive data, and the procedures for verifying the
transmission.
High speed
Flexibility
Easy to transfer files
Runs the system in different way
TCP/IP
It is a protocol for communication that connects network devices to the internet. The data
transmission across the internet is demonstrated by TCP and IP. additionally that specify the
transmission routes and how it should be divided into packets. It is intended to increase
network dependability and enable automatic recovery in the event that any network
component fails.
(Anon., n.d.)
Network Device
Switch
As they allow for the connection of numerous computers, printers, access points, servers, and
other gear, they play a crucial role in many business networks.
Switches are a crucial component of my network since they may expedite processes. They
are utilised in LANs, or local area networks. It offers a centralconnection for many
connected devices.
(Anon., n.d.)
Hub
It is a typical device that links networking equipment. The hub can serve as the
main link for all of our networking accessories. Hub is a helpful tool for receiving info
that is broadcast and sharing resources. Without connecting to each other, a hub can
connect devices together.
(Anon., n.d.)
SWITCH/HUB
Serve as a connector between two or more computers by acting as a mediator.
The transmission medium is wired and steered. A port on the computer is connected to one
end, while a port on a switch or hub is connected to the other end.
DIFFERENT BETWEEN THE SWITCH/HUB
The speed of data transfer is the primary distinction. Hub transmits data to all
computers, whereas switch only delivers data to the appropriate machines. Here, a
hub could cause unneeded network data congestion.
The switch employs full duplex mode for data transfer whereas the hub uses half
duplex mode.
Switch: Because they filter traffic based on MAC addresses, switches provide
improved security. They have the ability to separate device traffic, which improves
network security and stops unauthorised access to data.
Hub: Since hubs broadcast data to all connected devices, they offer no security
safeguards. It is simpler for unauthorised devices to eavesdrop onnetwork traffic
because there is no isolation of traffic.
Switch: A switch's ports each establish their own collision domain. This lowers
the possibility of network congestion caused by collisions becausecollisions are
isolated to the devices connected to each specific port.
Hub: For all linked devices, a hub establishes a single collision domain. This
necessitates that each device on the hub must pause and listen whenever a device
transmits data, potentially causing network slowdowns and collisions.
Router
A router is a piece of hardware used to connect a network of two or more computers .It is
sometimes referred to as a gateway. This determines the best ports for network connectivity
when it comes to data transmission. After the packet data has been transferred over the air,
this device helps you. This information can be transmitted between devices or through the
Internet. The router accomplishes this by giving each network device a local IP address. At
the door is the router.
Routers are responsible for controlling Internet traffic.
(Anon., n.d.)
Modem
The modem is used to connect a home computer or a computer network to the internet when
using telephone wires to access the internet. A translator of data is the modem. To prevent
transmission over telephone lines, digital signals sent fromcomputers are converted to
analogue signals, while analogue signals received overtelephone lines from the internet are
converted to digital signals before being transferred to computers. Both MOdulation and
DEModulation refer to this.
Therefore, the term "MODEM" is a mixture of these two words. These MODEMscome in
various varieties. Internal, exterior, and wireless modems are those.
Modern routers come equipped with a built-in modem.
(Anon., n.d.)
Three components has to be fulfilled to have a fully protected system they are:-
Hardware
Software
Cloud services
Firewall
Firewalls have a significant impact on network security. These are strong networking
devices that need a set of rules-based inspections for all data packetsand frames that pass
across the network. Next, the firewall chooses whether to permit or restrict access. A
firewall is a real-world device that controls access to computers. These firewalls are
interconnected with the uplink and the node.
(Anon., n.d.)
VPN CONCENTRATOR
This device resembles a router but focuses mostly on VPN connection structuresand
algorithms. These VPN concentrators can be set up to suit our needs.
By doing so, secure networking tunnels can be established.
Locate users attempting to connect to the servers
encode and decrypt information sent over tunnels.
Make the data packet flow inside the tunnels more efficient.
(Anon., n.d.)
Features of networking software
Application Layer: Utilise APIs to meet the control layer's demands and request
services.
Control Layer: This layer contains the network operating system. This covers the
network's architecture. It sends SDN needs to network components after receiving
them from the application layer.
The ability to add and remove users is controlled by the network administrator.
Security features are offered, and the administrator has theauthority to apply them.
Network virtualization is made possible.
SERVER TYPES
The hardware and software features of servers set them apart from other computers. If the
right software configurations are used, even an ordinary computer can be converted into a
server. For instance, our home computer can beconfigured to act as both a file server and a
print server. This describes how a server's software primarily determines how it functions.
Servers have specific hardware needs; regular desktop computers' CPUs and memory cannot
be used inservers. Server hardware is designed specifically to meet the needs of high end
processing.
Getting dependable components at a fair price is the primary goal when purchasinga server.
This can help a business save money and operate more effectively.
FILE SERVER
This system offers a file system. In computing, a single PC linked to the same localarea
network (LAN) as the users serves as the file server. A file server is a computer on a
network that distributes files to other computers on the network. relating to file utilisation.
contributes to the development of shared storage on server computers so that users can
access users. It is a networked computer whose primary purpose is to provide a location for
shared disc access, or publicly accessible shared storage of computer files, by the
computers linked to the same computer network on the workstations.
workstations.
. The most common function for network servers is file service, and major network
operating systems like Unix, Windows NT, and Novell NetWare all offer this type of file
sharing. File servers are frequently used in offices and classrooms where users connect their
client PCs through a LAN.
(Anon., n.d.)
Email server
A programme or computer on a network that serves just as a virtual mail service isknown as a
mail server, or simply a mail server. An programme or computer on a network known as an
email server, or simply a mail server, serves only as a substitute for a physical post office.
The server receives and distributes outgoing messages to local users as well as stores
incoming mail.
Client-server application model is used to send and receive messages using theSimple Mail
Transfer Protocol (SMTP).
(Anon., n.d.)
Database server
The hardware and software needed to maintain databases are referred to collectively as
database servers. The word "database server" is used to describe the client/server back-end
system of a database application. The back-end, which is sometimes referred to as a
database server, carries out non-user-specific operations such data processing, storage,
manipulation, and archiving. This includes the actual computer that runs the database
server. A database server istypically referred to in this context as a specific, high-tech
computer that houses a
database.
(Anon., n.d.)
Type of database:
Microsoft SQL Server
IBM DB2 • SAP Sybase ASE
PostgreSQL
MariaDB Enterprise
My SQL
Backup Server
In a corporate IT setting, a backup server often links to one or more additional backup
servers via a computer network. A backup server is a sort of server that permits the backup
of information on a specialized local or remote server, includingdata, files, programmes, and
databases. It combines hardware and software technologies to offer connected computers,
servers, or associated devices backup storage and retrieval services.
(Anon., n.d.)
Application server
The hardware and software required to administer the database context might be referred to
as a "database server" in some contexts. A database server is typicallyreferred to in this sense
as a specific, complicated computer that houses a database. A database programme on the
conventional client-server architecture comes to a conclusion with the database server.
Another name for this spider is acopy. The actual machine used to hold the database is
included in this.
(Anon., n.d.)
Proxy server
This file is utilised for security reasons. The files are completely safe and cannot be disclosed
.The server application serves as a bridge between a client and the server. It aids in preventing
access to a private network by online attackers. A server, it serves as a "intermediary"
between end users and online pages.
Some proxy servers shield your IP (Internet Protocol) address with their own in order to
safeguard your anonymity. A website sees the IP address provided by theproxy rather than
your IP address.
When a client submits a request, the proxy server receives it, delivers it to the server, and then
receives the response from the server and sends it back to the original client. This method
avoids putting the client and server in direct contact.
Proxy servers come in a wide variety of styles and feature sets. While some assist Internet
users in avoiding
(Anon., n.d.)
USAGE OF DEVICES AND NETWORK SOFTWARE .
The organisation must select the hardware and software with the help of a network
professional. Because these choices will affect the rest of the implementation, this time
frame is regarded as one of the most important.
Security Devices
• Firewalls
• Load Balancer
• VPN Concentrator
Network Devices
• Routers
• Network Interface Cards
• Switches
• Modem
I would choose these three servers for my initial network deployment strategy based on their
performance and price. I used both a proxy and DNS since, in myopinion, server security is
of the utmost importance.
These PCs, as I indicated before, are set up with high-end specifications and are the best
devices to use in our networking sections. We'll be using virtual machineswithin our desktops
that run client and server software. The capacity of virtual machines to work together is
clearly demonstrated by the fact that using them wouldn't hinder or negatively impact the
workstation's performance.
Workstations equipped with Windows servers and client servers will be able tofunction
without the least latency or delay.
With the aforementioned hardware and software, it is obvious that I intend to establish an
effective connection between these components and the software that
runs on them. To protect against external dangers and maximise the system'scapabilities, this
interaction is crucial.
Networking software
The software that we use for network processes and network analysis is called network
software, and network operating systems are regarded as the main category of software.
Every other network operating system and applications.
Anti virus
It serves as a safeguard for all PCs. Once installed, the majority of antivirus
programmes run in the background and offer real-time defence against viralattacks.
Users can protect their files and hardware with the help of comprehensive virusprotection
programmes against infections like worms,
The barrage is constant, and antivirus companies must frequently update their detection
technology to keep up with the more than 60,000 new malware samplescreated daily.
Users must have antivirus software installed and up to date because a computer without it will
become infected minutes after connecting to the internet.
ACTIVITY 03 .
Bluprint of Network
Mathara Branch
Department Ip Address
Reception area 192.168.11.0/24
Customer Services Area 192.168.12.0/24
Administration Department 192.168.13.0/24
HR Department 192.168.14.0/24
Accounting & Finance Department 192.168.15.0/24
IT Department 192.168.16.0/24
Assumptions
Network Topology:
The network consists of three routers: Router A, Router B, and Router C.These
routers are responsible for routing traffic between different departments and
branches.
VLAN Implementation:
The network includes both Level 1 and Level 2 switches to implement VLANs. Level 1
switches are used to connect devices within each department, while Level 2 switches
are employed to handle inter-VLAN routing.
Routing Protocol:
The RIP (Routing Information Protocol) is utilized as the inter-router routingprotocol.
RIP exchanges routing information among the routers and helps determine the best
paths for data transmission.
DHCP Servers:
Each department is equipped with its own DHCP server to automate the process of
IP address assignment. The DHCP servers provide IP addressesand other network
configuration parameters to the computers in their respective departments.
Department Computers:
To simplify the complexity, we will consider two computers in each
department. However, in reality, there would be a larger number ofcomputers in
each department.
Inter-Branch Connectivity:
The Mathara and Main branches are connected via a serial connection, which is a
wired method for establishing a link between the two locations. This connection
enables data transfer and communication between the branches.
Additional Servers:
Two servers are implemented in the network: an email server and an FTP (File
Transfer Protocol) server. These servers provide email services and facilitate file
transfers within the network.
DHCP Enablement:
All computers in the network are configured to enable DHCP. This ensures that
they can automatically obtain IP addresses and other network settings from the
DHCP servers, simplifying the network configuration process.
switch configurations
router configuration
User feedback form
I had to initially get input on my network design. Using the research as my reference, I might
change the size and shape. I've also asked them about the equipment I've used in the system,
and once I get their response, I'll be able to add more.
I also wanted user feedback to construct this network maintenance schedule. It willbe of great
assistance when making the schedule. There are also questions about networks and security.
When creating the maintenance schedule, these two elements will also be taken into
account.
My system has the lowest cost, in my opinion, of any system out there. This is as a result of
the VLAN design I employed. However, the user's perspective on the price will also be
taken into account in this.
The form also makes mention of the system's dependability and usability. I'd beable to give
a precise time range for the system using this, with upgrades and maintenance in between.
VMWare workstation player 16 (virtual machine) was used to install the windowsserver
2016. By using these softwares I was able to configure different server services
Installing DNS service to the local server
This is the step by step procedure to install DNS service into our local server. This is
the method we followed to create a successful DNS service.
1. Add roles and features
2. Selecting DNS service and installing DNS service features
3. Forward zone installation (Adding hostname)
4. Reverse zone installation (Adding Pointers)
5. Check the system with NS Lookup
After executing these steps correctly we will be able to install a working DNSservice in our
server.
Maintenance schedule
Before the network encounters a significant issue, a series of tasks called network
maintenance includes network monitoring, updates, error checking, etc. Both physical IT
assets (servers and hardware) and non-physical IT assets (software and cloud services)
are covered by this network upkeep. A healthy company will constantly take precautions
to protect its assets rather than dealing with them directly.
Full Network
Main branch
Mathara branch
Level 2
switch
Level 1 switch
Level 1 Switch
enable
configure terminal
interface range FastEthernet0/1-24
switchport mode access switchport
access vlan 90
do wr
exit
These commands will enable privileged EXEC mode (enable), enter global
configuration mode (configure terminal), configure the range of FastEthernet interfaces
from 1 to 24 (interface range FastEthernet0/1-24), set the switchport
mode to access, assign VLAN 90 to the interfaces (switchport mode access and
switchport access vlan 90), save the configuration changes (do wr or write memory),
and exit the interface configuration mode (exit).
Level 2 Switch
VLANs (Virtual Local Area Networks) are used to logically segment a networkinto
separate broadcast domains. Each VLAN operates as a separate network, allowing you to
control the flow of traffic and improve network efficiency.
Main
Department Vlans
Reception area Vlan 10
Sales & Marketing Department Vlan 20
Customer Services Area Vlan 30
Administration Departmen Vlan 40
HR Department Vlan 50
Accounting & Finance Department Vlan 60
Business Development Department Vlan 70
Video conferencing room Vlan 80
It department Vlan 90
The Server Room Vlan 100
Mathara
Department Vlans
Reception area Vlan 110
Customer Services Area Vlan 120
Administration Department Vlan 130
HR Department Vlan 140
Accounting & Finance Department Vlan 150
IT Department Vlan 160
Dhcp
service dhcp
ip dhcp pool itmathara-pool
network 192.168.16.0 255.255.255.0
default-router 192.168.16.1
dns-server 192.168.16.1exit
In this configuration, the service dhcp command enables the DHCP service on thedevice.
The ip dhcp pool itmathara-pool command creates a DHCP pool named "itmathara-pool"
for managing IP address assignments. The subsequent commands configure the
parameters for the DHCP pool:
network 192.168.16.0 255.255.255.0 defines the network address and subnet mask for
the pool.
default-router 192.168.16.1 specifies the default gateway (router) IP addressfor the
clients.
dns-server 192.168.16.1 sets the DNS server IP address that will be providedto the
DHCP clients.
After configuring the DHCP pool, the exit command is used to exit the DHCP
configuration mode.
Rip of configuration
router rip
version 2
network 10.254.10.0
network 10.0.0.0
exit
Network monitoring may aid in network optimisation and productivity growth, both of
which are crucial for a startup like ours. This might help us attract new customers to
our business.
By carefully watching the network, precise reports can be made. This couldaid in
our ability to predict the near future and assist us in developing a budget for our
next significant upgrade.
All of the systems, devices, traffic, and applications in the IT ecosystem may be monitored
using PRTG, a simple-to-use piece of software. This software supports a wide range of
protocols and technologies. We could make informed decisions if ournetwork's details were
clearly visualised. (Anon., n.d.)
Troubleshoot in Networking .
The procedure for locating, analysing, and resolving issues in a network environment.
Professionals in networking use this fundamental procedure to enhance network performance.
This following method may help to solve the problem smarter and faster.
• Collecting necessary information
• Develop a hypothesis
• Testing the hypothesis
• Finding for a solution
• Verifying the solution succeeded
1. Route Dampening
Is a technique for inhibiting a router that exhibits signs of route flapping. In thiscase, a router
is not marketed, but rather suppressed.
When a route flaps, it receives a penalty, and when the penalty total reaches apredetermined
threshold, the router is inhibited from closing.
These following command can be used to switch on and control routedampening in BGP
protocol:-
Is a technique for preventing topology updates from reaching the router by restricting the
information's discernibility. In essence, this strategy prevents therouter from seeing
extraneous routing updates in the topology.
1. Restarting router/Wifi
4. Security software .
5. DNS server.
When hiring new staff members, new client PCs are necessary. A new configuration scheme
will need to be applied to switches and routers. In order to distribute them throughout the
departments, another IP block will need to be purchased. These adjustments can all be made
according to a schedule. During such a change, server performance must also be taken into
account. We could keep using the server if it continues to operate favourably; otherwise, we
will need to make adjustments to that as well.
To protect the system from external attacks, I want to utilise firewalls. Additionally, remote
access will be improved to function as an administrator for each department. Additionally,
departmental admins will be implemented. This will be done in order to lessen the insider
threat. Next, I'd add a VPN to our network system so that we can use the internet safely, as
well as a load balancer to control how data flows through the system.