0% found this document useful (0 votes)
24 views

Unit 02 Networking

Uploaded by

induru gaming
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views

Unit 02 Networking

Uploaded by

induru gaming
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 86

INTERNAL VERIFICATION – ASSIGNMENT BRIEF

Programmer Title: HND in Computing

Assessor Name:

Internal Verifier Name:

Unit or Component Number


Unit 02 - Networking
and Title:

Assignment title: LAN Design & Implementation for Alliance Health

Assessment criteria targeted


LO1, LO2, LO3, LO4
by this assignment brief:

Is this an Authorised N/A


Assignment Brief published
by Pearson? If so, has it been
amended by the Assessor in
any way? Please give details.
(If using the Authorised
Assignment Brief ‘off the shelf’
with no amendments, please
answer the question marked *
in the checklist only)

Has this assignment been Yes No


submitted to the Assignment

Checking Service?
(If Yes, please keep a copy of
the ACS feedback with this
form)

INTERNAL VERIFIER CHECKLIST Y/N

Are the programme and unit details accurate? Y


*Are clear deadlines for assessment given? TBC

Is the time frame of an appropriate duration? Y

Is there a suitable vocational scenario or context? Y

Are the assessment criteria to be addressed stated accurately? Y

Does each task show which criteria are being addressed? Y

Do the tasks meet the assessment requirements of the unit/s? Y

Is it clear what evidence the learner needs to generate? Y

Is it likely to generate evidence that is valid and sufficient? Y

Overall, is the Assignment fit for purpose? Yes √ No

*If ‘No’ is recorded the Internal Verifier must recommend actions detailing the issues to be
addressed. The Assessor and the Internal Verifier must then confirm that the action has been
undertaken and that the Assignment Brief is authorised for use before being issued to learners.
Date
Target Date
Action required: Action
for
(If none then please state n/a) Complete
Completion
d

General Comments (if appropriate)

Assignment Brief Authorised for Use:

Internal Verifier signature Date

Assessor signature
Date

Lead Internal Verifier


[email protected] Date 2022/06/13
signature (if appropriate)
Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)

INTERNAL VERIFICATION – ASSESSMENT DECISIONS

Programme title BTEC Higher National Diploma in Computing

Mr. Udaya
Assessor Internal
Verifier
Unit 02: Networking
Unit(s)
LAN Design & Implementation for Alliance Health
Assignment title

Student’s name

List which assessment Pass Merit Distinction


criteria the Assessor has
awarded.

INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded


match those shown in the
assignment brief? Y/N

Is the Pass/Merit/Distinction grade


awarded justified by the assessor’s Y/N
comments on the student work?
Has the work been assessed
accurately? Y/N

Is the feedback to the student:


Give details:
• Constructive?
• Linked to relevant assessment Y/N
criteria? Y/N
• Identifying opportunities for Y/N
improved performance?
• Agreeing actions? Y/N

Does the assessment decision need


amending? Y/N

Assessor signature Date

Internal Verifier signature Date

Programme Leader signature (if


required) Date

Confirm action completed

Remedial action
taken
Give details:

Assessor signature Date

Internal
Verifier Date
signature

Programme
Leader signature Date
(if required)
Higher Nationals - Summative Assignment Feedback Form

Student Name/ID

Unit Title Unit 02: Networking

Assignment 1 Assessor
Number
18/05/2024 Date
Submission Date Received 1st
submission

Date Received 2nd


Re-submission Date submission

Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & P1 P2 M1 D1
Distinction Descripts

LO2 Explain networking devices and operations.

Pass, Merit & P3 P4 M2


Distinction Descripts

LO3 Design efficient networked systems.


Pass, Merit & P5 P6 M3 D2
Distinction Descripts

LO4 Implement and diagnose networked systems.


Pass, Merit & P7 P8 M4
Distinction Descripts
Grade: Assessor Signature: Date:

Resubmission Feedback:

Grade: Assessor Signature: Date:

Internal Verifier’s Comments:

Signature & Date:

* Please note that grade decisions are provisional. They are only confirmed once internal
and external moderation has taken place and grades decisions have been agreed at the
assessment board.

Assignment Feedback
Formative Feedback: Assessor to Student

Action Plan

Summative feedback
Feedback: Student to Assessor

Assessor Date
signature

Student Date
signature

Pearson Higher Nationals in


Computing

Unit 02: Networking


Assignment 01
General Guidelines

1. A Cover page or title page – You should always attach a title page to your
assignment. Use previous page as your cover sheet and make sure all the details are
accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.

Word Processing Rules


1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject,
Assignment No, and Page Number on each page. This is useful if individual sheets
become detached for any reason.
5. Use word processing application spell check and grammar check function to help
editing your assignment.

Important Points:

1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in
the body except for the before mentioned compulsory information will result in
rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due
date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as
illness, you may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE
FERRAL. You will then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly
using HARVARD referencing system to avoid plagiarism. You have to provide both
in-text citation and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade
could be reduced to A REFERRAL or at worst you could be expelled from the course
Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to
present it as my own without attributing the sources in the correct form. I further understand
what it means to copy another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of Pearson UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of
the assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will
be my own, and where I have made use of another’s work, I will attribute the source
in the correct way.
5. I acknowledge that the attachment of this document signed or not, constitutes a
binding agreement between myself and Pearson, UK.
6. I understand that my assignment will not be considered as submitted if this document
is not attached to the assignment.

Student’s Signature: Date:


Higher National Diploma in Computing
Assignment Brief
Student Name /ID Number

Unit Number and Title Unit 2: Networking

Academic Year 2022/23

Unit Tutor

Assignment Title LAN Design & Implementation for Alliance Health

Issue Date

Submission Date

IV Name & Date

Submission format

The submission should be in the form of an individual report written in a concise, formal business style
using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using Harvard
referencing system. Please also provide an end list of references using the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures, although
you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:

LO1 Examine networking principles and their protocols.

LO2 Explain networking devices and operations.

LO3 Design efficient networked systems.


LO4 Implement and diagnose networked systems.

Assignment Brief and Guidance:

Scenario

Alliance Health is a technology-enabled solutions company that optimizes the revenue cycle of the US
healthcare industry where its global delivery center is located in Colombo. The company is planning to
expand their business operations with their latest branch at Matara and wants it to be one of the state-
of-the-art companies in Matara with the latest facilities.

Assume you have been appointed as the new network analyst of Alliance Health to plan, design and
restructure the existing network. Prepare a network architectural design and implement it with your
suggestions and recommendations to meet the company requirements.
The floor plan of the head office in Colombo is as follows:
Floor 1:
 Reception area
 Sales & Marketing Department (10 employees)
 Customer Services Area – with Wi-Fi facilities

Floor 2:
 Administration Department (30 Employees)
 HR Department (20 employees)
 Accounting & Finance Department (15 employees)
 Audit Department (5 employees)
 Business Development Department (5 employees)

Floor 3
 Video conferencing room
 IT Department (60 employees)
 The Server Room

The floor plan of the branch in Matara is as follows:


Floor 1:
 Reception area
 Customer Services Area– with Wi-Fi facilities

Floor 2:
 Administration Department (10 Employees)
 HR Department (7 employees)
 Accounting & Finance Department (8 employees)
 IT Department (50 employees)

Following requirements are given by the Management.


 All the departments must be separated with unique subnet .

 The conferencing room of the head office and Customer Services Areas of
each branch are to be equipped with Wi-Fi connections .

 Connectivity between two branches (Head Office and Matara) would allow
the intra branch connectivity between departments. (Use of VPN is not
compulsory)

 The necessary IP address classes and ranges must be decided by the network
designer and should be used for all the departments except the server room .

 Number of servers required for the Server room need to be decided by the
Network designer and should be assigned with 10.254.10.0/24 subnet. (Uses
static IPs)
 Sales and Marketing Team also needs to access Network resources using
WIFI connectivity.

(Note: Clearly state your assumptions. You are allowed to design the network
according to your assumptions, but main requirements should not be violated)

Activity 01
 Discuss the benefits and constraints of different network system types that can
be implemented in the Matara branch and the main IEEE Ethernet standards
that can be used in above LAN and WLAN design.

 Discuss the importance and impact of network topologies and assess the main
network protocol suites that are used in network design using examples.
Recommend suitable network topology and network protocols for above
scenario and evaluate with valid points how the recommended topology
demonstrates the efficient utilization of the networking system of Matara
branch.

Activity 02
 Discuss the operating principles of network devices (Ex: Router, Switch, Etc.)
and server types that can be used for above scenario while exploring different
servers that are available in today’s market with their specifications.
Recommend server/servers for the above scenario and justify your selection
with valid points.

 Discuss the inter-dependence of workstation hardware and networking software


and provide examples for networking software that can be used in above
network design.

Activity 03
 Prepare a written network design plan to meet the above-mentioned user
requirements including a blueprint drawn using a modeling tool (Ex: Microsoft
Visio, EdrawMax) . T est and evaluate the proposed design by analysing user
feedback with the aim of optimizing your design and improving efficiency.

(Support your answer by providing the VLAN and IP subnetting scheme for the
above scenario and the list of devices, network components and software used to
design the network for above scenario and while justifying your selections.)

 Install and configure Network services, devices and applications (Ex:


VLAN,WiFi, DNS,Proxy, Web, Etc.) according to the proposed design to
accomplish the user requirements and design a detailed Maintenance schedule
for above Network.

*Note: - Screen shots of Configuration scripts should be presented.

Activity 04
 Implement a networked system based on your prepared design with valid
evidence.

 Develop test cases and conduct verification (Ex, Ping, extended ping,
traceroute, telnet, SSH, etc.) to test the above Network and analyse the test
results against the expected results. Recommend potential future enhancements
for the networked system with valid justifications and critically reflect on the
implemented network, including the plan, design, configurations, tests, and the
decisions made to enhance the system.
Acknowledgement
I take this opportunity to express my sincere gratitude to everyone who supported me
throughout the Networking Assignment. I am thankful for their aspiring guidance, invaluably
constructive criticism, and friendly advice during the assignment work. I am sincerely
grateful to them for sharing their truthful and illuminating views on several issues related to
this assignment. I express my heartfelt thanks to Mr. Udaya sir for support and guidance
throughout this assignment. I would also like to thank the entire ESoft Management for
having given me the opportunity to complete a valuable assignment by gaining a precious
knowledge regarding the sessions.
Thank you.
Contents
What is a networking system?...............................................................................................27
Network system types........................................................................................................27
LAN (Local Area Network)..............................................................................................28
WLAN (Wireless Local Area network).............................................................................29
MAN (Metropolitan Area Network)...............................................................................30
WAN (wide area network)..............................................................................................31
PAN (Personal Area Network)........................................................................................33
SAN (Storage Area network).......................................................................................... 34
Campus Area Network (CAN).........................................................................................35
VPN (Virtual Private Network)........................................................................................37
What is a network topology’s?...........................................................................................37
Network topology types.....................................................................................................38
Bus topology.................................................................................................................. 38
Star topology..................................................................................................................38
Ring topology................................................................................................................. 39
Mesh topology............................................................................................................... 40
Tree topology.................................................................................................................41
What is network protocol?................................................................................................ 42
Ethernet......................................................................................................................... 43
Transmission control protocol (TCP)..............................................................................43
Internet Protocol (IP)..................................................................................................... 43
User Datagram Protocol (UDP)...................................................................................... 43
Simple Mail Transfer Protocol (SMTP)...........................................................................44
File Transfer Protocol (FTP)............................................................................................44
Hyper Text Transfer Protocol Secure (HTTPS)................................................................44
What is networking standard?.......................................................................................44
Main IEEE Ethernet Standards............................................................................................... 45
What is IEEE standards.......................................................................................................45
What IEEE standards can be used in LAN?.........................................................................45
What IEEE standards for WLAN..........................................................................................46
Operating principles of networking devices and server type.............................................46
Repeater –......................................................................................................................47
Hub.................................................................................................................................47
Switch –..........................................................................................................................48
Bridge............................................................................................................................. 48
What are the server types?................................................................................................49
WEB Server.....................................................................................................................49
Database server............................................................................................................. 50
Email Server................................................................................................................... 51
File Server...................................................................................................................... 52
Virtualization..................................................................................................................52
Inter-dependence of workstation hardware with relevant networking software..............53
What is the workstation?...................................................................................................53
What software is used for computer networking?.............................................................54
Network software definition..............................................................................................54
What are the main components of network software?.....................................................54
User Management......................................................................................................... 54
File Management........................................................................................................... 55
Network software.............................................................................................................. 55
Client software...............................................................................................................55
Web Server Software..................................................................................................... 55
Application server software...........................................................................................56
Database Server Software..............................................................................................56
Cloud computing server software..................................................................................56
File Server Software....................................................................................................... 57
File server in windows server 2012 Installation.................................................................57
Activity 01.............................................................................................................................. 61
Main IEEE Ethernet standards For Matara branch.............................................................61
Recommend suitable network topology and network protocols for Matara branch.........61
Activity 02.............................................................................................................................. 63
Operating principles of network Devices according to scenario........................................63
Recommend server/servers for the Matara Branch and Colombo Head Office.................63
inter-dependence of workstation hardware according to scenario...................................64
Example of networking software that can be used in network design...............................64
Activity 03.............................................................................................................................. 65
Design a networked system to meet a given specification................................................65
Network Diagram...............................................................................................................66
Written plan of the designing network..........................................................................67
What is the work Floor in the network system?................................................................67
Feedback Analysis.............................................................................................................. 70
Design a networked system to meet a given specification................................................72
IP assigned to the Department computers....................................................................72
Reception area VLAN Create..........................................................................................73
Customer Care VLAN Create.......................................................................................... 74
Checking the VLAN brief.................................................................................................75
Show All VLAN in the Matara Branch.............................................................................76
Switch interconnect in Matara branch...........................................................................77
Creating sun interfaces in the router Create encapsulation on the router....................78
Ping All IPs in the Department.......................................................................................80
Test Plan.............................................................................................................................83
Figure Tables:

Figure 1 network system........................................................................................................27


Figure 2 LAN Network............................................................................................................28
Figure 3 WLAN network.........................................................................................................29
Figure 4 MAN network...........................................................................................................30
Figure 5 WAN network...........................................................................................................32
Figure 6 PAN network............................................................................................................ 33
Figure 7 SAN network............................................................................................................ 34
Figure 8 CAN network............................................................................................................ 36
Figure 9 VPN Network............................................................................................................37
Figure 10 BUS Network..........................................................................................................38
Figure 11 Star Topology......................................................................................................... 39
Figure 12 Ring topology......................................................................................................... 40
Figure 13 Mesh topology....................................................................................................... 41
Figure 14 tree topology..........................................................................................................42
Figure 15 repeater................................................................................................................. 47
Figure 16 HUB........................................................................................................................ 48
Figure 17 Switch.....................................................................................................................48
Figure 18 Bridge..................................................................................................................... 49
Figure 19 WEB server.............................................................................................................49
Figure 20 Database server......................................................................................................50
Figure 21 Email server............................................................................................................51
Figure 22 File Server...............................................................................................................52
Figure 23 VM Software windows server installation..............................................................57
Figure 24 Server manager Dashboard....................................................................................58
Figure 25 Roles and features in windows server....................................................................58
Figure 26 Active domain services configuration.....................................................................59
Figure 27 prerequisite check active directory........................................................................59
Figure 28 Active directory domain configuration...................................................................60
Figure 29 Server manager dashboard setup finished.............................................................60
Figure 30 System Blue Print................................................................................................... 65
Figure 31 Cisco Packet Tracer System....................................................................................66
Figure 32 users feed back 1....................................................................................................70
Figure 33 user feed back 2.....................................................................................................71
Figure 34 IP assigned to the computer...................................................................................72
Figure 35 reception area vlan creating...................................................................................73
Figure 36 customer care vlan create......................................................................................74
Figure 37 Vlan Check..............................................................................................................75
Figure 38 Show all VLAN........................................................................................................ 76
Figure 39 Switch interconnect............................................................................................... 77
Figure 40 encapsulation on the router 1................................................................................78
Figure 41 encapsulation on router 2......................................................................................79
Figure 42 ALL IPS ping 1......................................................................................................... 80
Figure 43 Ping All IPS 2...........................................................................................................81
Figure 44 Ping All IPS 3...........................................................................................................82
Figure 45 Test Case Table.......................................................................................................84
What is a networking system?

A computer network is a group of computers linked to each other that enables the computer
to communicate with another computer and share its resources, data, and applications.
(Team, n.d.)

Figure 1 network system

Network system types.

There are several network types.

1. LAN (local area network)


2. MAN (metropolitan area network)
3. WLAN (Wireless Local Area network)
4. WAN (wide area network)
5. PAN (Personal Area Network)
6. SAN (Storage Area Network)
7. CAN (Campus Area Network)
8. VPN (Virtual Private Network)

LAN (Local Area Network)

The system in which users are connected to each other in a very small area is called local
area network. (Bourgeois, n.d.)

Ex:
1. home Wi-Fi networks
2. Small business networks

Figure 2 LAN Network

Advantages of Local Area Network


• Sharing of resources:
• Internet sharing:
• Centralized data:
• Sharing of Applications:
• Easy and Fast communication:
• Data security:

Disadvantages of Local area network


• Setting up LAN is expensive:
• Covers small area:
• Data Security Threat:
• Maintenance:

WLAN (Wireless Local Area network)

WLAN is wireless computer network that connects two or more devices using wireless
communication. Users connected via wireless LAN may move around in a limited area such
as at home, at school, on campus, in an office building, or on trains. Wi-Fi and IEEE 802.11
are two of the most common WLAN standards. (Bourgeois, n.d.)

Figure 3 WLAN network

Advantages
• They provide clutter-free homes, offices, and other networked places.
• The LANs are scalable in nature, i.e., devices may be added or removed from the network
at greater ease than wired LANs.
• The system is portable within the network coverage. Access to the network is not bounded
by the length of the cables.
Disadvantages
• Since radio waves are used for communications, the signals are noisier with more
interference from nearby systems.
• Greater care is needed for encrypting information. Also, they are more prone to errors. So,
they require greater bandwidth than the wired LANs.
• WLANs are slower than wired LANs.

MAN (Metropolitan Area Network)

A metropolitan area network is a more expensive network and a larger network than a
controller area network. (Bourgeois, n.d.)

Ex:
1. telephone company network that can provide a high-speed DSL line to the customer
or the cable TV network in a city.

Figure 4 MAN network

Advantages
• Less expensive
• Sending local emails
• High speed than WAN
• Sharing of the internet

Disadvantages
• Internet speed difference
• Hacker’s attack
• Technical people required to set up
• More wires required

WAN (wide area network)

In its simplest form, a wide-area network (WAN) is a collection of local-area network (LAN)
or another network that communicate with one another. World biggest network is wide-area
network (WAN). (Bourgeois, n.d.)

Ex:
1. Internet is the example of WAN
2. A network of bank cash dispensers is WAN
Figure 5 WAN network

Advantages
• Covers large geographical area
• Centralized data
• Get updated files and data
• Global business
• High bandwidth

Disadvantages
• Security problems
• Needs firewall and antivirus software
• The setup cost is high
• Troubleshooting problems
• Server down and disconnection issue
PAN (Personal Area Network)

A personal area network (PAN) is a computer network for interconnecting electronic devices
within an individual person’s workspace. (Bourgeois, n.d.)

Ex:
1. Bluetooth is a personal area network. Because photos, videos, and files can be
exchanged from one smart phone to another through Bluetooth. (Ex. Bluetooth,
share it, xcender)

Figure 6 PAN network

Advantages of personal area network:


• In PAN no extra space is required.
• No need for extra cable and wire.
• Used in office, conference, and meetings
• It is used in TV remotes, AC remotes, etc.
• Data can Synchronize between different devices.
• Connect to many devices at a time
• No extra space required.
Disadvantages of personal area network:
• PAN can be operated in a smaller range of areas.
• Can only be used for personal area
• Slow data transfer
• Interfere with radio signals:
• Infrared signals travel only in a straight line

SAN (Storage Area network)

A network containing storage devices that can make those storage devices appear to be
locally to servers. (Bourgeois, n.d.)

Ex:
1. Fiber Channel (FC)
2. Ethernet
3. InfiniBand

Figure 7 SAN network


Advantages
• It is possible of achieve a speed of over 5Gbps using SAN
• Various types of security measures are available on SAN which ensures that your data is
secure.
• SAN comes with built in redundancy that makes sure of continuous network operations.

Disadvantages
• Purchasing and maintaining a Storage Area Network requires a significant amount of
cost. • Not all the time SAN will be a beneficial option. SAN is designed to manage large
number of expensive servers.
• Although SAN implements right security measures, still there is a possibility of data
leakage. A Storage Area Network is used in a shared environment.

Campus Area Network (CAN)

A can is a computer network made up of an interconnection of local area network (LAN)


which are close to each other in multiple buildings. CAN is lager than LAN bust smaller
than MAN which covers up to 5KMs. It is also called as campus network and corporate
area network. It is typically seen is universities and corporates. (Bourgeois, n.d.)

Ex:
1. University
2. Academic buildings
3. Library
Figure 8 CAN network

Advantages
• CAN is a fast way of communication between microcontrollers and devices.
• CAN is low cost because the number of wires used is less as compared to the old network.
• The errors in the network can be better diagnosed and fixed quickly.
• The weight of the automobile is also reduced because of fewer wires used.
• If no message is not received to any device, then the same message can be retransmitted
again.

Disadvantages
• There is a limit to the number of nodes or devices to be connected. You can connect a
maximum of 64 nodes in CAN.
• The nodes communicate in an undesirable fashion.
• CAN is established to be up to 40 meters in length. It will have trouble if the vehicle or
machine is more than 40 meters of length.
• To develop CAN the cost of software development and maintenance is high.
VPN (Virtual Private Network)

This virtual private network provides secure and private connections. This protects privacy
and can be used by common people as well. (Bourgeois, n.d.)

Figure 9 VPN Network

What is a network topology’s?

A topology is the layout of how a network communicates with different devices. There are a
couple of different categories of topologies. Its wired and wireless. (Tom Nolle, n.d.)
Network topology types

1. Bus topology
2. Star topology
3. Tree topology
4. Ring topology
5. Mesh topology
6. Hybrid topology

Bus topology

Each computer and network devices are connected to a single cable or backbone. And this
cable is coaxial cable. Fairly cheap and easy to implement is advantages. Requires that the
cable is terminated at both ends using terminators is it was disadvantages. (Tom Nolle, n.d.)

Figure 10 BUS Network

Star topology

In star topology all computers are connected to a cental wiring point (HUB Or SWITCH).
Star network all data passes through the switch. (Tom Nolle, n.d.)
Advantages -

 If one computer failed or break in the cable other computer would not be
affected. Cus each computer has their own cable connections.

Disadvantages –

 If the cental hub or switch fails then all computer on the swtich would be
affected.

Figure 11 Star Topology

Ring topology

Each computer is connected to each other. shape like ring or loop. And each data packet is
sent around the ring until it reaches its destination. (Tom Nolle, n.d.)

Advantage –
 Easy to install
 Easy to troubleshoot

Disadvantage –
 If one computer goes down or the single break in the cable, then all
data flow would be disrupted.

Figure 12 Ring topology

Mesh topology

Each computer on the network is connected to every other computer on the network.

Advantage –
 Mesh topology is that it creates a high redundancy level.
Figure 13 Mesh topology

Tree topology

Tree topology is a combination of star and bus topology. (Tom Nolle, n.d.)

Advantage –
 Installing new extended network is easy in the network due to the star
characteristic.
 Ease of troubleshooting error nodes increases the efficiency of the
network and does not affect the main network.
Disadvantage –
 Crash in central unit, in case of damage in the core part of the network,
whole network connection is crashed.
 Difficult to install security measures.
Figure 14 tree topology

What is network protocol?

Network protocols are like rules, how data should be sent, received, understood by the
devices. Protocols describe how devices should interact with each other over a network.
(team, n.d.)

Network protocols layers

Layer Protocols
Process/ application FTP, HTTP, HTTPS, SMTP
Transport/ Host-to-Host TCP/UDP
Internet IP, ARP, RARP
Network Access Ethernet, Fast Ethernet
Ethernet

Ethernet is a type of network protocol that helps devices connect and communicate with each
other in a local area network (LAN). Packets are like small packages of information that are
sent from one device to another. (Alissa Irei, n.d.)

Transmission control protocol (TCP)

Breaks data into smaller packets sends across network ensured reassembled correctly. It also
handles if any packets are lost or corrupted during transmission (Team, n.d.).

Internet Protocol (IP)

It assigns unique IP addresses to devices and determines how data is sent from the source to
the destination device. IP ensures that data packets reach the right destination by routing
them through various network devices like routers. (team, n.d.)

User Datagram Protocol (UDP)


A faster nut less reliable method of data transmission compared to TCP. It does not establish
a connection or guarantee packet delivery or order. UDP commonly used for time sensitive
applications video streaming or online gaming. (Anon., n.d.)

Simple Mail Transfer Protocol (SMTP)

SMTP is a network protocol used for sending emails from a client device to a mail server.

File Transfer Protocol (FTP)

FTP is a network protocol used for transferring files between devices over a network. It
allows user to navigate directories, transfer files, and manage file permissions.

Hyper Text Transfer Protocol Secure (HTTPS)

It enables users to request and access web pages, download files, and interact with web
applications. HTTP defines how information is formatted, transmitted, and displayed on the
web.

What is networking standard?


Provides guideline to manufactures, venders’ government agencies and other service
providers to ensure the kind of interconnectivity necessary in today marketplace and in
international communication. (Andrew Froehlich, n.d.)

There are five most important organizations –

 American National Standards Institute (ANSI)


 Institute of Electrical and Electronic Engineers (IEEE)
 International Organization for standardization (ISO)
 Internet Engineering Task Force (IETF)
 World Wide Web Consortium (W3C)

Main IEEE Ethernet Standards

What is IEEE standards

IEEE 802.3 is a set of standards put forth by the Institute of Electrical and Electronics
Engineers (IEEE) that define Ethernet-based networks and the name of the group
responsible for developing them. The IEEE 802.3 standard defines the physical layer and
media access control (MAC) for local area networks (LANs), commonly referred to as
Ethernet networks. (team, n.d.)

What IEEE standards can be used in LAN?

Among the most widely used IEEE 802 standards are Ethernet, bridging, and virtual bridged
LANs, as well as wireless technologies such as wireless LAN, wireless PAN, wireless MAN,
wireless coexistence, MID, and wireless RAN. There is a dedicated group focusing on each
of these areas.
• 802.3Ethernet (CSMA/CD) LAN

• 802.4TokenBusLAN

• 802.5TokenRingLAN

• 802.9Isochronous LAN

What IEEE standards for WLAN

IEEE 802.11 WLANs are characterized by a number of standards. In addition to 802.11,


802.11b, 802.11g, 802.11n, and 802.11p, all of these standards are carrier-sense multiple
access with collision avoidance. They also support both centralized base stations and ad hoc
networks.

• IEEE 802.11

• IEEE 802.11a

• IEEE 802.11b

• IEEE 802.11g

• IEEE 802.11n

• IEEE 802.11p

Operating principles of networking devices and server type

Network Devices –
 Repeater
 Hub
 Switch
 Bridge
 Router
 Content Filter
 Load Balancer
 Network Card
 Modem
 Firewall

Repeater –

 Repeaters regenerates the signal in a single local area network.

Figure 15 repeater

Hub –
 Hub is a local area network device. Its operates a receives, always broadcasting.
Figure 16 HUB

Switch –

 Switch connects devices in a single local area network. Switch is a intelligent


device, it stores the MAC address table.

Figure 17 Switch

Bridge –
 Bridge connects two local area network segments that are running with the same
protocols. Bridge can also regenerate the signals. Bridge is a combination of
repeater, and MAC address reading capability.
Figure 18 Bridge

What are the server types?

WEB Server

A web server is software and hardware that uses networking protocols to respond to request
made over the World Wide Web. The main job of a web server is to display website content
through storing, processing, and delivering webpages to users. Web server hardware is
connected to the internet and allows data to be exchanged with other connected devices,
while web server software controls how a user accesses hosted files. (Alexander S. Gillis,
n.d.)

Figure 19 WEB server


Database server

A database server runs a database management system and provides database services to
clients. A database server consists of hardware and software that run a database. The
software side of a database server is the back-end database application. The hardware side of
a database server is the server system used for database strong and retrieval. The database
server stores the database management system and the database itself. Its main role is to
receive required data and pass back the results. (phoenixnap, n.d.)

Figure 20 Database server


Email Server

An email server, or simply mail server, is an application or computer in a network whose sole
purpose is to act as a virtual post office. The server stores incoming mail for distribution to
local users and sends out outgoing messages. This uses a client-server application model to
send and receive messages using simple mail transfer protocol (SMTP). (Team, n.d.)

Figure 21 Email server


File Server

In computer network, file server is a computer system that is responsible for storing and
fetching all types of files (audio file, images, video, database, and other documents), and
these files are used by all client machines which are linked over the network. A file server
allows users to transfer all files over the entire network without using any physical medium
of file transfer such as pen drive, floppy disk, or other external storage media. We can set up
any computer as host that plays that plays the role as a file server. (Wright, n.d.)

Figure 22 File Server

Virtualization

The process of diving a physical server a place where files and application are hosted on
networks into multiple virtual servers via software. Files and applications are hosted on
servers, which provide functionality to other programs. Local area networks (LANs) and
wide area networks (WANs) use this device to process requests and deliver data. It is not
uncommon for servers to be very powerful, capable of handling complex tasks with ease.
(Team, n.d.)
Inter-dependence of workstation hardware with relevant networking software.

What is the workstation?

Workstation are built for software’s are getting upgraded at core and very fast. Most
demanding application required robust hardware to deliver an extreme performance.

These are top running models of workstations –


 Dell precision Series
 HP Z Series
 Lenovo Think station Series

Workstation Most advanced features –


 Expandable Storage
 Power processing Unit
 Customized Design and Ability as per the need
 More Durable than desktop
 Delivers High end performance.

Workstation required at the most of the advance application areas –


 Gaming developments
 Manufacturing designs developments
 Photography and film production
 Architecture and construction renderings
What software is used for computer networking?

Network software definition.

Nowadays, networking software is used by the great majority of big companies, enterprises,
and organizations. Productivity may be increased, and everyone can realize their full
potential when content sharing, communication, and security are efficiently managed across
a sizable number of users and devices. When building a network, managers can modify or
personalize certain parts of the general structure by deploying network software. Current
networking software demonstrates how these applications operate. (Mohanakrishnan, n.d.)

What are the main components of network software?

User Management

Admins can utilize user management to control IT resources like networks, devices, systems,
apps, storage systems, and SaaS services, among others. Users need to be managed using
identity and access management (IAM) systems, especially directory services tools.
Keeping an updated list of identities is another step in this procedure. (Lee, n.d.)
File Management

For file maintenance (or management), a file management system is used. Data file
management software manages data files on a computer. There are limited capabilities in a
file management system, which is intended to be used for managing files in the workplace,
such as special office documents and records. The interface may display information about
the report, such as the owner, the date of creation, the state of completion and other helpful
office features. The term file manager is also used to refer to a file management system.
(team, n.d.)

Network software.

Client software

One example of a software client would be your phone's weather widget. Not only are many
web browsers software clients, but you may use Microsoft Outlook on your desktop as well.
When we describe programs, we usually refer to them as software clients.

Web Server Software

Web servers employ the protocols HTTP (Hypertext Transfer Protocol) and others for
managing requests from clients sent over the Internet. A web server's main objective is to
store, process, and transport webpages so that users may view the material on them.
Application server software

The business logic for an application program is provided by the application server, computer
software. When a client or user wants services from another server, a server working as a
proxy act in between the client or user and an endpoint, such a computer.

Database Server Software

Database servers run network database applications and manage database files, such as
Microsoft SQL Server or Oracle. SQL Server is one of the most popular database
management systems.

Cloud computing server software

The cloud is just a big building filled with computers (server). It’s a giant data center. This
server performs numerous tasks, such as running applications, storing data, data processing,
web hosting.
Ex:
1. Email
2. Productivity software
3. Web servers
4. Database
5. YouTube example for cloud computing.
File Server Software

File servers provide file systems or at least portions of file systems to connected clients over
a computer network. File servers allow users to store files on internal data media in a central
location accessible by authorized clients.

File server in windows server 2012 Installation

Step 1.
Windows server installing in the VM Software

Figure 23 VM Software windows server installation


Step 2.
Setup the server manager dashboard

Figure 24 Server manager Dashboard

Step 3.
Add roles and features to Windows server manager

Figure 25 Roles and features in windows server


Step 4.
Active Directory domain services configuration Wizard in server manager

Figure 26 Active domain services configuration

Step 5.
Prerequisite check active directory domain services configuration.

Figure 27 prerequisite check active directory


Step 6.
Active directory domain services configuration installation

Figure 28 Active directory domain configuration

Step 7.
Server manager dashboard setup finished.

Figure 29 Server manager dashboard setup finished


Activity 01

By using the LAN network for the Matara branch, the whole building can
communicate through fast and wi-fi technology.

Main IEEE Ethernet standards For Matara branch

IEEE 802.1 for LAN Bridging and management and remote media access
control (MAC).
IEEE 802.5 for taken ring access and for communication between LAN.
IEEE 802.6 standards for information exchange between systems.
IEEE 802.7 standards for broadband LAN cabling.
IEEE 802.11 for wireless networking (WI-FI)
IEEE 802.16 for wireless networking (WiMAX)

Recommend suitable network topology and network protocols for Matara branch.

Network topology.

A recommended network topology would be a star topology.


Examples:
1. a star topology can easily accommodate growth in the number of
departments or devices within the branch. New departments or
devices can be added by simply connecting them to the central
switch.
2. In a star topology, all devices connect to a central switch, making
networking management and troubleshooting more straightforward.
It’s easier to identify and isolate issues compared to more complex
topologies.
3. If one device or connection fails, it does not affect the rest of the
network.
4. Star topologies are relatively simple to implement and understand,
making them suitable for smaller networks like the Matara branch.

Recommend suitable network protocols for Matara branch.


Example:
1. Internet protocol version 6 (IPv6) - accommodating the growing
number of devices and users is the network. As Alliance Health is
expanding its operations, IPv6 ensures scalability and future
proofing of the network infrastructure.
2. Wireless LAN (WI-FI) Using Wi-Fi 6 – Wi-Fi 6 provides higher
data rates, increased capacity, and improved performance in high-
density environments. These protocols would be ideal for providing
fast and reliable wireless connectivity in the customer services area
and other departments where Wi-Fi access is required.
3. Virtual private network (VPN) using IP security – A VPN with IP
security encryption ensures secure communication between the
Matara branch and the Head office in Colombo. This protocol would
be suitable for establishing a secure connection over the internet,
allowing remote access to network resources, and facilitating inter
branch communication without compromising data security.
4. Simple network management protocol (SNMP) – SNMP can be
used for network monitoring and management at the Matara branch.
It allows administrators to monitor network devices, collect
performance data, and troubleshoot network issues remotely,
ensuring optimal network performance and reliability.
Activity 02

Operating principles of network Devices according to scenario

1. Router: operate at the network layer 3 and responsible for routing


data packets between Matara and Colombo networks. They use
routing tables to determine the best path for forwarding packets
based on destination IP addresses.
2. Switch: switch operates at the network layer 2 responsible for
forwarding data frames within the same network.

Recommend server/servers for the Matara Branch and Colombo Head Office.

1. Database server: Given the nature of the business and the need for
storing and managing large volumes of healthcare data, a powerful
database server is essential. A server equipped with high
performance processors, RAM, and redundant storage would be
suitable.
2. Application server: an application hosting revenue cycle
optimization software, healthcare managements applications
software would be vital.
3. File Server: A file server for storing and sharing documents,
reports, and other files among employees would enhance
collaboration and productivity.
4. Email Server: Given the importance of communication, and email
server for managing email correspondence within the organization
would be essential. This server supports secure email protocols,
spam, and backup recovery capabilities.\
inter-dependence of workstation hardware according to scenario

1. Network interface cards (NICs): workstation hardware includes


NICs, which are physical devices that enable computers to connect
to a network. Network software, devices drivers, communicates
with NICs to control data transmission and reception.
2. Operating systems (OS): workstation need operating systems like
windows, MacOS, Linux.
3. Network applications: workstation run network application like
web browsers, emails, file transfer utilities. Maintain connections
with servers and other devices on the network.

Example of networking software that can be used in network design.

1. TCP/IP protocol: communication over the internet and most local


area networks.
2. DHCP server and client software: Dynamic Host Configuration
protocol used for automatically assign IP addresses parameters to
devices.
3. DNS Server And Client Software: Domain Name System server
software installed on servers to manage domain name resolution and
DNS Client software running on workstation to query DNS server
for name resolution.
4. Firewall Software: firewall software for network security by
filtering and controlling traffic based on predefined rules.
Activity 03

Design a networked system to meet a given specification.

The written Plan and blueprint of the networked system.


Network Design
Network Diagram

Figure 31 Cisco Packet Tracer System


Written plan of the designing network

Network systems should be planned in a leaner way. Depending on the scenario, the learner
will have to make sure that those branchers are connected to each other to build a good and
effective network. The learner needs to identify the network requirements that need to be
incorporated into the network design. Starting with a leaner design for the network system is
the best way to go. As shown in the following step-by-step, the learner creates the network
by gathering the main requirements for the performance and what are the network
capabilities, along with what devices and software are required, as well as the connectivity
between the different departments of the company.

What is the work Floor in the network system?

In Colombo Head Office


1 s t Floor
In first Floor learner made system above scenarios require, this floor has
sales and marketing department using WI-FI for the access to the switch.
The other reception area and customer services area department connect to
the switch also.

2 n d Floor
In second floor every department connect to the one SWITCH. And learner
use star topology to make this system Because if one department down not
effect to the other department.

3 r d Floor
according to the scenario learner decided to add web server and file server
for the server room department for the secure the data and connectivity. On
the 3rd Floor another department connects to the SWTICH, and web server
and File server connect to the SWITCH also. And the Other Floor SWITCHs
connect to the 3 r d floor router. And after that router connect to the modem
and modem connect to the cloud.
In Matara branch

1 s t Floor
According to the scenario kind of leaner particularly decided customer
service are department for all intents and purposes add Wi-Fi fir the
connection Wi-Fi connection mostly connect to the switch and reception
area generally connect to switch also in a major way.

2 n d Floor
Administration, HR Department, accounting department, IT department all
departments connected to SWITCH. And Switch Connect to the router and
router connect to modem. Both branches connect to the cloud.

IP allocation table
Department No. of VLAN Network ID Broadcast ID Gateway Subnet Mask
Employ ID
ees
Head Office Colombo
Reception area 20 192.168.11.1 192.168.11.255 192.168.11.129 255.255.255.128

Sales & 30 192.168.12.1 192.168.12.255 192.168.12.193 255.255.255.19


marketing 192.168.12.2 2
department
Customer 10 40 192.168.13.1 192.168.13.255 192.168.13.255 255.255.255.22
services area 4
Administration 30 50 192.168.10.4 192.168.14.255 192.168.10.1 255.255.255.0
department 192.168.10.5
192.168.10.7
HR department 20 60 192.168.15.1 192.168.15.255 192.168.15.249 255.255.255.24
192.168.15.2 8
192.168.15.3
Accounting & 5 70 192.168.16.1 192.168.16.255 192.168.16.253 255.255.255.25
192.168.16.2
finance 2
department
Aduit 5 80 192.168.17.1 192.168.17.255 192.168.17.192 255.255.255.19
department 2
Business 5 90 192.168.18.1 192.168.18.255 192.168.18.248 255.255.255.24
development 8
department
Video 100 192.168.19.1 192.168.19.255 192.168.19.255 255.255.255.24
conferencing 192.168.19.2 0
room
IT department 60 110 192.168.20.1 192.168.20.255 192.168.20.255 255.255.255.24
192.168.20.2 8
192.168.20.3
Server 1 WEB 120 10.254.10.1 10.254.10.254 255.255.255.0

Server 2 140 10.254.10.3 10.254.10.254 255.255.255.0


DNS
Matara Branch
Reception area 150 192.168.30.1 192.168.21.255 192.168.30.126 255.255.255.12
8
Customer 160 192.168.32.1 192.168.22.255 192.168.30.129 255.255.255.19
services area 192.168.31.2 2
Administration 10 170 192.168.34.3 192.168.23.255 192.168.34.1 255.255.255.0
department
HR department 7 180 192.168.33.1 192.168.24.255 192.168.30.193 255.255.255.22
4
Accounting & 8 190 192.168.36.1 192.168.25.255 192.168.36.249 255.255.255.25
finance 192.168.36.2 2
department
IT department 50 200 192.168.35.1 192.168.26.255 192.168.35.241 255.255.255.24
192.168.35.2 8

Feedback Analysis

Feedback from the above questionnaire was collected from 5 users. In


addition, presented using percentages.

Figure 32 users feed back 1


Figure 33 user feed back 2
Design a networked system to meet a given specification.

IP assigned to the Department computers.

Figure 34 IP assigned to the computer


Creating the VLANs
Following this step create VLANs in the access switches.

Reception area VLAN Create

Figure 35 reception area vlan creating


Customer Care VLAN Create

Figure 36 customer care vlan create


Checking the VLAN brief

Figure 37 Vlan Check


Show All VLAN in the Matara Branch

Figure 38 Show all VLAN


Switch interconnect in Matara branch.

Figure 39 Switch interconnect


Creating sun interfaces in the router Create encapsulation on the router

Figure 40 encapsulation on the router 1


Figure 41 encapsulation on router 2
Ping All IPs in the Department

Figure 42 ALL IPS ping 1


Figure 43 Ping All IPS 2
Figure 44 Ping All IPS 3
Test Plan

Test case Test Screenshots Expected results Actual results Pass/Fail


ID scenario
Test 01 IP ping Ping statistics for Ping statistics for pass
testing 192.168.20.1: 192.168.20.1:
Packets: sent = 4, Packets: sent = 4,
received = 4, lost = received = 4, lost
0 (0% loss), = 0 (0% loss),
Approximate Approximate
round trip time in round trip time in
milli-seconds: milli-seconds:
Minimum = 3ms, Minimum = 3ms,
maximum = 7ms, maximum = 7ms,
Average = 5ms Average = 5ms
Test 02 Telnet telnet telnet pass
Ping 192.168.14.241 192.168.14.241
Trying Trying
192.168.14.241… 192.168.14.241…
open open

User Access User Access


Verification Verification

Password: Password:
R1> R1>
R1>rp R1>rp
Translating Translating
“rp”….domain “rp”….domain
server server
(255.255.255.255. (255.255.255.255.
255) 255)
Test 03 SSH ping Ssh-1 admin Ssh-1 admin pass
Test 192.168.10.1 192.168.10.1
Password: Password:

R1- SSH>en R1- SSH>en


Password: Password:

SSH#config t SSH#config t

Figure 45 Test Case Table


Cisco Packet Tracer Project for SYNTAX SOLUTIONS
Note: below in this, author is given the network project file access using Microsoft
OneDrive

OneDrive Link

Cisco System OneDrive Link –


Cisco Packet Tracer System.rar
Grading Rubric

Grading Criteria Achieved Feedback

LO1 : Examine networking principles and their protocols.

P1
Discuss the benefits and constraints of different network types and
standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Assess common networking principles and how protocols enable the
effectiveness of networked systems.

LO2 : Explain networking devices and operations

P3
Discuss the operating principles of networking devices and server
types.
P4
Discuss the interdependence of workstation hardware and relevant
networking software
M2
Explore a range of server types and justify the selection of a server for
a given scenario, regarding cost and performance optimization

LO 1 & LO2
D1 Evaluate the topology protocol selected for a given scenario and
how it demonstrates the efficient utilization of a networking system.

LO3 : Design efficient networked systems

P5
Design a networked system to meet a given specification.
P6
Design a maintenance schedule to support the networked system.

M3
Analyze user feedback on your designs with the aim of optimizing your
design and improving efficiency.
D2
Critically reflect on the implemented network, including the design and
decisions made to enhance the system.
LO4 : Implement and diagnose networked systems

P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.

M4
Recommend potential enhancements for the networked systems.
D2 Critically reflect on the implemented network, including the
design and decisions made to enhance the system.

You might also like