0% found this document useful (0 votes)
37 views

Networking Assignment

Uploaded by

sajidharimzi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views

Networking Assignment

Uploaded by

sajidharimzi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 103

INTERNAL VERIFICATION – ASSIGNMENT BRIEF

Programme Title: HND in Computing


Assessor Name: Oshada Lokuhetty
Internal Verifier Name:

Unit or Component Number and Unit 02 - Networking


Title:
Assignment title: LAN Design & Implementation for Alliance Health
Assessment criteria targeted by
this assignment brief: LO1, LO2, LO3, LO4

Is this an Authorised N/A


Assignment Brief published by
Pearson? If so, has it been
amended by the Assessor in
any way? Please give details.
(If using the Authorised Assignment Brief ‘off
the shelf’ with no amendments, pleaseanswer
the question marked * in the checklist only)

Has this assignment been Ye N


submitted to the Assignment s o
Checking Service? (If Yes, please
keep a copy of the ACS feedback with this √
form)

INTERNAL VERIFIER CHECKLIST Y/N

Are the programme and unit details accurate? Y

*Are clear deadlines for assessment given? TBC

Is the time frame of an appropriate duration? Y

Is there a suitable vocational scenario or context? Y

Are the assessment criteria to be addressed stated accurately? Y

Does each task show which criteria are being addressed? Y

Do the tasks meet the assessment requirements of the unit/s? Y

Is it clear what evidence the learner needs to generate? Y

Is it likely to generate evidence that is valid and sufficient? Y

Overall, is the Assignment fit for purpose? Yes √ No


*If ‘No’ is recorded the Internal Verifier must recommend actions detailing the issues to be addressed. The Assessor and the Internal
Verifier must then confirm that the action has been undertaken and that the Assignment Brief is authorised for use before being
issued to learners.
Action required: Target Date Date Action
(If none then please state n/a) for Completed
Completion

General Comments (if appropriate)

Assignment Brief Authorised for Use:

Internal Verifier signature Date

Assessor signature
Date

Lead Internal Verifier


signature (ifappropriate) [email protected] Date 2022/06/13

Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)
INTERNAL VERIFICATION – ASSESSMENT DECISIONS

Programme title BTEC Higher National Diploma in Computing

Assessor Internal
Verifier
Unit(s) Unit 02: Networking

Assignment title LAN Design & Implementation for Alliance Health

Student’s name
List which Pas Meri Distinction
assessment criteria s t
the Assessor has
awarded.
INTERNAL VERIFIER CHECKLIST

Do the assessment criteria


awarded match those shown in Y/N
the assignment brief?
Is the Pass/Merit/Distinction
grade awarded justified by Y/N
the assessor’s comments on
the student work?
Has the work been
Y/N
assessed accurately?
Is the feedback to the
student: Give details:
• Constructive? Y/N
• Linked to relevant assessment Y/N
criteria? Y/N
• Identifying opportunities for
improved performance? Y/N
• Agreeing actions?
Does the assessment
Y/N
decision need amending?

Assessor signature Date

Internal Verifier signature Date


Programme Leader signature (if
Date
required)

Confirm action
completed
Remedial action
taken Give details:

Assessor signature Date

Internal
Date
Verifier
signature
Programme
Date
Leader signature
(if required)
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID

Unit Title Unit 02: Networking

Assignment 1 Assessor
Number
Date
Submission Date
Received
1st
submission
Date Received
Re-submission
2nd submission
Date

Assessor Feedback:
LO1 Examine networking principles and their
protocols.
Pass, Merit & P P M1 D
Distinction 1 2 1
Descripts
LO2 Explain networking devices and
operations.
Pass, Merit & P P M
Distinction 3 4 2
Descripts
LO3 Design efficient networked
systems.
Pass, Merit & P P M D
Distinction 5 6 3 2
Descripts
LO4 Implement and diagnose networked
systems.
Pass, Merit & P P M
Distinction 7 8 4
Descripts

Grade: Assessor Signature: Date:

Resubmission Feedback:

Grade: Assessor Signature: Date:

Internal Verifier’s Comments:

Signature & Date:

* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken
place and grades decisions have been agreed at the assessment board.

Assignment Feedback
Formative Feedback: Assessor to Student

Action Plan

Summative feedback

Feedback: Student to Assessor

Assessor Date
signature

Student Date
signature
Pearson Higher Nationals in
Computing
Unit 02: Networking
Assignment 01
General Guidelines

1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.

2. Attach this brief as the first section of your assignment.

3. All the assignments should be prepared using a word processing software.

4. All the assignments should be printed on A4 sized papers. Use single side printing.

5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.

Word Processing Rules

1. The font size should be 12 point, and should be in the style of Time New Roman.

2. Use 1.5 line spacing. Left justify all paragraphs.

3. Ensure that all the headings are consistent in terms of the font size and font style.

4. Use footer function in the word processor to insert Your Name, Subject,
Assignment No, and Page Number on each page. This is useful if individual sheets
become detached for any reason.

5. Use word processing application spell check and grammar check function to help editing your
assignment.

Important Points:

1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory
information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the
before mentioned compulsory information will result in rejection of your work.

2. Avoid using page borders in your assignment body.

3. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.

4. Ensure that you give yourself enough time to complete the assignment by the due date.

5. Excuses of any nature will not be accepted for failure to hand in the work on time.

6. You must take responsibility for managing your own time effectively.

7. If you are unable to hand in your assignment on time and have valid reasons such as
illness, you may apply (in writing) for an extension.

8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .

9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.

10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in- text citation
and a reference list.

11. If you are proven to be guilty of plagiarism or any academic misconduct, your gradecould be
reduced to A REFERRAL or at worst you could be expelled from the course
Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct form. I further understand what it means to copy
another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of Pearson UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my own,
and where I have made use of another’s work, I will attribute the source in the correct way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding agreement
between myself and Pearson, UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.

Student’s Signature: [email protected]


Date: 2024.04.06
(Provide E-mail ID) (Provide Submission Date)
Higher National Diploma in Computing
Assignment Brief
Student Name /ID Number Sajidha Rimzi /E189889

Unit Number and Title Unit 2: Networking

Academic Year

Unit Tutor

Assignment Title LAN Design & Implementation for Alliance Health

Issue Date

Submission Date 2024.04.06

IV Name & Date

Submission format

The submission should be in the form of an individual report written in a concise, formal business
style using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using
Harvard referencing system. Please also provide an end list of references using the Harvard
referencing system.
The recommended word count is 3,000–3,500 words for the report excluding
annexures,
although you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:

LO1 Examine networking principles and their protocols. LO2

Explain networking devices and operations.

LO3 Design efficient networked systems.

LO4 Implement and diagnose networked systems.


Assignment Brief and Guidance:

Scenario

Alliance Health is a technology-enabled solutions company that optimizes the revenue cycle of the
US healthcare industry where its global delivery center is located in Colombo. The company is
planning to expand their business operations with their latest branch at Matara and wants it to be one
of the state-of-the-art companies in Matara with the latest facilities.

Assume you have been appointed as the new network analyst of Alliance Health to plan, design and
restructure the existing network. Prepare a network architectural design and implement it with your
suggestions and recommendations to meet the company requirements.
The floor plan of the head office in Colombo is as follows: Floor
1:
 Reception area
 Sales & Marketing Department (10 employees)
 Customer Services Area – with Wi-Fi facilities

Floor 2:
 Administration Department (30 Employees)
 HR Department (20 employees)
 Accounting & Finance Department (15 employees)
 Audit Department (5 employees)
 Business Development Department (5 employees)

Floor 3
 Video conferencing room
 IT Department (60 employees)
 The Server Room

The floor plan of the branch in Matara is as follows:Floor 1:


 Reception area
 Customer Services Area– with Wi-Fi facilities

Floor 2:
 Administration Department (10 Employees)
 HR Department (7 employees)
 Accounting & Finance Department (8 employees)
 IT Department (50 employees)

Following requirements are given by the Management.


 All the d ep ar t ment s must be separated with unique subnet .

 The conferencing room of the head office and Customer Services


Areas of each br an ch are to be equipped with Wi- Fi connections .

 Connectivity between two branches ( Head Office and Matara) would allow the
intra branch connectivity between departments. ( Use of VPN is not compulsor y) 

 The necessary IP address classes and ranges must be d ecid ed by th e


net wor k des ign er and s hould be us ed for all the d ep ar t ments except the server
room.

 Number of servers required for the Server room need to be d ecid ed by the
Networ k designer and should be assigned with 10. 254. 10. 0/24 subnet. ( Uses
static IPs)

 Sales and Marketing T ea m also needs to access N et w or k r es our c es using WIFI


connectivit y.

( Note : Clearly state your a ss umptions . You are allowe d to design the ne twork
ac cording to your a ss umptions , but main re quire me nts should not be v iola te d)

Activity 01
 Discuss the benefits and constraints of diff er ent networ k system types that can be
implement ed in the Matara branch and the main IEEE Ether net standar ds that can be
used in above LAN and WLAN design. 

 Discuss the impor tance and impact of networ k topologies and assess the main
networ k pr otocol suites that are used in networ k design using examples. Recommend
suitable networ k topology and networ k pr otocols for above scenar io and evaluate with
valid points how the r ecommended topology demonstrates the efficient utilization of
the net wor king system of Matara branch.

Activity 02
 Discuss the operating pri nciples of network devices ( Ex: Router, Switch, Etc.) and
ser ver types that can be used for above scenar io while explor ing diff er ent servers that
are available in today’ s market with their speci fications. Rec ommend server/ servers for
the above scenario and justify your selection with valid points.



 Discuss the inter- dependence of w orkstation hardware and networki ng softwar e and
pr ovide examples for networ king softwar e that can be used in above networ k design. 
Activity 03
 Prepare a written network design plan to meet the above- me ntione d user requireme nts
including a blueprint drawn using a modeling tool ( Ex: Mic rosoft Visio, Edraw Max) . Test
and evaluate the proposed design by a nalyzing user f eedback with the aim of optimizing
your design and impr oving efficiency. 

( Support your answer by providing the VLAN and IP subnetting scheme for the above
scenario and the l ist of devices, network compone nts and software used to design the
networ k for above scenar io and while justifying your selections.)

 Install and configure Network services, devices and applications ( Ex: VLAN, Wi
Fi, DNS, Proxy, Web, Etc.) according to the proposed design to accomp lis h the user
r equir ements and design a detailed Maintenance schedule for above N etwor k.

* Note: - Screen shots of Configuration scripts should be presented.

Activity 04
 Imp lement a networ ked system based on your pr epar ed design with valid
evidences. 

 Develop test cases and conduct verification ( Ex: Ping, extended ping, trace r oute,
telnet, SSH, etc.) to test the above Networ k and analyse the test r esults against the
expected r esults. Recommend potential futur e enhancements for the networ ked
system with valid justifications and cr itically r eflect on the implement ed networ k,
including the plan, design, configurations, tests and the decisions made to enhance the
system. 
Grading Rubric

Grading Criteria Achieved Feedback

LO1 : Examine networking principles and


their protocol
P1
Discuss the benefits and constraints of different networktypes
and standards.
P2
Explain the impact of network topology, communicationand
bandwidth requirements.
M1
Assess common networking principles and how protocols
enable the effectiveness of networked systems.

LO2 : Explain networking devices and


operations
P3
Discuss the operating principles of networking devicesand
server types.
P4
Discuss the interdependence of workstation hardwareand
relevant networking software
M2
Explore a range of server types and justify the selection of a
server for a given scenario, regarding cost and performance
optimisation

LO 1 & LO2
D1 Evaluate the topology protocol selected for a given scenario and
how it demonstrates the efficient utilisation of a
networking system.
LO3 : Design efficient networked
systems
P5
Design a networked system to meet a given specification.
P6
Design a maintenance schedule to support the networkedsystem.

M3
Analyse user feedback on your designs with the aim of
optimising your design and improving efficiency.
D2
Critically reflect on the implemented network, includingthe
design and decisions made to enhance the system.
LO4 : Implement and diagnose networked
systems

P7
Implement a networked system based on a prepareddesign.

P8
Document and analyze test results against expectedresults.

M4
Recommend potential enhancements for the networked
systems.
D2 Critically reflect on the implemented network, including
the design and decisions made to enhance the system.
Acknowledgement

I am Sajidha Rimzi. I worked hard to complete this task. However, it would not have been possible without
my lecturer Mr. Ama. miss I would like Thanks to ESoft Metro Campus for guidance and constant
supervision in addition to providing the necessary information related to the task and also their support to
complete the task. I would like to express my gratitude to myself to my parents for their encouragement
which helped me complete the task.
Contents
ACTIVITY 01 . 20
Network 20
Benefits of networking 20
Types of network 21
(1) LOCAL AREA NETWORK (LAN) 21
(2) METROPOLITAN AREA NETWORK (MAN) 22
WIDE AREA NETWORK (WAN) 23
VIRTUAL PRIVATE NETWORK (VPN) 24
PERSONAL AREA NETWROK (PAN) 24
Network system types 25
Network standard 26
Institute of Electronic and Electrical Engineering (IEEE) 26
The table of IEEE standards . 26
International Standards Organization (ISO) 28
DATA COMMUNICATION MEDIA 32
Bandwidth 35
Benefits of high bandwidth 35
NETWORKING MODELS 36
Transmission Control Protocol/Internet Protocol (TCP/IP) 36
ISO OSI Model 36
OSI seven layer 37
Comparison of TCP/IP and ISO /OSI model 37
Application layer Protocol 38
DNS (Domain Name System) 38
Telnet (Telecommunication network) 38 FTP
(File Transfer Protocol) 39 SSH
(Secure Shell) 39
HTTP (Hypertext Transfer Protocol) 39
ACTIVITY 02 . 40
Network Device 40
SWITCH/HUB 40
DIFFERENT BETWEEN THE SWITCH/HUB 41
Router 41
Modem 42
SECURITY DEVICES IN NETWORK 42
Firewall 43
VPN CONCENTRATOR 43
Features of networking software 44
SERVER TYPES 44
FILE SERVER 44
Email server 45
Database server 45
Backup Server 46
Application server 46
Proxy server 47
USAGE OF DEVICES AND NETWORK SOFTWARE . 47
Servers Virtual Servers 48
Networking software 48
Advantages of networking software: 49
Anti virus 49
ACTIVITY 03 . 50
User feedback form 51
RESPONCES 53
Install and configure network service and application. 54
Installing DNS service to the local server 56
Installing Active directory in our local server 63
Maintenance schedule 68
Maintenance schedule 69
ACTIVITY 04 . 72
Different services are produced by this programme. These services allow us to demonstrate
the credibility of the network. The photographs I gave for the networkdesign topic feature a
completely operational network system in addition to just the exterior. 72
Configuration of the switch . 73
Vlans 74
Dhcp 75
Result of configuration 76
Network monitoring . 77
Network monitoring tool. 77
Troubleshoot in Networking . 81
Network Cable Fix. 82
Command line interface pic 84
Potential future enhancement. 85
References 86
ACTIVITY 01 .

Network
A network is any communication channel between two or more computers ordevices. that a
device is connected to another through a cable or a physical connection. Additionally, there
are two alternate paths for connecting.

The size of a single network can range from a single sending device to the entire internet,
the largest network currently in use. All networks share information with alltypes of devices,
small and large, thanks to a common feature.
They are used for such as :-

 Sending messages ,mails , chats and etc…..


 Share data and information through the storage devices .
 Share hardware like printers

Benefits of networking
Refers to the process of linking computers, devices, or systems to share resources,
information, and services in the context of computers and technology. Networking has a
number of advantages, which can differ based on the type of network (such as a local area
network, wide area network, or the internet) and the network's particular objectives. Here
are some of the main advantages:

 Resource sharing :-
Networking makes it simple for users to share files and documents. Users can collaborate
more easily as a result, making it simpler to work on projects together. Peripheral Sharing:
By allowing users on a network to share peripherals like printers, scanners, and external
storage, redundant hardware is no longer necessary.

 Centralized data management : -


Networks provide for centralised data administration and storage, which canenhance data
accessibility, security, and backup.

 Communication :-
Email: Networking enables the exchange of emails, a crucial tool for modern
business and personal communication.
Virtual meetings and conferences can be held, saving time and resources, thanks to
networking's support for video conferencing and VoIP (Voice over Internet Protocol)
conversations.

 Remote access :-
By enabling remote access to resources, networking enables users to access data or
programmes hosted on distant servers while working from various places.
 Resource efficiency :-
By enabling numerous users to share the same resources, networking can increaseresource
efficiency and save hardware and software costs.

 Scalability :-
Networks can readily be scaled to match an organization's expansion. The network may be
expanded to accommodate more devices and users with moderate simplicity.

 Internet access :-
Networks can readily be scaled to match an organization's expansion. The network may be
expanded to accommodate more devices and users with moderate simplicity.

Types of network
 Local area network (LAN)
 Metropolitan area network (MAN)
 Wide area network (WAN)
 Virtual private network (VPN)
 Personal area network (PAN)

(1) LOCAL AREA NETWORK (LAN)


Computers inside of a room or multiple rooms in a building are connected by a LAN. An
example of a computer network is one that has been built in a school, university, small
business, or office.
Most LAN connections are made to the router's hub using ethernet, wifi, or a combination of
the two to connect devices to the network. Ethernet is a technologyfor establishing a physical
network connection that uses a cable.

(Anon., n.d.)
Advantage Disadvantage
 Easy and cheat communication .  Distance limitation
 Resource sharing  Security problem
 Sharing software application  Crashes may effect
 Data centralization

(2) METROPOLITAN AREA NETWORK (MAN)


Examples of MANs include banking networks, institutes, and universities with branches.
Generally speaking, a MAN is small enough that dedicated point-to-point,or backbone, data
connections are established between buildings or to a hosted colocation data centre. It also
interconnects with computer resources in a geographic area the size of a metropolitan area.

(Anon., n.d.)

Advantage Disadvantage
 Has hight security level more  Cannot work on traditional
than WAN phone copper wires .
 User can share their internet  If it becomes bigger it will be
connection . more difficult to use .
 Can send local emails fast and free  Have more chances of cracking
more than LAN
WIDE AREA NETWORK (WAN)
These networks offer extensive coverage. This may occur inside or outside of a nation. The
Internet serves as the best WAN example.
Today, there are several WAN architectures designed for use cases that practicallytouch
every facet of contemporary life. An enterprise can access a carrier network by using a WAN
router, sometimes referred to as an edge router or border router, which routes data packets
between WAN locations.

(Anon., n.d.)

Advantage Disadvantage
 High bandwidth  Cost is high
 Global business  Security problems
 Can exchange more applications
 Sharing if software
VIRTUAL PRIVATE NETWORK (VPN)
A private network connection is a virtual private network. Users can access a private
network through point-to-point communication. That safeguards your online privacy and
internet connection.
Increases in functionality, security, and private network administration are alladvantages of a
VPN. It often serves remote workers and gives access to resources that are unavailable on
public networks.

(Anon., n.d.)

Advantage Disadvantage
 Avoid bandwidth  Slow internet connection
 Can hide our private information  Breakdown of connection
 Escape data throttling  Illegal of VPNs
 Some service blocked like
(Netflix)

PERSONAL AREA NETWROK (PAN)


Personal area networks (PANs) connect electronic devices like wireless models, computers,
telephones, tablets, etc.; these are typically found in small offices or homes. While devices
within a PAN can exchange data with one another, PANs typically lack a router and
therefore cannot connect directly to the Internet.
(Anon., n.d.)

Advantage Disadvantage
 Easy to use  Slow data transfer
 No need of wires and cables  Less distance range
 No extra space required  Radio signals
 Used in meetings and
conferences

Network system types

1. peer to peer
two or more computers connected over the internet. Peer-to-peer can be utilised at home, at
work, and any where .Peer to peer file sharing is simple and distraction- free.

2. Client server
Those who request data or information over the internet or from an area network are
referred to as clients, and those who provide that data and information are referred to as
servers. A server computer responds to the client computer connected to the server, and the
server has a network operating system installed.
Network standard
Standards are crucial for establishing and maintaining a competitive market because they
enable vendors to compete on the fundamental quality of their goodswhile remaining
competitive with those on the market now. Data communication required for network
topologies and processes is referred to as networking standards.

There are different types of layers which are existing :


 Network layer - IP , IPX
 Application layer - HTML , HTTP , H.323, POP …..
 Physical layer - RS-232C (cable) , V.92(modem)
 Transport layer - TCP , SPX
 Data link layer - Ethernet IEEE, 802.3 …..

Some noted standard organizations .


 American National Standard Institute (ANSI)
 International Standard Organization (ISO)
 Institute of Electric and Electronic Engineers (IEEE)
 Internet engineering task force (IETF)
 World Wide Web Consortium (W3C)

Institute of Electronic and Electrical Engineering (IEEE)


Project 802 was started by the IEEE Computer Society. They function with bothLANs and
MANs, or metropolitan area networks. Variable size packets are prohibited per IEEE 802
standards.
In networking, IEEE technical papers are considered industry standards.
The objective is to advance research and instruction in electrical engineering andcomputer
science.

The table of IEEE standards .

IEEE 802 LAN/ MAN


IEEE 802.1 Standards for LAN/MAN bridging and management and remote
media access control (MAC) bridging
IEEE 802.2 Standards for logical link control (LLC) standards for
Connectivity
IEEE 802.3 Ethernet standards for carrier sense multiple access with
collision detection (CSMA/CD)
IEEE 802.4 Standards for token passing bus access
IEEE 802.24 Standards for logical link control (LLC) standards’ for
connectivity
IEEE 802.5 Standards for token ring access and for communications
between LANs and MANs
IEEE 802.6 Standards for information exchange between system
IEEE 802.7 Standards for broadband LAN cabling
IEEE 802.8 Fibre optic connection
IEEE 802.9 Standards for integrated services, like voice and data
IEEE 802.10 Standards for LAN / MAN security implementation
IEEE 802.11 Wireless networking - WIFI
IEEE 802.12 Standards for demand priority access method
IEEE 802.14 Standards for cable television broadband communication
IEEE 802.15.1 Bluetooth
IEEE 802.15.4 Wireless sensor / control network – “Zigbee”
IEEE 802.15.6 Wireless body area network (BAN)- (eg- Bluetooth low energy)
IEEE 802.16 Wireless networking – “WIMAX”

Communication standard table

802.3 - 2012 A revision of base standard incorporating the


2012 802.3at/av/ba/bd/bg amendments , corrigenda and
errata
802.3bj June 2014 Define a 4-lane 100Gbit/s backplane PHY for operation
overlink consist with copper traces on “improved FR-4 (as
defined by IEEEP802.3ap or better materials to be defined by
the task force) with the legths up to at least 1m and a 4-lane
100 Gbit/s PHY for operation over linksconsistent with copper
twinaxial cables with leghts up
to at least 5m
802.3bk 2013 This amendment to IEEE Std 802.3 defines the physicallayer
specification and management parameters for EPON operation
on poit – to- multipoint passive opticalnetworks supporting
extended power budget classes
for PX30 , PX40 , PRX40 , and PR40 PMDs
802.3bm 2015 100G/ 40G etherent for optical cable
802.3bp 2014 1000BASE- T1 - Gigabit Ethernet over a single twisted
pair , automotive and industrial environment .
802.3pq Feb 2016 40BASE – T for 4 pair balanced twisted pair cabling
with 2 connectors over 30m distance s
802.3bs 2017 400 Gbit/s Ethernet over optical fiber using multiple
25G/50G lanes
802.3bt 2017 Power over Ethernet enhancement up to 100W using all4 -pair
balanced twisted pair cabling , lower standby
power and specific enhancements to support IOT
application (eg; Lighting , Sensors , building
automation)

International Standards Organization (ISO)


A compilation of organisational norms from 146 nations
Fewer than 300 of IOS's more than 14350 standards pertain to computer-related goods and
functions. The goal is to produce international technological standardsto allow global
information interchange and barrier-free trade.

Benefits of standards
 Reduce market risks
 Increase productivity and enhance efficiency.
 Reduce development time and cost
 Market growth for new emerging technologies .

Network Topology
The architecture or arrangement of components, links, and nodes within a computer network
is referred to as network topology. It specifies how various gadgets or nodes are linked
together and how data is transferred throughout thenetwork. Performance, scalability, and
dependability of a network can all be significantly impacted by its topology.

There are 2 types of network topologies


 Physical topology
 Logical topology

Physical Topologies
The physical configuration or arrangement of components and cables in a computer network
is referred to as physical topology. It specifies the physical
connections between devices and the methods used to transfer data between them. There are 5
types of topologies:-
 Star topology
 Bus topology
 Ring topology
 Tree topology
 Mesh topology
 Hybrid topology (combination of above topologies )

Star topology
Failure of individual nodes or cables does not always result in network outage; hence, this is a
commonly used design and built by centralising a switch/hub and computers.

(Anon., n.d.)

Advantage Disadvantage
Hub can be upgraded easily Performance is based on hub or swich
Fast performance expensive
Easy to setup

Bus topology
Here , all the connections are established through a main cable . That is called thebackbone
because any issue with the network affects all the computers in the network. This design is
easy in networking and fewer cables are required .
However a limited number of computers can be connected
(Anon., n.d.)

Ring topology
Computers are arranged in a ring or bangle and connected by cables in this example. Data or
information circulate in a circle. One computer or cable failure canresult in the network as a
whole failing.

(Anon., n.d.)

Advantage Disadvantage
Cheap Failure of one computer destroy the
entire network
Only the node can transmit the data Trouble shooting difficult
Transmitting data not effected by high
Traffics

Tree topology
Both bus and star topologies share traits with tree topology. Several star topologies
are connected to a bus backbone wire in this configuration. One benefit of this is having
individual control over each network.

(Anon., n.d.)
Mesh topology
Both bus and star topologies' properties can be found in tree topology. A bus backbone
cable connects a number of star topologies in this system. The capabilityof controlling each
network separately is one benefit of this.

(Anon.,
n.d.)

Advantages Disadvantages
It is robust High cost
Easy connection carry its own data Installation is difficult
Default is diagnosed easily
Provide security

Hybrid topology
Mesh topology is the result of the combination of two or more topologies. While hybrid
topologies have some advantages over other topologies, they also have significant
drawbacks. This topology doesn't exhibit any of the traits associatedwith any one of the
particular

(Anon., n.d.)
Advantage Disadvantage
Flexible Complex design
Effective High cost
Reliable
Can be modified

DATA COMMUNICATION MEDIA


Data communication is the act of transmitting data and information. Between twoor more
computers or devices, such as printers, data transmission is possible. A connection between
a sender and a receiver is necessary for data transfer.
Networking is the process of making such a link.

 Sender/source - the person or the object which sends data


 Medium - medium used to transmit data (telephone wire/ wireless)
 Receiver / destination – the person or the object which receive data .

(1) DATA TRANSMISSION MEDIA

1. Simplex mode
Only from the sender to the receiver is data sent. Printing documents, watching TV,and
listening to the radio are a few examples.
2. Half duplex mode
Data is transferred in this case in one direction at a time. This implies that followingthe
transmission of data from the sender or source to the receiver, the latter may then
communicate data back to the former. One can employ walkie-talkies used by security forces
and online browsing to obtain information as examples.

(Anon., n.d.)

3. Full duplex mode


Full duplex data transmission involves sending information to both parties simultaneously.A
full duplex mode communication example is a phone call.
(Anon., n.d.)

PHYSICAL MEDIA
Typically, cables are used to physically connect the computers in a network.A deeper
understanding of how networks function and how data is transported from one point to
another is made possible by the different sorts of connections that canbe used within them.’’

Twisted pair

It is made up of several. pairs of insulated wire that have been twisted together. Forvarious
forms of voice and data infrastructure, this wire is quite beneficial. Twisted pair wires offer
signal interference protection. Twisted-pair cables come in two variations.

(Anon., n.d.)

 Unshielded Twisted Pair (UTP) and The UTP cables is mostly used in
Ethernet Installations.
 Shielded Twisted Pair (STP). The STP cables are the kinds of networks to prevent
crosstalk and electromagnetic interference.

Coaxial cable
The most popular type of network cabling was coaxial cable since it was lightweight,
affordable, and simple to use. Because coaxial cable was so widelyused, it was considered a
secure, well-supported installation.
Because coaxial cables were secure and simple to install, they quickly gained popularity.
The cable was made up of an exterior jacket, a metal shield, and solidcopper insulation. The
TC uses coax wires because of their higher bandwidth.

(Anon., n.d.)

Fibre optical cable


is very good at high-speed, high-capacity data transfer because to the signal's purity and lack of
attenuation. Since there is no electrical pulse in the cable, optical cables provide a larger
bandwidth and are secure for long-distance data transmission. This strand is thicker than a
human hair and contains one or more glass chains.

(Anon., n.d.)
Bandwidth
The amount of data sent through a network in a particular amount of time is knownas
bandwidth. The amount of digital data that may be transferred or received at once is referred
to as bandwidth. This is referred to as the data transmission rate occasionally.
Circuit is particularly effective in using bandwidth for data, voice, and video. On your
network, the typical bandwidth usage per user should be as follows:
 Audio – Variable. Limited to 64 Kbps
 Video – Variable. Limited to 512 Kbps
 Screen share – Variable. Limited to 512 Kbps (static content uses less)

Benefits of high bandwidth


 faster performance of the application.
 Makes interaction possible.
 Improved data transfer efficiency.
 A faster rate of data transfer.
 Allow several concurrent sessions

NETWORKING MODELS

Transmission Control Protocol/Internet Protocol (TCP/IP)


TCP/IP is a protocol for communication that links network devices on the internet
.In a private computer network, it serves as a communication protocol. Data from adata
stream is accepted by Transmission Control Protocol (TCP), which then separates it into
packets and adds a TCP header to create TCP segments. After then, an Internet Protocol (IP)
datagram is created by encapsulating the TCP.

(Anon., n.d.)
ISO OSI Model
 This conceptual approach, which allows two dissimilar systems to connect
independent of their underlying architecture, encompasses all facets of network
communication.
 OSI is a model for comprehending and creating a flexible network
architecture, not a protocol.
 Benefits of the OSI model include: standardising interfaces, accelerating
evolution, and reducing complexity.
 It is a compilation of organisational norms from 146 different nations.
 They can be quite helpful in resolving network issues. Their aim is to build
worldwide technological standards to allow global exchange and barrier-freetrade.
OSI seven layer

(Anon., n.d.)

Comparison of TCP/IP and ISO /OSI model

TCP/IP ISO/OSI
 Horizontal approach  7 layers
 Only 4 layers  Vertical approach
 Implementation of OSI  Reference model

Protocol
They are a series of procedures that must be followed in a formal way, conductedin a
systemic manner. These guidelines specify the types of data that may be delivered, the
instructions that may be used to send and receive data, and the procedures for verifying the
transmission.

These protocols may be broken up into four categories:-


1. Link layer - PPP, DSL, Wi-Fi, etc.
2. Internet layer - IPv4, IPv6, etc.
3. Transport layer - TCP, UDP, etc.
4. Application layer - HTTP, IMAP, FTP, etc
Benefits of protocol:-

 High speed
 Flexibility
 Easy to transfer files
 Runs the system in different way

Application layer Protocol

TCP/IP
It is a protocol for communication that connects network devices to the internet. The data
transmission across the internet is demonstrated by TCP and IP. additionally that specify the
transmission routes and how it should be divided into packets. It is intended to increase
network dependability and enable automatic recovery in the event that any network
component fails.

DNS (Domain Name System)


One of the pillars of the internet is DNS, whose purpose is to identify a computer'sname on
a network that employs the TCP/IP protocol. It is primarily utilised in Internet-connected
programmes like web browsers and email clients. Mail. This DNS's simplicity,
lightweight design, and consistency make it effective.

Telnet (Telecommunication network)


Providing a directed communication capability across the internet or a local area network is
telnet, a protocol. In 1969, Telnet, the first internet standard, was created.
In actuality, they pose numerous hazards to the security system and have numerous
drawbacks.
FTP (File Transfer Protocol)
It is a protocol for sending files over a network between computers. Only less readable
usernames and passwords are sent while using FTP. Unregistered users can access the
necessary files through email, but only registered users can accessthem and download them.

(Anon., n.d.)

SSH (Secure Shell)


It is a network protocol that provides secure access to a computer for users and
administrators. This acts as a conduit for file transfers and other distant data exchanges
between two or more machines. Because it enhances communicationsecurity, its
dependability is more widely acknowledged.

HTTP (Hypertext Transfer Protocol)


It's an application layer that web servers use to transport files. Web servers oftenuse the well-
known TCP port 80. When sending HTTP requests, browsers utilise this port if the port isn't
provided in the URL.
(Anon., n.d.)
ACTIVITY 02 .

Network Device

Switch
As they allow for the connection of numerous computers, printers, access points, servers, and
other gear, they play a crucial role in many business networks.
Switches are a crucial component of my network since they may expedite processes. They
are utilised in LANs, or local area networks. It offers a centralconnection for many
connected devices.

(Anon., n.d.)
Hub
It is a typical device that links networking equipment. The hub can serve as the
main link for all of our networking accessories. Hub is a helpful tool for receiving info
that is broadcast and sharing resources. Without connecting to each other, a hub can
connect devices together.

(Anon., n.d.)

SWITCH/HUB
Serve as a connector between two or more computers by acting as a mediator.
The transmission medium is wired and steered. A port on the computer is connected to one
end, while a port on a switch or hub is connected to the other end.
DIFFERENT BETWEEN THE SWITCH/HUB
 The speed of data transfer is the primary distinction. Hub transmits data to all
computers, whereas switch only delivers data to the appropriate machines. Here, a
hub could cause unneeded network data congestion.

 The switch employs full duplex mode for data transfer whereas the hub uses half
duplex mode.

 Switch: Because they filter traffic based on MAC addresses, switches provide
improved security. They have the ability to separate device traffic, which improves
network security and stops unauthorised access to data.

 Hub: Since hubs broadcast data to all connected devices, they offer no security
safeguards. It is simpler for unauthorised devices to eavesdrop onnetwork traffic
because there is no isolation of traffic.

 Switch: A switch's ports each establish their own collision domain. This lowers
the possibility of network congestion caused by collisions becausecollisions are
isolated to the devices connected to each specific port.

 Hub: For all linked devices, a hub establishes a single collision domain. This
necessitates that each device on the hub must pause and listen whenever a device
transmits data, potentially causing network slowdowns and collisions.

Router
A router is a piece of hardware used to connect a network of two or more computers .It is
sometimes referred to as a gateway. This determines the best ports for network connectivity
when it comes to data transmission. After the packet data has been transferred over the air,
this device helps you. This information can be transmitted between devices or through the
Internet. The router accomplishes this by giving each network device a local IP address. At
the door is the router.
Routers are responsible for controlling Internet traffic.

(Anon., n.d.)
Modem
The modem is used to connect a home computer or a computer network to the internet when
using telephone wires to access the internet. A translator of data is the modem. To prevent
transmission over telephone lines, digital signals sent fromcomputers are converted to
analogue signals, while analogue signals received overtelephone lines from the internet are
converted to digital signals before being transferred to computers. Both MOdulation and
DEModulation refer to this.
Therefore, the term "MODEM" is a mixture of these two words. These MODEMscome in
various varieties. Internal, exterior, and wireless modems are those.
Modern routers come equipped with a built-in modem.

(Anon., n.d.)

SECURITY DEVICES IN NETWORK


One of the most important factors to take into account while constructing a network is
security. The network administrator needs to be familiar with all of thenetwork's security
measures.

Three components has to be fulfilled to have a fully protected system they are:-
 Hardware
 Software
 Cloud services
Firewall
Firewalls have a significant impact on network security. These are strong networking
devices that need a set of rules-based inspections for all data packetsand frames that pass
across the network. Next, the firewall chooses whether to permit or restrict access. A
firewall is a real-world device that controls access to computers. These firewalls are
interconnected with the uplink and the node.

(Anon., n.d.)
VPN CONCENTRATOR
This device resembles a router but focuses mostly on VPN connection structuresand
algorithms. These VPN concentrators can be set up to suit our needs.
 By doing so, secure networking tunnels can be established.
 Locate users attempting to connect to the servers
 encode and decrypt information sent over tunnels.
 Make the data packet flow inside the tunnels more efficient.

(Anon., n.d.)
Features of networking software
 Application Layer: Utilise APIs to meet the control layer's demands and request
services.
 Control Layer: This layer contains the network operating system. This covers the
network's architecture. It sends SDN needs to network components after receiving
them from the application layer.
 The ability to add and remove users is controlled by the network administrator.
Security features are offered, and the administrator has theauthority to apply them.
Network virtualization is made possible.

SERVER TYPES
The hardware and software features of servers set them apart from other computers. If the
right software configurations are used, even an ordinary computer can be converted into a
server. For instance, our home computer can beconfigured to act as both a file server and a
print server. This describes how a server's software primarily determines how it functions.
Servers have specific hardware needs; regular desktop computers' CPUs and memory cannot
be used inservers. Server hardware is designed specifically to meet the needs of high end
processing.
Getting dependable components at a fair price is the primary goal when purchasinga server.
This can help a business save money and operate more effectively.

FILE SERVER
This system offers a file system. In computing, a single PC linked to the same localarea
network (LAN) as the users serves as the file server. A file server is a computer on a
network that distributes files to other computers on the network. relating to file utilisation.
contributes to the development of shared storage on server computers so that users can
access users. It is a networked computer whose primary purpose is to provide a location for
shared disc access, or publicly accessible shared storage of computer files, by the
computers linked to the same computer network on the workstations.
workstations.
. The most common function for network servers is file service, and major network
operating systems like Unix, Windows NT, and Novell NetWare all offer this type of file
sharing. File servers are frequently used in offices and classrooms where users connect their
client PCs through a LAN.
(Anon., n.d.)

Email server
A programme or computer on a network that serves just as a virtual mail service isknown as a
mail server, or simply a mail server. An programme or computer on a network known as an
email server, or simply a mail server, serves only as a substitute for a physical post office.
The server receives and distributes outgoing messages to local users as well as stores
incoming mail.

Types of Email servers


 POP3 Email Servers
 IMAP Email Servers
 SMTP Email Servers
 Web-Based Email

Client-server application model is used to send and receive messages using theSimple Mail
Transfer Protocol (SMTP).

(Anon., n.d.)
Database server
The hardware and software needed to maintain databases are referred to collectively as
database servers. The word "database server" is used to describe the client/server back-end
system of a database application. The back-end, which is sometimes referred to as a
database server, carries out non-user-specific operations such data processing, storage,
manipulation, and archiving. This includes the actual computer that runs the database
server. A database server istypically referred to in this context as a specific, high-tech
computer that houses a
database.

(Anon., n.d.)
Type of database:
 Microsoft SQL Server
 IBM DB2 • SAP Sybase ASE
 PostgreSQL
 MariaDB Enterprise
 My SQL

Backup Server
In a corporate IT setting, a backup server often links to one or more additional backup
servers via a computer network. A backup server is a sort of server that permits the backup
of information on a specialized local or remote server, includingdata, files, programmes, and
databases. It combines hardware and software technologies to offer connected computers,
servers, or associated devices backup storage and retrieval services.

(Anon., n.d.)
Application server
The hardware and software required to administer the database context might be referred to
as a "database server" in some contexts. A database server is typicallyreferred to in this sense
as a specific, complicated computer that houses a database. A database programme on the
conventional client-server architecture comes to a conclusion with the database server.
Another name for this spider is acopy. The actual machine used to hold the database is
included in this.
(Anon., n.d.)

Proxy server
This file is utilised for security reasons. The files are completely safe and cannot be disclosed
.The server application serves as a bridge between a client and the server. It aids in preventing
access to a private network by online attackers. A server, it serves as a "intermediary"
between end users and online pages.
Some proxy servers shield your IP (Internet Protocol) address with their own in order to
safeguard your anonymity. A website sees the IP address provided by theproxy rather than
your IP address.

When a client submits a request, the proxy server receives it, delivers it to the server, and then
receives the response from the server and sends it back to the original client. This method
avoids putting the client and server in direct contact.
Proxy servers come in a wide variety of styles and feature sets. While some assist Internet
users in avoiding

(Anon., n.d.)
USAGE OF DEVICES AND NETWORK SOFTWARE .
The organisation must select the hardware and software with the help of a network
professional. Because these choices will affect the rest of the implementation, this time
frame is regarded as one of the most important.

Security Devices
• Firewalls
• Load Balancer
• VPN Concentrator

Network Devices
• Routers
• Network Interface Cards
• Switches
• Modem

Servers Virtual Servers


- I want to use a virtual server because it is the most well-known serveron the
market right now.
 It offers a variety of services, including software- and application-basedservices.
 Because the virtual server firm handles the majority of the managing, thecost of
management is also decreased.
 Can be utilised remotely Proxy server - To protect the client PCs and theservers

I would choose these three servers for my initial network deployment strategy based on their
performance and price. I used both a proxy and DNS since, in myopinion, server security is
of the utmost importance.

These PCs, as I indicated before, are set up with high-end specifications and are the best
devices to use in our networking sections. We'll be using virtual machineswithin our desktops
that run client and server software. The capacity of virtual machines to work together is
clearly demonstrated by the fact that using them wouldn't hinder or negatively impact the
workstation's performance.

Workstations equipped with Windows servers and client servers will be able tofunction
without the least latency or delay.
With the aforementioned hardware and software, it is obvious that I intend to establish an
effective connection between these components and the software that
runs on them. To protect against external dangers and maximise the system'scapabilities, this
interaction is crucial.

Networking software
The software that we use for network processes and network analysis is called network
software, and network operating systems are regarded as the main category of software.
Every other network operating system and applications.

• Some examples include versions of Microsoft Windows (like Windows 10,


Windows 8, Windows 7, Windows Vista, and Windows XP)
• , Apple's mac OS (formerly OS X),
• Chrome OS, BlackBerry Tablet OS,
• Linux ,
• Unix
• Ubuntu
• Solaris

Advantages of networking software:


 Network provisioning that is centralised.
 Enterprise-wide holistic management.
 Finer-grained security.
 Reduced operating expenses.
 Lower capital costs and hardware savings.
 Abstraction of clouds.
 Content delivery assurance.

Anti virus
It serves as a safeguard for all PCs. Once installed, the majority of antivirus
programmes run in the background and offer real-time defence against viralattacks.
Users can protect their files and hardware with the help of comprehensive virusprotection
programmes against infections like worms,

The barrage is constant, and antivirus companies must frequently update their detection
technology to keep up with the more than 60,000 new malware samplescreated daily.
Users must have antivirus software installed and up to date because a computer without it will
become infected minutes after connecting to the internet.
ACTIVITY 03 .

Bluprint of Network

IP ADDRESS AND ALLOCATION TABLE .


Main branch
Department Ip Address
Reception area 192.168.1.0/24
Sales & Marketing Department 192.168.2.0/24
Customer Services Area 192.168.3.0/24
Administration Departmen 192.168.4.0/24
HR Department 192.168.5.0/24
Accounting & Finance Department 192.168.6.0/24
Business Development Department 192.168.7.0/24
Video conferencing room 192.168.8.0/24
The Server Room 192.168.9.0/24
The Server Room 192.168.10.0/24

Mathara Branch

Department Ip Address
Reception area 192.168.11.0/24
Customer Services Area 192.168.12.0/24
Administration Department 192.168.13.0/24
HR Department 192.168.14.0/24
Accounting & Finance Department 192.168.15.0/24
IT Department 192.168.16.0/24

Assumptions

 Network Topology:
The network consists of three routers: Router A, Router B, and Router C.These
routers are responsible for routing traffic between different departments and
branches.
 VLAN Implementation:
The network includes both Level 1 and Level 2 switches to implement VLANs. Level 1
switches are used to connect devices within each department, while Level 2 switches
are employed to handle inter-VLAN routing.
 Routing Protocol:
The RIP (Routing Information Protocol) is utilized as the inter-router routingprotocol.
RIP exchanges routing information among the routers and helps determine the best
paths for data transmission.
 DHCP Servers:
Each department is equipped with its own DHCP server to automate the process of
IP address assignment. The DHCP servers provide IP addressesand other network
configuration parameters to the computers in their respective departments.
 Department Computers:
To simplify the complexity, we will consider two computers in each
department. However, in reality, there would be a larger number ofcomputers in
each department.
 Inter-Branch Connectivity:
The Mathara and Main branches are connected via a serial connection, which is a
wired method for establishing a link between the two locations. This connection
enables data transfer and communication between the branches.
 Additional Servers:
Two servers are implemented in the network: an email server and an FTP (File
Transfer Protocol) server. These servers provide email services and facilitate file
transfers within the network.
 DHCP Enablement:
All computers in the network are configured to enable DHCP. This ensures that
they can automatically obtain IP addresses and other network settings from the
DHCP servers, simplifying the network configuration process.

switch configurations

router configuration
User feedback form
I had to initially get input on my network design. Using the research as my reference, I might
change the size and shape. I've also asked them about the equipment I've used in the system,
and once I get their response, I'll be able to add more.

I also wanted user feedback to construct this network maintenance schedule. It willbe of great
assistance when making the schedule. There are also questions about networks and security.
When creating the maintenance schedule, these two elements will also be taken into
account.

My system has the lowest cost, in my opinion, of any system out there. This is as a result of
the VLAN design I employed. However, the user's perspective on the price will also be
taken into account in this.
The form also makes mention of the system's dependability and usability. I'd beable to give
a precise time range for the system using this, with upgrades and maintenance in between.

These recommendations will be invaluable to the company and me as I make decisions on


network design in the future. These inquiries can be found on the userfeedback form. The
outcomes will be meaningfully analyzed to produce an effective output.
RESPONCES
Install and configure network service and application.

VMWare workstation player 16 (virtual machine) was used to install the windowsserver
2016. By using these softwares I was able to configure different server services
Installing DNS service to the local server
This is the step by step procedure to install DNS service into our local server. This is
the method we followed to create a successful DNS service.
1. Add roles and features
2. Selecting DNS service and installing DNS service features
3. Forward zone installation (Adding hostname)
4. Reverse zone installation (Adding Pointers)
5. Check the system with NS Lookup

After executing these steps correctly we will be able to install a working DNSservice in our
server.

Installing Active directory in our local server


This is the method used to create a new domain and give domain controller for it. There are
many services which comes with active directory which will be useful to our servers in many
ways. Making it a domain controller is one of them. The imagesprovided above proves that
active directory was installed in my server and configured properly.

Maintenance schedule
Before the network encounters a significant issue, a series of tasks called network
maintenance includes network monitoring, updates, error checking, etc. Both physical IT
assets (servers and hardware) and non-physical IT assets (software and cloud services)
are covered by this network upkeep. A healthy company will constantly take precautions
to protect its assets rather than dealing with them directly.

As we know network is a vast environment. It contains different aspects whichhas to be


monitored in different ways. Some of them are:-
• Network security
• Network performance
• Network durability
• Network hardware
• Software updates and troubleshooting
Network maintenance are carried out by some specific people .
• Original Equipment Manufactures – these are the original manufacturesof the
products used by a company. There are certain services provided by this party
which includes monthly , quarterly or yearly maintenance, network
installations etc…
• Internal IT department – this includes the employees of the company. These
employees can easily monitor the networking environment in regular basis.
Therefore employees falls under the category of daily network monitoring
group.
Maintenance schedule

Maintenance Maintenance Maintenance schedule Maintenance


schedule schedule schedule
Maintenance Maintenance • Maintenance schedule Maintenance
schedule schedule schedule

Maintenance Maintenance schedule Maintenance


schedule schedule

Server and strong • a user-friendly environment Every week


infrastructure where all servers use a during
recognizable interface maintenance
• High performance in
environments with connected
servers and storage

Desktop • VDI may become Every week


infrastructure unaffordable due to storage during
• costs in particular. Has the maintenance
Network capability to support mobile
maintenance and remote workers with
ease.
Network equipment • combines, divides, switches, Every year
boosts, or directs packets of during
information traveling over a maintenance
telecommunications or
computer network.
• connects devices so that theycan
exchange data with one another.
Back and security • Check your backups to ensurethat Whenever
files can be recovered. possible at any
• Protect sensitive data on time of the day
backups by encrypting them.

User data cleaning • an improvement in data Every week


• accuracy Ensure uniformity during
maintenance
Software
maintenance Pc tune up • Utilizing AVG PC Tune up in a Every week
single during
• click maintenance maintenance
Extends the battery
life
System format • To stop viruses and other types Whenever
of attack, this is done. possible at any
• from endangering the time of the day
organization.

Server maintenance • removing the gadget's plug Every 6 months


• Cooling the apparatus
• Elimination of network
• cables Sucking out extra air
from the system using the
• air out duct. the computer
room This is preventing the
entry of germs in.
Work station • Unplugging the gadget Every 4 months
maintenance • Reducing the heat
Hardware • Removing Network and Other
maintenance
cables Cleaning up dust with a
vacuum
Router maintenance • removing the gadget's plug Every 4 months
• Reducing the heat
• Using a vacuum to remove
network and other cables
eliminate dust
Switch maintenance • Plugging the apparatus out Every 4 months
Reducing the temperature
• Disposing of network and
other cables by
• vacuuming sweep up the
dust
Firewall • removing the gadget's plug Every 4 months
maintenance • Reducing the heat
• Using a vacuum to remove
network
• and other
cables to
eliminate dust
ACTIVITY 04 .

Different services are produced by this programme. These services allow us


to demonstrate the credibility of the network. The photographsI gave for the
network design topic feature a completely operational network system in
addition to just the exterior.

Full Network

Main branch
Mathara branch

Configuration of the switch .

Level 2
switch

Level 1 switch

Level 1 Switch

enable
configure terminal
interface range FastEthernet0/1-24
switchport mode access switchport
access vlan 90
do wr
exit

These commands will enable privileged EXEC mode (enable), enter global
configuration mode (configure terminal), configure the range of FastEthernet interfaces
from 1 to 24 (interface range FastEthernet0/1-24), set the switchport
mode to access, assign VLAN 90 to the interfaces (switchport mode access and
switchport access vlan 90), save the configuration changes (do wr or write memory),
and exit the interface configuration mode (exit).

Level 2 Switch

interface GigabitEthernet1/0/4 switchport


trunk encapsulation dot1Qswitchport mode
trunk
exit
do wr

These commands configure GigabitEthernet interface 1/0/4 as a trunk port.


The switchport trunk encapsulation dot1Q command sets the trunking encapsulation to
IEEE 802.1Q, which is the most common trunking protocol used inEthernet networks. The
switchport mode trunk command configures the interface as a trunk port, allowing it to
carry traffic for multiple VLANs. The exit command exits the interface configuration mode,
and the do wr command saves the configuration changes.
Vlans

VLANs (Virtual Local Area Networks) are used to logically segment a networkinto
separate broadcast domains. Each VLAN operates as a separate network, allowing you to
control the flow of traffic and improve network efficiency.

Main
Department Vlans
Reception area Vlan 10
Sales & Marketing Department Vlan 20
Customer Services Area Vlan 30
Administration Departmen Vlan 40
HR Department Vlan 50
Accounting & Finance Department Vlan 60
Business Development Department Vlan 70
Video conferencing room Vlan 80
It department Vlan 90
The Server Room Vlan 100

Mathara

Department Vlans
Reception area Vlan 110
Customer Services Area Vlan 120
Administration Department Vlan 130
HR Department Vlan 140
Accounting & Finance Department Vlan 150
IT Department Vlan 160
Dhcp

DHCP (Dynamic Host Configuration Protocol) is a network protocol that automates


the process of assigning IP addresses and other network configurationparameters to devices
on a network

service dhcp
ip dhcp pool itmathara-pool
network 192.168.16.0 255.255.255.0
default-router 192.168.16.1
dns-server 192.168.16.1exit

In this configuration, the service dhcp command enables the DHCP service on thedevice.
The ip dhcp pool itmathara-pool command creates a DHCP pool named "itmathara-pool"
for managing IP address assignments. The subsequent commands configure the
parameters for the DHCP pool:
network 192.168.16.0 255.255.255.0 defines the network address and subnet mask for
the pool.
default-router 192.168.16.1 specifies the default gateway (router) IP addressfor the
clients.
dns-server 192.168.16.1 sets the DNS server IP address that will be providedto the
DHCP clients.
After configuring the DHCP pool, the exit command is used to exit the DHCP
configuration mode.
Rip of configuration

RIP (Routing Information Protocol) is a dynamic routing protocol that is used to


exchange routing information between routers in a network. RIP is classified as adistance-
vector routing protocol and operates based on the hop count metric

router rip
version 2
network 10.254.10.0
network 10.0.0.0
exit

In this configuration, the router rip commandenables RIP


routing on the router. The version
2 command specifies that RIP version 2 should be used.
The network commands are used to advertise the networks that should participatein RIP
routing updates. In this example, network 10.254.10.0 and network
10.0.0.0 are the network addresses that will be advertised via RIP.
After configuring the necessary RIP settings, the exit command is used to exit therouter
configuration mode.
Network monitoring .
It is impossible to understand the complexities that result from this enormous increase. The
risk is bigger in the networking sector, so it's important to take preparations before dealing
with the actual threat.

Real-time monitoring of all crucial networking equipment is necessary for improved


productivity. The performance of the network system is impacted by faulty networkdevices.
Therefore, it's critical to identify these flaws before they pose a serious threat. Tools for
network monitoring make these tasks easier to execute. (Anon., n.d.)

 Network monitoring may aid in network optimisation and productivity growth, both of
which are crucial for a startup like ours. This might help us attract new customers to
our business.
 By carefully watching the network, precise reports can be made. This couldaid in
our ability to predict the near future and assist us in developing a budget for our
next significant upgrade.

Network monitoring tool.

As I indicated in the aforementioned issue, network monitoring is crucial to providing clients


with a top-notch end user experience. A network monitoring tool can assist the business in
preserving and tracking the network's availability, productivity, and performance over time.
The findings of all the crucial network datacan be used to evaluate the system's durability
with the real-time capability of network monitoring tools.

All of the systems, devices, traffic, and applications in the IT ecosystem may be monitored
using PRTG, a simple-to-use piece of software. This software supports a wide range of
protocols and technologies. We could make informed decisions if ournetwork's details were
clearly visualised. (Anon., n.d.)
Troubleshoot in Networking .
The procedure for locating, analysing, and resolving issues in a network environment.
Professionals in networking use this fundamental procedure to enhance network performance.

This following method may help to solve the problem smarter and faster.
• Collecting necessary information
• Develop a hypothesis
• Testing the hypothesis
• Finding for a solution
• Verifying the solution succeeded

1. Route Dampening

Is a technique for inhibiting a router that exhibits signs of route flapping. In thiscase, a router
is not marketed, but rather suppressed.
When a route flaps, it receives a penalty, and when the penalty total reaches apredetermined
threshold, the router is inhibited from closing.

These following command can be used to switch on and control routedampening in BGP
protocol:-

 Bgp dampening – turns on dampening process


 No bgp dampening – turns off dampening process
2. Route Aggregation

Is a technique for preventing topology updates from reaching the router by restricting the
information's discernibility. In essence, this strategy prevents therouter from seeing
extraneous routing updates in the topology.

Network Cable Fix.


In contrast to wireless connections, using a wired network makes it easier to establish a
solid connection that is less vulnerable to environmental factors like weather and other
network speeds. A media with such advantages is unreliable interms of troubleshooting.
Before coming to a conclusion, so many steps must be taken.
In order to locate the network failure, numerous actions must be followed. Thiscould be
in the router, client computer, network cable, or software settings. To determine the
cause of the conflict, all of these situations must be examined.

1. Restarting router/Wifi

2. Checking whether other device can access the


network .

3. Updating network card .

4. Security software .

5. DNS server.

Test; ping to the Executed by ; Executedate Execute time


gateway Sajidha ;3:00pm

Description Expected output Received output Pass/fail

Ping from pc 1 to Reply from Reply from Pass


192.168.10.122 192.168.10.122 192.168.10.122

Test; ping to the Executed by ; Execute date Execute time


gateway Sajidha ;3:00pm

Description Expected output Received output Pass/fail

Ping from pc 1 to Reply from Reply from Pass


192.168.10.139 192..168.10.139 192.168.10.139

Test; ping to the Executed by ; Execute date Execute time


gateway Sajidha ;3:00pm
Description Expected output Received output Pass/fail
Ping from pc 1 to Reply from Reply from Pass
192.168.10.161 192.168.10.161 192.168.10.161
Test; ping vlan in Executed by Execute Execute ti
same branch ; sajidha dat ;3:00pm m
e e
Description Expected output Received output Pass/fail

Pinging from Reply from VLAN Reply from VLAN Pass


VLAN 40 to 30 30
VLAN50

Test; ping vlan in Executed by ; Execute Execute ti


different branch Sajidha dat ;3:00pm m
e e
Description Expected output Received output Pass/fail

Pinging from Reply from VLAN Reply from VLAN Pass


VLAN 10 to 10 10
VLAN120

Test; tracert Executed by ; Execute Execute ti


Sajidha dat ;3:00pm m
e e
Description Expected output Received output Pass/fail

Ping from laptop 1to Reply from Reply from Pass


192.168.10.2 192.168.10.2 192.168.10.2

Test; tracert Executed by ; Execute Execute ti


Sajidha dat ;3:00pm m
e e
Description Expected output Received output Pass/fail

Ping from laptop 0to Reply from Reply from Pass


192.168.12.2 1992.168.12.2 192.168.12.2

Test; show VLAN Executed by ; Execute date; Execute ti


Sajidha ;3:00pm m
e
Description Expected output Received output Pass/fail

Switch showing Display all the 7 Displayed all the 7 Pass


running VLAN VLAN VLAN

Test; show running Executed by ; Execute Execute ti


config Sajidha dat ;3:00pm m
e e
Description Expected output Received output Pass/fail
Show running Display all the Display all the Pass
config config config

Test; show IP int br Executed by ; Execute Execute ti


Sajidha dat ;3:00pm m
e e
Description Expected output Received output Pass/fail

Showing assignedIP Display all IP Display all IP Pass


in router address address

Command line interface pic

ping vlan in same branch

ping vlan in different branch


tracert from laptop 1 to 192.168.10.2

Ping from laptop 0 to 192.168.12.2


show VLAN

show running config


show IP int br
Potential future enhancement.
VIDCO-19, an IT-based corporation, needs to be upgraded over time. The network
environment was updated with fixed features up until this point. In another five years, this
identical approach wouldn't be as effective.
I would want to highlight that there are numerous developments that we can createin this
company, by size and growth, as the network consultant for VIDCO-19. with our excellent
network environment.

When hiring new staff members, new client PCs are necessary. A new configuration scheme
will need to be applied to switches and routers. In order to distribute them throughout the
departments, another IP block will need to be purchased. These adjustments can all be made
according to a schedule. During such a change, server performance must also be taken into
account. We could keep using the server if it continues to operate favourably; otherwise, we
will need to make adjustments to that as well.

To protect the system from external attacks, I want to utilise firewalls. Additionally, remote
access will be improved to function as an administrator for each department. Additionally,
departmental admins will be implemented. This will be done in order to lessen the insider
threat. Next, I'd add a VPN to our network system so that we can use the internet safely, as
well as a load balancer to control how data flows through the system.

To get an effective system working in the network environment, these improvementswill be


done at cheap cost.
References
Anon., n.d. http://ecomputernotes.com/images/Full-Duplex-Mode.jpg. [Online]. Anon., n.d.
http://www.netdcint.com/media/attachments/cfiles/pages/publication_26/496_1.j pg. [Online].
Anon., n.d. https://1.bp.blogspot.com/-
CSe9u5SWTaw/WFOyGnjDlXI/AAAAAAAAD6A/ZthyA3es1qc-
fwisQhuWXQwRfaZJGv4nACLcB/s1600/669645-
b1c2671e3b6ba16ab5942a4ac0dff3bd.png. [Online].
Anon., n.d. https://2.bp.blogspot.com/-Nk_PoLetuW0/W2lQcil-
aiI/AAAAAAAADPw/ASDU1fhKk7skJPebcoUsTxgbt1ykm0GFACLcBGAs/w1200-h630-
p-k-no-nu/jenis-jenis-jaringan-komputer-man-1200x612.jpg. [Online].
Anon., n.d. https://2.bp.blogspot.com/-ZE3jo-
n2YFk/XMseOVmVEKI/AAAAAAAAAvI/d5_gtEZRiOcI7DTsFFeQA5BG9gI7sWwNwC
LcBGAs/s1600/LAN.png. [Online].
Anon., n.d. https://3.bp.blogspot.com/-
cemfIaEuxtE/VxgH4EwHXkI/AAAAAAAAAF4/n04see3kEb8rGbTZXKYQNZV6r8ZH0 Bm-
ACLcB/s1600/cable%2Bcoaxial.jpg. [Online].
Anon., n.d. https://3.bp.blogspot.com/-G6Z9MQO-fCU/UVQqF-
rpEuI/AAAAAAAAABA/jk5HXTl6BJQ/s1600/ll.png. [Online].
Anon., n.d. https://3c1703fe8d.site.internapcdn.net/newman/gfx/news/hires/2013/1-
whatisavirtu.jpg. [Online].
Anon., n.d. https://arinidina.files.wordpress.com/2017/11/hub2.jpg. [Online]. Anon., n.d.
https://blog.bemopro.com/hs-
fs/hubfs/File%20server.png?width=1065&name=File%20server.png. [Online]. Anon., n.d.
https://cdn.educba.com/academy/wp-content/uploads/2019/04/What-is-Application-Server-
1.jpg. [Online].
Anon., n.d. https://digitalnoteshub.com/wp-content/uploads/2020/12/Half-duplex- mode-
1024x576.png. [Online].
Anon., n.d. https://geekflare.com/wp-content/uploads/2021/06/FTP-1155x385.png.
[Online].
Anon., n.d. https://i.ibb.co/h9ZRLTg/hybrid-topology1.jpg. [Online].
Anon., n.d. https://i.ytimg.com/vi/yUE5m1KpFT8/maxresdefault.jpg. [Online]. Anon., n.d.
https://images.idgesg.net/images/article/2018/08/4_catastrophe_vulnerable_disa ster_fiber-
optic-cables-100769194-large.jpg. [Online].
Anon., n.d. https://images-na.ssl-images-amazon.com/images/I/81K4IHoxEHL.jpg.
[Online].
Anon., n.d. https://msatechnosoft.in/blog/wp-content/uploads/2017/04/WAN-MSA
-Technosoft.png. [Online].
Anon., n.d. https://mycomputernotes.com/wp-content/uploads/2019/12/TCPIP- model.jpg.
[Online].
Anon., n.d. https://nterone-assets.s3.us-west-
2.amazonaws.com/production/uploads/editor/2019-03-21-1553196390-osi-model- 7-layers-
1024x734.jpg. [Online].
Anon., n.d.
https://search.yahoo.com/search?fr=mcafee&type=E210US91215G0&p=Network+
monitoring+.. [Online].
Anon., n.d. https://search.yahoo.com/search?fr=mcafee&type=E210US91215G0&p=Network+
monitoring+tool.. [Online].
Anon., n.d. https://steemitimages.com/640x0/https://encrypted-
tbn0.gstatic.com/images?q=tbn:ANd9GcRgGzxv4f6Pg-9hKU-
I6B8FanUqKtBhw5RtNnG60nZIa-SybY1t. [Online].
Anon., n.d. https://tse1.mm.bing.net/th?id=OIP.KTz4Os084apI- y8g5mcalwHaFj&pid=Api&P=0&h=180.
[Online].
Anon., n.d. https://tse1.mm.bing.net/th?id=OIP.NnshFBOSLkhlGWIWqM-TUAHaEo&pid=Api&P=0&h=180.
[Online].
Anon., n.d.
https://tse2.mm.bing.net/th?id=OIP.qR6YvJJKVIqpNQhyfWdb9QHaEU&pid=Api&P=
0&h=180. [Online].
Anon., n.d.
https://tse3.mm.bing.net/th?id=OIP.YcJWdLMUhsyjDeEn85uWQgHaEL&pid=Api&P
=0&h=180. [Online].
Anon., n.d. https://whitelabelitsolutions.com/wp-content/uploads/2017/06/best- server-
backup-software.png. [Online].
Anon., n.d. https://www.besd.nl/sites/default/files/pictures/Etic-Telecom/Etic-
Telcom%20IPL%20(EN)/Etic-Telecom-SIG-E-400-Ethernet-VPN-concentrator.jpg.
[Online].
Anon., n.d. https://www.cablify.ca/wp-content/uploads/2018/04/Mesh- Topology.jpg. [Online].
Anon., n.d. https://www.cablify.ca/wp-content/uploads/2018/04/Ring-Topology.jpg.
[Online].
Anon., n.d. https://www.itrelease.com/wp-content/uploads/2018/07/Personal-Area
-Network-PAN-Diagram.png. [Online].
Anon., n.d. https://www.itrelease.com/wp-content/uploads/2021/04/Star-topology- diagram.jpg.
[Online].
Anon., n.d. https://www.learnabhi.com/wp-content/uploads/2018/02/proxy-server- web-2.jpg.
[Online].

You might also like