Unit 02 Networking
Unit 02 Networking
Assessor Name:
*If ‘No’ is recorded the Internal Verifier must recommend actions detailing the issues to be
addressed. The Assessor and the Internal Verifier must then confirm that the action has been
undertaken and that the Assignment Brief is authorised for use before being issued to learners.
Date
Target Date
Action required: Action
for
(If none then please state n/a) Complete
Completion
d
Assessor signature
Date
Mr. Udaya
Assessor Internal
Verifier
Unit 02: Networking
Unit(s)
LAN Design & Implementation for Alliance Health
Assignment title
Student’s name
Remedial action
taken
Give details:
Internal
Verifier Date
signature
Programme
Leader signature Date
(if required)
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID
Assignment 1 Assessor
Number
18/05/2024 Date
Submission Date Received 1st
submission
Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & P1 P2 M1 D1
Distinction Descripts
Resubmission Feedback:
* Please note that grade decisions are provisional. They are only confirmed once internal
and external moderation has taken place and grades decisions have been agreed at the
assessment board.
Assignment Feedback
Formative Feedback: Assessor to Student
Action Plan
Summative feedback
Feedback: Student to Assessor
Assessor Date
signature
Student Date
signature
1. A Cover page or title page – You should always attach a title page to your
assignment. Use previous page as your cover sheet and make sure all the details are
accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in
the body except for the before mentioned compulsory information will result in
rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due
date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as
illness, you may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE
FERRAL. You will then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly
using HARVARD referencing system to avoid plagiarism. You have to provide both
in-text citation and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade
could be reduced to A REFERRAL or at worst you could be expelled from the course
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to
present it as my own without attributing the sources in the correct form. I further understand
what it means to copy another’s work.
Unit Tutor
Issue Date
Submission Date
Submission format
The submission should be in the form of an individual report written in a concise, formal business style
using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using Harvard
referencing system. Please also provide an end list of references using the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures, although
you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:
Scenario
Alliance Health is a technology-enabled solutions company that optimizes the revenue cycle of the US
healthcare industry where its global delivery center is located in Colombo. The company is planning to
expand their business operations with their latest branch at Matara and wants it to be one of the state-
of-the-art companies in Matara with the latest facilities.
Assume you have been appointed as the new network analyst of Alliance Health to plan, design and
restructure the existing network. Prepare a network architectural design and implement it with your
suggestions and recommendations to meet the company requirements.
The floor plan of the head office in Colombo is as follows:
Floor 1:
Reception area
Sales & Marketing Department (10 employees)
Customer Services Area – with Wi-Fi facilities
Floor 2:
Administration Department (30 Employees)
HR Department (20 employees)
Accounting & Finance Department (15 employees)
Audit Department (5 employees)
Business Development Department (5 employees)
Floor 3
Video conferencing room
IT Department (60 employees)
The Server Room
Floor 2:
Administration Department (10 Employees)
HR Department (7 employees)
Accounting & Finance Department (8 employees)
IT Department (50 employees)
The conferencing room of the head office and Customer Services Areas of
each branch are to be equipped with Wi-Fi connections .
Connectivity between two branches (Head Office and Matara) would allow
the intra branch connectivity between departments. (Use of VPN is not
compulsory)
The necessary IP address classes and ranges must be decided by the network
designer and should be used for all the departments except the server room .
Number of servers required for the Server room need to be decided by the
Network designer and should be assigned with 10.254.10.0/24 subnet. (Uses
static IPs)
Sales and Marketing Team also needs to access Network resources using
WIFI connectivity.
(Note: Clearly state your assumptions. You are allowed to design the network
according to your assumptions, but main requirements should not be violated)
Activity 01
Discuss the benefits and constraints of different network system types that can
be implemented in the Matara branch and the main IEEE Ethernet standards
that can be used in above LAN and WLAN design.
Discuss the importance and impact of network topologies and assess the main
network protocol suites that are used in network design using examples.
Recommend suitable network topology and network protocols for above
scenario and evaluate with valid points how the recommended topology
demonstrates the efficient utilization of the networking system of Matara
branch.
Activity 02
Discuss the operating principles of network devices (Ex: Router, Switch, Etc.)
and server types that can be used for above scenario while exploring different
servers that are available in today’s market with their specifications.
Recommend server/servers for the above scenario and justify your selection
with valid points.
Activity 03
Prepare a written network design plan to meet the above-mentioned user
requirements including a blueprint drawn using a modeling tool (Ex: Microsoft
Visio, EdrawMax) . T est and evaluate the proposed design by analysing user
feedback with the aim of optimizing your design and improving efficiency.
(Support your answer by providing the VLAN and IP subnetting scheme for the
above scenario and the list of devices, network components and software used to
design the network for above scenario and while justifying your selections.)
Activity 04
Implement a networked system based on your prepared design with valid
evidence.
Develop test cases and conduct verification (Ex, Ping, extended ping,
traceroute, telnet, SSH, etc.) to test the above Network and analyse the test
results against the expected results. Recommend potential future enhancements
for the networked system with valid justifications and critically reflect on the
implemented network, including the plan, design, configurations, tests, and the
decisions made to enhance the system.
Acknowledgement
I take this opportunity to express my sincere gratitude to everyone who supported me
throughout the Networking Assignment. I am thankful for their aspiring guidance, invaluably
constructive criticism, and friendly advice during the assignment work. I am sincerely
grateful to them for sharing their truthful and illuminating views on several issues related to
this assignment. I express my heartfelt thanks to Mr. Udaya sir for support and guidance
throughout this assignment. I would also like to thank the entire ESoft Management for
having given me the opportunity to complete a valuable assignment by gaining a precious
knowledge regarding the sessions.
Thank you.
Contents
What is a networking system?...............................................................................................27
Network system types........................................................................................................27
LAN (Local Area Network)..............................................................................................28
WLAN (Wireless Local Area network).............................................................................29
MAN (Metropolitan Area Network)...............................................................................30
WAN (wide area network)..............................................................................................31
PAN (Personal Area Network)........................................................................................33
SAN (Storage Area network).......................................................................................... 34
Campus Area Network (CAN).........................................................................................35
VPN (Virtual Private Network)........................................................................................37
What is a network topology’s?...........................................................................................37
Network topology types.....................................................................................................38
Bus topology.................................................................................................................. 38
Star topology..................................................................................................................38
Ring topology................................................................................................................. 39
Mesh topology............................................................................................................... 40
Tree topology.................................................................................................................41
What is network protocol?................................................................................................ 42
Ethernet......................................................................................................................... 43
Transmission control protocol (TCP)..............................................................................43
Internet Protocol (IP)..................................................................................................... 43
User Datagram Protocol (UDP)...................................................................................... 43
Simple Mail Transfer Protocol (SMTP)...........................................................................44
File Transfer Protocol (FTP)............................................................................................44
Hyper Text Transfer Protocol Secure (HTTPS)................................................................44
What is networking standard?.......................................................................................44
Main IEEE Ethernet Standards............................................................................................... 45
What is IEEE standards.......................................................................................................45
What IEEE standards can be used in LAN?.........................................................................45
What IEEE standards for WLAN..........................................................................................46
Operating principles of networking devices and server type.............................................46
Repeater –......................................................................................................................47
Hub.................................................................................................................................47
Switch –..........................................................................................................................48
Bridge............................................................................................................................. 48
What are the server types?................................................................................................49
WEB Server.....................................................................................................................49
Database server............................................................................................................. 50
Email Server................................................................................................................... 51
File Server...................................................................................................................... 52
Virtualization..................................................................................................................52
Inter-dependence of workstation hardware with relevant networking software..............53
What is the workstation?...................................................................................................53
What software is used for computer networking?.............................................................54
Network software definition..............................................................................................54
What are the main components of network software?.....................................................54
User Management......................................................................................................... 54
File Management........................................................................................................... 55
Network software.............................................................................................................. 55
Client software...............................................................................................................55
Web Server Software..................................................................................................... 55
Application server software...........................................................................................56
Database Server Software..............................................................................................56
Cloud computing server software..................................................................................56
File Server Software....................................................................................................... 57
File server in windows server 2012 Installation.................................................................57
Activity 01.............................................................................................................................. 61
Main IEEE Ethernet standards For Matara branch.............................................................61
Recommend suitable network topology and network protocols for Matara branch.........61
Activity 02.............................................................................................................................. 63
Operating principles of network Devices according to scenario........................................63
Recommend server/servers for the Matara Branch and Colombo Head Office.................63
inter-dependence of workstation hardware according to scenario...................................64
Example of networking software that can be used in network design...............................64
Activity 03.............................................................................................................................. 65
Design a networked system to meet a given specification................................................65
Network Diagram...............................................................................................................66
Written plan of the designing network..........................................................................67
What is the work Floor in the network system?................................................................67
Feedback Analysis.............................................................................................................. 70
Design a networked system to meet a given specification................................................72
IP assigned to the Department computers....................................................................72
Reception area VLAN Create..........................................................................................73
Customer Care VLAN Create.......................................................................................... 74
Checking the VLAN brief.................................................................................................75
Show All VLAN in the Matara Branch.............................................................................76
Switch interconnect in Matara branch...........................................................................77
Creating sun interfaces in the router Create encapsulation on the router....................78
Ping All IPs in the Department.......................................................................................80
Test Plan.............................................................................................................................83
Figure Tables:
A computer network is a group of computers linked to each other that enables the computer
to communicate with another computer and share its resources, data, and applications.
(Team, n.d.)
The system in which users are connected to each other in a very small area is called local
area network. (Bourgeois, n.d.)
Ex:
1. home Wi-Fi networks
2. Small business networks
WLAN is wireless computer network that connects two or more devices using wireless
communication. Users connected via wireless LAN may move around in a limited area such
as at home, at school, on campus, in an office building, or on trains. Wi-Fi and IEEE 802.11
are two of the most common WLAN standards. (Bourgeois, n.d.)
Advantages
• They provide clutter-free homes, offices, and other networked places.
• The LANs are scalable in nature, i.e., devices may be added or removed from the network
at greater ease than wired LANs.
• The system is portable within the network coverage. Access to the network is not bounded
by the length of the cables.
Disadvantages
• Since radio waves are used for communications, the signals are noisier with more
interference from nearby systems.
• Greater care is needed for encrypting information. Also, they are more prone to errors. So,
they require greater bandwidth than the wired LANs.
• WLANs are slower than wired LANs.
A metropolitan area network is a more expensive network and a larger network than a
controller area network. (Bourgeois, n.d.)
Ex:
1. telephone company network that can provide a high-speed DSL line to the customer
or the cable TV network in a city.
Advantages
• Less expensive
• Sending local emails
• High speed than WAN
• Sharing of the internet
Disadvantages
• Internet speed difference
• Hacker’s attack
• Technical people required to set up
• More wires required
In its simplest form, a wide-area network (WAN) is a collection of local-area network (LAN)
or another network that communicate with one another. World biggest network is wide-area
network (WAN). (Bourgeois, n.d.)
Ex:
1. Internet is the example of WAN
2. A network of bank cash dispensers is WAN
Figure 5 WAN network
Advantages
• Covers large geographical area
• Centralized data
• Get updated files and data
• Global business
• High bandwidth
Disadvantages
• Security problems
• Needs firewall and antivirus software
• The setup cost is high
• Troubleshooting problems
• Server down and disconnection issue
PAN (Personal Area Network)
A personal area network (PAN) is a computer network for interconnecting electronic devices
within an individual person’s workspace. (Bourgeois, n.d.)
Ex:
1. Bluetooth is a personal area network. Because photos, videos, and files can be
exchanged from one smart phone to another through Bluetooth. (Ex. Bluetooth,
share it, xcender)
A network containing storage devices that can make those storage devices appear to be
locally to servers. (Bourgeois, n.d.)
Ex:
1. Fiber Channel (FC)
2. Ethernet
3. InfiniBand
Disadvantages
• Purchasing and maintaining a Storage Area Network requires a significant amount of
cost. • Not all the time SAN will be a beneficial option. SAN is designed to manage large
number of expensive servers.
• Although SAN implements right security measures, still there is a possibility of data
leakage. A Storage Area Network is used in a shared environment.
Ex:
1. University
2. Academic buildings
3. Library
Figure 8 CAN network
Advantages
• CAN is a fast way of communication between microcontrollers and devices.
• CAN is low cost because the number of wires used is less as compared to the old network.
• The errors in the network can be better diagnosed and fixed quickly.
• The weight of the automobile is also reduced because of fewer wires used.
• If no message is not received to any device, then the same message can be retransmitted
again.
Disadvantages
• There is a limit to the number of nodes or devices to be connected. You can connect a
maximum of 64 nodes in CAN.
• The nodes communicate in an undesirable fashion.
• CAN is established to be up to 40 meters in length. It will have trouble if the vehicle or
machine is more than 40 meters of length.
• To develop CAN the cost of software development and maintenance is high.
VPN (Virtual Private Network)
This virtual private network provides secure and private connections. This protects privacy
and can be used by common people as well. (Bourgeois, n.d.)
A topology is the layout of how a network communicates with different devices. There are a
couple of different categories of topologies. Its wired and wireless. (Tom Nolle, n.d.)
Network topology types
1. Bus topology
2. Star topology
3. Tree topology
4. Ring topology
5. Mesh topology
6. Hybrid topology
Bus topology
Each computer and network devices are connected to a single cable or backbone. And this
cable is coaxial cable. Fairly cheap and easy to implement is advantages. Requires that the
cable is terminated at both ends using terminators is it was disadvantages. (Tom Nolle, n.d.)
Star topology
In star topology all computers are connected to a cental wiring point (HUB Or SWITCH).
Star network all data passes through the switch. (Tom Nolle, n.d.)
Advantages -
If one computer failed or break in the cable other computer would not be
affected. Cus each computer has their own cable connections.
Disadvantages –
If the cental hub or switch fails then all computer on the swtich would be
affected.
Ring topology
Each computer is connected to each other. shape like ring or loop. And each data packet is
sent around the ring until it reaches its destination. (Tom Nolle, n.d.)
Advantage –
Easy to install
Easy to troubleshoot
Disadvantage –
If one computer goes down or the single break in the cable, then all
data flow would be disrupted.
Mesh topology
Each computer on the network is connected to every other computer on the network.
Advantage –
Mesh topology is that it creates a high redundancy level.
Figure 13 Mesh topology
Tree topology
Tree topology is a combination of star and bus topology. (Tom Nolle, n.d.)
Advantage –
Installing new extended network is easy in the network due to the star
characteristic.
Ease of troubleshooting error nodes increases the efficiency of the
network and does not affect the main network.
Disadvantage –
Crash in central unit, in case of damage in the core part of the network,
whole network connection is crashed.
Difficult to install security measures.
Figure 14 tree topology
Network protocols are like rules, how data should be sent, received, understood by the
devices. Protocols describe how devices should interact with each other over a network.
(team, n.d.)
Layer Protocols
Process/ application FTP, HTTP, HTTPS, SMTP
Transport/ Host-to-Host TCP/UDP
Internet IP, ARP, RARP
Network Access Ethernet, Fast Ethernet
Ethernet
Ethernet is a type of network protocol that helps devices connect and communicate with each
other in a local area network (LAN). Packets are like small packages of information that are
sent from one device to another. (Alissa Irei, n.d.)
Breaks data into smaller packets sends across network ensured reassembled correctly. It also
handles if any packets are lost or corrupted during transmission (Team, n.d.).
It assigns unique IP addresses to devices and determines how data is sent from the source to
the destination device. IP ensures that data packets reach the right destination by routing
them through various network devices like routers. (team, n.d.)
SMTP is a network protocol used for sending emails from a client device to a mail server.
FTP is a network protocol used for transferring files between devices over a network. It
allows user to navigate directories, transfer files, and manage file permissions.
It enables users to request and access web pages, download files, and interact with web
applications. HTTP defines how information is formatted, transmitted, and displayed on the
web.
IEEE 802.3 is a set of standards put forth by the Institute of Electrical and Electronics
Engineers (IEEE) that define Ethernet-based networks and the name of the group
responsible for developing them. The IEEE 802.3 standard defines the physical layer and
media access control (MAC) for local area networks (LANs), commonly referred to as
Ethernet networks. (team, n.d.)
Among the most widely used IEEE 802 standards are Ethernet, bridging, and virtual bridged
LANs, as well as wireless technologies such as wireless LAN, wireless PAN, wireless MAN,
wireless coexistence, MID, and wireless RAN. There is a dedicated group focusing on each
of these areas.
• 802.3Ethernet (CSMA/CD) LAN
• 802.4TokenBusLAN
• 802.5TokenRingLAN
• 802.9Isochronous LAN
• IEEE 802.11
• IEEE 802.11a
• IEEE 802.11b
• IEEE 802.11g
• IEEE 802.11n
• IEEE 802.11p
Network Devices –
Repeater
Hub
Switch
Bridge
Router
Content Filter
Load Balancer
Network Card
Modem
Firewall
Repeater –
Figure 15 repeater
Hub –
Hub is a local area network device. Its operates a receives, always broadcasting.
Figure 16 HUB
Switch –
Figure 17 Switch
Bridge –
Bridge connects two local area network segments that are running with the same
protocols. Bridge can also regenerate the signals. Bridge is a combination of
repeater, and MAC address reading capability.
Figure 18 Bridge
WEB Server
A web server is software and hardware that uses networking protocols to respond to request
made over the World Wide Web. The main job of a web server is to display website content
through storing, processing, and delivering webpages to users. Web server hardware is
connected to the internet and allows data to be exchanged with other connected devices,
while web server software controls how a user accesses hosted files. (Alexander S. Gillis,
n.d.)
A database server runs a database management system and provides database services to
clients. A database server consists of hardware and software that run a database. The
software side of a database server is the back-end database application. The hardware side of
a database server is the server system used for database strong and retrieval. The database
server stores the database management system and the database itself. Its main role is to
receive required data and pass back the results. (phoenixnap, n.d.)
An email server, or simply mail server, is an application or computer in a network whose sole
purpose is to act as a virtual post office. The server stores incoming mail for distribution to
local users and sends out outgoing messages. This uses a client-server application model to
send and receive messages using simple mail transfer protocol (SMTP). (Team, n.d.)
In computer network, file server is a computer system that is responsible for storing and
fetching all types of files (audio file, images, video, database, and other documents), and
these files are used by all client machines which are linked over the network. A file server
allows users to transfer all files over the entire network without using any physical medium
of file transfer such as pen drive, floppy disk, or other external storage media. We can set up
any computer as host that plays that plays the role as a file server. (Wright, n.d.)
Virtualization
The process of diving a physical server a place where files and application are hosted on
networks into multiple virtual servers via software. Files and applications are hosted on
servers, which provide functionality to other programs. Local area networks (LANs) and
wide area networks (WANs) use this device to process requests and deliver data. It is not
uncommon for servers to be very powerful, capable of handling complex tasks with ease.
(Team, n.d.)
Inter-dependence of workstation hardware with relevant networking software.
Workstation are built for software’s are getting upgraded at core and very fast. Most
demanding application required robust hardware to deliver an extreme performance.
Nowadays, networking software is used by the great majority of big companies, enterprises,
and organizations. Productivity may be increased, and everyone can realize their full
potential when content sharing, communication, and security are efficiently managed across
a sizable number of users and devices. When building a network, managers can modify or
personalize certain parts of the general structure by deploying network software. Current
networking software demonstrates how these applications operate. (Mohanakrishnan, n.d.)
User Management
Admins can utilize user management to control IT resources like networks, devices, systems,
apps, storage systems, and SaaS services, among others. Users need to be managed using
identity and access management (IAM) systems, especially directory services tools.
Keeping an updated list of identities is another step in this procedure. (Lee, n.d.)
File Management
For file maintenance (or management), a file management system is used. Data file
management software manages data files on a computer. There are limited capabilities in a
file management system, which is intended to be used for managing files in the workplace,
such as special office documents and records. The interface may display information about
the report, such as the owner, the date of creation, the state of completion and other helpful
office features. The term file manager is also used to refer to a file management system.
(team, n.d.)
Network software.
Client software
One example of a software client would be your phone's weather widget. Not only are many
web browsers software clients, but you may use Microsoft Outlook on your desktop as well.
When we describe programs, we usually refer to them as software clients.
Web servers employ the protocols HTTP (Hypertext Transfer Protocol) and others for
managing requests from clients sent over the Internet. A web server's main objective is to
store, process, and transport webpages so that users may view the material on them.
Application server software
The business logic for an application program is provided by the application server, computer
software. When a client or user wants services from another server, a server working as a
proxy act in between the client or user and an endpoint, such a computer.
Database servers run network database applications and manage database files, such as
Microsoft SQL Server or Oracle. SQL Server is one of the most popular database
management systems.
The cloud is just a big building filled with computers (server). It’s a giant data center. This
server performs numerous tasks, such as running applications, storing data, data processing,
web hosting.
Ex:
1. Email
2. Productivity software
3. Web servers
4. Database
5. YouTube example for cloud computing.
File Server Software
File servers provide file systems or at least portions of file systems to connected clients over
a computer network. File servers allow users to store files on internal data media in a central
location accessible by authorized clients.
Step 1.
Windows server installing in the VM Software
Step 3.
Add roles and features to Windows server manager
Step 5.
Prerequisite check active directory domain services configuration.
Step 7.
Server manager dashboard setup finished.
By using the LAN network for the Matara branch, the whole building can
communicate through fast and wi-fi technology.
IEEE 802.1 for LAN Bridging and management and remote media access
control (MAC).
IEEE 802.5 for taken ring access and for communication between LAN.
IEEE 802.6 standards for information exchange between systems.
IEEE 802.7 standards for broadband LAN cabling.
IEEE 802.11 for wireless networking (WI-FI)
IEEE 802.16 for wireless networking (WiMAX)
Recommend suitable network topology and network protocols for Matara branch.
Network topology.
Recommend server/servers for the Matara Branch and Colombo Head Office.
1. Database server: Given the nature of the business and the need for
storing and managing large volumes of healthcare data, a powerful
database server is essential. A server equipped with high
performance processors, RAM, and redundant storage would be
suitable.
2. Application server: an application hosting revenue cycle
optimization software, healthcare managements applications
software would be vital.
3. File Server: A file server for storing and sharing documents,
reports, and other files among employees would enhance
collaboration and productivity.
4. Email Server: Given the importance of communication, and email
server for managing email correspondence within the organization
would be essential. This server supports secure email protocols,
spam, and backup recovery capabilities.\
inter-dependence of workstation hardware according to scenario
Network systems should be planned in a leaner way. Depending on the scenario, the learner
will have to make sure that those branchers are connected to each other to build a good and
effective network. The learner needs to identify the network requirements that need to be
incorporated into the network design. Starting with a leaner design for the network system is
the best way to go. As shown in the following step-by-step, the learner creates the network
by gathering the main requirements for the performance and what are the network
capabilities, along with what devices and software are required, as well as the connectivity
between the different departments of the company.
2 n d Floor
In second floor every department connect to the one SWITCH. And learner
use star topology to make this system Because if one department down not
effect to the other department.
3 r d Floor
according to the scenario learner decided to add web server and file server
for the server room department for the secure the data and connectivity. On
the 3rd Floor another department connects to the SWTICH, and web server
and File server connect to the SWITCH also. And the Other Floor SWITCHs
connect to the 3 r d floor router. And after that router connect to the modem
and modem connect to the cloud.
In Matara branch
1 s t Floor
According to the scenario kind of leaner particularly decided customer
service are department for all intents and purposes add Wi-Fi fir the
connection Wi-Fi connection mostly connect to the switch and reception
area generally connect to switch also in a major way.
2 n d Floor
Administration, HR Department, accounting department, IT department all
departments connected to SWITCH. And Switch Connect to the router and
router connect to modem. Both branches connect to the cloud.
IP allocation table
Department No. of VLAN Network ID Broadcast ID Gateway Subnet Mask
Employ ID
ees
Head Office Colombo
Reception area 20 192.168.11.1 192.168.11.255 192.168.11.129 255.255.255.128
Feedback Analysis
Password: Password:
R1> R1>
R1>rp R1>rp
Translating Translating
“rp”….domain “rp”….domain
server server
(255.255.255.255. (255.255.255.255.
255) 255)
Test 03 SSH ping Ssh-1 admin Ssh-1 admin pass
Test 192.168.10.1 192.168.10.1
Password: Password:
SSH#config t SSH#config t
OneDrive Link
P1
Discuss the benefits and constraints of different network types and
standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Assess common networking principles and how protocols enable the
effectiveness of networked systems.
P3
Discuss the operating principles of networking devices and server
types.
P4
Discuss the interdependence of workstation hardware and relevant
networking software
M2
Explore a range of server types and justify the selection of a server for
a given scenario, regarding cost and performance optimization
LO 1 & LO2
D1 Evaluate the topology protocol selected for a given scenario and
how it demonstrates the efficient utilization of a networking system.
P5
Design a networked system to meet a given specification.
P6
Design a maintenance schedule to support the networked system.
M3
Analyze user feedback on your designs with the aim of optimizing your
design and improving efficiency.
D2
Critically reflect on the implemented network, including the design and
decisions made to enhance the system.
LO4 : Implement and diagnose networked systems
P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked systems.
D2 Critically reflect on the implemented network, including the
design and decisions made to enhance the system.