Net Sample
Net Sample
Assessor signature
Date
Internal Verifier
Date
signature
Programme Leader
Date
signature (if required)
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID E181097
Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction P1 P2 M1 D1
Descripts
Resubmission Feedback:
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.
Assignment Feedback
Formative Feedback: Assessor to Student
Network protocols to be explained a little bit more
Action Plan
Went more through network protocols and explained more thoroughly about them
Summative feedback
Thank you for your valuable feedback and guidance. Your assessments have been
insightful and helped me improve my work. Thank you so much for being really kind and
friendly along this journey too...
Assessor Date
signature
1. A Cover page or title page – You should always attach a title page to your assignment. Use previous
page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory
information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the
before mentioned compulsory information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will then
be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and
a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct form. I further understand what it means to copy
another’s work.
Unit Tutor
Submission format
The submission should be in the form of an individual report written in a concise, formal business style
using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using Harvard
referencing system. Please also provide an end list of references using the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures,
although you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:
Alliance Health is a technology-enabled solutions company that optimizes the revenue cycle of the
US healthcare industry where its global delivery center is located in Colombo. The company is
planning to expand their business operations with their latest branch at Matara and wants it to be
one of the state-of-the-art companies in Matara with the latest facilities.
Assume you have been appointed as the new network analyst of Alliance Health to plan, design and
restructure the existing network. Prepare a network architectural design and implement it with your
suggestions and recommendations to meet the company requirements.
The floor plan of the head office in Colombo is as follows:
Floor 1:
• Reception area
• Sales & Marketing Department (10 employees)
• Customer Services Area – with Wi-Fi facilities
Floor 2:
• Administration Department (30 Employees)
• HR Department (20 employees)
• Accounting & Finance Department (15 employees)
• Audit Department (5 employees)
• Business Development Department (5 employees)
Floor 3
• Video conferencing room
• IT Department (60 employees)
• The Server Room
The floor plan of the branch in Matara is as follows:
Floor 1:
• Reception area
• Customer Services Area– with Wi-Fi facilities
Floor 2:
• Administration Department (10 Employees)
• HR Department (7 employees)
• Accounting & Finance Department (8 employees)
• IT Department (50 employees)
• T he c onfer enci ng r oom of the head offic e and Customer S erv ic es Ar ea s of each
branch are to be equipped w ith Wi -Fi c onnec ti ons .
• C onnec tivi ty betw een tw o br anc hes (Head Office and M atara ) wo uld allow the
intra branch co nnectiv ity between departments. (Use o f VP N is no t com pulso ry)
• T he nec ess ary I P addr ess cl asses and r ang es m ust be decided by the network
designer and sho uld be use d fo r all the departments except the serv er r oom .
• N umber of s erv ers r equi red for the S erv er r oom need to be decided by the Netwo rk
designer and sho uld be assi gned with 10 .254. 10.0/ 24 subnet. (Uses static IPs)
( N ot e : C l e a r l y s t at e y o ur a ss u m pt i o n s . Y ou a re a l l o w e d t o d es i g n t h e ne t w o r k a c c o r d i ng t o y ou r
a s s um p t i on s , bu t m a i n r e q u i r e m en t s sh o u l d n ot b e v i o l a te d )
Ac tiv ity 01
• D iscuss the benefits and co nstraints o f different netwo rk system types that can be
im plemented in the Matara branch and the m ain IEEE Ethernet standards that can
be used in above L AN and WLAN design .
• D iscuss the im po rtance and im pact o f netwo rk to po lo g ies and assess the m ain
netwo rk proto co l suites that are used in netwo rk design using exam ples .
Recommend suitable netwo rk to po lo gy and netwo rk pro to col s for above scenario
and evaluate with v alid po in ts how the recommended to po lo gy demo nstrates the
efficient utilizatio n o f the netwo rking system of M atara branch.
Ac tiv ity 02
• D iscuss the operating principles o f network dev ices (Ex: Ro uter, Switch, Etc.) and
server ty pes that can be used fo r abov e scenario while explo ring different serv ers
that are av ailable in today’s market with their specifications . Re commend
server/ servers fo r the abov e scenario and justify your selectio n with v alid po ints .
• D iscuss the inter -dependence o f workstatio n hardware and netwo rking so ftware
and prov ide exam ples for netwo rking so ftware that can be used in abov e network
design.
Ac tiv ity 03
• P repare a written netwo rk design plan to m eet the abo ve -mentio ned user
requirements including a blueprint drawn using a mo deling too l ( Ex: M icro so ft Visio ,
EdrawM ax) .Test and evaluate the pro posed design by analyzing user feedback with
the aim o f optimizing yo ur design and im prov ing efficiency.
(Suppo rt y our answer by prov iding the VLAN and IP subnetting schem e fo r the abov e
scenario and the list of dev ices, netwo rk com po nents and software used to design the
netwo rk for abo ve scenario and while justifying yo ur selectio ns. )
• Install and co nfigure Netwo rk serv ices , dev ices and applicatio ns (Ex: VL AN, WiFi,
D NS, Pro xy , Web, Etc.) acco rding to the pro po sed design to accom plish the user
requirements and design a detailed M aintenance schedule for abov e Netwo rk.
*N ote: - Scr een s hots of C onfig ur ati on scri pts shoul d be pr esented.
Ac tiv ity 04
• Im plement a netwo rked system based on yo ur prepared design with v alid
evidence s.
• D evelo p test cases and co nduct verificatio n (Ex: P ing, extended ping, trace ro ute,
telnet, SSH, etc.) to test the above Network and analyse the test results against
the expected results. Recomm end potential future enhancem ents for the
netwo rked sy stem with v alid justificatio ns and critically reflect on the
im plemented netwo rk, including the plan, desig n, configurations, test s and the
decisio ns m ade to enhance the system .
Acknowledgement
As I sit here reflecting on the completion of this assignment, I am overwhelmed with gratitude
for all those who have helped me along the way. From the early brainstorming sessions to the
final proofreading, the support and guidance of those around me have been invaluable. I would
like to take this opportunity to express my sincere appreciation to those who have contributed to
this project, in ways big and small.
First and foremost, I would like to thank my Lecturers for their unwavering commitment to my
education and for pushing me to new heights of academic achievement. Their expertise and
enthusiasm have been truly inspiring, and I am grateful for the knowledge and skills I have gained
through their instruction. Thank you so much Mr. Sudesh.
I would also like to extend a heartfelt thank you to my classmates and friends who have provided
endless support and encouragement throughout this process. Your thoughtful insights,
constructive feedback, and unwavering support have been an invaluable source of motivation for
me.
Last but certainly not least, I would like to acknowledge the love and support of my family. Your
unwavering belief in me and your constant encouragement have been the foundation of my
success, and I am forever grateful for all that you do.
In closing, I would like to express my gratitude to all those who have played a role in bringing
this project to fruition. Your contributions have not gone unnoticed, and I am grateful for the
impact you have had on my growth and development as a student and as a person.
Table of Contents
Activity 01....................................................................................................................................... 1
1.1 Introduction ........................................................................................................................... 1
1.2 What is a Network................................................................................................................. 1
1.3 Types of Network Architecture ............................................................................................. 1
1.3.1 Peer-To Peer Network .................................................................................................... 2
1.3.2 Client/Server Network ................................................................................................... 3
1.4 Types of Networks ................................................................................................................ 4
1.4.1 LAN (Local Area Network) ........................................................................................... 4
1.4.2 WAN (Wide Area Network) .......................................................................................... 5
1.4.3 MAN (Metropolitan Area Network) .............................................................................. 7
1.4.4 CAN (Campus Area Network) ....................................................................................... 8
1.4.5 PAN (Personal Area Network) ...................................................................................... 9
1.4.6 WLAN (Wireless Local Area Network) ...................................................................... 10
1.5 IEEE (Institute of Electrical and Electronics Engineers) and the IEEE SA (IEEE Standard
Organization) ............................................................................................................................ 11
1.6 IEEE Ethernet Standards ..................................................................................................... 11
1.6.1 IEEE Ethernet Standards for LAN: .............................................................................. 11
1.6.2 IEEE Ethernet Standards for WLAN: .......................................................................... 12
1.7 Network Topologies ............................................................................................................ 13
1.7.1 Point to Point Topology ............................................................................................... 13
1.7.2 Bus Topology ............................................................................................................... 14
1.7.3 Ring Topology ............................................................................................................. 15
1.7.4 Star Topology ............................................................................................................... 17
1.7.5 Mesh Topology ............................................................................................................ 18
1.7.6 Tree Topology .............................................................................................................. 19
1.7.7 Hybrid Topology .......................................................................................................... 20
1.7.8 Daisy Chain Topology ................................................................................................. 21
1.8 Network Protocols............................................................................................................... 22
1.8.1 Management Protocols ................................................................................................. 22
1.8.2 Security Protocols ........................................................................................................ 23
1.8.3 Communication Protocols ............................................................................................ 23
1.9 Some Other Types of Protocols .......................................................................................... 24
1.10 OSI Model ......................................................................................................................... 25
1.11 TCP/IP Model ................................................................................................................... 27
1.12 Network Design ................................................................................................................ 28
1.13 Suitable Network Topology and Network Protocols for The Above Scenario and Reason
for My Suggestion..................................................................................................................... 29
1.14 Efficient Utilization of the Networking System of Matara Branch .................................. 29
Activity 02..................................................................................................................................... 31
2.1 What are Network Devices ................................................................................................. 31
2.2 Types and Operating principles of Network Devices ......................................................... 31
2.2.1 Hub ............................................................................................................................... 31
2.2.2 Switch........................................................................................................................... 32
2.2.3 Router ........................................................................................................................... 32
2.2.4 Gateway ....................................................................................................................... 33
2.2.5 Firewall ........................................................................................................................ 33
2.2.6 Modem ......................................................................................................................... 34
2.2.7 Access point ................................................................................................................. 34
2.2.8 Bridge ........................................................................................................................... 35
2.2.9 Repeater ....................................................................................................................... 35
2.3 What is a Server .................................................................................................................. 36
2.4 Types of Servers.................................................................................................................. 36
2.4.1 File Server .................................................................................................................... 36
2.4.2 Print Server .................................................................................................................. 36
2.4.3 Application Server ....................................................................................................... 36
2.4.4 Database Server............................................................................................................ 36
2.4.5 Web Server ................................................................................................................... 36
2.4.6 Mail Server ................................................................................................................... 37
2.4.7 DNS Server .................................................................................................................. 37
2.4.8 Proxy Server ................................................................................................................. 37
2.5 The 05 Best Small Business Server Options of 2023 ......................................................... 37
2.5.1 HPE ProLiant ML350 Gen10 ...................................................................................... 37
2.5.2 Dell PowerEdge T40 .................................................................................................... 38
2.5.3 Lenovo ThinkSystem SR550 ....................................................................................... 39
2.5.4 Dell PowerEdge T640 .................................................................................................. 40
2.5.5 Best Small Business NAS: Synology DiskStation DS220j ......................................... 41
2.6 My Selection ....................................................................................................................... 41
2.7 Inter-dependence of Workstation Hardware and Networking Software and Examples for
Networking Software That Can be used in Above Network Design ........................................ 42
Activity 03..................................................................................................................................... 47
3.1 Written Network Design Plan ............................................................................................. 47
3.2 My Network Design (Blue Print) ........................................................................................ 49
3.3 User Feedback and Analysis ............................................................................................... 50
3.3.1 Feedback Form ............................................................................................................. 50
3.3.2 Feedback Form Summary Charts ................................................................................. 55
3.3.3 Feedback Form Suggestions Received ........................................................................ 57
3.3.4 Feedback Form Overall Analysis ................................................................................. 58
3.4 Table That Shows the Departments, Devices used, Subnet Mask, VLAN and IP Subnetting
Scheme for the Above Scenario ................................................................................................ 59
3.5 The Devices Used to Create the Network ........................................................................... 61
3.6 The Software’s Used to Create the Network ...................................................................... 63
3.7 Maintenance Schedule ........................................................................................................ 64
3.8 Evaluation on the Implemented Network, Including the Design and Decisions that can be
Made to Enhance the System .................................................................................................... 66
Activity 04..................................................................................................................................... 67
4.1 Network Design Configurations Done Step by Step Including Installing and Configuring
Network Services, Devices and Application to Implement the System ................................... 67
4.2 Testing ................................................................................................................................. 86
4.3 Testing My Network ........................................................................................................... 87
4.3 Potential Future Enhancements That Could be Done for the Networked Systems ............ 94
4.4 My Reflection on the Implemented Network ..................................................................... 96
References ................................................................................................................................. 97
Table Of Figures
1.1 Introduction
Advantages:
• Less costly
• Other computers can work even if one stops working.
• Easy to setup and maintain.
Disadvantage:
• Since it doesn’t contain the centralized system, it cannot back up data.
• Contains security issues.
Advantages:
• Data can back up easily.
• Has a dedicated server that improves overall performance.
• Better security.
• Quick data sharing.
Disadvantages:
• Expensive.
• The cost of Network Operating Server (NOS) for the server is high.
• Requires a network administrator to manage resources (Anon., n.d.).
Figure 3 (LAN)
Characteristics:
• It’s a private network.
• Relatively higher speed.
• Contains various kinds of media access methods like token ring and ethernet.
Advantages:
• Less hardware cost since resources like printers, DVD-ROM, hard-disks could be
Disadvantages:
• Installation cost is high.
• Does not offer good privacy.
• Requires a LAN administrator due to constant failures in software and hardware setups.
Characteristics:
• Software files will be shared among all users.
• Can be used by any organizations to form its global integrated network.
Advantages:
• Covers a large geographical area.
• Works using radio transmitters and receivers built into client.
Disadvantages:
• Setup cost is high.
Figure 5 (MAN)
Characteristics:
• Mostly covers towns and cities.
• Mostly uses Fiber Optics.
• Data rates are sufficient for distributed computing applications.
Advantages:
• Fast communication.
• Supports an extensive size network.
Disadvantages:
• Need more cables.
• Tough to secure from hackers.
Figure 6 (CAN)
Advantages:
• High speed.
• Built-in error detection.
• Robust.
• Low cost to initialize.
Disadvantages:
• Doesn’t support maximum number of nodes.
• Maintenance is costly.
• Undesirable interactions between nodes.
Figure 7 (PAN)
Characteristics:
• Allows handling IT devices at the surrounding of a single user.
• Can be wirelessly connected to internet called WPAN.
Disadvantages:
• May establish bad connection to other network at the same radio bands.
• Covers only a limited distance.
Figure 8 (WLAN)
Characteristics:
• Includes an access point employed to attach the web.
• Uses radio signals, infrared beams or lasers to communicate.
• Follows a typical named IEEE 802.11.
• Easy to implement and use in house or other places.
Disadvantages:
• Requires license.
• Spreads a limited area.
• Data transfer rate decreases if number of connected devices increase.
• Communication may interfere due to bad weather.
• Low security (Anon., n.d.).
1.5 IEEE (Institute of Electrical and Electronics Engineers) and the IEEE SA (IEEE
Standard Organization)
The IEEE SA is not a body formally established organization by the government but rather a
community. The IEEE (Institute of Electrical and Electronics Engineers) is a professional
association that develops, defines and reviews electronics and computer science standards.
Their mission is to advance technology for the benefit of humanity.
• IEEE 802.11 – 1997: the WLAN standard was originally 1 Mbit/s and 2Mbit/s,
2.4 GHz RF and infrared (IR) standard (1997), all the others listed below are
Amendments to this standard, exceed for Recommended Practices 802.11F and
802.11T.
• IEEE 802.11a: 54 Mbit/s, 5 GHz standard (1999, shipping products in 2001).
• IEEE 802.11b: Enhancements to 802.11 to support 5.5 Mbit/s and 11 Mbit/s
(1999).
• IEEE 802.11c: Bridge operation procedures; included in the IEEE 802.1D
standard (2001).
• IEEE 802.11d: International (country-to-country) roaming extensions (2001).
Physical Topologies
Any structure interconnected to each other in a Local Area Network (LAN) is called
physical topology. The network is physically laid and acts as a map for various
devices to connect with each other showing how the cables and the type of cables
used in connecting the devices.
Advantages:
Disadvantages:
Advantages:
Disadvantages:
Advantages:
Disadvantages:
Disadvantages:
Advantages:
➢ Fast communication.
➢ Faults could be diagnosed easily.
➢ Provides security and privacy.
Disadvantages:
Advantages:
• Flexible.
• Networks could be isolated and prioritized from different computers.
• Easy to detect and correct errors.
Disadvantages:
Advantages:
• Very flexible.
• Network can be easily expanded.
• Reliable.
Disadvantages:
• Very challenging to design the architecture of a hybrid topology and to maintain it.
• Hubs used here are very expensive.
• Requires a lot of cabling and network devices
Advantages:
• Additional cables are not required.
Disadvantages:
• Speed reduces if number of nodes increases.
• All computer needs two transmitters and receivers for communication (Anon., n.d.).
6. Presentation Layer
Ensures whether the data is usable and prepares for transmission over the session layer
Data is encrypted over here.
5. Session Layer
4. Transport Layer
The layer transmits data using the transmitting protocols including TCP and UDP.
It controls how much data to be sent, at what rate and where it goes.
3. Network Layer
The network layer breaks up segments into network packets, reassembles the packets on
the receiving end and route the packets by selecting the best path.
1. Physical Layer
The layer is responsible for physical cable or wireless connection between network nodes
and transmission of raw data (0s and 1s).
➢ It consists of 04 layers:
1) Network Access Layer
Corresponds the combination of Data Link Layer and Physical Layer in OSI
model. Protocols here allows physical transmission of data.
2) Internet Layer.
Performs similar to the network layer in OSI model. The main protocols in this
layer are IP, ICMP and ARP.
3) Transport Layer.
4) Application Layer
It performs the functions of the Application, Presentation and Session Layers in
OSI model.
Advantages of TCP/IP model:
• Helps establish network connections in different types of computers.
• Work independent of the OS.
• Supports many network routings.
• Its and open protocol suite.
Unique Subnets: The use of unique subnets for each department ensures network
security and prevents unauthorized access to sensitive data. It also enables
efficient management of the network and allows for quick troubleshooting of
any issues that arise.
Intra-Branch Connectivity: The mesh network topology allows for conn ectivity
between the head office and Matara branch, enabling intra -branch
communication and collaboration between departments. This will facilitate
better coordination and improved decision -making processes, making it easier
for Alliance Health to achieve its business goals.
The use of OSPF as the routing protocol ensures efficient routing of data packets,
while SNMP can be used to monitor the network and diagnose problems. The
topology protocol also enables scalability, making it a cost -effective and
efficient solution for Alliance Health's networking needs. It allows the company
to easily add new departments or branches as needed, without causing disruption
to the existing network. This is particularly important for a growing company
like Alliance Health.
2.2.1 Hub
A hub is a basically multi-port repeater. A hub is a basic network device that connects multiple
devices in a local network and forwards data between them. Hubs cannot filter data, so data
packets are sent to all connected devices. They do not have the intelligence to find out the best
path for data packets which leads to inefficiencies and wastage.
Types of Hubs:
• Active Hub
• Passive Hub
• Intelligent Hub
A switch is a network device that connects multiple devices in a local network and forwards data
between them using MAC addresses. The switch can perform error checking before forwarding
data, which makes it very efficient as it does not forward packets that have errors and forward
good packets selectively to the correct port only. There are a number of types of switches.
2.2.3 Router
A router is a network device that connects multiple networks and forwards data packets between
them. Routers normally connect LANs and WANs and have a dynamically updating routing
table based on which they make decisions on routing the data packets.
A gateway is a passage to connect two networks that may work upon different networking
models. They work as messenger agents that take data from one system, interpret it, and transfer
it to another system. They are also called as protocol converter
2.2.5 Firewall
A firewall is a network device that inspects network traffic and blocks unauthorized access to the
network. Firewalls can be hardware or software-based and can enforce security policies to
protect against attacks.
A modem is a network device that converts digital signals from a computer into analog signals
that can be transmitted over a phone line or cable. Modems enable devices to connect to the
Internet and other networks.
Types of Modems:
• Simple.
• Half Duplex.
• Full Duplex.
2.2.8 Bridge
A bridge is a network device that connects two or more network segments together and forwards
data packets between them. It is a repeater, with add on the functionality of filtering content by
reading the MAC addresses of the source and destination. It is a 2-port device.
Types of Bridges:
• Transparent Bridges
• Source Routing Bridges
2.2.9 Repeater
A repeater regenerates the signal over the same network before the signal becomes too weak or
corrupted to extend the length to which the signal can be transmitted over the same network.
They do not amplify the signal. When the signal becomes weak, they copy it bit by bit and
regenerate it at its star topology connectors connecting if original strength improving the signal
strength. It’s a 2-port device (Anon., n.d.).
A file server shares files and folders, storage space to hold files and folders, or both, over a
network Networked computers are the intended clients, even though local programs can be
clients
Print servers are used to manage print queues and make printers available to multiple users on a
network which eliminates the hassle of physical access. Their clients are computers in need of
printing something.
An application server is a server that runs and manages applications that can be accessed by
client devices over the network. Their clients are computers with a web browser.
Cons:
• High-end configs are pricey
The Lenovo ThinkSystem SR3550 is a highly scalable 2U rackmount server with PCIe
expansion, hot-swappable drive bays, software RAID support, and dual second-generation Xeon
Platinum processors. The SR550 offers room to grow with hot-swap drive bays for up to 16 SFF
drives and support for dual power supplies. It also comes with Lenovo’s XClarity Controller for
easy maintenance and automation. A small business server with enterprise aspirations, the SR550
is a great foundation for a larger data center (Anon., n.d.).
The T640 is Dell's priciest tower server with dual Xeon sockets, support for up to 216TB
storage, dual 10Gb Ethernet, and multiple PCIe 3.0 x16 slots. Its extra PCIe slots and dual 10Gb
Ethernet are ideal for tasks such as machine learning, while its hardware RAID support, EMC
server tools, and hot-plug features make it a scalable solution for small businesses (Anon., n.d.).
Pros:
• Dual 10Gb Ethernet ports
• Hardware RAID support
Cons:
• Expensive
If it’s all about basic file storage in a business, a Synology NAS like the DiskStation DS220j is a
great option. With two drive bays, up to 32TB of storage, and useful software included, it's an
affordable solution (Anon., n.d.).
Pros:
• Very affordable
• Dedicated operating system
• Android & iOS apps
Cons:
• Limited & basic
2.6 My Selection
I recommend the HPE ProLiant ML350 Gen10 server for the Server Room at Alliance Health.
This server is a high-performance, reliable, and scalable option that can accommodate the needs
of a healthcare organization such as Alliance Health.
Moreover, the HPE ProLiant ML350 Gen10 is a highly scalable server that can accommodate
future growth of Alliance Health. It offers flexible expansion options for memory, storage, and
network connectivity, which allows the server to be easily upgraded as the organization's needs
change. Finally, HPE is a leading vendor in the server market and offers excellent support for
its products, including regular firmware and software updates, technical support, and service
options such as onsite maintenance.
The network design of Alliance Health involves connecting multiple workstations to each other
through a network. Workstation hardware refers to the physical components of a computer that
are required to perform various tasks such as processing data, storing information, and displaying
output. These components include
CPU (Central Processing Unit):
The CPU is the computer's brain, processing instructions from programs to input, store, and
output data. It has a control unit to interpret instructions and an ALU to perform arithmetic and
logic operations. Without a CPU, programs could not run on a computer (Anon., n.d.).
And some other components include Motherboard, Power Supply Unit, Cooling System (Fans,
Liquid Cooling, etc.), Input/Output devices (Keyboard, Mouse, Monitor, etc.), Workstation
chassis or case.
Hardware components alone cannot establish communication and connectivity on the network.
Networking software is also required to manage the data transmission, routing, and other
network functions. Networking software includes various protocols such as TCP/IP, HTTP, FTP,
DNS, and others that allow data to be transmitted across the network. Networking software also
includes applications such as firewalls, routers, switches, and hubs that help to manage and
control network traffic. Some examples of networking software that can be used in this scenario
include:
Network monitoring software: This software is used to monitor the performance and availability
of the network and its components. Examples of some network monitoring software that can be
used in this network design include:
• SolarWinds Network Performance Monitor: SolarWinds Network Performance Monitor
is a top-tier network monitoring tool that uses SNMP to collect device reports. Its support
advisors have deep technical knowledge and the product is highly customizable with an
easy-to-use interface. You can create customized dashboards, topology maps, alerts, and
more.
• PRTG Network Monitor from Paessler: PRTG Network Monitor is known for advanced
infrastructure management. It displays network performance and alerts in a hierarchical
Firewall software: Firewall software is used to protect the network from unauthorized access and
malware. In this scenario, firewall software can be used to secure the network from external
threats and restrict access to certain network resources. Some top Firewall software’s:
• SolarWinds Network Firewall Security Management: SolarWinds Security Event
Manager is a network firewall security management tool that provides continuous
monitoring and real-time event correlation to catch suspicious activities. It offers real-
time visibility into network firewall security and helps to detect security violations
through policy checks.
• ManageEngine Firewall Analyzer: It is a firewall management software suitable for
network and security admins of small to enterprise-scale private or government IT
infrastructures. The tool continuously monitors firewall logs to identify suspicious
activity and provides real-time visibility into firewall security. It helps to detect security
vulnerabilities in firewall policies.
• System Mechanic Ultimate Defense: A security, privacy, and performance suite with
anti-malware, password management, and malware removal features. It has System
Shield with proactive and reactive detection, and a Malware Killer with Scan Cloud-
based scanning.
• Norton Free Firewall: It is a part of Norton Antivirus and Norton Internet Security,
known as Smart Firewall. It blocks or flags programs using a database of programs.
Workstation hardware and networking software are two critical components of a computer
network that are closely interdependent on each other. Some examples of how they are related:
To ensure optimal network performance, it is essential to select hardware components that are
compatible with the networking software and to configure the software appropriately to work
with the hardware.
IP Addressing Scheme:
The IP addressing scheme that can be used for the network is IPv4. To avoid IP conflicts, we can
use private IP address ranges for all departments. Each department can be assigned a unique
subnet as requested in the scenario with the following IP address ranges:
Head Office:
Reception area: 10.1.1.0/24
Sales & Marketing Department: 10.1.2.0/24
Customer Services Area: 10.1.3.0/24
Administration Department: 10.1.4.0/24
HR Department: 10.1.5.0/24
Accounting & Finance Department: 10.1.6.0/24
Audit Department: 10.1.7.0/24
Business Development Department: 10.1.8.0/24
Video Conferencing Room: 10.1.9.0/24
IT Department: 10.1.10.0/24
Server Room: 10.254.10.0/24 (Static IPs)
Matara Branch:
Reception area: 10.2.1.0/24
Customer Services Area: 10.2.2.0/24
Administration Department: 10.2.3.0/24
HR Department: 10.2.4.0/24
Accounting & Finance Department: 10.2.5.0/24
IT Department: 10.2.6.0/24
Network Security (These won’t be implemented in my system here but could be done in real):
To secure the network, the following measures can be implemented:
Access control lists (ACLs) can be set up on the routers to restrict access to the network.
Virtual private network (VPN) connections can be established between the head office and the
branch in Matara to ensure secure communication between the two locations.
Firewalls can be installed to filter incoming and outgoing traffic.
Server Room:
The server room will be equipped with the following equipment:
Servers: Ten servers will be installed in the server room.
These also can be added but won’t be in my system for the scenario -
Storage Devices: Storage devices such as NAS or SAN will be installed to store data.
Backup System: A backup system will be installed to ensure data integrity and availability in
case of a disaster.
Network Management:
To manage the network, the following measures can be implemented (But I won’t be able to do it
in my system for now):
Network Monitoring: A network monitoring tool can be installed to monitor network activity and
troubleshoot any issues.
When it comes to security and accessibility, most users found my network design to be good, but
a few suggested that I could focus more on the security of the network. This is an important
consideration, as security is a crucial factor in any network design. I may want to consider
implementing additional security measures, such as firewalls or intrusion detection systems, to
further enhance the security of the network. In terms of future growth and expansion, most users
felt that my network design took these factors into account somewhat well or very well. This is a
positive sign, as it suggests that your design has room for growth and scalability.
Finally, the fact that most users were satisfied with my network design overall is a good
indication that I have created an effective and efficient design. However, it's important to
continue gathering feedback and making improvements where necessary to ensure that the
design remains up-to-date and meets the changing needs of the company. In addition, one user
suggested that I could potentially save costs by only using one switch instead of two for a
particular floor. Another user suggested reducing the number of PCs in the IT department to
make the space less compact.
Overall, the user feedback on my network design is largely positive, but there are a few areas
where I could potentially make some improvements to optimize the system and improve
efficiency. By taking these suggestions into account and continuing to gather feedback, I can
create a network design that meets the needs of the company and its users.
Head Office:
Department VLAN IP Address Subnet Mask Devices
Access point,
Reception area 10 10.1.1.0/24 255.255.255.0
phone, Switch
Sales team
Sales & computers (05),
Marketing 20 10.1.2.0/24 255.255.255.0 Laptops (02),
Department phone, printer,
Switch
Customer
service
Customer
30 10.1.3.0/24 255.255.255.0 computers (02),
Services Area
phone, printer,
Switch
Administration
computers (10),
Administration
40 10.1.4.0/24 255.255.255.0 Laptop (02),
Department
phone, printer,
Switch
HR team
computers (04),
HR phone, Laptop
50 10.1.5.0/24 255.255.255.0
Department (01), Access
point, printer,
Switch
Accounting & Accounting &
Finance 60 10.1.6.0/24 255.255.255.0 finance
Department computers (03),
Matara Branch:
Department VLAN IP Address Subnet Mask Devices
Access point,
Reception area 10 10.2.1.0/24 255.255.255.0
Switch
Switch 2960: The Cisco 2960 switch is a fixed-configuration switch designed for small to
medium-sized businesses. It supports advanced features, such as QoS (Quality of Service),
VLANs, and STP (Spanning Tree Protocol), and has built-in security features, such as ACLs
(Access Control Lists) and port security. In Packet Tracer, you can use the 2960 switch to
connect multiple devices within a single network and manage the flow of data between them.
Access point: An access point is a wireless networking device that allows wireless devices to
connect to a wired network. In Packet Tracer, you can use the access point to simulate a wireless
network and test the connectivity of wireless devices within the network. Access points typically
support different wireless standards, such as 802.11n and 802.11ac, and have built-in security
features, such as WPA2 (Wi-Fi Protected Access II) and MAC (Media Access Control) filtering.
Cisco wireless router: It provides a secure, reliable, and scalable wireless network. It offers
excellent security features, including encryption and access control, to protect my network from
unauthorized access and other security threats. Using a Cisco wireless router in my network can
ensure the confidentiality, integrity, and availability of the network.
IP Phone (7960): The Cisco 7960 IP Phone is a VoIP (Voice over Internet Protocol) phone that
supports SIP (Session Initiation Protocol) and SCCP (Skinny Client Control Protocol) protocols.
It has a built-in Ethernet switch that allows you to connect a PC to the phone and share the same
network connection. In Packet Tracer, you can use the 7960 IP Phone to simulate a VoIP
network and test the connectivity of IP phones within the network.
Printer: A printer is a device that allows you to print documents and other materials. In Packet
Tracer, you can use a printer to test the connectivity between a computer and a printer within a
network. Printers typically support different connection methods, such as USB, Ethernet, and
Wi-Fi, and have different printing technologies, such as laser and inkjet.
Laptop: A laptop is a portable computer that is similar to a PC but is designed to be more mobile.
In Packet Tracer, you can use a laptop to simulate a mobile device within a network and test its
connectivity with other devices. Laptops typically have built-in Wi-Fi and Ethernet connections,
as well as different hardware specifications, such as screen size and battery life.
Server: The server in Cisco Packet Tracer can be configured to provide specific services using a
variety of protocols, such as HTTP, FTP, SMTP, DNS, and DHCP. It can also be connected to
other network devices, such as routers, switches, and firewalls, to allow network users to access
its services. Using a server in Packet Tracer can provide many benefits and help to create a more
efficient and secure network environment.
Copper straight through cable: A straight-through cable is a type of Ethernet cable that is used to
connect different networking devices, such as a switch and a router. In Packet Tracer, you can
use a straight-through cable to connect different devices within a network. Straight-through
cables have the same wiring on both ends and are commonly used for connecting dissimilar
devices.
Copper cross-over cable: A crossover cable is a type of Ethernet cable that is used to connect
similar networking devices, such as a switch and a switch, or a PC and a PC.
I used Cisco Packet Tracer for building my network. It is a powerful network simulation tool that
allows users to create virtual network models and simulate the behaviour of network devices and
connections. It is a versatile platform that can be used to design, configure, and troubleshoot
network infrastructures of varying sizes and complexities. Packet Tracer offers a range of
features that enable users to create and configure network topologies, test network protocols, and
For the drawing of the network diagram (Blue print) I used Visual Paradigm. It is a cloud-based
visual modelling tool that allows users to create professional-looking diagrams, including
network topologies, traffic visualization, and device configuration. It offers a rich library of
symbols and supports various export options. Its collaboration and communication features make
it ideal for this. It is a powerful and user-friendly tool for network design and planning.
3.8 Evaluation on the Implemented Network, Including the Design and Decisions that can
be Made to Enhance the System
The network is well-organized and meets the requirements of the company. The use of a Mesh
network topology provides redundancy and ensures that there is no single point of failure. The IP
addressing scheme is also well thought-out and avoids conflicts by using private IP address
ranges for each department. The inclusion of switches, routers, and wireless access points
provides the necessary connectivity for the network. However, the lack of additional security
measures such as firewalls and access control lists are a potential area for improvement, as
suggested by user feedback.
The server room is adequately equipped with ten servers, although the addition of storage
devices and a backup system could enhance data availability and integrity. Network management
tools such as network monitoring, configuration management, and documentation are also
important components that can ensure optimal network performance and consistency. The Sales
and Marketing department's access to the network via Wi-Fi connectivity is a convenient
solution, although it is important to ensure that appropriate security measures are in place to
protect network resources.
In terms of user feedback, the suggestion to consider adding a cloud system to the network
design could potentially improve resource utilization and data transfer. The focus on network
The suggestion to reduce costs by using only one switch instead of two for a particular floor is
also worth considering, although it is important to ensure that this does not compromise network
performance. Similarly, reducing the number of PCs in the IT department could improve space
utilization and make the environment less congested.
Overall, the network design plan is well thought-out and meets the requirements of the company.
However, there are areas for improvement, and it is important to consider feedback from users to
optimize the system's efficiency and effectiveness.
Activity 04
4.1 Network Design Configurations Done Step by Step Including Installing and
Configuring Network Services, Devices and Application to Implement the System
Turning the Line connected between main switch and router Up in both departments
Trunking all the Switches in both the branches and setting the VTP mode as client except the
main switch
4.2 Testing
Testing refers to the process of verifying the functionality, performance, and security of a
network infrastructure, including its devices, protocols, and applications. The purpose of testing
is to identify any issues or defects that may affect the network's ability to meet its intended goals,
such as availability, reliability, and security.
Testing is crucial in networking because it helps to ensure that the network infrastructure is
working as expected, and that it can support the intended applications and services. Through
testing, we can identify and resolve issues before they impact the end-users, thereby improving
Actual Result
Actual Result
Actual Result
Actual Result
Actual Result
Actual Result
Actual Result
4.3 Potential Future Enhancements That Could be Done for the Networked Systems
There are several potential future enhancements that can be implemented to improve the security
and performance of the networked systems in the future. Here are some of them,
• Firewall: Implementing a firewall can add an extra layer of security to the network. The
firewall can be configured to restrict access to the network based on predefined rules, and
to monitor incoming and outgoing traffic for any malicious activity.
• Intrusion Prevention System (IPS): An IPS can be installed to detect and prevent any
attempts to exploit vulnerabilities in the network. It can also detect and block any known
attacks, and can alert the network administrator of any suspicious activity.
• Cloud-based Solutions: Cloud-based solutions can provide a more scalable and flexible
infrastructure for the network. This can also help reduce hardware costs and improve
reliability.
• Quality of Service (QoS): QoS can be implemented to prioritize network traffic and
ensure that critical applications and services receive the necessary bandwidth and
resources. This can help to improve application performance and user experience.
• Network Automation: Network automation can be implemented to automate routine
network management tasks and improve network efficiency. This can help to reduce
manual labour costs and minimize errors caused by manual configuration.
I am also pleased with the tests that were conducted, including ping, extended ping, trace route,
telnet, SSH, login, and VLAN tests. The majority of the tests had positive outcomes, which
indicates that the network is functioning as intended.
Looking towards the future, I believe that there are several potential enhancements that could be
implemented to further improve the network. These include the implementation of a firewall,
IPS, IDS, and SIEM tools to provide additional layers of security and advanced monitoring
capabilities. Additionally, setting up a baseline for the network, implementing advanced network
monitoring and management tools, and using storage devices such as NAS or SAN can help
improve performance, availability, and data backup and recovery. Overall, I am extremely
pleased with the network implementation and believe that it provides a solid foundation for the
Alliance Health network structure. With ongoing maintenance and periodic updates to address
emerging threats and technologies, I am confident that the network will continue to meet the
needs of the organization and support its continued success.
P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Assess common networking principles and how protocols
enable the effectiveness of networked systems.
P3
Discuss the operating principles of networking devices and
server types.
LO 1 & LO2
D1 Evaluate the topology protocol selected for a given scenario and
how it demonstrates the efficient utilisation of a networking
system.
LO3 : Design efficient networked systems
P5
Design a networked system to meet a given specification.
P6
Design a maintenance schedule to support the networked
system.
P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D2 Critically reflect on the implemented network, including the
design and decisions made to enhance the system.