0% found this document useful (0 votes)
63 views144 pages

Network Assignment

Network assignment
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views144 pages

Network Assignment

Network assignment
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 144

Higher Nationals

Internal verification of assessment decisions – BTEC (RQF)

INTERNAL VERIFICATION – ASSESSMENT DECISIONS

Programme title BTEC Higher National Diploma in Computing

Mr. Oshada Lokuhetti


Assessor Internal
Verifier
Unit 02: Networking
Unit(s)

Assignment title LAN Design & Implementation for SYNTAX SOLUTIONS


H.P.Dileesha Mandara Prawarshana
Student’s name

List which assessment Pass Merit Distinction


criteria the Assessor has
awarded.
INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded match


those shown in the assignment brief? Y/N

Is the Pass/Merit/Distinction grade awarded


justified by the assessor’s comments on the
Y/N
student work?

Has the work been assessed


Y/N
accurately?
Is the feedback to the student:
Give details:
• Constructive? Y/N
• Linked to relevant assessment Y/N
criteria? Y/N
• Identifying opportunities for
improved performance? Y/N
• Agreeing actions?
Does the assessment decision need
Y/N
amending?

Assessor signature Date

Internal Verifier signature Date


Programme Leader signature (if
Date
required)

Confirm action completed


Remedial action taken
Give details:

H.P.D.Mandara Prawarshana 1 Unit 02 Networking


Assessor signature Date

Internal
Date
Verifier
signature
Programme Leader
Date
signature (if
required)

H.P.D.Mandara Prawarshana 2 Unit 02 Networking


Higher Nationals - Summative Assignment Feedback Form
Student Name/ID H.P.Dileesha Mandara Prawarshana

Unit Title Unit 02: Networking

Assignment Number 1 Assessor

03/05/2022 Date 03/05/2022


Submission Date
Received 1st
submission
Date Received 2nd
Re-submission Date
submission

Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction P1 P2 M1
Descripts

LO2 Explain networking devices and operations.


Pass, Merit & Distinction P3 P4 M2 D1
Descripts

LO3 Design efficient networked systems.


Pass, Merit & Distinction P5 P6 M3 D2
Descripts

LO4 Implement and diagnose networked systems.


Pass, Merit & Distinction P7 P8 M4 D3
Descripts

Grade: Assessor Signature: Date:

Resubmission Feedback:

Grade: Assessor Signature: Date:

Internal Verifier’s Comments:

Signature & Date:

H.P.D.Mandara Prawarshana 3 Unit 02 Networking


* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.

Assignment Feedback
Formative Feedback: Assessor to Student

Action Plan

Summative feedback

Feedback: Student to Assessor

H.P.D.Mandara Prawarshana 4 Unit 02 Networking


Assessor Date
signature

[email protected] 03/05/2022
Student Date
signature

H.P.D.Mandara Prawarshana 5 Unit 02 Networking


Pearson Higher Nationals in
Computing
Unit 02: Networking
Assignment 01

H.P.D.Mandara Prawarshana 6 Unit 02 Networking


General Guidelines

1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.

Word Processing Rules

1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.

Important Points:

1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body
except for the before mentioned compulsory information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and
a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course

H.P.D.Mandara Prawarshana 7 Unit 02 Networking


Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct form. I further understand what it means to
copy another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of Pearson UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my
own, and where I have made use of another’s work, I will attribute the source in the correct way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Pearson, UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.

[email protected] 03/05/2022
Student’s Signature: Date:
(Provide E-mail ID) (Provide Submission Date)

H.P.D.Mandara Prawarshana 8 Unit 02 Networking


Higher National Diploma in Computing
Assignment Brief
Student Name /ID Number H.P.Dileesha Mandara Prawarshana

Unit Number and Title Unit 2: Networking

Academic Year 2021/22

Unit Tutor

Assignment Title LAN Design & Implementation for SYNTAX SOLUTIONS

Issue Date

Submission Date

IV Name & Date

Submission format

The submission should be in the form of an individual report written in a concise, formal
business style using single spacing and font size 12. You are required to make use of headings,
paragraphs and subsections as appropriate, and all work must be supported with research and
referenced using Harvard referencing system. Please also provide an end list of references using
the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures,
although you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:

LO1 Examine networking principles and their protocols.

LO2 Explain networking devices and operations.

LO3 Design efficient networked systems.

LO4 Implement and diagnose networked systems.

H.P.D.Mandara Prawarshana 9 Unit 02 Networking


Assignment Brief and Guidance:

H.P.D.Mandara Prawarshana 10 Unit 02 Networking


Scenario

SYNTAX SOLUTIONS is a privately owned, well-known Software company located in Colombo.


The Management of SYNTAX SOLUTIONS has purchased a 3-story building in the heart of
Matara. They are planning to make it one of the state-of-the-art companies in Matara with the
latest facilities.

It is expected to have nearly 150 employees in Matara branch.

Department Number of Users

Customer Care 10

Sales and Marketing 20

Finance 25

Legal 5

HR 10

Developers 55

Network Team 5

Server Room Servers +ISP connections

Following re quireme nt s are give n by the Management .


 All the de part me nts must be separat ed with unique subnet and should no t
communicat e with each ot her unless there is a special requirement .

 19 2.168.10 .0 /24 is give n and should be used for all the de part me nts except
the server room. IPs should assign using DHCP .

 ERP and CRM Sy st ems ne ed to be impleme nted in Matara branch in local


servers.

H.P.D.Mandara Prawarshana 11 Unit 02 Networking


 Number of serve rs re quired for the Se rv er room ne ed to be de cided by the
Net work de signer and should be assigned wit h 10 .2 54.1.0/2 4 subnet . (Use s
static IPs )

 High le vel of re dundancy is expecte d in net work de sign to eliminate single


point of failures and traffic bo ttle ne cks.

 Sale s and Marke ting Team ne ed to access Ne tw ork resource s using WIFI
connect ivity.

 Proper met hods for net working monit oring and trouble shoot ing nee d to be
establishe d.

 All po ssible ne twork securit y mechanisms should be impleme nted.

Assume yo u have be en appoint ed as the ne w ne tw ork consult ant of SYNTAX


SOL UTIONS . Pre pare a ne two rk archit ect ural de sign and impleme nt it with your
sugge st ions and re commendations to mee t the company re quireme nt s.

(Not e: Clear ly state your assumpt ions. You ar e allow ed to design the netw or k
according to your assumpt ions, but main requirement s should not be violat ed)

Act ivity 01
 Discuss the bene fit s and const raints of different ne tw ork syste m types that
can be impleme nted in the Mat ara branch and the main IEEE Ethe rne t
standards that can be used in above LAN and WLAN de sign.

 Discuss the importance and impact of net work topologies and ne tw ork
protocol suite s while comparing the main ne tw ork topologies and ne two rk
protocol suite s that are used in ne tw ork de sign using examples. Recommend
suit able ne tw ork topologies and ne tw ork prot ocol suit es for above scenario
and justify your answer with valid po int s.

H.P.D.Mandara Prawarshana 12 Unit 02 Networking


Act ivity 02
 Discuss the operat ing principles of net work de vice s (Ex: Route r, Sw it ch, Etc.)
and server types that can be used for above scenario while exploring different
serve rs that are available in today ’s marke t with their specificat ions.
Recommend serve r/serve rs for the above scenario and justify your sele ct ion
with valid points.

 Discuss the inte r-de pe ndence of workstation hardware with ne tw orking


softw are and provide example s for ne tw orking software that can be used in
above ne twork design.

Act ivity 03
 Pre pare a writt en ne tw ork de sign plan to me et the above me ntioned user
re quireme nt s including a blueprint drawn using a mode ling tool. (Ex: Microsoft
Visio , Edraw Max).

Support your answer by providing the VLAN and IP subnet ting scheme for the
above sce nario and the list of de vices, ne tw ork component s and softw are used
to de sign the ne tw ork for above scenario and while justifying your sele ct ions.

 Test and evaluate the proposed de sign to me et the re quireme nt s and analyse
user fe edback by using a Use r fee dback form.

 Install and configure Ne tw ork services, de vice s and applicat ions (Ex:
VL AN,DHCP, DNS,Proxy , Web, Etc.) according to the propose d de sign to
accomplish the user require ment s and design a de taile d Mainte nance sche dule
for above Ne two rk.

H.P.D.Mandara Prawarshana 13 Unit 02 Networking


*Not e: - Scre en shots of Configuration scripts should be presente d.

Act ivity 04
 Impleme nt a ne tworke d syste m based on yo ur prepared de sign with valid
evidence s and re commend po tent ial fut ure enhancement s for the ne two rked
syste m wit h valid justificat ions to yo ur re commendations. Use critical
re flection to crit ically evaluate the de sign, plan, configuration, and testing of
your ne tw ork while justifying with valid conclusions.

 Deve lop test cases and conduct ve rification (Ex: Ping, ext ended ping, trace
rout e, telnet, SSH, etc.) to test the above Ne tw ork and analyse the test re sults
against the expecte d re sults.

H.P.D.Mandara Prawarshana 14 Unit 02 Networking


H.P.D.Mandara Prawarshana 15 Unit 02 Networking
Grading Rubric

Grading Criteria Achieved Feedback

LO1 : Examine networking principles and their protocols.

P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Compare common networking principles and how protocols
enable the effectiveness of networked systems.

LO2 : Explain networking devices and operations

P3
Discuss the operating principles of networking devices and
server types.

H.P.D.Mandara Prawarshana Unit 02 Networking


16
P4
Discuss the inter-dependence of workstation hardware with
relevant networking software.

M2
Explore a range of server types and justify the selection of a
server, considering a given scenario regarding cost and
performance optimization.

LO 1 & LO2
D1 Critically evaluate the topology protocol selected for a given
scenario to demonstrate the efficient utilisation of a networking
system.
LO3 : Design efficient networked systems

P5
Design a networked system to meet a given specification.
P6
Test and evaluate the design to meet the requirements and
analyze user feedback.
M3
Install and configure network services and applications on your

H.P.D.Mandara Prawarshana Unit 02 Networking


17
choice.
D2
Design a maintenance schedule to support the networked
system.
LO4 : Implement and diagnose networked systems

P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D3
Use critical reflection to evaluate own work and justify valid
conclusions.

H.P.D.Mandara Prawarshana Unit 02 Networking


18
Acknowledgement

The timely and effective completion of the book would not have been possible without the
assistance and support of many people. I'd want to use this occasion to express my gratitude
to everyone who assisted me in some way throughout this crucial project, whether directly
or indirectly. First of all, I wish to express my sincere gratitude and due respect to my
Mr. OSHADA LOKUHETTI lectures in department of Computing Esoft Metro Campus
Matara. I give him a great heartfelt thanks for his invaluable advice, constant
encouragement, and positive support, all of which greatly aided me during my time at work.
I'd want to thank him for always taking an active interest in my questions and making useful
advice.

H.P.D.Mandara Prawarshan

H.P.D.Mandara Prawarshana 19 Unit 02 Networking


CONTENTS

Acknowledgement ..................................................................................................................19

Learning Outcomes:01 .......................................................................................................... 27

1.1Valuation of current network ( Syntax Solutions company) ...................................... 27


1.2 Peer to peer network .................................................................................................. 27
1.3 Client server network ............................................................................................29
1.2 Network types ............................................................................................................ 30
1.2.5 CAN (Campus Area Network) ............................................................................... 38
1.2.6 VPN (Virtual area network) ....................................................................................39
1.3 Differences between these network (PAN , LAN , MAN , WAN ) .......................... 42
1.4 Network standards ..................................................................................................... 43
1.5 Network Models ........................................................................................................ 46
1.6 ISO OSI model ...........................................................................................................46
1.7 TCP/IP mode ..............................................................................................................48
1.8 Differences between OSI and TCP/IP models ...........................................................49
1.9 Network Protocol .......................................................................................................50
1.10 Differences between these network protocol (TCP/IP/UDP) .................................. 53
1.11 Differences between these network protocol (SMTP/FTP/HTTP/Telnet) .............. 54
1.12 Network topology ................................................................................................... 55
1.30 Physical topology ....................................................................................................55
1.14 Logical Topology .....................................................................................................61
1.15 Ethernet ....................................................................................................................62
1.16 Virtual LAN (VLAN) .............................................................................................. 62
1.17 Token Ring .............................................................................................................. 62

Learning Outcomes:02 .......................................................................................................... 63

2.1 Networking Devices .................................................................................................. 63


2.2 Network Transmission Media ....................................................................................72
2.3 Servers Types .............................................................................................................75
2.4 Selecting the best server brand ................................................................................. 78

H.P.D.Mandara Prawarshana 20 Unit 02 Networking


2.5 Choose the best file server – ...................................................................................... 83
2.6 Networking software ..................................................................................................84
2.6.2 Difference between SDN and NFV ........................................................................ 85
2.6 Server software .......................................................................................................... 87
2.7 Inter-dependence of workstation hardware with relevant networking software. .......91

Learning Outcomes:03 .......................................................................................................... 92

3.1 Creating a network model for SYNTAX SOLUTIONS ............................................92


3.2 Network Design Plan (EDRAW MAX ) ................................................................... 93
3.3 VLAN and IP SUBNETTING ...................................................................................94
3.4 IP addresses table .......................................................................................................95
3.5 Devices and cable used to build syntax solution network ........................................ 96
3.6 Feedbacks for the design test ..................................................................................... 99
3.7 Creating a network with CISCO packet tracer and router configuration ................ 107
3.10 Introducing a DHCP server and installing it ..........................................................121
3.10.2 Configure DHCP Server ..................................................................................... 126
3.11 Maintenance schedule for SYNTEX SOLUTION networked system. ................. 130

Learning Outcomes:04 ........................................................................................................ 131

4.1Network design for syntax solution company .......................................................... 131


4.2 Network system check (TEST CASE) ....................................................................132
....................................................................................................................................... 134
4.3 Future enhancements for the networked system ......................................................142

Referents ............................................................................................................................... 143

Figure 1 -( peer to peer)(en.wikipedia.org) ..................................................................... 27


Figure 2 (clint server network)( en.wikipedia.org) ......................................................... 29
Figure 3 – (Local area network) (minsecu , 2021) .......................................................... 31
Figure 4 : (Metropolitan area network )(quora .com , 2020) ........................................ 32

H.P.D.Mandara Prawarshana 21 Unit 02 Networking


Figure 5 - (Wide Area Network) (minsecu ,2021) ............................................................34
Figure 6 –(Personal Area Network (minsecu, 2021) .......................................................36
Figure 7 –(campus area network)( www.itrelease.com 2018) ....................................... 38
Figure 8 - (virtual area network|)(wikipedia.org) ............................................................39
Figure 9 - (storage area network)(ssla.co.uk/storage) .................................................... 40
Figure 10 - Network models(tutorialspoint.com ,2016) .................................................43
Figure 11 - Ethernet cable(techsmartest.com,2011 .......................................................44
Figure 12 - IEEE 802 standards https://network-byte.com/ieee-standards/ .................45
Figure 14 - Transmission control protocol (/www.ionos.com/2020) .............................. 50
Figure 15 - - Internet protocol (https://www.cloudflare.com/learning/2020) .............. 50
Figure 16 - User datagram protocol (www.cloudflare.com/2020) .................................51
Figure 17 - Simple mail transport protocol (www.educba.com/2020) .......................... 51
Figure 18 – (File transfer protocol) (cyberhoot.com/2020) ........................................... 52
Figure 19 - -( Hyper text transfer protocol )(researchhubs.com/2020) ......................... 52
Figure 20 -(Telnet )(www.ssh.com /2020) ......................................................................52
Figure 21 - :( Bus Topology) (w3 School, 2020) .............................................................. 55
Figure 22 - : (Star Topology) (w3 School, 202 .................................................................56
Figure 23 - : (Ring Topology) (w3 School, 2020) ............................................................. 57
Figure 24 - :( Tree Topology) (w3 School, 2020) .............................................................58
Figure 25 - : (Mesh Topology )(w3 School, 2020) ........................................................... 59
Figure 26 - : (Hybrid Topology) (w3 School, 2020) ......................................................... 60
Figure 27 - CISCO Switch (study CCNS.com) ................................................................... 63
Figure 28 (- router) (study CCNS.com) ............................................................................64
Figure 29 (- The hub)(study CCNS.com) .........................................................................65
Figure 30 - - the firewall(study CCNS.com) .....................................................................66
Figure 31 - Where the firewall should be installed(study CCNS.com) ............................67
Figure 32 - Bridge(study CCNS.com) ................................................................................68
Figure 33 - Anti-viruses software (driver easy.com/2019) ............................................. 71
Figure 34 - - UTP cable(https://www.fiberoptics4sale.com/) ......................................... 72

H.P.D.Mandara Prawarshana 22 Unit 02 Networking


Figure 35 --STP cable (https://www.fiberoptics4sale.com/) ..........................................73
Figure 36 -coaxial cable (https://www.fiberoptics4sale.com/) .......................................73
Figure 37 - - Fiber optical(https://www.fiberoptics4sale.com/) .................................... 73
Figure 38 - - DELL EMC(https://www.storagereview.com/) ...........................................78
Figure 39 ( CISCO file serve)r(https://www.cisco.com/) ................................................. 80
Figure 40 - -ORACLE Server(oracle /server.com) .............................................................81
Figure 41 - - HP Pro-Liant Server(https://www.itinstock.com/) .....................................82
Figure 42 -( cisco IOS)(.cisco.com) ................................................................................86
Figure 43 - web server software (www.smart/home/beginner.com) ............................88
Figure 44 - Application server software( (www.smart/home/beginner.com) ............... 88
Figure 45 - database server software ((unika infocom.com/2020) ................................89
Figure 46 - file server software (turboFuture.com/2020 .............................................. 90
Figure 47 - cloud server software(unika infocom.com/2020) ........................................ 91
Figure 48 - (EDRAW MAX PALN) ..................................................................................... 93
Figure 49 - The CISCO switch (www.router-switch.com/2020) ......................................96
Figure 50 - CISCO 1841 router (www.router-cisco 1841.com/2020 .............................. 97
Figure 51 - HP Elite One 800 computer ( desertcart.lk) .................................................98
Figure 52 - HP Laser Jet Pro printer (printerFor you.com) ............................................. 98
Figure 53 - add port (the author/2022) ........................................................................ 108
Figure 54 - router connecting (the author) ................................................................... 108
Figure 55 - cable (the author) ....................................................................................... 108
Figure 56 - click CLU (the author) ................................................................................. 109
Figure 57 - code(the author/2022) ............................................................................... 110
Figure 58 - serial port configuration(the author/2022) .................................................111
Figure 59 - configuration fast ethernet(the author/2022) ............................................ 112
Figure 60 - DHCP Configuration(the author/2022 .........................................................113
Figure 61 - DHCP check(the author/2022) ....................................................................114
Figure 62 - VLAN Configure(the author/2022) ............................................................. 115
Figure 63 - configure trunk(the author/2022) ..............................................................116

H.P.D.Mandara Prawarshana 23 Unit 02 Networking


Figure 64 - dekstop(the author/2022) ...........................................................................117
Figure 65 - click the IP configuration(the author/2022) ...............................................117
Figure 66 - customer care(the author/2022) ................................................................118
Figure 67 - Developers(the author/2022) .....................................................................119
Figure 68 - server room(the author/2022) .................................................................... 120
Figure 69 –(DHCP server)(network1.net) ..................................................................... 121
Figure 70 - (step 01)(activedirectorypro.com) ..............................................................121
Figure 71 -( step 2)(activedirectorypro.co .................................................................... 122
Figure 72 - Click on the next button ............................................................................. 123
Figure 73 - step 3 ........................................................................................................... 123
Figure 74 - STEP 4 ..........................................................................................................124
Figure 75 - step 5 ........................................................................................................... 124
Figure 76 - step 6 .......................................................................................................... 125
Figure 77 - step7 ........................................................................................................... 125
Figure 78 - final step ..................................................................................................... 126
Figure 79 - (Server Manager)(activedirectorypro.com) ................................................127
Figure 80 -( Post-Install configuration wizard|))(activedirectorypro.com) .................. 128
Figure 81 - click close button(activedirectorypro.com) ................................................ 128
Figure 82 - click the DHCP server(activedirectorypro.com) .......................................... 129
Figure 83 - DHCP server (activedirectorypro.com) ....................................................... 129
Figure 84 - network design (the author/2022) ............................................................. 131
Figure 85 -ping 192.168.10.147(the author/2022) .......................................................133
Figure 86 ping 192.168.10.65(the author/2022) ..........................................................134
Figure 87 -ping 192.168.10.130(the author/2022) .......................................................135
Figure 88 - ping 192.168.10.99(the author/2022) ........................................................136
Figure 89 - ping 192.168.10.163(the author/2022) ......................................................137
Figure 90 ping 192.168.10.174(the author/2022) ........................................................138
Figure 91 -ping 192.168.10.10(the author/2022) .........................................................139
Figure 92 -ping 10.254.1.1(the aythor/2022) ............................................................... 140

H.P.D.Mandara Prawarshana 24 Unit 02 Networking


H.P.D.Mandara Prawarshana 25 Unit 02 Networking
Table 1 - Differences between these network ............................................................... 42
Table 2 - Differences between OSI and TCP/IP models .................................................. 49
Table 3 - Differences between these network protocol .................................................53
Table 4 - Differences between these network protocol .................................................54
Table 5 - differences between a switch and hub ............................................................69
Table 6 - - differences between a router and bridge .......................................................70
Table 7 Difference between SDN and NFV ..................................................................... 85
Table 8 Maintenance schedule FORM .......................................................................... 130
Table 9 -sample test case(the author/2022) ................................................................. 132
Table 10 - test case 01(the author/2022) ..................................................................... 132
Table 11 - test case 02(the author/2022) ..................................................................... 133
Table 12 -test case 02(the author/2022) ..................................................................... 134
Table 13 - sale and marketing(the author/2022) ......................................................... 135
Table 14 - legal(the author/2022) .................................................................................136
Table 15 - network team(the author/2022) ................................................................. 137
Table 16 - developer (the author/2022) .......................................................................138
Table 17 - server room/2022) .......................................................................................139

H.P.D.Mandara Prawarshana 26 Unit 02 Networking


Learning Outcomes:01

1.1Valuation of current network ( Syntax Solutions company)


Syntax Solutions is a commercial company in Colombo. A subsidiary of this company is
being set up in MATARA .For this purpose 150 employees are prepared to be employed and
this company is prepared to become a company with the latest facilities with the latest
facilities in MATARA.

For this purpose ,the manager has given permission to select a suitable network types ,
connect it to each other and create a network thinking about the security of the information
exchanged by the network.

All departments here must be separated by a unique subnet and communicate with each other
only for a specific reason. In addition, the use of WIFI to connect to the internet and network
monitoring and troubleshooting procedures must be enabled for all of these networks. The
company’s network should be created as the new network consultant here. This should be
created by the computer using the IP address provided.

The IP address is 192.168.10.0/24 and should be used for departments other than the client
room. That is, the creation of a computer network is started below.

1.2 Peer to peer network


Peer-to-peer networking is a form of computer networking in which all machines share the
same processing burden. Client-Server Networking, in which certain devices are responsible
for supplying or "Serving" data while other devices utilise or function as "clients" of those
servers, is different from Peer-To-Peer Networking (also known as Peer Networking).

Figure 1-( peer to peer)(en.wikipedia.org)

H.P.D.Mandara Prawarshana 27 Unit 02 Networking


Benefits

1. Easy to setup
Generally, easy to setup a peer to peer network requiring no advanced technology
knowledge. Also since all connected computers can manage by users.

2. Less expensive to install


The setup cost is reduced due to the fact that there is no central configuration.
Maintaining peer to peer network also is relatively inexpensive.

3. Does not require a server


In this type networking, each computer act as a server and workstation, so no need to
use a special server.

4. Moderate skill administer can maintenance


no need any specialized network administrator because users can manage system.

Constraints

1. Very low levels of security supported


Security for individual data are comparatively less in peer to peer networking. There
is no high security other than assigning permissions.

2. More time consuming to maintain (individually)


If system has any error, will be taken more time to adjust it because each computer
have to check one by one.

3. Backup recovery
This is the main drawback of this network system type. Backup is difficult in P2P
networks, since the data is not centralized. Data is saved on different systems.

4. Can share illegal content


In the present world, many people use P2P networks for transfer copyrighted content
like films and songs by designing torrents.

H.P.D.Mandara Prawarshana 28 Unit 02 Networking


1.3 Client server network
Larger networks will benefit from this network. A central computer or server serves as a
storage area for network data and applications. It operates on the basis of a request and
answer system.

Figure 2 (clint server network)( en.wikipedia.org)

Benefits

1. Less time to maintain (Only sever)

It is simple to handle files because they are all kept on a single server. If system fail,
will be checked only server and it takes less time.

2. High level security supported

A client-server network's data is successfully secured due to its centralized


architecture. Only authorized users have access to the server.

3. Backup is controlled by centrally

In the client server network, all the backup options are handled by the main server.
This is very useful for taking data for long time with safely.

Constraints

1. More expensive to install

For maintain and setup it takes high cost because client server networks need
powerful tools. Also high functional severs prices are high.

2. Traffic congestion

. If many clients make request for same server, as a result of that connection will be
slow.

H.P.D.Mandara Prawarshana 29 Unit 02 Networking


1.2 Network types
A computer network is when two or more computers connect to each other and exchange
data and information. There are main types of networks that can be identified for this ,LAN ,
MAN and WAN. This is different from each other and the areas covered by the networks
are also different. Can establish a computer networks connection using cable or wireless
media. Each network includes hardware and software that connects computers and tools.

There are different kinds of network types too they are as follows. That is all the network
types are introduced separately below.

 LAN ( local area network)

 MAN (metropolitan area network)

 WAN (wide area network )

 PAN (personal area network)

 SAN (storage area networks)

 CAN (controller area network)

 VPN (virtual area networks)

1.2.1 LAN ( local area network)

A LAN ( local area network ) can be abbreviated as a network that spreads ( spreads out)
between a building or between two or three building to share information and resources.
This means that the network is only fora short distance and can be connected to the WAN
( wide area network ) network using a router ( WIFI ) and exchange information and
outsiders.

H.P.D.Mandara Prawarshana 30 Unit 02 Networking


Figure 3 – (Local area network) (minsecu , 2021)

Benefits

1. This can be created Wireless or with wires

this network can be designed with or without wires , but it does not cost much
for one type .that is ,wireless design.

2. It is cheaper to install.

Compared to other networks it cost less to create and is very profitable.

3. Resources can be shared .for example Hard disk , DVD drives and Printers.

Resources can be shared on this network which means that one printer can be
used by everyone on the network.

4. Easy of communication

LAN users can easily exchange data and information. The data is stored on the
server so you can connect to it at any time and retrieve data and information.

5. Safety

that is all the information here is storage on a separate server which increases
the security of the data and information.

H.P.D.Mandara Prawarshana 31 Unit 02 Networking


Constraints

1. Limited area covers

The LAN network is limited to a small area and can only exchange data and
information for an office , a single building or a group of surrounding building.

2. Data is not confidential

Here all users can view and check the data files , thus reducing the security of the
data .

3. Maintenance costs more

This requires a user for reasons such as software installation and cable breakage.

4. LAN Set-up is expensive

The software used to set up the LAN is very expensive for the various
communication devices such as server , hub, switch, router, cable.

1.2.2 MAN (metropolitan area network)

That is , this is a network that covers an urban area. This is a single big city , multi city and
large area with multiple fabrics . Most people use Fibre optic cable. Used for this purpose , it
speed up the movement of data and information. This network is smaller than the WAN
network and larger than the LAN network . A MAN network is created from large collection
of LAN networks.

The image below shows a MAN network.

Figure 4 : (Metropolitan area network )(quora .com , 2020)

H.P.D.Mandara Prawarshana 32 Unit 02 Networking


Benefits

1. No too expensive

Network connection costs less. That is , it joins the LAN network to create a
MAN network. Here the MAN network combine to from a WAN network

2. Having a local e-mail

Local mail can be created within this network. It also has the ability to send
information securely through it .

3. That of speed

The number of people connecting to the MAN is small so you can see a very
good speed here.

4. Internet sharing

Here you can get the internet connection related to the WAN network. This
allows data and information to be shared easily.

5. Data security

As it extends within the city limits , the security of the data here is increased. The
reason is that the number of people involved in this is low .

Constraints

1. Difficulty managing

LAN network combine to create a MAN network. The large number of LAN
network here make it difficult to manage the MAN network.

2. Need to set up a technical staff

You need to have a good technical staff to build a MAN. It will cost extra.

3. There is an additional cost of the wires.

It takes a large amount of wire to connect all the LAN networks together.

4. Hacker attacks.

Hacker warrants can easily enter this network. Data can be leaked for this reason.

H.P.D.Mandara Prawarshana 33 Unit 02 Networking


1.2.3 WAN (wide area network )

This is the largest of these networks. This network can be abbreviated as a computer network
spread across the world . This network allows you to easily communicate and exchange
information with people anywhere in the world. The internet is a prime example of this . This
network is not limited to one location but extends over a large geographical area via
telephone lines , Fibre optic cable , or satellite connections.

Figure 5- (Wide Area Network) (minsecu ,2021)

Benefits

1. Geographical area

The WAN network covers a large geographical area so data can be easily
exchanged.

2. Massage exchange

You can exchange message fast in a WAN network. For example ,exchanging
information through web applications such as Face book and WhatsApp

H.P.D.Mandara Prawarshana 34 Unit 02 Networking


3. Update information and files

Daily updated information is available through this network.

4. Software and resources

For example , you can get an extra storage on a computer . you can use the free
software .

5. For global business

In today society all businesses are connected to the internet so it is easy to do


business.

Constraints

1. Security issue

Security issues arise when all technological devices come together and exchange
information. This means that the WAN network has more security issues compared to the
LAN and MAC network.

2. Need firewall and Anti-virus software

Hacker can be involved in data and information exchange. Anti-virus software


and firewall should be used to prevent this.

3. High set-up cost

You will need a router and a switch to connect to this network . therefore it costs
more to install this.

4. Troubleshooting problems

The network cover to large area so it is a bit difficult to solve the problem that
occur there

H.P.D.Mandara Prawarshana 35 Unit 02 Networking


1.2.4 PAN (personal area network)

This network is usually set up by a single person within a room or 10 Meters. This lasts for
a short period of time and allows you to easily connect to the network and exchange
information. This network can be create using laptops and mobile phones.

Figure 6 –(Personal Area Network (minsecu, 2021)

The are two types of personal area network

i. Wired personal area network

This network was created using cables such as USB and RJ45

ii. Wireless personal network

These network were create using wireless technology such as WIFI and
BLUETOOTH

H.P.D.Mandara Prawarshana 36 Unit 02 Networking


Benefits

1. Low cost

It cost less. That is, the cost of the wire is lower because the network is created in
a shorted distance.

2. Can be easily created

This can be easily created as it creates a small area.

3. This is used in many places

This network is used in many places. That is it is used in school classroom ,


conference halls and meeting.

4. Is safe

This security of this network is enhanced as it is less likely to cause interruptions.

Constraints

1. Slow data transfer

The data and information here are slow moving . for example a picture via
BLUETOOTH

2. PAN can be operated in less range of area

This covers a small area so fewer people area involved.

3. Infra-red signal travel only in a straight line

This run along a straight line . if it encounters an interruption the network will
crash.

4. Can only be used for personal area

Because it covers a small area, data and information are exchanged over a small
area.

H.P.D.Mandara Prawarshana 37 Unit 02 Networking


1.2.5 CAN (Campus Area Network)
This is a micro controller- based serial bus network that connect devices sensors and
actuators In a system or sub system for real time control.+

Figure 7 –(campus area network)( www.itrelease.com 2018)

Benefits

1. Flexible data rate


It supports a data rate of 1Mbps. The CAN bus will have eight times the bandwidth of
a regular CAN bus
2. Cost
Because of the less complicated wiring and usage of the flash programming it saves
money and time in the long run.
3. Working perfectly
It operate well in a variety of electrical situations.

Constraints

1. Maintain issues
It necessitates higher software development and maintenance costs.

2. Less area coverage


It can accommodate a maximum length of 40 meters.

H.P.D.Mandara Prawarshana 38 Unit 02 Networking


1.2.6 VPN (Virtual area network)

Virtual Private Network (VPN) is a link that creates a private network over a public network
system. VPN is a developing service used by current advancements. In reality, many sectors
are increasingly using VPN to help their businesses grow. Even if VPN has a lot of
advantages for users, it also has a lot of disadvantages.

Figure 8- (virtual area network|)(wikipedia.org)

Benefits

1. Provide anonymity
Almost all websites may see your true IP address, which you are using. VPN allows
you to hide your true IP address and encrypt your data.

2. Protect from attacks


Users can use a VPN service to protect themselves from such attacks. A VPN
connection encrypts your connection in such a way that it appears to attackers as
gibberish.

3. Can avoid restrictions


Content providers use geo-restrictions to ban websites for users in certain geographic
locations. Because a VPN masks your real IP address with a fake one, these websites
may believe you are in the correct location.

4. Improve gaming experience


Many users are unaware that a virtual private network might genuinely improve your
online gaming experience.

H.P.D.Mandara Prawarshana 39 Unit 02 Networking


Constraints

1. Slow speed
When you use a VPN, you may notice a drop-in speed. Because of the data encryption,
this is the case.

2. Cost
However, there are plenty free VPN services accessible. Many of them do not provide
the user with the whole protection they require. For complete safety, will have to buy
a paid VPN service.

3. Legality issues
In the present world, some countries consider private networks including VPN are n
illegal.

1.2.7 SAN (Storage area network)

SAN is a technology that allows data to be stored within a network. Data is sent between
servers and storage devices since all files and apps are stored locally on the disks. Although
SAN has become a popular choice among businesses, it is not without flaws.

Figure 9- (storage area network)(ssla.co.uk/storage)

H.P.D.Mandara Prawarshana 40 Unit 02 Networking


Benefits

1. High performance

Because fiber optics technology is used in SAN, it provides extremely high data
transfer speeds.

2. High security

On SAN, a variety of security methods are available to ensure that your data is
safe.

3. Scalability

SAN also provides far more scalability to meet the demands of the organization.
Users can increase the number of disks if they require extra storage.

Constraints

1. High cost

A large amount of money is required to purchase and operate a Storage Area


Network. This is mostly owing to the adoption of fiber-optic technology.

2. Maintain is complex

A SAN that is used to manage a large number of servers. Using SAN to maintain a
small number of servers is a waste of money.

3. Privacy issues

Even if SAN employs appropriate security measures, data loss is still a risk. In a
shared environment, a Storage Area Network is employed.

H.P.D.Mandara Prawarshana 41 Unit 02 Networking


1.3 Differences between these network (PAN , LAN , MAN , WAN )

PAN (personal LAN ( local area MAN (metropolitan WAN (wide area
area network) network) area network) network )

Cover a small Cover an area Cover an area larger This network is


area larger than PAN than LAN spread all over the
world

Fewer people More people can More people can A large group can
can join join than PAN join than LAN join

Network It costs a lot more It costs a lot more This costs a lot of
design costs than a PAN than a LAN money to design
less

These can be This network is This network is This network is


wireless or designed with wires designed with wires designed with wires
wired

Table 1 - Differences between these network

H.P.D.Mandara Prawarshana 42 Unit 02 Networking


1.4 Network standards
Document prepared to provide technical requirements, specification and guidelines. That is
these standards were set to ensure that the networking control device software and hardware
were appropriate for their intended purpose. This ensures quality , safety and efficiency. In a
nutshell, it is a collection of guidelines.. The following are the organizations that create
networking standards

American national standards institute (ANSI)

Institute of electrical and electronics engineers (IEEE)

International organizations for standardization (IOS)

Internet engineering task force (IETF)

World wide web consortium (W3C)

Network models are how network communicate according to network standards. Here the
models show how different networks communicate with each other .there are two model.
ISO OSI model and TCP/IP model . currently TCP/IP is used

.
IOS OSI TCP/IPMODE

SMTP/FTP

Format data, encryption

Start and stop session

TCP/UDP/Port number

IP Address /routers

MAC Address /switches

Cable/hub /network interface


cade
Figure 10- Network models(tutorialspoint.com ,2016)

H.P.D.Mandara Prawarshana 43 Unit 02 Networking


1.4.1 Key IEEE Ethernet standards that can be used in LAN and WLAN
design
There are many Ethernet standards available today. This is a family of IEEE standards from
the institute of electronics for LAN , MAN and PAN. It has parameters from 802.1 to 82.12.
there are a number of networking standards set out to ensure that this is compatible with
networking technology. That is rules have been developed for the manufacture of devices
such as grid cables and grid devices. Below is the Ethernet cable

IEEE 802 is a set of networking standards that covers the physical and data-link layer
specifications for Ethernet and wireless technologies. Essentially,

Assists in the compliance of IEEE 802 standards with Internet services and technology.

Set of programmes that are recommended for all network devices to function together
properly.

Without these standards, equipment manufacturers will be able to design network devices
that will only function with specific PCs. Connecting systems that do not utilise the same
set of networking technologies will be more complex. Standardization protocols make it
possible to connect a variety of devices to a number of networks.

Figure 11 - Ethernet cable(techsmartest.com,2011

H.P.D.Mandara Prawarshana 44 Unit 02 Networking


1.4.2 IEEE802.3ae - 2002
Gigabit Ethernet transmits Ethernet frames at a speed of 10GB per second. This is specified
in the IEEE802.3ae-2002 standard. This consists of eight small cables in a single cable. This
cable is used to create a network and connect networks to each other

 802.11ac WIFI adapter

 802.11b Router

 802.11e

 802.11c and goes up to 802.1X

IEEE 802.6

This was created by one of the oldest standards and will be controlled by ANSI for the
MAN network. It defines a high-speed shared medium access protocol to be used over a twin
counter flowing. Unidirectional bus sub network.

Figure 12 - IEEE 802 standards https://network-byte.com/ieee-standards/

H.P.D.Mandara Prawarshana 45 Unit 02 Networking


1.5 Network Models
Simply put , this is how data and information are transferred from one computer to another..
This happens in two ways.
 ISO OSI model

 TCP/IP mode

1.6 ISO OSI model


This model consists of seven layers. The functionality of this layer is to learn how the
hardware and software works. These 7 layers work in sequence when sending a message
and this has somewhat reduced usage. These 7 layers are given below.

APPLICATION (7)

PRESENTATION (6)

SESSION (5)

TRANSPORT (4)

NETWORK (3)

DATA LINK (2) Figure 13 - OSI model

PHYSICAL (1)

1.6.1 PHYSICAL Layer (cable ,network interface card and hub)


This layer is the first and lowest layer , works closely with the physical connection
between the devices. and covert the code in to a machine language data and information are
transmitted over cables. For example typing a number with the keyboard. On one computer
this layer is the bottom layer and on the other computer it is the top layer. Machine language
is a code formed by 1,0 . for example 1010111100 is the machine code.

1.6.2 DATA LINK Layer (MAC Address /switches)

This is the OSI model's second layer.. This layer packs in to the data frames and corrects any
errors that the physical layer many have. It also adds MAC addresses to these data packets.

H.P.D.Mandara Prawarshana 46 Unit 02 Networking


1.6.3 NETWORK Layer (IP Address /routers)
Frames are retrieved from the data link layer and delivered to the desired destination
based on the addresses contained in the frames. Here the IP address is used to find the
destination. Here IP Addresses are also assigned. The router assigns the relevant IP address
data to the packet.

1.6.4 TRANSPORT Layer (TCP/UDP/Port number)


The message of this layer is broken down in to pieces and TCP,UDP and Port Number
are added to them. It also handles data packet distribution and troubleshooting. Here is the
TCP and transmission control protocol.

1.6.5 SESSION Layer (Start and stop session)


It controls conversations between different computers and establishes a session or
connection between machines. This is the beginning of building a connection between two
devices and sending a massage.

1.6.6 PRESENTATION Layer (Format data, encryption)

This is also sometimes referred to as the syntax layer. Once the massage has been
processed this layer adjusts it so that it can go through the network. Allows the received
message to be converted so that it cannot be retrieved by a third party.

1.6.7 APPLICATION Layer (SMTP/FTP)

This is also know as the first layer. This layer processes the data and allows the
application layer and the end user to interact directly with the software application. All
communications here are managed by an application layer, and the application layer
determines whether there are adequate network resources.

Here one computer is the layer that prepares to send the message and the other
computer display the message.

H.P.D.Mandara Prawarshana 47 Unit 02 Networking


1.7 TCP/IP mode
This consists of four layers. Developed by the department of defence (DOD) in the 1960s and
is based on a standard protocol. The TCP/IP is limited to four layers compared to the seven
layers in the OSI/IOS model. The TCP/IP model is faster and more reliable. These fore layers
are described separately below.

1.7.1 APPLICATION LAYERS (FTP,TELENT,TFTP,SMTP,DNS,SNMP)

This layer is the top level layer and also interacts with application programs. The
application layer is the last layer for the user. This layer also helps to identify communication
partners , retrieve resources and synchronize resources. The application layer ,for example
includes application such as file transfer , remote access and email.

1.7.2 TRANSPORT LAYERS (TCP,UDP)

The transport layer is used to transmit data from a mechanical process to a destination
system process. It also serves as single and multiple networks. The layer also performs error
control, transport control and reliable control. These layer transmit the data in order and send
the next data if no data error occurs.

1.7.3 INTERNET LAYERS (ICMP,IP)

This layer is the second layer of the TCP/IP format. The internet layer divides data
into packets and also find the destination. IP addresses are assigned to data packets to find the
destination. It also gives the identity of the data packets.

1.7.4 NETWORK ACCESS LAYERS

Network access layers are the first layer of the TCP/TP format. This layers assigns
MAC addresses to the data. After the MAC addresses are entered, the data packets are
translated into a machine language (1,0) and the data is transmitted. Cable types are also used
to transmit data. (coaxial,optical,coaxial Fiber

H.P.D.Mandara Prawarshana 48 Unit 02 Networking


1.8 Differences between OSI and TCP/IP models

OSI MODEL TCP/IP MODEL

It is developed by OSI (international It is developed by ARPANET (advanced


standard organization). research project agency network)

OSI layers have seven layers TCP/IP has four layers


In OSI model, transport layer provides Protocols cannot be replaced easily in
assurance delivery of packets. TCP/IP model.
OSI developed model then protocol. TCP/IP model network layer only
provides connection less services.

OSI follows a vertical approach TCP/IP follows a horizontal approach

The OSI header must be at least 5 bytes Minimum header size is 20 bytes.
long.
Table 2 - Differences between OSI and TCP/IP models

CONCLUSIONS
Listed above are all the details about the IEEE Ethanet standards used in LAN design and
how to choose a network model as Syntax Solutions new network advisor. It is best for this
company to use a LAN (local area network) network. The design of the LAN network and the
relevant standards were discussed. The TCP/IP format is more suitable than the OSI format
when selecting network models.

Reason for choose a TCP/IP model

This model is faster than the OSI model. Because what happens in seven layers in the OSI
model happens in four layers in the TCP/IP layers.

Once a company has selected good network types, it must also select a topology relevant to
then network. For then , the following topology is explained.

H.P.D.Mandara Prawarshana 49 Unit 02 Networking


1.9 Network Protocol
A network protocol is a collection of rules that govern how data is exchanged between
devices connected to the same network.. Essentially it allows connected devices to
communicate device to communicate with each other, regardless of any differences in their
internal processes structure or design. The are several basic protocols for moving data across
a network. That is ,

 Transmission control protocol (TCP)

TCP is a public dialogue protocol used to communicant over a network. It sends any message
from the supply to the relevant location divides the data packets when sending the data and
reassemble the data packets at the end point.

Figure 14- Transmission control protocol (/www.ionos.com/2020)

 Internet protocol (IP)

The Internet Protocol (IP) is a collection of rules for routing and addressing data packets so
that they can transit across networks and reach their intended destination. Data is split down
into smaller bits known as packets as it travels over the Internet.. Each packet has IP
information attached to it, which helps routers send packets to the correct location. Every
device or domain that connects to the Internet is given an IP address, and data arrives where it
is needed as packets are routed to the IP address assigned to them.

Figure 15 - - Internet protocol (https://www.cloudflare.com/learning/2020)

H.P.D.Mandara Prawarshana 50 Unit 02 Networking


 User datagram protocol (UDP)

The User Datagram Protocol is a core part of the Internet Protocol suite in computer
networking. Computer programs can use UDP to send messages to other hosts on the Internet
Protocol network, which are referred to as data grams in this scenario. Setting up
communication channels or data paths does not necessitate communication.

Figure 16 - User datagram protocol (www.cloudflare.com/2020)

 Simple mail transport protocol(SMTP)

Email is gradually establishing itself as one of the most useful online services. SMTP is the
most widely used method for sending email over the internet from one user to another..
SMTP is a push protocol that is used to send emails, whereas POP (post office protocol) or
IMAP (internet message access protocol) is used to retrieve emails at the recipient's end.

Figure 17 - Simple mail transport protocol (www.educba.com/2020)

 File transfer protocol(FTP)

Transferring data from one machine to another is quite simple and uncomplicated, although it
can occasionally cause issues. Two systems, for example, may have distinct file conventions.
Text and data may be represented differently in the two systems. The directory structures of
the two systems may differ. The FTP protocol resolves these concerns by establishing two

H.P.D.Mandara Prawarshana 51 Unit 02 Networking


connections between hosts.. One link is utilized for data transfer, while the other is used for
control.

Figure 18 – (File transfer protocol) (cyberhoot.com/2020)

 Hyper text transfer protocol(HTTP)

Hypertext Transfer Protocol Secure is an enhancement to the Hypertext Transfer Protocol. It


is extensively used on the Internet and is utilized for secure computer network
communication.Transport layer security, or, preferably, the security layer encrypts the
communication protocol in HTTPS.

Figure 19 - -( Hyper text transfer protocol )(researchhubs.com/2020)

 TELNET

Telnet is an application protocol for bidirectional interactive text-oriented communication


over the Internet or a local area network using a virtual terminal connection.

Figure 20 -(Telnet )(www.ssh.com /2020)

H.P.D.Mandara Prawarshana 52 Unit 02 Networking


1.10 Differences between these network protocol (TCP/IP/UDP)

TCP IP UDP

It's an industry–standard It supports many routing UDP uses checksums on all


paradigm for resolving real– protocols. packets to identify errors.
world networking problems.

It's interoperable, meaning It operates independently of When only a single packet of


indicates it can interact the operating system. data needs to be transferred
across networking sites. between the hosts, UDP
might be used.

It's a set of open protocols. It can be operated UDP communication can be


independently. more efficient than a data
stream with assured delivery.

It is a scalable, client-server It automatically breaks up When UDP packets are


architecture data into a packet received, they are
uncontrolled, including block
boundaries.

It assigns AN scientific It helps to establish or Because the end hosts do not


discipline address to every establish a connection store connection state data, a
laptop on the network, between many types of server can support more UDP
therefore creating every computers, PCs and other clients than TCP clients.
device to be recognizable devices.
over the network.
Table 3 - Differences between these network protocol

H.P.D.Mandara Prawarshana 53 Unit 02 Networking


1.11 Differences between these network protocol
(SMTP/FTP/HTTP/Telnet)

SMTP FTP HTTP TELNET

The message explains Allows for the It is capable of


No encryption layer
why the email was transfer of numerous sending and receiving
not sent when it fails. files and directories. data.

Greater security. Allows multiple files Errors are notified It assists in the
and folders to be without the need to administration of the
transferred. end the TCP network element
connection.

Connects to any Allows you to Because it has fewer It has a user


system schedule transfers TCP connections, it authentication
decreases network feature.
congestion.

Deliver ability speed The ability to add Flexibility. HTTP has Remote computers
more items to a queue for the ability to use automation test
upload or download. download extensions facilities on a shared
or plugins and basis. This saves
display the relevant money by decreasing
data whenever an the number of things
application requires you have to buy.
new capabilities.

Table 4 - Differences between these network protocol

H.P.D.Mandara Prawarshana 54 Unit 02 Networking


1.12 Network topology
Network topology is a geometric structure in witch two or more computers are connected to
each other. This is divided in to two part.

1. Physical topology

2. Logical topology

1.30 Physical topology


Physical topology is a set of two or more computers connected to each other. This is
classified as RING , MESH, TREE, BUS ,START and HYBRID Topology.

1.13.1 Bus Topology


Bus topology is a system in witch more then two computers are connected on a single cable
and data is exchanged. The backboard cable can be identified as the main cable here.

Figure 21 - :( Bus Topology) (w3 School, 2020)

H.P.D.Mandara Prawarshana 55 Unit 02 Networking


Advantages

 It does not cost much to create this.

 Assets can be used in general (the printer can be used in general)

 Can be easily maintained

 This cost less wire

Disadvantages

 The main cable breaks the entire network will be down.

 Only one computer can exchange data at a time.

 Unable to connect large number of computers.

 Data conflicts occur.(only one data cab be submitted at a time)

1.13.2 Start Topology


This is a start shaped network. Start topology is Cantered on one switch and exchanges data.
Connects to a computer switch and exchanges data.

Figure 22 - : (Star Topology) (w3 School, 202

H.P.D.Mandara Prawarshana 56 Unit 02 Networking


Advantages

 Data transfer speed is high

 Data is exchange by a switch or a hub

 Easy to maintain too.

 Even if one computer shuts down, the network will still work

 Can be easily created.

Disadvantages

 The number of computer depends of the number of port on the switch.

 Wires do not cost much.

 If an error occurs on the switch the network will crash

1.13.3 Ring Topology


This is a ring shaped network where data travels in the same direction. The token must be
obtained to exchange data.

Figure 23 - : (Ring Topology) (w3 School, 2020)

H.P.D.Mandara Prawarshana 57 Unit 02 Networking


Advantages

 Can be easily maintained

 It does not cost much to set up the network.

 It does not cost much for wires.

 Data is exchanged by a token

Disadvantages

 The main cable breaks the network will crash.

 Once computer once disabled, the network crashes.

 Data travel in only one direction.

 Data can only be sent to one computer at a time

1.13.4 Tree Topology

This is a tree -shaped topology network. This involves the exchange of data in to tree layer.
That is a combination of RING topology and BUS topology. The two tops combine to
create the tree tops one.

Figure 24 - :( Tree Topology) (w3 School, 2020)

H.P.D.Mandara Prawarshana 58 Unit 02 Networking


Advantages

 This is made up of two topology

 A large number of computer can be connected

 Assets can be shared

 Errors are minimized .(error can be easily identified)

Disadvantages

 It costs a lot to install

 Somewhat difficult to maintain

 The cables come at a huge cost

 If the main wire break , the network break down.

1.13.5 Mesh Topology


When two or more computers link to each other and share data, this is known as a network..
This takes the from of the mesh. All the computers here are interconnected.

Figure 25 - : (Mesh Topology )(w3 School, 2020)

H.P.D.Mandara Prawarshana 59 Unit 02 Networking


Advantages

 All the computers here are interconnected

 Errors are low

 Network crashes are minimized

 Data can be send faster

 Data can be sent to the relevant computer

Disadvantages

 It costs a lot to install

 The cables come at a huge cost

 Difficult to maintain

1.13.6 Hybrid Topology


The topology consists of tree types of topology. That is made up of a combination of ring
topology , tree topology and bus topology.

Figure 26 - : (Hybrid Topology) (w3 School, 2020)

H.P.D.Mandara Prawarshana 60 Unit 02 Networking


Advantages

 This is created by combining three topology

 Many computer can be connected.

 Assets can be used in general

 It is possible to communicate with each other and exchange information

Disadvantages

 Wires are more expensive

 It is a bit difficult to maintain

 Installation also costs more.

CONCLUSIONS

The above topology has examined all of them and explained their advantages and
disadvantages. The above gives a conclusion about the Ethernet and the model relevant to
this syntax Solutions company.

Based on that conclusion the company has decided to create a hybrid topology. Create
separate topologies for departments and link them all together. The most suitable hybrid
topology for this is.

1.14 Logical Topology

How data and information flows and signal are transmitted from one computer to another.
For example how data flow from a switch and how a switch is divided in to sections. This is
divided into three parts.

1. Ethernet

2. Virtual LAN

3. Token ring

H.P.D.Mandara Prawarshana 61 Unit 02 Networking


1.15 Ethernet
What is Ethernet mentioned above. Simply put, Ethernet is the cable used to create a network.
Ethernet is divided into two main categories. That is fast Ethernet and Giga Ethernet.
Ethernet cable requires a network interface card. The average Ethernet cable speed is
10mbps.

1.15.1 Fast Ethernet


Fast Ethernet relies on WIFI, UTP and FIBER. This is fast then Ethernet and is 100mbps here.
Launched in 1995,it was further elaborated by the IEEE 802.3c protocol, marking it the fast
Est Ethernet of its time. (IT Release/ junaid rehman/2021)

1.15.2 GIGA Ethernet


It is capable of transmitting Ethernet frames at a speed of 1Gbps. It is also widely used for
LAN network activation. This is an extension of the 10mbps and 100mbps 802.3 Ethernet
standards. It can transmit data very fast. (IT Release/ junaid rehman/2021)

1.16 Virtual LAN (VLAN)


VLAN simply means dividing a switch into two part. This also minimized the need to move
data unnecessarily. Externally it is a single network and on the inside it is divided into
sections. This will reduce the cost of installing a separate network. (IT Release/ junaid
rehman/2021)

1.17 Token Ring


A token ring could be a circuit for an area network (LAN) ,all of then area unit connected in a
very ring or star, giving one or additional tokens from host to host. A token ring is a
information frame that’s transmitted between network points.

CONCLUSIONS

When choosing an Ethernet it is better to choose GIGA Ethernet than a fast Ethernet. That
is because good speed can be seen in the data. Using the VLAN , reduces the cost of setting
up another network.

H.P.D.Mandara Prawarshana 62 Unit 02 Networking


Learning Outcomes:02

2.1 Networking Devices


Once SYNTAX SOLUTIONS has selected the appropriate network type, you need to select
the networking tools needed to create. There are various types of networking devices on the
market to create a network. Networking devices are divided in to three parts. That is
hardware devices ,end user devices and network software.

2.1.1 Hardware Devices


Hardware devices are devices that can be installed and touched outside of the network . These
accessories can be purchased at the market and are available at the variety of prices.
Equipment such as switches, router ,firewall ,hub ,bridge ,repeater and gate way are required
when designing a network. These devices are listed separately below.

1) Switch

A network switch is a device used to exchange data with one another. That is ,this devices is
used to connect devices in a network. This devices does not transfer data to multiple device
networks but to one devices. Switcher are most commonly found on LAN network. There are
many types of switches on the market today. Below is a picture of a switch.

Figure 27 - CISCO Switch (study CCNS.com)

H.P.D.Mandara Prawarshana 63 Unit 02 Networking


Features of a switch

 Speed - Data traffic congestion is reduced because a switch transmits data only to
the relevant devices. So the data is exchange fast.

 Security - Data security is enhanced as the data travels only to the relevant devices.
When moving data, the data do not collide with each other and the data is not
damaged.

 Intelligence - The intelligence of a switch increases. Find the device that sends the
data and sends the data to it.

 Number of devices that can be connected - The switch has at least four ports. You
can see the frequency of the switch form four upwards. Therefore the relevant
devices has to be purchased from the market.

2) Router

This device is used to connect two or more network. The router determines the appropriate
path for the transmission of information. Different types of routers can be found in the
market.

Figure 28 (- router) (study CCNS.com)

H.P.D.Mandara Prawarshana 64 Unit 02 Networking


Features of a switch

 Network address translations (NAT)-Monitors IP addresses of all devices


connected to the NAT router and transmits data to the respective devices.

 Connection and resource sharing - The router can easily share resources. That is,
devices as printers can be shared.

 Guest networks - Guest prevents unauthorized person from joining the network.
This increases network security.

 VPN server and client support - This helps to retain the privacy of you wireless
network connection.

3) Hub

Activates as an intermediary to establish a connection between two or more computers. The


data transfer speed is slightly lower and data is transferred to all devices. When exchange
data, the HUB also causes unnecessary congestion.

Figure 29 (- The hub)(study CCNS.com)

H.P.D.Mandara Prawarshana 65 Unit 02 Networking


Features of a hub

 Transmission mode - The transmission mode of the hub can seen as Half-duplex.

 Low intelligence - The HUB transfers data to all computers. Can’t recognize
separate computers.

 Low Speed - The hub is slow and causes unnecessary congestion. The speed is
reduced due to unnecessary congestion.

 Is active on the physical layer - The hub operates on the first layer according to the
OSI model. That is, it operates on the physical layer.

4) Firewall

Firewall is a computer network security system. The firewall is installed as a security barrier
between computer and the internet. Firewall can be installed on the computer in the form of
software as well as hardware. It provides security during data transfer between computers. A
firewall can be purchased from the market at a variety of prices.

Figure 30 - - the firewall(study CCNS.com)

H.P.D.Mandara Prawarshana 66 Unit 02 Networking


How to connect a firewall

Where the firewall should be located between a network. The model takes the shape of a wall
and can be installed as both hardware and software.

Figure 31 - Where the firewall should be installed(study CCNS.com)

Features of a firewall

 Blockage against unauthorized access - The firewall prevents unauthorized access


to the computers.

 Protection against Malware -Virus entry into the computer is prevented. That is ,it
also acts as an anti-virus software.

 Provide access only to valid data packet- The firewall prevents unauthorized data
packets from entering.

 Various protection levels- The firewall provides security to the computers at


various levels.

H.P.D.Mandara Prawarshana 67 Unit 02 Networking


5) Bridge

The device is used to connect two or more individual network together by means of a bridge.
That is, it is simply called a network controller. This device can also be bought in the market
at different prices. Below is a picture of a bridge devices.

Figure 32- Bridge(study CCNS.com)

Features of a bridge

 Networks can be connected to each other- A bridge connects two or more


networks. Adding networks can create a single network.

 Reliability - Converting a small LAN network into a single network reduces data
congestion.

 Maintenance - Individual network are easier to maintain than a small network.

 Speed - Sending data at once slows down a bit. That is, it is slower than repeaters

H.P.D.Mandara Prawarshana 68 Unit 02 Networking


Difference between switch and hub

Switch Hub

Data transfer speed increases. The hub is slower than than switch.

The switch is intelligent (MAC address can Hub is not intelligent (HUB does not
be identified and data sent to the relevant recognize MAC addresses. Sends data to al
device) devices.)

Frames and packets Electrical signals or bits

Full duplex Half duplex

Does not cause traffic congestion when Causes traffic when sending data
sending data.
Table 5 - differences between a switch and hub

Difference between Router and Bridge

Router bridge

Used to connect LAN and WAN Connects two different LAN segments

Router IP addresses can be read (uses IP Bridge MAC addresses can be read (uses
addresses to send data) MAC addresses to send data)

H.P.D.Mandara Prawarshana 69 Unit 02 Networking


Transmits data in the from packet. Transmits data in the from frames.

Router work in data link layer Bridge work in network layer

Table 6- - differences between a router and bridge

2.1.2 End-user devices


End user devices are devices that are used by the user. Fore example, devices such as
computers, laptops and printers can be identified as end-user devices. These devices are
introduced separately below.

1) Personal computers (PC)

This is a typical personal computers and can perform input ,process and output
functions. That is an electrically powered device that can store and retrieve date and
information when needed. Required accessories must be purchased separately. That is
keyboard ,mouse monitor and ECT. In 1960 INTEL and MICROSOFT developed a
large number of personal computers. Later another company was able to develop
different types of computers.

2) Laptops

Witch the advent of personal computers, companies have been able to manufacture
laptops. This device can also make input ,process and output.

3) Printer

This is an output device. The user can use the printer to get the information on a piece
of paper. Printer can be divided into two main categories. That is ,impact printer (is
noisy at print) and non-impact printer(not noisy in printer).

H.P.D.Mandara Prawarshana 70 Unit 02 Networking


2.1.3 Security software
Network software is essential for creating and using a network. That is, should pay more
attention to the security of a network. The following is the software used to create and use a
network.

1) Firewall

Using this software will block unwanted web site, links and viruses. Network security
can be ensured by installing this software on the relevant network. This software can
be purchased from the market at different prices.

2) Antiviral

Installing anti-virus software will destroy any unwanted viruses that may be coming
to the network. Viruses can enter the network and destroy the network and this can be
used to bypass it. There are various types of anti-virus software available in the
market. The following are the different types of anti-virus software.

Figure 33 - Anti-viruses software (driver easy.com/2019)

2.1.4 Functions of security software


 User management - users are restricted from accessing the network and user
management takes place.

H.P.D.Mandara Prawarshana 71 Unit 02 Networking


 File management - determine the location where data is stored for users and specify
its accessibility.

 Access - allows users to access the network without interruption.

 Network security systems - unauthorized persons are prevented from entering the
network.

2.2 Network Transmission Media


It is the means by which data is transmitted from one place to another, that is, the path
between the transmitter and the receiver. These data transmission media are divided into two
main categories. That is, wireless and wired

1) Wired transmission media

The use of wires for data transmission is wired transmission media. There are also different
types of wires for data transmission. That is,

 Twisted pair

A pair of wires twisted together for data transmission is called a twisted wire pair.
This is divided into two parts.

Unshielded Twisted Pair - (UTP)

A pair of amber copper wire together is called a UTP. This is inexpensive and very
flexible. The maximum distance of data transmission is 100m. This is mostly used in
telephone connection.

Figure 34- - UTP cable(https://www.fiberoptics4sale.com/)

H.P.D.Mandara Prawarshana 72 Unit 02 Networking


Shielded Twisted Pair -( STP)

STP promotes the development and protection of date transmission quality. This is
heavy and expensive.

Figure 35 --STP cable (https://www.fiberoptics4sale.com/)

 Coaxial cable

Coaxial cable the outer cable in the from of a copper wire mesh, consists of a pair of
coaxial cables that generate electromagnetism around the core . TV antennas are used
as CCTV cables and these cables are more expensive.

Figure 36-coaxial cable (https://www.fiberoptics4sale.com/)

 Fibre optical

This cable also consists of a pair of conductive cables.The core has a glass tube and thin
glass Fibre (classing) around it and a plastic jacket to separate the pair of cables. can be
called radiant cycling. Used in modern telephone networks. This are relatively expensive.
It is the fastest data transmission pilot media currently available.

Figure 37 - - Fiber optical(https://www.fiberoptics4sale.com/)

H.P.D.Mandara Prawarshana 73 Unit 02 Networking


2) Wireless transmission media

Non-pilot media is the transmission of data as signals over the air without the use of physical
media.

 Radio waves
Radio wave media is used for data transmission. WIFI and Bluetooth are examples
of reaction to radio weaves.

 Microwaves

In microwave transmission data travels in a single line. Satellite stations located in the
upper sky capture data transmission through satellite towers located n the ground and
transmit it back to the desired tower.

 Infra-red

This data is used as a transmission media for TV remote controls as well as wireless
keyboards and mouse control.

conclusion

The above describes the hardware and software required for the network that Syntax
Solutions will create. Ready to create a network using those tools.You need to select a
suitable cable for the network you are preparing to create. The author has selected the STP
(Shielded Twisted Pair) cable for this purpose. The reason for choosing those cables.

Reason for choosing STP cable

 There is a shield around the cable to protect it from external shields.

 Reduces external electrical noise (EMI, RFI)

 Ability to travel data up to 100m

 Data transmission speed is high.

H.P.D.Mandara Prawarshana 74 Unit 02 Networking


2.3 Servers Types
A computer network has a server computer and its associated client computers. A network
operating system is installed on a server computers. A person requesting data or information
from the internet or a local network is called a client, and a data and information provider is

called a server.

A server often performs a number of additional functions, as part of a single request and
response, including verifying the applicant's identity, ensuring that the client has access to the
requested data or resources, and properly formatting or returning the desired response

a) File server

File servers store and distribute files. Multiple purchasers or users cloud share files hold
on a server. Additionally ,centrally storing files offers easier backup or fault tolerance
solutions than marking an attempt to produce security and integrity for files on each
device in a corporation. Digital computers hardware are often designed to maximise
browse and write speeds to enhance performance.

File server features

 Multiple users stop editing the same file at the same time.

 Permission management is used to set which files can be accessed and who has
the right to edit or delete the file.

 Maintains data integrity

 Copying data to multiple servers in different locations on a distributed files


system result in a redundant and very high level of data.

H.P.D.Mandara Prawarshana 75 Unit 02 Networking


b) Application server

Application server typically run on resource- intensive applications than are shared by a
large range of users. This than saves than shopper the resources needed to run the
application. It also eliminates the need for software packaging and maintenance on
multiple machines.

Application server features

 Internet storage naming server(ISNS)

 Windows network load balancing(WNLB)

 Remote procedure call over HTTP Proxy

 Messaging queue

c) Web server

The most common type of server on the market today is a web server. A web server is a
specialized application server than provides programs and data hosting requested by user
over the internet o the internet. Web server respond to requests from browsers than run or
server computers of web page or other web based services.

Common web server, Microsoft internet information services(IIS) server and Nginx
server.

Web server features

 Ability to store data and create more websites.

 FTP websites are easy to set up.

 Website configuration and directory security are easy to set up

 Virtual directories are easy to create and can then be mapped with physical
directories.

H.P.D.Mandara Prawarshana 76 Unit 02 Networking


d) Database sever

Databases ought to be accessible to multiple servers at any time and will need abnormal
disc space. Each of those needs are well-suited for locating such databases shoppers.
Info shoppers modify into application and reply to several requests from shoppers.
Common info server application embody Oracle, Microsoft, SQL server,DB2 and
INFORMIX.

Database server features

 Data exchange. For an organization ,integrating all the data into one database
system has many advantages.

 Data independence

 Provisions for multiple viewing of data

 There are backup and recovery facilities.

e) Proxy server

A proxy server acts as an intermediary between a server and a server often used to isolate
clients or servers for security purposes, a proxy server receives a request from the client.
Instead of responding to the client it sends the request to another server or process. The
proxy server receives feedback from the second server and then replies to the original
server as if it were answering it alone.

Proxy server features

 There is enhanced security

 Access to blocked resources

 Privacy benefits

 Savings and improved speeds

H.P.D.Mandara Prawarshana 77 Unit 02 Networking


2.4 Selecting the best server brand

There are several top client brands that can provide the infrastructure that a business needs
for their network. Namely DELL,HP,CISCO and ORACLE.

 DELL EMC(14G power edge servers)

Dell power edge servers the dell power EDGR is one of the most respected customers
in the industry and the brand has greatly diversified over the past few years.

A dell file server can be used to establish critical control over critical data and file
sharing services at the enterprise level, up to large businesses with multiple remote
users. Client set-up is a logical step for companies that need a better data organization
and better access to sharing

Figure 38 - - DELL EMC(https://www.storagereview.com/)

Features of dell EMC filer server

 Centralized the management.

 Data backup (this server has the facility to backup important data.)

 higher security.( this server provides high security for data)

 Data recovery

 Increase user control.

H.P.D.Mandara Prawarshana 78 Unit 02 Networking


Dell EMC Power Edge R740 specifications:

o Form Factor: 2U
o CPU: Up to two Intel Xeon SP, up to 28 cores per processor
o Memory: 24 DDR4 DIMM slots, Supports RDIMM /LRDIMM, speeds up to 2667,
3TB max Up to 12 NVDIMM, 192 GB Max; Supports registered ECC DDR4
DIMMs only
o Storage Controllers:
o Internal controllers: PERC H330, H730p, H740p, HBA330, Software RAID
(SWRAID) S140
o Boot Optimized Storage: HWRAID 2 x M.2 SSDs 120GB, 240 GB
o External PERC (RAID): H840
o External HBAs (non-RAID): 12 Gbps SAS HBA
o Drive Bays:
o Front drive bays: Up to 16 x 2.5” SAS/SATA (HDD/SSD) max 61TB or up to 8 x
3.5” SAS/SATA HDD max 80TB Optional DVD-ROM, DVD+RW
o Network daughter card options
o 4 x 1GE or 2 x 10GE + 2 x 1GE or 4 x 10GE or 2 x 25GE
o Front ports: Video, 2 x USB 2.0, available USB 3.0, dedicated IDRAC Direct
Micro-USB Rear ports: Video, serial, 2 x USB 3.0, dedicated iDRAC network port
o Video card: VGA
o Riser options with up to 8 PCIe Gen 3 slots, maximum of 4 x 16 slots
o Depth: 715.5mm

 CISCO file server(UCS S3260)

CISCO UCS S3260 storage server is a modular dual node x86 server designed for
investment security. Its architectural flexibility provides high performance or high
capacity for your data intensive workload. In conjunction with UCS manager,
customers can easily deploy storage capacity from terabytes (TB) to petabytes(PB) in
minutes.

H.P.D.Mandara Prawarshana 79 Unit 02 Networking


Figure 39( CISCO file serve)r(https://www.cisco.com/)

Features of CISCO file server

 This server is the cheapest in the marker.

 Simplified internal chassis replacement for Cisco UCS blades and reduced
hardware costs by minimizing the number of adapters and ports required for
rack servers.

 Easy to manage

 Can be easily maintained in the event of a fault.

 Increased performance and agility.

CISCO file server(UCS S3260) specifications:

o Dual two-socket server nodes based on Intel® Xeon® Scalable processors or Intel
E5-2600 v4 CPUs with up to 44 cores per server node
o Up to 1.5 TB of DDR4 memory per server node (3 TB total)
o Support for high performance NVMe and Flash Memory
o Massive 960 TB data storage capacity that easily scales to Petabytes with UCS
Manager
o Policy driven storage management framework for zero-touch capacity on demand
o Dual-port 40 Gbps System I/O Controllers with Cisco VIC 1300 Series Embedded
Chip

H.P.D.Mandara Prawarshana 80 Unit 02 Networking


o Unified I/O for Ethernet or Fiber Channel to existing NAS or SAN storage
environments
o Support for Cisco BIDI transceivers, 40 Gbps connectivity over existing 10 Gbps
cabling infrastructure

 ORACLE Server

Oracle Server is a connection database management system that provides an open,


comprehensive and integrated approach to information management. An Oracle
Server consists of an Oracle database and an Oracle instance.

Figure 40- -ORACLE Server(oracle /server.com)

Features of ORACLE server

 Minimize maintenance.

 Ability to execute one file server at a time.

 Ability to modify a physical file.

 Higher security

 Backup and recover

H.P.D.Mandara Prawarshana 81 Unit 02 Networking


ORACLE Server specifications:

Compatible Brand Oracle

Model Name/Number SUN ORACLE X8-8 Rack Server

Memory 1024 GB/sec memory bandwidth

Processor Intel Xeon Scalable Processor Second


Generation Platinum 8200 series processors

Features Oracle Database Smart Flash Cache and


Oracle's unique NVM Express (NVMe) design

Management Fault Management Architecture built into


ILOM and Oracle Linux

 HP Pro-Liant Server (DL 380 G6)

Pro-liant is a server computer brand by Hewlett- Packard enterprise, originally developed


and marketed by COMPAQ Hewlett Packard, HP retired from its net server brand in
favour of the proletarian brand .HP proliant Gen8 servers offer a new networking
technology.

Figure 41 - - HP Pro-Liant Server(https://www.itinstock.com/)

H.P.D.Mandara Prawarshana 82 Unit 02 Networking


HP Pro-Liant Server (DL 380 G6) specifications:

Processor Type XEON

Brand HP

Memory 256 GB

Processor 2 CPU

Power Supply 750

2.5 Choose the best file server –

It is an ideal machine for small and medium measuring institutions. The CISCO report server
is more expensive and DELL EMC server relatively inexpensive. Here the HP server is also
the most expensive and fastest server in the market. Because the DELL server is in good
demand in the market, the DELL server is suitable for SYNTAX SOLUTIONS company.

Therefore, The author suggest the dell EMC file server to move records more securely for a
cognitively advanced presentations.

Server selection requirement

 Buy the right operation system

 Support and maintenance

 Match virtualization to your need

 Buy the affordable server

 Choose best of breed.

H.P.D.Mandara Prawarshana 83 Unit 02 Networking


2.6 Networking software

A work station is a computer intended for individual use that is faster and more capable than
a personal computer to set-up wireless or wired connections networks. Because they are
personal computers, they can be utilised independently of the mainframe if they have their
own software and hard disc storage.

Network software is a large category of software that is used to design, develop, operate,
and monitor computer networks. Hardware-based networks with embedded software were
common in the past. Software is decoupled from hardware with the introduction of Software
Defined Networking (SDN), making it more responsive to the ever-changing nature of the
computer network. That is, two network software can be identified below.

2.6.1 Types of networking software

o Software-defined networking (SDN)

Software-defined networking is a network management strategy that allows for


dynamic, pro grammatically efficient network design to increase network
performance and monitoring, making it more like cloud computing than traditional
network management.
SDN is a networking architecture that enables dynamic and programming efficient
network configuration to increase overall network performance and make networks
more dynamic and flexible.

o Network functions virtualization (NFV)

Multiple network operators can use NFV to establish network regulations without
worrying about where tasks should be located or how traffic should be routed via
them. It is a means of virtualizing network services such as routers, firewalls, and
load balancers that were formerly run on proprietary-controlled computer hardware.

H.P.D.Mandara Prawarshana 84 Unit 02 Networking


2.6.2 Difference between SDN and NFV

SDN NFV
Data centrers are the primary focus of SDN The NFV technology is aimed at service
architecture. providers and operators

Open Flow is the communication protocol There is currently no protocol in place for
used by SDN. NFV.

SDN supports Open Networking NFV is overseen by the ETSI NFV


Foundation. Working Group.
Industry-standard servers or switches are NFV applications run on industry-standard
used to execute SDN applications. servers.

SDN reduces cost of network. NFV increases scalability and agility

Table 7 Difference between SDN and NFV

2.6.3 Networking software functions


o Assists with computer network step and installation.
o Allows network virtualizations to take place.
o Allows users to access data by assisting in the definition of data storage locations.
o Assists network administrators and security systems in preventing data breaches,
unauthorized access, and network attacks.
o Allows users to have seamless access to network resources.

2.6.4 List of networking software

 Cisco internetwork Operating System (IOS)

 Datadog Network Performance Monitoring

H.P.D.Mandara Prawarshana 85 Unit 02 Networking


 Auvik

 ManageEngine OpManager

 Site24x7 Network Monitoring

 Checkmk

2.6.6 Networking software can be used in the network design (CISCO)


The Cisco internetwork Operating System (IOS) is the appropriate network software for
SYNTAX SOLUTIONS to create a network.

Figure 42 -( cisco IOS)(.cisco.com)

Cisco's IOS is a proprietary operating system that allows for routing, switching, and inter
networking. It supervises and controls the hardware it operates on. It functions as a user-to-
hardware interface, allowing the user to issue commands to configure and manage Cisco
equipment. The IOS was originally designed for Cisco routers, but Cisco decided to deploy it
on other platforms, notably Catalyst switches, a few years later. The IOS is now used by most
Cisco routers and a growing number of Cisco Catalyst switches, such as the Catalyst 2960
and 3560 series switches. Cisco's IOS is the key to increasing productivity in information-
intensive enterprises all around the world.

H.P.D.Mandara Prawarshana 86 Unit 02 Networking


Some of Cisco IOS functions as bellows,

o Protocols and functions of the network are being transferred.


o To control unauthorized access
o To keep the network stable and reliable
o To establish a link between various data link layer technologies
o To secure network resources

2.6 Server software


Server software is a type of software designed to be used activated and managed on a
computer server. It facilitate and utilizes the underlying server computing power for use with
a range of advanced computer services and functions. The server software can be categorized
as follows.

 Web server software

A web server is a computer that executes websites. It is a computer program that


distributes web pages as needed. The primary purpose of a web server is to store, edit
and distribute web to users. This interaction is done using the hypertext transfer protocol
(HTTP).

The most popular web server software

 Apache

 Nginx

 Cloudflare

 Microsoft - IIS

 Litespeed

 Google server

H.P.D.Mandara Prawarshana 87 Unit 02 Networking


Figure 43 - web server software (www.smart/home/beginner.com)

 Application server software

An application server is a modern from of platform middle ware. It is system software


that exists on one side of the operating system (OS), external resources (such as database
management system [DBMS] communication and internet services), and third-party user
application.

The most popular application server software

 Plesk

 Ngink

 Litespeed web server

 Apache

 ISS 7.5

 Tomcat

Figure 44 - Application server software( (www.smart/home/beginner.com)

H.P.D.Mandara Prawarshana 88 Unit 02 Networking


 Database server software

Database software is a tool or application that help users manage SQL server and
database server infrastructure. Database software allows users to easily configure manage
monitor, and manage SQL servers and database. It is designed to extract information
from the database.

The most popular database server software

 SQL server

 MYSQL

 Oracle

 IBM (DB2)

 Sybase

Figure 45 - database server software ((unika infocom.com/2020)

 File server software3

A file server is a computer responsible for storing and managing data files so that files
can be accessed by other computers on the same network. It enable users to exchange
information over a network without having to physically transfer filers.

The most popular file server software

 Amahi home server

H.P.D.Mandara Prawarshana 89 Unit 02 Networking


 Windows home server

 Free NAS

 Ubuntu server edition

 Madsonic

Figure 46 - file server software (turboFuture.com/2020

 Cloud computing server software

Cloud computing is the process of obtaining computer system resources, especially data
storage and computer power, without the direct dynamic management of the user. This
term is commonly used to describe data centre that are accessible to many users over the
internet.

The most popular cloud computing server software

 Google drive

 Oracle

 Azure

 Amazon drive

 Dropbox

H.P.D.Mandara Prawarshana 90 Unit 02 Networking


Figure 47 - cloud server software(unika infocom.com/2020)

Conclusion

The best software for SYNTAX SLUTIONS is a web server. They are always linked to the
internet in order to develop and build software. This firm will also benefit from the file server.
Because they want to keep important files safe. As a result, the file server is solely
responsible for storing the files. In addition, database servers are frequently utilised for
purposes such as customer information, order information, and job information. Using the
various types of servers listed above, an efficient network design for the SYNTAX
SOLUTIONS matara branch may be created.

2.7 Inter-dependence of workstation hardware with relevant networking


software.
Inter dependence of workstation hardware is computer hardware and software work together.
That is we connect the devices and software used above into one. The following is a brief
description of this.

Workstations, also known as nodes, are connected to the server through a network interface
card and a cable. Workstations are typically intelligent systems, such as the IBM pc. DUMV
terminals, on the other hand, are employed in.

The network operating system, together with system management tools and user utilities, is
installed on the servers' hard drive. When the system is launched, NOS boots up and takes
control of the other servers.

H.P.D.Mandara Prawarshana 91 Unit 02 Networking


Learning Outcomes:03

3.1 Creating a network model for SYNTAX SOLUTIONS

Syntax solution is divided in to eight department all of witch must be separated from each
other by a subnet. For this IP address 192.168.1.0 has been given and this should be used for
departments. The IP address 10.254.1.0/24 should be used for the client room. The sales and
marketing team should be able to used WIFI.

Used of network security mechanisms and troubleshooting techniques on the network ready
to be created. The following is the department of the company.

 Customer Care

 Sales and Marketing

 Finance

 Legal

 HR

 Developers

 Network Team

 Server

All the devices and related software related to the company’s network have been identified.
You need to create a network with those identified tool and software. There fore, before
creating a real world network, it is necessary to create a plan using some tool.

That is, the following is the network created using the EDROW MAX tool.

H.P.D.Mandara Prawarshana 92 Unit 02 Networking


3.2 Network Design Plan (EDRAW MAX )

Figure 48 - (EDRAW MAX PALN)

H.P.D.Mandara Prawarshana Unit 02 Networking


93
3.3 VLAN and IP SUBNETTING

VLAN (virtual LAN )

A VLAN is a subnet that can be clustered with a collection of devices on separate physical
native space network (LAN s). A local area network is a group of computers and devices
that share a line of communication or wireless connection to a server across a regular
geographic region.

VLAN s allow network administrators to restrict access to a group of users by dividing


workstation in to completely separate isolated computer network segments. Directors are
not required to reconfigure the network or change VLAN teams once users transfer their
workstations.

IP Sub netting

A logical subdivision of an IP network is referred to as a subnet or subnet work. Subnet


work are the process of breaking a network into two or more networks. The most crucial
group of bit comparable to IP addresses is used to address computers on the same subnet.

An IP address is

Every computer on the internet used IP addresses to identify themselves. These addresses
are separated by decimal points and are represented by fore values ranging from 0 to 255.
The IP addresses are provided by an internet provider.

These companies must provide the IP addresses associated with this network before
creating the network. Therefore ,the following are the IP addresses of the relevant
department and their ranges.

H.P.D.Mandara Prawarshana 94 Unit 02 Networking


3.4 IP addresses table

Department None VLAN Subnet Mask IP Range


of

user

Customer care 10 10 255.255.255.240 192.168.10.144 -

192.168.10.159

Sale and 20 20 255.255.255.224 192.168.10.96 -


marketing
192.168.10.127

Finance 25 30 255.255.255.224 192.168.10.64 -

192.168.10.95

Legal 5 40 255.255.255.248 192.168.10.160 -

192.168.10.167

HR 10 50 255.255.255.240 192.168.10.128 -

192.168.10.143

Developers 55 60 255.255.255.192 192.168.10.0 -

192.168.10.63

Network team 5 70 255.255.255.248 192.168.10.168 -

192.168.10.175

Server Room 2 255.255.255.0 10.254.1.2/24

Table - IP Addresses

H.P.D.Mandara Prawarshana 95 Unit 02 Networking


3.5 Devices and cable used to build syntax solution network

Before creating a network, you need to look at the connected devices and other things. That
is, you need to buy from the market what you need to fit the network. As the new subnet
advisor you will need to select the tools relevant to creating syntax solution company network.

Below are some of the tool and accessories selected for syntax solution company

 Switch (CISCO catalyst 2960-C)

This brand is selected for the network switch. This switch is in good demand in the market
and is relatively inexpensive. The bandwidth of this switch is 16 Gbps. The CISCO catalyst
2960 plus offers 24 or 48 fast Ethernet ports and is available with IEEE 802.3 of power over
Ethernet all models include both copper (1000BASE-T) and optical uplink options.

Figure 49 - The CISCO switch (www.router-switch.com/2020)

 Router (CISCO - 1841)

syntax solution has decided to use the CISCO 1841 router. This is because this router
includes an intrusion prevention system (IPS) and a firewall system. Using this router
provides better security for the network and can further protect the system with a password.
The following is the CISCO 1841 router.

H.P.D.Mandara Prawarshana 96 Unit 02 Networking


Figure 50 - CISCO 1841 router (www.router-cisco 1841.com/2020

 Computers ( HP Elite One 800)

The company has decided to use HP(Elite One 800) computers to build its network. Because
the HP(Elite One 800) computer is a computer specially designed for business. This type of
computer is also in good demand in the market. Below are some of the features of the
selected computer.

The processor is i7

The hard disk is 1TB

Ram 6 GB

Computer with these features can work without any interruptions. Below is a picture
of the computer that is ready to be used for the network.

H.P.D.Mandara Prawarshana 97 Unit 02 Networking


Figure 51 - HP Elite One 800 computer ( desertcart.lk)

 Printer (HP Laser Jet Pro multi-function)

A printer is essential for a network. Here when choosing a printer, you should pay more
attention to its efficiency. It has been decided to use an HP Laser Jet Pro printer for this
network. This is the reason for choosing. Wireless printer, WIFI direct uses toner with jet
intelligence, speed letter ;up to 30 ppm auto duplex printing. Below is the picture of the HP
Laser Jet Pro printer.

Figure 52 - HP Laser Jet Pro printer (printerFor you.com)

 Twisted pair cable (STP)

Wires must be selected to connect the components of the network. This STP cable is selected
for this purpose. This is because the purpose of the selection is to prevent data loss while the
data is moving and not too expensive in the market. Information on these cables is given
above.

The server has selected a computer for this network.

H.P.D.Mandara Prawarshana 98 Unit 02 Networking


3.6 Feedbacks for the design test
Once syntax solution has created the network, it allows multiple users to use it to diagnose
network performance issues. Then you have to get the opinion of those users. Users will be
given a form for that. That is , below is the form that was created to give to the user.

Date

Customer name / position

Excellent GOOD BAD

1. Access speed

2. User friendliness

3. The security of this


network?

4. The performance of this


network?

5. Does the network system


full fill the requirements?

Signature

Below are some of the feedback form received form several users.

H.P.D.Mandara Prawarshana 99 Unit 02 Networking


1.The form provided with the idea of the first user

Date 20/04/2022
Customer name/ position Nimali weerasingha / IT student
Excellent GOOD BAD

Access speed
yes
User friendliness
yes
The security of this
network?
yes

The performance of this


network? yes

Does the network system


full fill the requirements?
yes

Signature Nimali weerasingha

2 .The form provided with the idea of the second user

Date 20/04/2022

Customer name/ position Pasindu sasmith/ student

Excellent GOOD BAD

H.P.D.Mandara Prawarshana 100 Unit 02 Networking


Access speed
yes
User friendliness
yes
The security of this
network?
yes

The performance of this


network? yes

Does the network system


full fill the requirements?
yes

Signature Pasindu

3 .The form provided with the idea of the third user

Date 20/04/2022

Customer name/ position Rajetha wikrama/ teacher

Excellent GOOD BAD

Access speed
yes
User friendliness
yes
The security of this network?
yes
The performance of this

H.P.D.Mandara Prawarshana 101 Unit 02 Networking


network? yes

Does the network system full


fill the requirements?
yes

Signature Rajitha

4 . The form provided with the idea of the fourth user

Date 20/04/2022

Customer name / position Kamal nawarathna/ student

Excellent GOOD BAD

Access speed
yes
User friendliness
yes
The security of this network?
yes
The performance of this
network? yes

Does the network system full


fill the requirements?
yes

Signature Kamal

H.P.D.Mandara Prawarshana 102 Unit 02 Networking


5 .The form provided with the idea of the five user
Date 20/04/2022

Customer name/ position Padsindu / student

Excellent GOOD BAD

Access speed yes

User friendliness yes

The security of this network? yes

The performance of this yes


network?

Does the network system full yes


fill the requirements?

Signature Pasindu

6 .The form provided with the idea of the six user


Date 20/04/2022

Customer name/ position Chamalee / Teacher

Excellent GOOD BAD

Access speed yes

User friendliness yes

H.P.D.Mandara Prawarshana 103 Unit 02 Networking


The security of this network? yes

The performance of this yes


network?

Does the network system full yes


fill the requirements?

Signature Pasindu

7 .The form provided with the idea of the seven user


Date 20/04/2022

Customer name/ position Maleesha / student

Excellent GOOD BAD

Access speed yes

User friendliness yes

The security of this network? yes

The performance of this yes


network?

Does the network system full yes


fill the requirements?

Signature Maleesha

H.P.D.Mandara Prawarshana 104 Unit 02 Networking


8 .he form provided with the idea of the eight user

Date 20/04/2022

Customer name/ position Bagya / IT student

Excellent GOOD BAD

Access speed
yes
User friendliness
yes
The security of this network? Yes

The performance of this


network? yes

Does the network system full


fill the requirements?
yes

Signature Bagya

H.P.D.Mandara Prawarshana 105 Unit 02 Networking


Once you have received the feedback forms, you should look into them.

Excellent GOOD BAD

Access speed

8
User friendliness

4 2 2
The security of this network?

5 2 1
The performance of this
network?
1 2 5

Does the network system full


fill the requirements?
2 1 5

Consolation-
Finally all the feedback form should be collected and monitored one by one. After observing
them, we were able to identify a lot of information. That is, there is no confusion about the
speed of the software. Accordingly four have said good about user friendliness and two have
said bad. Five people have said bad things about system requirements and should pay more
attention to it and take action to avoid it. More attention should be paid to software
performance. Because five people have said bad things about it. Accordingly, system security
should be further enhanced. That is, the software should be future developed by paying more
attention to this user information.

H.P.D.Mandara Prawarshana 106 Unit 02 Networking


3.7 Creating a network with CISCO packet tracer and router configuration
Cisco Systems developed Packet Tracer, a cross-platform visual simulation program that
allows users to establish network locations and simulate current computer networks. Users
can configure Cisco routers and switches using a command line interface provided by the
program. The following is a network design created step by step CISCO for syntax solution
company.

Insert the HWIC-2T port

First you need to add the relevant port to the relevant router. It can be seen in the images
below.

OFF the Router

Insert the HWIC- T2 port

H.P.D.Mandara Prawarshana 107 Unit 02 Networking


Figure 53 - add port (the author/2022)

Connecting the router

This is where the two routers connect to each other. After selecting the port for the router
select the appropriate cable.

Figure 54- router connecting (the author)

Select the relevant cable


Serial DCE cables can be selected and connected to the router.

Figure 55 - cable (the author)

Serial DCE cables

H.P.D.Mandara Prawarshana 108 Unit 02 Networking


Enter a name for the router.

Click on the router and then CLU click on the next tab.

Click the CLU

Figure 56 - click CLU (the author)

H.P.D.Mandara Prawarshana 109 Unit 02 Networking


Below is the code for changing the host name (host name- 1router)
That is changing the name of the router here. The relevant code is given below.

Figure 57 - code(the author/2022)

H.P.D.Mandara Prawarshana 110 Unit 02 Networking


Router configuration serial port (IP Address assign )

Figure 58- serial port configuration(the author/2022)

H.P.D.Mandara Prawarshana 111 Unit 02 Networking


Router configuration Fast Ethernet port (IP Address assign )

Figure 59- configuration fast ethernet(the author/2022)

H.P.D.Mandara Prawarshana 112 Unit 02 Networking


DHCP Configuration
The Dynamic Host Configuration Protocol (DHCP) is a client/server protocol that
automatically provides an IP address and other configuration information, such as the
subnet mask and default gateway, to an Internet Protocol (IP) host.

Figure 60- DHCP Configuration(the author/2022

H.P.D.Mandara Prawarshana 113 Unit 02 Networking


DHCP Check IP address

Figure 61 - DHCP check(the author/2022)

H.P.D.Mandara Prawarshana 114 Unit 02 Networking


VLAN Configure

Figure 62 - VLAN Configure(the author/2022)

H.P.D.Mandara Prawarshana 115 Unit 02 Networking


Configure trunk port

Figure 63 - configure trunk(the author/2022)

H.P.D.Mandara Prawarshana 116 Unit 02 Networking


Desktop (pc) IP address assign

click the computer

CLICK THE DEKSTOP TAB

Figure 64- dekstop(the author/2022)

Click the IP configuration

Figure 65 - click the IP configuration(the author/2022)

H.P.D.Mandara Prawarshana 117 Unit 02 Networking


IP address assign ( customer care)

Figure 66 - customer care(the author/2022)

H.P.D.Mandara Prawarshana 118 Unit 02 Networking


DEVELOPERS (CHECK THE IP ADDRESS DHCP)

Figure 67 - Developers(the author/2022)

H.P.D.Mandara Prawarshana 119 Unit 02 Networking


SERVER ROOM

Figure 68- server room(the author/2022)

Consolation

The configuration and IP of the cisco design created for the company s network have been
completed

H.P.D.Mandara Prawarshana 120 Unit 02 Networking


3.10 Introducing a DHCP server and installing it

DHCP (Dynamic Host Configuration Protocol) is a server/server protocol that automatically


delivers Internet Protocol (IP) hosting, its IP address, and other relevant configuration
information such subnet masks and default portal.

The Internet Engineering Task Force (IETF) defines DHCP as a standard based on the
Bootstrap Protocol (BOOTP), a protocol with many implementation details in common.
Allows a DHCP server to get the necessary TCP/IP configuration information from another
DHCP server.

Figure 69 –(DHCP server)(network1.net)

3.10.1 Install DHCP Server on window Serve

First step

Open the Server Manager application.


To access the Server Manager, go to the Start menu and select Server Manager.

Figure 70 - (step 01)(activedirectorypro.com)

H.P.D.Mandara Prawarshana 121 Unit 02 Networking


Step 2: Add roles and features

Figure 71 -( step 2)(activedirectorypro.co

H.P.D.Mandara Prawarshana 122 Unit 02 Networking


Click next on the before you begin page.

Figure 72 - Click on the next button

Step 3: Select Role-based or feature-based installation

Figure 73- step 3

H.P.D.Mandara Prawarshana 123 Unit 02 Networking


Step 4: Select destination server

Choose the server where you want the DHCP service to be deployed on this page. In this
case, I'm going to use the local
server.

Figure 74 - STEP 4

Step 5: Select server roles

Figure 75- step 5

H.P.D.Mandara Prawarshana 124 Unit 02 Networking


Step 6: Feature, DHCP Server

On the features screen click next

Figure 76 - step 6

Step 7: Confirmation

On the confirmation screen, you can choose to restart the server automatically if necessary.

It is not necessary to restart the 2016 server.

Figure 77 - step7

H.P.D.Mandara Prawarshana 125 Unit 02 Networking


Click install and the install will start.

You will get an install progress page, it will say install succeeded when complete.

Figure 78 - final step

That completes the install of the DHCP role. Move onto the next section for steps on

configuring the DCHP server.

3.10.2 Configure DHCP Server

The DHCP service should now be setup if you followed the procedures above.
However, it still requires configuration.

H.P.D.Mandara Prawarshana 126 Unit 02 Networking


Step 1: Server Manager

In the server manager dashboard you will see a yellow notification at the top left. Click on it
Now click on “Complete DHCP configuration”

Figure 79 - (Server Manager)(activedirectorypro.com)

Step 2: Post-Install configuration wizard

Click the next button on the description screen.

If the server is domain-joined, utilise AD credentials on the authorisation page.

If the DHCP server is freestanding and not attached to the domain, choose "Skip AD
authorization."

H.P.D.Mandara Prawarshana 127 Unit 02 Networking


Figure 80 -( Post-Install configuration wizard|))(activedirectorypro.com)

Click close

Figure 81 - click close button(activedirectorypro.com)

H.P.D.Mandara Prawarshana 128 Unit 02 Networking


To access the DHCP management console click start -> Windows Administrative Tool ->
DHCP

Figure 82 - click the DHCP server(activedirectorypro.com)

Figure 83 - DHCP server (activedirectorypro.com)

H.P.D.Mandara Prawarshana 129 Unit 02 Networking


3.11 Maintenance schedule for SYNTEX SOLUTION networked system.
Maintenance scheduling is pre-planned work that specifies who, what, when, and where
chores will be performed. Maintenance planning is a method for identifying and resolving
possible issues before they become serious. Scheduled maintenance allows you to plan the
most hours possible based on your resources.

NO DAIL WEEKL MONTHL YEARL Signat


TASK
ure
Y Y Y Y

1 Update network diagram

2 Software Check

3 Data Backup Check

4 Hardware device check

5 Network cables and


switches check

6 Network cables and


switches check

7 Internet connection check

Table 8 Maintenance schedule FORM

H.P.D.Mandara Prawarshana 130 Unit 02 Networking


Learning Outcomes:04

4.1Network design for syntax solution company


Implement a networked system based on your prepared design with valid evidences and
recommend potential future enhancements for the networked system with valid
justifications to your recommendations. Use critical reflection to critically evaluate the
design, plan, configuration, and testing of your network while justifying with valid
conclusions

Network design cisco packet tracer

Figure 84 - network design (the author/2022)

H.P.D.Mandara Prawarshana 131 Unit 02 Networking


4.2Network system check (TEST CASE)
A test case is a document that contains a set of test data, preconditions, expected outcomes,
and postconditions that was created for a specific test scenario in order to check compliance
with a certain requirement.

Test case Input data Expected Actual result Test result


result (Pass /Fail)

Table 9-sample test case(the author/2022)

The following is a test of the network design

Test case – 01
Ping customer care ( 192.168.10.147)
Name – mandara

Test case Input data Expected Actual result Test result


result (Pass /Fail)

Ping Ip address Ping statistics Ping statistics pass


customer care 192.168.10.147 for for
department 192.168.10.147 192.168.10.147
Packets send = Packets send =
4 , received = 4 , received =
4 , lost 0 (0% 4 , lost 0 (0%
loss) loss)
Table 10 - test case 01(the author/2022)

H.P.D.Mandara Prawarshana 132 Unit 02 Networking


Figure 85 -ping 192.168.10.147(the author/2022)

Test case – 02
Ping Finance ( 192.168.10.65)
Name – Pasindu

Test case Input data Expected Actual result Test result


result (Pass /Fail)

Ping Ip address Ping statistics Ping statistics pass


Finance 192.168.10.65 for for
department 192.168.10.65 192.168.10.65
Packets send = Packets send =
4 , received = 4 , received =
4 , lost 0 (0% 4 , lost 0 (0%
loss) loss)
Table 11 - test case 02(the author/2022)

H.P.D.Mandara Prawarshana 133 Unit 02 Networking


Figure 86 ping 192.168.10.65(the author/2022)

Test case – 03
Ping HR ( 192.168.10.130)
Name – Mahinsa

Test case Input data Expected Actual result Test result


result (Pass /Fail)

Ping Ip address Ping statistics Ping statistics pass


HR 192.168.10.130 for for
department 192.168.10.130 192.168.10.130
Packets send = Packets send =
4 , received = 4 , received =
4 , lost 0 (0% 4 , lost 0 (0%
loss) loss)
Table 12 -test case 02(the author/2022)

H.P.D.Mandara Prawarshana 134 Unit 02 Networking


Figure 87 -ping 192.168.10.130(the author/2022)

Test case – 04
Ping sale and marketing ( 192.168.10.99)
Name – chalani

Test case Input data Expected Actual result Test result


result (Pass /Fail)

Ping Ip address Ping statistics Ping statistics pass


SALE AND 192.168.10.99 for for
MARKETING 192.168.10.99 192.168.10.99
department Packets send = Packets send =
4 , received = 4 , received =
4 , lost 0 (0% 4 , lost 0 (0%
loss) loss)
Table 13 - sale and marketing(the author/2022)

H.P.D.Mandara Prawarshana 135 Unit 02 Networking


Figure 88 - ping 192.168.10.99(the author/2022)

Test case – 05
Ping Legal ( 192.168.10.163)
Name – chamali

Test case Input data Expected Actual result Test result


result (Pass /Fail)

Ping Ip address Ping statistics Ping statistics pass


Legal 192.168.10.163 for for
department 192.168.10.163 192.168.10.163
Packets send = Packets send =
4 , received = 4 , received =
4 , lost 0 (0% 4 , lost 0 (0%
loss) loss)
Table 14 - legal(the author/2022)

H.P.D.Mandara Prawarshana 136 Unit 02 Networking


Figure 89 - ping 192.168.10.163(the author/2022)

Test case – 06
Ping network team ( 192.168.10.174)
Name – hashan

Test case Input data Expected Actual result Test result


result (Pass /Fail)

Ping Ip address Ping statistics Ping statistics pass


Network team 192.168.10.174 for for
department 192.168.10.174 192.168.10.174
Packets send = Packets send =
4 , received = 4 , received =
4 , lost 0 (0% 4 , lost 0 (0%
loss) loss)
Table 15 - network team(the author/2022)

H.P.D.Mandara Prawarshana 137 Unit 02 Networking


Figure 90 ping 192.168.10.174(the author/2022)

Test case – 07
Ping developer ( 192.168.10.10)
Name – Himsara

Test case Input data Expected Actual result Test result


result (Pass /Fail)

Ping Ip address Ping statistics Ping statistics pass


Developer 192.168.10.10 for for
department 192.168.10.10 192.168.10.10
Packets send = Packets send =
4 , received = 4 , received =
4 , lost 0 (0% 4 , lost 0 (0%
loss) loss)
Table 16 - developer (the author/2022)

H.P.D.Mandara Prawarshana 138 Unit 02 Networking


Figure 91 -ping 192.168.10.10(the author/2022)

Test case – 08
Ping server room ( 10.254.1.1)
Name – mandara

Test case Input data Expected Actual result Test result


result (Pass /Fail)

Ping Ip address Ping statistics Ping statistics pass


Server room 10.254.1.1 for 10.254.1.1 for 10.254.1.1
Packets send = Packets send =
4 , received = 4 , received =
4 , lost 0 (0% 4 , lost 0 (0%
loss) loss)
Table 17 - server room/2022)

H.P.D.Mandara Prawarshana 139 Unit 02 Networking


Figure 92 -ping 10.254.1.1(the aythor/2022)

Test case all information


Test case no Description Tester name Date

01 Customer care Mandara 01/05/2022


Ip address
192.168.10.147
02 Finance Pasindu 01/05/2022
Ip address
192.168.10.65
03 HR mahinsa 01/05/2022
Ip address
192.168.10.130
04 Sale and Chalani 01/05/2022
marketing
Ip address
192.168.10.99

H.P.D.Mandara Prawarshana 140 Unit 02 Networking


05 Legal Chamali 01/05/2022
Ip address
192.168.10.163
06 Network team Hashan 01/05/2022
Ip address
192.168.10.174
07 Developer Himsara 01/05/2022
Ip address
192.168.10.10
08 Server room mandara 01/05/2022
Ip address
10.254.1.1

Consolation

According to the situation, the author has determined the network kinds and network models.
As a result, the author described network concepts and the most appropriate network
topologies for the circumstance and supported his selection. After that, the author
determined the most acceptable server types for the case and explained them briefly. If that
is not the case, the author has provided techniques for selecting servers based on cost and
performance. Moreover, despite the circumstances, the author has recognized network
devices, network hardware, and networking software.

The author has determined the network types and network models based on the scenario. As
a consequence, the author outlined network ideas and the best network topologies for the
situation, as well as defending his choice. The author then selected the most appropriate
server types for the situation and briefly discussed them. If this isn't the case, the author has
supplied ways for choosing servers based on price and performance. Moreover, the author
has recognized network devices, network hardware, and networking software regardless the
conditions.

H.P.D.Mandara Prawarshana 141 Unit 02 Networking


4.3Future enhancements for the networked system
Virtualization of network functions and software-defined networking will play an
increasingly important role in the future of networking, turning what was previously
specialized hardware or local virtual machines into cloud-based software.

 Updating software and firmware


Advancements in technology and the software that runs on them do not always keep
up with each other. It's feasible that we'll all have new programs running on old
machines, or new programs running on old machines, but they're unlikely to get along.

 Provide a separate guest network


Visitors can access to the internet through a separate network set up by the company,
which keeps business resources distinct.

 Configuration of VPN (Virtual Private Network) server


VPNs must be utilized in the network system since they employ powerful encryption
methods to secure online data while we surf the web. With the use of VPN, the
network may be expanded. The usage of a virtual private network (VPN) offers the
benefit of allowing information to be accessed remotely from any place, which can
increase productivity.

 Implement load balancing


Its strong traffic management features can help organizations seek faster access to the
resources that each end user need.

H.P.D.Mandara Prawarshana 142 Unit 02 Networking


Referents

Allen, R., 2022. Install and Configure DHCP Server on Windows Server. [online] Active Directory Pro.
Available at: <https://activedirectorypro.com/configure-dhcp-server/> [Accessed 3 April 2022].

Support, T., Technologies, I., Networking, I. and Tech Notes, T., 2022. Data Link Switching Plus.
[online] Cisco. Available at: <https://www.cisco.com/c/en/us/support/docs/ibm-
technologies/data-link-switching-dlsw-data-link-switching-plus-dlsw-/12249-49.html>
[Accessed 30 April 2022].

example, W., Rehman, J. and Rehman, J., 2022. What is a Campus area network (CAN) with an
example. [online] IT Release. Available at: <https://www.itrelease.com/2018/11/what-is-a-
campus-area-network-can-with-an-example/> [Accessed 30 April 2022].
En.wikipedia.org. 2022. Virtual private network - Wikipedia. [online] Available at:
<https://en.wikipedia.org/wiki/Virtual_private_network> [Accessed 30 April 2022].

: ssla-co-uk. 2022. ssla-co-uk. [online] Available at: <https://www.ssla.co.uk/storage-area-


network/> [Accessed 29 April 2022].

Difference between SDN and NFV - GeeksforGeeks. [online] Available at:


<https://www.geeksforgeeks.org/difference-between-sdn-and-
nfv/#:~:text=SDN%20separates%20control%20plane%20and,dedicated%20appliances%20to
%20virtual%20servers.> [Accessed 30 April 2022].

What is a Switch? - Definition from Techopedia. [online] Available at:


<https://www.techopedia.com/definition/2306/switch-networking> [Accessed 30 April 2022].

2022. Local area network - Wikipedia. [online] Available at:


<https://en.wikipedia.org/wiki/Local_area_network> [Accessed 1 May 2022].

H.P.D.Mandara Prawarshana 143 Unit 02 Networking


What is the OSI Model?. [online] Available at: <https://www.forcepoint.com/cyber-edu/osi-
model#:~:text=The%20OSI%20Model%20(Open%20Systems,between%20different%20prod
ucts%20and%20software.> [Accessed 1 May 2022].

2022. What is a Test Case?. [online] Available at:


<https://www.techtarget.com/searchsoftwarequality/definition/test-case> [Accessed 1 May
2022].

H.P.D.Mandara Prawarshana 144 Unit 02 Networking

You might also like