Network Assignment
Network Assignment
Internal
Date
Verifier
signature
Programme Leader
Date
signature (if
required)
Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction P1 P2 M1
Descripts
Resubmission Feedback:
Assignment Feedback
Formative Feedback: Assessor to Student
Action Plan
Summative feedback
[email protected] 03/05/2022
Student Date
signature
1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body
except for the before mentioned compulsory information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and
a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct form. I further understand what it means to
copy another’s work.
[email protected] 03/05/2022
Student’s Signature: Date:
(Provide E-mail ID) (Provide Submission Date)
Unit Tutor
Issue Date
Submission Date
Submission format
The submission should be in the form of an individual report written in a concise, formal
business style using single spacing and font size 12. You are required to make use of headings,
paragraphs and subsections as appropriate, and all work must be supported with research and
referenced using Harvard referencing system. Please also provide an end list of references using
the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures,
although you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:
Customer Care 10
Finance 25
Legal 5
HR 10
Developers 55
Network Team 5
19 2.168.10 .0 /24 is give n and should be used for all the de part me nts except
the server room. IPs should assign using DHCP .
Sale s and Marke ting Team ne ed to access Ne tw ork resource s using WIFI
connect ivity.
Proper met hods for net working monit oring and trouble shoot ing nee d to be
establishe d.
(Not e: Clear ly state your assumpt ions. You ar e allow ed to design the netw or k
according to your assumpt ions, but main requirement s should not be violat ed)
Act ivity 01
Discuss the bene fit s and const raints of different ne tw ork syste m types that
can be impleme nted in the Mat ara branch and the main IEEE Ethe rne t
standards that can be used in above LAN and WLAN de sign.
Discuss the importance and impact of net work topologies and ne tw ork
protocol suite s while comparing the main ne tw ork topologies and ne two rk
protocol suite s that are used in ne tw ork de sign using examples. Recommend
suit able ne tw ork topologies and ne tw ork prot ocol suit es for above scenario
and justify your answer with valid po int s.
Act ivity 03
Pre pare a writt en ne tw ork de sign plan to me et the above me ntioned user
re quireme nt s including a blueprint drawn using a mode ling tool. (Ex: Microsoft
Visio , Edraw Max).
Support your answer by providing the VLAN and IP subnet ting scheme for the
above sce nario and the list of de vices, ne tw ork component s and softw are used
to de sign the ne tw ork for above scenario and while justifying your sele ct ions.
Test and evaluate the proposed de sign to me et the re quireme nt s and analyse
user fe edback by using a Use r fee dback form.
Install and configure Ne tw ork services, de vice s and applicat ions (Ex:
VL AN,DHCP, DNS,Proxy , Web, Etc.) according to the propose d de sign to
accomplish the user require ment s and design a de taile d Mainte nance sche dule
for above Ne two rk.
Act ivity 04
Impleme nt a ne tworke d syste m based on yo ur prepared de sign with valid
evidence s and re commend po tent ial fut ure enhancement s for the ne two rked
syste m wit h valid justificat ions to yo ur re commendations. Use critical
re flection to crit ically evaluate the de sign, plan, configuration, and testing of
your ne tw ork while justifying with valid conclusions.
Deve lop test cases and conduct ve rification (Ex: Ping, ext ended ping, trace
rout e, telnet, SSH, etc.) to test the above Ne tw ork and analyse the test re sults
against the expecte d re sults.
P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Compare common networking principles and how protocols
enable the effectiveness of networked systems.
P3
Discuss the operating principles of networking devices and
server types.
M2
Explore a range of server types and justify the selection of a
server, considering a given scenario regarding cost and
performance optimization.
LO 1 & LO2
D1 Critically evaluate the topology protocol selected for a given
scenario to demonstrate the efficient utilisation of a networking
system.
LO3 : Design efficient networked systems
P5
Design a networked system to meet a given specification.
P6
Test and evaluate the design to meet the requirements and
analyze user feedback.
M3
Install and configure network services and applications on your
P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D3
Use critical reflection to evaluate own work and justify valid
conclusions.
The timely and effective completion of the book would not have been possible without the
assistance and support of many people. I'd want to use this occasion to express my gratitude
to everyone who assisted me in some way throughout this crucial project, whether directly
or indirectly. First of all, I wish to express my sincere gratitude and due respect to my
Mr. OSHADA LOKUHETTI lectures in department of Computing Esoft Metro Campus
Matara. I give him a great heartfelt thanks for his invaluable advice, constant
encouragement, and positive support, all of which greatly aided me during my time at work.
I'd want to thank him for always taking an active interest in my questions and making useful
advice.
H.P.D.Mandara Prawarshan
Acknowledgement ..................................................................................................................19
For this purpose ,the manager has given permission to select a suitable network types ,
connect it to each other and create a network thinking about the security of the information
exchanged by the network.
All departments here must be separated by a unique subnet and communicate with each other
only for a specific reason. In addition, the use of WIFI to connect to the internet and network
monitoring and troubleshooting procedures must be enabled for all of these networks. The
company’s network should be created as the new network consultant here. This should be
created by the computer using the IP address provided.
The IP address is 192.168.10.0/24 and should be used for departments other than the client
room. That is, the creation of a computer network is started below.
1. Easy to setup
Generally, easy to setup a peer to peer network requiring no advanced technology
knowledge. Also since all connected computers can manage by users.
Constraints
3. Backup recovery
This is the main drawback of this network system type. Backup is difficult in P2P
networks, since the data is not centralized. Data is saved on different systems.
Benefits
It is simple to handle files because they are all kept on a single server. If system fail,
will be checked only server and it takes less time.
In the client server network, all the backup options are handled by the main server.
This is very useful for taking data for long time with safely.
Constraints
For maintain and setup it takes high cost because client server networks need
powerful tools. Also high functional severs prices are high.
2. Traffic congestion
. If many clients make request for same server, as a result of that connection will be
slow.
There are different kinds of network types too they are as follows. That is all the network
types are introduced separately below.
A LAN ( local area network ) can be abbreviated as a network that spreads ( spreads out)
between a building or between two or three building to share information and resources.
This means that the network is only fora short distance and can be connected to the WAN
( wide area network ) network using a router ( WIFI ) and exchange information and
outsiders.
Benefits
this network can be designed with or without wires , but it does not cost much
for one type .that is ,wireless design.
2. It is cheaper to install.
3. Resources can be shared .for example Hard disk , DVD drives and Printers.
Resources can be shared on this network which means that one printer can be
used by everyone on the network.
4. Easy of communication
LAN users can easily exchange data and information. The data is stored on the
server so you can connect to it at any time and retrieve data and information.
5. Safety
that is all the information here is storage on a separate server which increases
the security of the data and information.
The LAN network is limited to a small area and can only exchange data and
information for an office , a single building or a group of surrounding building.
Here all users can view and check the data files , thus reducing the security of the
data .
This requires a user for reasons such as software installation and cable breakage.
The software used to set up the LAN is very expensive for the various
communication devices such as server , hub, switch, router, cable.
That is , this is a network that covers an urban area. This is a single big city , multi city and
large area with multiple fabrics . Most people use Fibre optic cable. Used for this purpose , it
speed up the movement of data and information. This network is smaller than the WAN
network and larger than the LAN network . A MAN network is created from large collection
of LAN networks.
1. No too expensive
Network connection costs less. That is , it joins the LAN network to create a
MAN network. Here the MAN network combine to from a WAN network
Local mail can be created within this network. It also has the ability to send
information securely through it .
3. That of speed
The number of people connecting to the MAN is small so you can see a very
good speed here.
4. Internet sharing
Here you can get the internet connection related to the WAN network. This
allows data and information to be shared easily.
5. Data security
As it extends within the city limits , the security of the data here is increased. The
reason is that the number of people involved in this is low .
Constraints
1. Difficulty managing
LAN network combine to create a MAN network. The large number of LAN
network here make it difficult to manage the MAN network.
You need to have a good technical staff to build a MAN. It will cost extra.
It takes a large amount of wire to connect all the LAN networks together.
4. Hacker attacks.
Hacker warrants can easily enter this network. Data can be leaked for this reason.
This is the largest of these networks. This network can be abbreviated as a computer network
spread across the world . This network allows you to easily communicate and exchange
information with people anywhere in the world. The internet is a prime example of this . This
network is not limited to one location but extends over a large geographical area via
telephone lines , Fibre optic cable , or satellite connections.
Benefits
1. Geographical area
The WAN network covers a large geographical area so data can be easily
exchanged.
2. Massage exchange
You can exchange message fast in a WAN network. For example ,exchanging
information through web applications such as Face book and WhatsApp
For example , you can get an extra storage on a computer . you can use the free
software .
Constraints
1. Security issue
Security issues arise when all technological devices come together and exchange
information. This means that the WAN network has more security issues compared to the
LAN and MAC network.
You will need a router and a switch to connect to this network . therefore it costs
more to install this.
4. Troubleshooting problems
The network cover to large area so it is a bit difficult to solve the problem that
occur there
This network is usually set up by a single person within a room or 10 Meters. This lasts for
a short period of time and allows you to easily connect to the network and exchange
information. This network can be create using laptops and mobile phones.
This network was created using cables such as USB and RJ45
These network were create using wireless technology such as WIFI and
BLUETOOTH
1. Low cost
It cost less. That is, the cost of the wire is lower because the network is created in
a shorted distance.
4. Is safe
Constraints
The data and information here are slow moving . for example a picture via
BLUETOOTH
This run along a straight line . if it encounters an interruption the network will
crash.
Because it covers a small area, data and information are exchanged over a small
area.
Benefits
Constraints
1. Maintain issues
It necessitates higher software development and maintenance costs.
Virtual Private Network (VPN) is a link that creates a private network over a public network
system. VPN is a developing service used by current advancements. In reality, many sectors
are increasingly using VPN to help their businesses grow. Even if VPN has a lot of
advantages for users, it also has a lot of disadvantages.
Benefits
1. Provide anonymity
Almost all websites may see your true IP address, which you are using. VPN allows
you to hide your true IP address and encrypt your data.
1. Slow speed
When you use a VPN, you may notice a drop-in speed. Because of the data encryption,
this is the case.
2. Cost
However, there are plenty free VPN services accessible. Many of them do not provide
the user with the whole protection they require. For complete safety, will have to buy
a paid VPN service.
3. Legality issues
In the present world, some countries consider private networks including VPN are n
illegal.
SAN is a technology that allows data to be stored within a network. Data is sent between
servers and storage devices since all files and apps are stored locally on the disks. Although
SAN has become a popular choice among businesses, it is not without flaws.
1. High performance
Because fiber optics technology is used in SAN, it provides extremely high data
transfer speeds.
2. High security
On SAN, a variety of security methods are available to ensure that your data is
safe.
3. Scalability
SAN also provides far more scalability to meet the demands of the organization.
Users can increase the number of disks if they require extra storage.
Constraints
1. High cost
2. Maintain is complex
A SAN that is used to manage a large number of servers. Using SAN to maintain a
small number of servers is a waste of money.
3. Privacy issues
Even if SAN employs appropriate security measures, data loss is still a risk. In a
shared environment, a Storage Area Network is employed.
PAN (personal LAN ( local area MAN (metropolitan WAN (wide area
area network) network) area network) network )
Fewer people More people can More people can A large group can
can join join than PAN join than LAN join
Network It costs a lot more It costs a lot more This costs a lot of
design costs than a PAN than a LAN money to design
less
Network models are how network communicate according to network standards. Here the
models show how different networks communicate with each other .there are two model.
ISO OSI model and TCP/IP model . currently TCP/IP is used
.
IOS OSI TCP/IPMODE
SMTP/FTP
TCP/UDP/Port number
IP Address /routers
IEEE 802 is a set of networking standards that covers the physical and data-link layer
specifications for Ethernet and wireless technologies. Essentially,
Assists in the compliance of IEEE 802 standards with Internet services and technology.
Set of programmes that are recommended for all network devices to function together
properly.
Without these standards, equipment manufacturers will be able to design network devices
that will only function with specific PCs. Connecting systems that do not utilise the same
set of networking technologies will be more complex. Standardization protocols make it
possible to connect a variety of devices to a number of networks.
802.11b Router
802.11e
IEEE 802.6
This was created by one of the oldest standards and will be controlled by ANSI for the
MAN network. It defines a high-speed shared medium access protocol to be used over a twin
counter flowing. Unidirectional bus sub network.
TCP/IP mode
APPLICATION (7)
PRESENTATION (6)
SESSION (5)
TRANSPORT (4)
NETWORK (3)
PHYSICAL (1)
This is the OSI model's second layer.. This layer packs in to the data frames and corrects any
errors that the physical layer many have. It also adds MAC addresses to these data packets.
This is also sometimes referred to as the syntax layer. Once the massage has been
processed this layer adjusts it so that it can go through the network. Allows the received
message to be converted so that it cannot be retrieved by a third party.
This is also know as the first layer. This layer processes the data and allows the
application layer and the end user to interact directly with the software application. All
communications here are managed by an application layer, and the application layer
determines whether there are adequate network resources.
Here one computer is the layer that prepares to send the message and the other
computer display the message.
This layer is the top level layer and also interacts with application programs. The
application layer is the last layer for the user. This layer also helps to identify communication
partners , retrieve resources and synchronize resources. The application layer ,for example
includes application such as file transfer , remote access and email.
The transport layer is used to transmit data from a mechanical process to a destination
system process. It also serves as single and multiple networks. The layer also performs error
control, transport control and reliable control. These layer transmit the data in order and send
the next data if no data error occurs.
This layer is the second layer of the TCP/IP format. The internet layer divides data
into packets and also find the destination. IP addresses are assigned to data packets to find the
destination. It also gives the identity of the data packets.
Network access layers are the first layer of the TCP/TP format. This layers assigns
MAC addresses to the data. After the MAC addresses are entered, the data packets are
translated into a machine language (1,0) and the data is transmitted. Cable types are also used
to transmit data. (coaxial,optical,coaxial Fiber
The OSI header must be at least 5 bytes Minimum header size is 20 bytes.
long.
Table 2 - Differences between OSI and TCP/IP models
CONCLUSIONS
Listed above are all the details about the IEEE Ethanet standards used in LAN design and
how to choose a network model as Syntax Solutions new network advisor. It is best for this
company to use a LAN (local area network) network. The design of the LAN network and the
relevant standards were discussed. The TCP/IP format is more suitable than the OSI format
when selecting network models.
This model is faster than the OSI model. Because what happens in seven layers in the OSI
model happens in four layers in the TCP/IP layers.
Once a company has selected good network types, it must also select a topology relevant to
then network. For then , the following topology is explained.
TCP is a public dialogue protocol used to communicant over a network. It sends any message
from the supply to the relevant location divides the data packets when sending the data and
reassemble the data packets at the end point.
The Internet Protocol (IP) is a collection of rules for routing and addressing data packets so
that they can transit across networks and reach their intended destination. Data is split down
into smaller bits known as packets as it travels over the Internet.. Each packet has IP
information attached to it, which helps routers send packets to the correct location. Every
device or domain that connects to the Internet is given an IP address, and data arrives where it
is needed as packets are routed to the IP address assigned to them.
The User Datagram Protocol is a core part of the Internet Protocol suite in computer
networking. Computer programs can use UDP to send messages to other hosts on the Internet
Protocol network, which are referred to as data grams in this scenario. Setting up
communication channels or data paths does not necessitate communication.
Email is gradually establishing itself as one of the most useful online services. SMTP is the
most widely used method for sending email over the internet from one user to another..
SMTP is a push protocol that is used to send emails, whereas POP (post office protocol) or
IMAP (internet message access protocol) is used to retrieve emails at the recipient's end.
Transferring data from one machine to another is quite simple and uncomplicated, although it
can occasionally cause issues. Two systems, for example, may have distinct file conventions.
Text and data may be represented differently in the two systems. The directory structures of
the two systems may differ. The FTP protocol resolves these concerns by establishing two
TELNET
TCP IP UDP
Greater security. Allows multiple files Errors are notified It assists in the
and folders to be without the need to administration of the
transferred. end the TCP network element
connection.
Deliver ability speed The ability to add Flexibility. HTTP has Remote computers
more items to a queue for the ability to use automation test
upload or download. download extensions facilities on a shared
or plugins and basis. This saves
display the relevant money by decreasing
data whenever an the number of things
application requires you have to buy.
new capabilities.
1. Physical topology
2. Logical topology
Disadvantages
Even if one computer shuts down, the network will still work
Disadvantages
Disadvantages
This is a tree -shaped topology network. This involves the exchange of data in to tree layer.
That is a combination of RING topology and BUS topology. The two tops combine to
create the tree tops one.
Disadvantages
Disadvantages
Difficult to maintain
Disadvantages
CONCLUSIONS
The above topology has examined all of them and explained their advantages and
disadvantages. The above gives a conclusion about the Ethernet and the model relevant to
this syntax Solutions company.
Based on that conclusion the company has decided to create a hybrid topology. Create
separate topologies for departments and link them all together. The most suitable hybrid
topology for this is.
How data and information flows and signal are transmitted from one computer to another.
For example how data flow from a switch and how a switch is divided in to sections. This is
divided into three parts.
1. Ethernet
2. Virtual LAN
3. Token ring
CONCLUSIONS
When choosing an Ethernet it is better to choose GIGA Ethernet than a fast Ethernet. That
is because good speed can be seen in the data. Using the VLAN , reduces the cost of setting
up another network.
1) Switch
A network switch is a device used to exchange data with one another. That is ,this devices is
used to connect devices in a network. This devices does not transfer data to multiple device
networks but to one devices. Switcher are most commonly found on LAN network. There are
many types of switches on the market today. Below is a picture of a switch.
Speed - Data traffic congestion is reduced because a switch transmits data only to
the relevant devices. So the data is exchange fast.
Security - Data security is enhanced as the data travels only to the relevant devices.
When moving data, the data do not collide with each other and the data is not
damaged.
Intelligence - The intelligence of a switch increases. Find the device that sends the
data and sends the data to it.
Number of devices that can be connected - The switch has at least four ports. You
can see the frequency of the switch form four upwards. Therefore the relevant
devices has to be purchased from the market.
2) Router
This device is used to connect two or more network. The router determines the appropriate
path for the transmission of information. Different types of routers can be found in the
market.
Connection and resource sharing - The router can easily share resources. That is,
devices as printers can be shared.
Guest networks - Guest prevents unauthorized person from joining the network.
This increases network security.
VPN server and client support - This helps to retain the privacy of you wireless
network connection.
3) Hub
Transmission mode - The transmission mode of the hub can seen as Half-duplex.
Low intelligence - The HUB transfers data to all computers. Can’t recognize
separate computers.
Low Speed - The hub is slow and causes unnecessary congestion. The speed is
reduced due to unnecessary congestion.
Is active on the physical layer - The hub operates on the first layer according to the
OSI model. That is, it operates on the physical layer.
4) Firewall
Firewall is a computer network security system. The firewall is installed as a security barrier
between computer and the internet. Firewall can be installed on the computer in the form of
software as well as hardware. It provides security during data transfer between computers. A
firewall can be purchased from the market at a variety of prices.
Where the firewall should be located between a network. The model takes the shape of a wall
and can be installed as both hardware and software.
Features of a firewall
Protection against Malware -Virus entry into the computer is prevented. That is ,it
also acts as an anti-virus software.
Provide access only to valid data packet- The firewall prevents unauthorized data
packets from entering.
The device is used to connect two or more individual network together by means of a bridge.
That is, it is simply called a network controller. This device can also be bought in the market
at different prices. Below is a picture of a bridge devices.
Features of a bridge
Reliability - Converting a small LAN network into a single network reduces data
congestion.
Speed - Sending data at once slows down a bit. That is, it is slower than repeaters
Switch Hub
Data transfer speed increases. The hub is slower than than switch.
The switch is intelligent (MAC address can Hub is not intelligent (HUB does not
be identified and data sent to the relevant recognize MAC addresses. Sends data to al
device) devices.)
Does not cause traffic congestion when Causes traffic when sending data
sending data.
Table 5 - differences between a switch and hub
Router bridge
Used to connect LAN and WAN Connects two different LAN segments
Router IP addresses can be read (uses IP Bridge MAC addresses can be read (uses
addresses to send data) MAC addresses to send data)
This is a typical personal computers and can perform input ,process and output
functions. That is an electrically powered device that can store and retrieve date and
information when needed. Required accessories must be purchased separately. That is
keyboard ,mouse monitor and ECT. In 1960 INTEL and MICROSOFT developed a
large number of personal computers. Later another company was able to develop
different types of computers.
2) Laptops
Witch the advent of personal computers, companies have been able to manufacture
laptops. This device can also make input ,process and output.
3) Printer
This is an output device. The user can use the printer to get the information on a piece
of paper. Printer can be divided into two main categories. That is ,impact printer (is
noisy at print) and non-impact printer(not noisy in printer).
1) Firewall
Using this software will block unwanted web site, links and viruses. Network security
can be ensured by installing this software on the relevant network. This software can
be purchased from the market at different prices.
2) Antiviral
Installing anti-virus software will destroy any unwanted viruses that may be coming
to the network. Viruses can enter the network and destroy the network and this can be
used to bypass it. There are various types of anti-virus software available in the
market. The following are the different types of anti-virus software.
Network security systems - unauthorized persons are prevented from entering the
network.
The use of wires for data transmission is wired transmission media. There are also different
types of wires for data transmission. That is,
Twisted pair
A pair of wires twisted together for data transmission is called a twisted wire pair.
This is divided into two parts.
A pair of amber copper wire together is called a UTP. This is inexpensive and very
flexible. The maximum distance of data transmission is 100m. This is mostly used in
telephone connection.
STP promotes the development and protection of date transmission quality. This is
heavy and expensive.
Coaxial cable
Coaxial cable the outer cable in the from of a copper wire mesh, consists of a pair of
coaxial cables that generate electromagnetism around the core . TV antennas are used
as CCTV cables and these cables are more expensive.
Fibre optical
This cable also consists of a pair of conductive cables.The core has a glass tube and thin
glass Fibre (classing) around it and a plastic jacket to separate the pair of cables. can be
called radiant cycling. Used in modern telephone networks. This are relatively expensive.
It is the fastest data transmission pilot media currently available.
Non-pilot media is the transmission of data as signals over the air without the use of physical
media.
Radio waves
Radio wave media is used for data transmission. WIFI and Bluetooth are examples
of reaction to radio weaves.
Microwaves
In microwave transmission data travels in a single line. Satellite stations located in the
upper sky capture data transmission through satellite towers located n the ground and
transmit it back to the desired tower.
Infra-red
This data is used as a transmission media for TV remote controls as well as wireless
keyboards and mouse control.
conclusion
The above describes the hardware and software required for the network that Syntax
Solutions will create. Ready to create a network using those tools.You need to select a
suitable cable for the network you are preparing to create. The author has selected the STP
(Shielded Twisted Pair) cable for this purpose. The reason for choosing those cables.
called a server.
A server often performs a number of additional functions, as part of a single request and
response, including verifying the applicant's identity, ensuring that the client has access to the
requested data or resources, and properly formatting or returning the desired response
a) File server
File servers store and distribute files. Multiple purchasers or users cloud share files hold
on a server. Additionally ,centrally storing files offers easier backup or fault tolerance
solutions than marking an attempt to produce security and integrity for files on each
device in a corporation. Digital computers hardware are often designed to maximise
browse and write speeds to enhance performance.
Multiple users stop editing the same file at the same time.
Permission management is used to set which files can be accessed and who has
the right to edit or delete the file.
Application server typically run on resource- intensive applications than are shared by a
large range of users. This than saves than shopper the resources needed to run the
application. It also eliminates the need for software packaging and maintenance on
multiple machines.
Messaging queue
c) Web server
The most common type of server on the market today is a web server. A web server is a
specialized application server than provides programs and data hosting requested by user
over the internet o the internet. Web server respond to requests from browsers than run or
server computers of web page or other web based services.
Common web server, Microsoft internet information services(IIS) server and Nginx
server.
Virtual directories are easy to create and can then be mapped with physical
directories.
Databases ought to be accessible to multiple servers at any time and will need abnormal
disc space. Each of those needs are well-suited for locating such databases shoppers.
Info shoppers modify into application and reply to several requests from shoppers.
Common info server application embody Oracle, Microsoft, SQL server,DB2 and
INFORMIX.
Data exchange. For an organization ,integrating all the data into one database
system has many advantages.
Data independence
e) Proxy server
A proxy server acts as an intermediary between a server and a server often used to isolate
clients or servers for security purposes, a proxy server receives a request from the client.
Instead of responding to the client it sends the request to another server or process. The
proxy server receives feedback from the second server and then replies to the original
server as if it were answering it alone.
Privacy benefits
There are several top client brands that can provide the infrastructure that a business needs
for their network. Namely DELL,HP,CISCO and ORACLE.
Dell power edge servers the dell power EDGR is one of the most respected customers
in the industry and the brand has greatly diversified over the past few years.
A dell file server can be used to establish critical control over critical data and file
sharing services at the enterprise level, up to large businesses with multiple remote
users. Client set-up is a logical step for companies that need a better data organization
and better access to sharing
Data backup (this server has the facility to backup important data.)
Data recovery
o Form Factor: 2U
o CPU: Up to two Intel Xeon SP, up to 28 cores per processor
o Memory: 24 DDR4 DIMM slots, Supports RDIMM /LRDIMM, speeds up to 2667,
3TB max Up to 12 NVDIMM, 192 GB Max; Supports registered ECC DDR4
DIMMs only
o Storage Controllers:
o Internal controllers: PERC H330, H730p, H740p, HBA330, Software RAID
(SWRAID) S140
o Boot Optimized Storage: HWRAID 2 x M.2 SSDs 120GB, 240 GB
o External PERC (RAID): H840
o External HBAs (non-RAID): 12 Gbps SAS HBA
o Drive Bays:
o Front drive bays: Up to 16 x 2.5” SAS/SATA (HDD/SSD) max 61TB or up to 8 x
3.5” SAS/SATA HDD max 80TB Optional DVD-ROM, DVD+RW
o Network daughter card options
o 4 x 1GE or 2 x 10GE + 2 x 1GE or 4 x 10GE or 2 x 25GE
o Front ports: Video, 2 x USB 2.0, available USB 3.0, dedicated IDRAC Direct
Micro-USB Rear ports: Video, serial, 2 x USB 3.0, dedicated iDRAC network port
o Video card: VGA
o Riser options with up to 8 PCIe Gen 3 slots, maximum of 4 x 16 slots
o Depth: 715.5mm
CISCO UCS S3260 storage server is a modular dual node x86 server designed for
investment security. Its architectural flexibility provides high performance or high
capacity for your data intensive workload. In conjunction with UCS manager,
customers can easily deploy storage capacity from terabytes (TB) to petabytes(PB) in
minutes.
Simplified internal chassis replacement for Cisco UCS blades and reduced
hardware costs by minimizing the number of adapters and ports required for
rack servers.
Easy to manage
o Dual two-socket server nodes based on Intel® Xeon® Scalable processors or Intel
E5-2600 v4 CPUs with up to 44 cores per server node
o Up to 1.5 TB of DDR4 memory per server node (3 TB total)
o Support for high performance NVMe and Flash Memory
o Massive 960 TB data storage capacity that easily scales to Petabytes with UCS
Manager
o Policy driven storage management framework for zero-touch capacity on demand
o Dual-port 40 Gbps System I/O Controllers with Cisco VIC 1300 Series Embedded
Chip
ORACLE Server
Minimize maintenance.
Higher security
Brand HP
Memory 256 GB
Processor 2 CPU
It is an ideal machine for small and medium measuring institutions. The CISCO report server
is more expensive and DELL EMC server relatively inexpensive. Here the HP server is also
the most expensive and fastest server in the market. Because the DELL server is in good
demand in the market, the DELL server is suitable for SYNTAX SOLUTIONS company.
Therefore, The author suggest the dell EMC file server to move records more securely for a
cognitively advanced presentations.
A work station is a computer intended for individual use that is faster and more capable than
a personal computer to set-up wireless or wired connections networks. Because they are
personal computers, they can be utilised independently of the mainframe if they have their
own software and hard disc storage.
Network software is a large category of software that is used to design, develop, operate,
and monitor computer networks. Hardware-based networks with embedded software were
common in the past. Software is decoupled from hardware with the introduction of Software
Defined Networking (SDN), making it more responsive to the ever-changing nature of the
computer network. That is, two network software can be identified below.
Multiple network operators can use NFV to establish network regulations without
worrying about where tasks should be located or how traffic should be routed via
them. It is a means of virtualizing network services such as routers, firewalls, and
load balancers that were formerly run on proprietary-controlled computer hardware.
SDN NFV
Data centrers are the primary focus of SDN The NFV technology is aimed at service
architecture. providers and operators
Open Flow is the communication protocol There is currently no protocol in place for
used by SDN. NFV.
ManageEngine OpManager
Checkmk
Cisco's IOS is a proprietary operating system that allows for routing, switching, and inter
networking. It supervises and controls the hardware it operates on. It functions as a user-to-
hardware interface, allowing the user to issue commands to configure and manage Cisco
equipment. The IOS was originally designed for Cisco routers, but Cisco decided to deploy it
on other platforms, notably Catalyst switches, a few years later. The IOS is now used by most
Cisco routers and a growing number of Cisco Catalyst switches, such as the Catalyst 2960
and 3560 series switches. Cisco's IOS is the key to increasing productivity in information-
intensive enterprises all around the world.
Apache
Nginx
Cloudflare
Microsoft - IIS
Litespeed
Google server
Plesk
Ngink
Apache
ISS 7.5
Tomcat
Database software is a tool or application that help users manage SQL server and
database server infrastructure. Database software allows users to easily configure manage
monitor, and manage SQL servers and database. It is designed to extract information
from the database.
SQL server
MYSQL
Oracle
IBM (DB2)
Sybase
A file server is a computer responsible for storing and managing data files so that files
can be accessed by other computers on the same network. It enable users to exchange
information over a network without having to physically transfer filers.
Free NAS
Madsonic
Cloud computing is the process of obtaining computer system resources, especially data
storage and computer power, without the direct dynamic management of the user. This
term is commonly used to describe data centre that are accessible to many users over the
internet.
Google drive
Oracle
Azure
Amazon drive
Dropbox
Conclusion
The best software for SYNTAX SLUTIONS is a web server. They are always linked to the
internet in order to develop and build software. This firm will also benefit from the file server.
Because they want to keep important files safe. As a result, the file server is solely
responsible for storing the files. In addition, database servers are frequently utilised for
purposes such as customer information, order information, and job information. Using the
various types of servers listed above, an efficient network design for the SYNTAX
SOLUTIONS matara branch may be created.
Workstations, also known as nodes, are connected to the server through a network interface
card and a cable. Workstations are typically intelligent systems, such as the IBM pc. DUMV
terminals, on the other hand, are employed in.
The network operating system, together with system management tools and user utilities, is
installed on the servers' hard drive. When the system is launched, NOS boots up and takes
control of the other servers.
Syntax solution is divided in to eight department all of witch must be separated from each
other by a subnet. For this IP address 192.168.1.0 has been given and this should be used for
departments. The IP address 10.254.1.0/24 should be used for the client room. The sales and
marketing team should be able to used WIFI.
Used of network security mechanisms and troubleshooting techniques on the network ready
to be created. The following is the department of the company.
Customer Care
Finance
Legal
HR
Developers
Network Team
Server
All the devices and related software related to the company’s network have been identified.
You need to create a network with those identified tool and software. There fore, before
creating a real world network, it is necessary to create a plan using some tool.
That is, the following is the network created using the EDROW MAX tool.
A VLAN is a subnet that can be clustered with a collection of devices on separate physical
native space network (LAN s). A local area network is a group of computers and devices
that share a line of communication or wireless connection to a server across a regular
geographic region.
IP Sub netting
An IP address is
Every computer on the internet used IP addresses to identify themselves. These addresses
are separated by decimal points and are represented by fore values ranging from 0 to 255.
The IP addresses are provided by an internet provider.
These companies must provide the IP addresses associated with this network before
creating the network. Therefore ,the following are the IP addresses of the relevant
department and their ranges.
user
192.168.10.159
192.168.10.95
192.168.10.167
HR 10 50 255.255.255.240 192.168.10.128 -
192.168.10.143
192.168.10.63
192.168.10.175
Table - IP Addresses
Before creating a network, you need to look at the connected devices and other things. That
is, you need to buy from the market what you need to fit the network. As the new subnet
advisor you will need to select the tools relevant to creating syntax solution company network.
Below are some of the tool and accessories selected for syntax solution company
This brand is selected for the network switch. This switch is in good demand in the market
and is relatively inexpensive. The bandwidth of this switch is 16 Gbps. The CISCO catalyst
2960 plus offers 24 or 48 fast Ethernet ports and is available with IEEE 802.3 of power over
Ethernet all models include both copper (1000BASE-T) and optical uplink options.
syntax solution has decided to use the CISCO 1841 router. This is because this router
includes an intrusion prevention system (IPS) and a firewall system. Using this router
provides better security for the network and can further protect the system with a password.
The following is the CISCO 1841 router.
The company has decided to use HP(Elite One 800) computers to build its network. Because
the HP(Elite One 800) computer is a computer specially designed for business. This type of
computer is also in good demand in the market. Below are some of the features of the
selected computer.
The processor is i7
Ram 6 GB
Computer with these features can work without any interruptions. Below is a picture
of the computer that is ready to be used for the network.
A printer is essential for a network. Here when choosing a printer, you should pay more
attention to its efficiency. It has been decided to use an HP Laser Jet Pro printer for this
network. This is the reason for choosing. Wireless printer, WIFI direct uses toner with jet
intelligence, speed letter ;up to 30 ppm auto duplex printing. Below is the picture of the HP
Laser Jet Pro printer.
Wires must be selected to connect the components of the network. This STP cable is selected
for this purpose. This is because the purpose of the selection is to prevent data loss while the
data is moving and not too expensive in the market. Information on these cables is given
above.
Date
1. Access speed
2. User friendliness
Signature
Below are some of the feedback form received form several users.
Date 20/04/2022
Customer name/ position Nimali weerasingha / IT student
Excellent GOOD BAD
Access speed
yes
User friendliness
yes
The security of this
network?
yes
Date 20/04/2022
Signature Pasindu
Date 20/04/2022
Access speed
yes
User friendliness
yes
The security of this network?
yes
The performance of this
Signature Rajitha
Date 20/04/2022
Access speed
yes
User friendliness
yes
The security of this network?
yes
The performance of this
network? yes
Signature Kamal
Signature Pasindu
Signature Pasindu
Signature Maleesha
Date 20/04/2022
Access speed
yes
User friendliness
yes
The security of this network? Yes
Signature Bagya
Access speed
8
User friendliness
4 2 2
The security of this network?
5 2 1
The performance of this
network?
1 2 5
Consolation-
Finally all the feedback form should be collected and monitored one by one. After observing
them, we were able to identify a lot of information. That is, there is no confusion about the
speed of the software. Accordingly four have said good about user friendliness and two have
said bad. Five people have said bad things about system requirements and should pay more
attention to it and take action to avoid it. More attention should be paid to software
performance. Because five people have said bad things about it. Accordingly, system security
should be further enhanced. That is, the software should be future developed by paying more
attention to this user information.
First you need to add the relevant port to the relevant router. It can be seen in the images
below.
This is where the two routers connect to each other. After selecting the port for the router
select the appropriate cable.
Click on the router and then CLU click on the next tab.
Consolation
The configuration and IP of the cisco design created for the company s network have been
completed
The Internet Engineering Task Force (IETF) defines DHCP as a standard based on the
Bootstrap Protocol (BOOTP), a protocol with many implementation details in common.
Allows a DHCP server to get the necessary TCP/IP configuration information from another
DHCP server.
First step
Choose the server where you want the DHCP service to be deployed on this page. In this
case, I'm going to use the local
server.
Figure 74 - STEP 4
Figure 76 - step 6
Step 7: Confirmation
On the confirmation screen, you can choose to restart the server automatically if necessary.
Figure 77 - step7
You will get an install progress page, it will say install succeeded when complete.
That completes the install of the DHCP role. Move onto the next section for steps on
The DHCP service should now be setup if you followed the procedures above.
However, it still requires configuration.
In the server manager dashboard you will see a yellow notification at the top left. Click on it
Now click on “Complete DHCP configuration”
If the DHCP server is freestanding and not attached to the domain, choose "Skip AD
authorization."
Click close
2 Software Check
Test case – 01
Ping customer care ( 192.168.10.147)
Name – mandara
Test case – 02
Ping Finance ( 192.168.10.65)
Name – Pasindu
Test case – 03
Ping HR ( 192.168.10.130)
Name – Mahinsa
Test case – 04
Ping sale and marketing ( 192.168.10.99)
Name – chalani
Test case – 05
Ping Legal ( 192.168.10.163)
Name – chamali
Test case – 06
Ping network team ( 192.168.10.174)
Name – hashan
Test case – 07
Ping developer ( 192.168.10.10)
Name – Himsara
Test case – 08
Ping server room ( 10.254.1.1)
Name – mandara
Consolation
According to the situation, the author has determined the network kinds and network models.
As a result, the author described network concepts and the most appropriate network
topologies for the circumstance and supported his selection. After that, the author
determined the most acceptable server types for the case and explained them briefly. If that
is not the case, the author has provided techniques for selecting servers based on cost and
performance. Moreover, despite the circumstances, the author has recognized network
devices, network hardware, and networking software.
The author has determined the network types and network models based on the scenario. As
a consequence, the author outlined network ideas and the best network topologies for the
situation, as well as defending his choice. The author then selected the most appropriate
server types for the situation and briefly discussed them. If this isn't the case, the author has
supplied ways for choosing servers based on price and performance. Moreover, the author
has recognized network devices, network hardware, and networking software regardless the
conditions.
Allen, R., 2022. Install and Configure DHCP Server on Windows Server. [online] Active Directory Pro.
Available at: <https://activedirectorypro.com/configure-dhcp-server/> [Accessed 3 April 2022].
Support, T., Technologies, I., Networking, I. and Tech Notes, T., 2022. Data Link Switching Plus.
[online] Cisco. Available at: <https://www.cisco.com/c/en/us/support/docs/ibm-
technologies/data-link-switching-dlsw-data-link-switching-plus-dlsw-/12249-49.html>
[Accessed 30 April 2022].
example, W., Rehman, J. and Rehman, J., 2022. What is a Campus area network (CAN) with an
example. [online] IT Release. Available at: <https://www.itrelease.com/2018/11/what-is-a-
campus-area-network-can-with-an-example/> [Accessed 30 April 2022].
En.wikipedia.org. 2022. Virtual private network - Wikipedia. [online] Available at:
<https://en.wikipedia.org/wiki/Virtual_private_network> [Accessed 30 April 2022].