0% found this document useful (0 votes)
25 views123 pages

Net Sample

This document outlines an assignment brief for the HND in Computing (Software Engineering) focusing on LAN Design & Implementation for Alliance Health. It includes assessment criteria, internal verification checklists, and detailed requirements for network design and implementation across two office locations. The assignment emphasizes the need for a structured report, adherence to guidelines, and the use of Harvard referencing, while also detailing specific tasks related to network principles, devices, and system implementation.

Uploaded by

amnawaz28
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views123 pages

Net Sample

This document outlines an assignment brief for the HND in Computing (Software Engineering) focusing on LAN Design & Implementation for Alliance Health. It includes assessment criteria, internal verification checklists, and detailed requirements for network design and implementation across two office locations. The assignment emphasizes the need for a structured report, adherence to guidelines, and the use of Harvard referencing, while also detailing specific tasks related to network principles, devices, and system implementation.

Uploaded by

amnawaz28
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 123

INTERNAL VERIFICATION – ASSIGNMENT BRIEF

Programme Title: HND in Computing (Software Engineering)

Assessor Name: Oshada Lokuhetty

Internal Verifier Name:

Unit or Component Number and


Title:
Unit 02 - Networking

Assignment title: LAN Design & Implementation for Alliance Health


Assessment criteria targeted by
this assignment brief:
LO1, LO2, LO3, LO4

Is this an Authorised Assignment N/A


Brief published by Pearson? If so,
has it been amended by the
Assessor in any way? Please give
details.
(If using the Authorised Assignment Brief
‘off the shelf’ with no amendments, please
answer the question marked * in the
checklist only)

Has this assignment been Yes No


submitted to the Assignment
Checking Service? √
(If Yes, please keep a copy of the ACS
feedback with this form)

INTERNAL VERIFIER CHECKLIST Y/N

Are the programme and unit details accurate? Y

*Are clear deadlines for assessment given? TBC

Is the time frame of an appropriate duration? Y

Is there a suitable vocational scenario or context? Y

Are the assessment criteria to be addressed stated accurately? Y

Does each task show which criteria are being addressed? Y

Do the tasks meet the assessment requirements of the unit/s? Y

Is it clear what evidence the learner needs to generate? Y

Is it likely to generate evidence that is valid and sufficient? Y

Overall, is the Assignment fit for purpose? Yes √ No


*If ‘No’ is recorded the Internal Verifier must recommend actions detailing the issues to be addressed. The Assessor and
the Internal Verifier must then confirm that the action has been undertaken and that the Assignment Brief is authorised
for use before being issued to learners.
Target Date Date
Action required:
for Action
(If none then please state n/a)
Completion Completed

General Comments (if appropriate)

Assignment Brief Authorised for Use:

Internal Verifier signature Date

Assessor signature
Date

Lead Internal Verifier signature (if


appropriate)
[email protected] Date 2022/06/13
Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)
INTERNAL VERIFICATION – ASSESSMENT DECISIONS

Programme title BTEC Higher National Diploma in Computing (Software Engineering)

Assessor Internal Verifier


Unit 02: Networking
Unit(s)

Assignment title LAN Design & Implementation for Alliance Health


Mohommed Naushad Mohommed Nabeel
Student’s name
List which assessment criteria Pass Merit Distinction
the Assessor has awarded.

INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded match


those shown in the assignment brief? Y/N

Is the Pass/Merit/Distinction grade awarded


justified by the assessor’s comments on the Y/N
student work?
Has the work been assessed
Y/N
accurately?
Is the feedback to the student:
Give details:
• Constructive? Y/N
• Linked to relevant assessment criteria? Y/N
• Identifying opportunities for Y/N
improved performance?
• Agreeing actions? Y/N
Does the assessment decision need
Y/N
amending?

Assessor signature Date

Internal Verifier signature Date


Programme Leader signature (if required)
Date

Confirm action completed


Remedial action taken
Give details:

Assessor signature Date

Internal Verifier
Date
signature
Programme Leader
Date
signature (if required)
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID E181097

Unit Title Unit 02: Networking

Assignment Number 1 Assessor


27/03/2023 Date Received 05/12/2022
Submission Date
1st submission
Date Received 2nd
Re-submission Date
submission

Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction P1 P2 M1 D1
Descripts

LO2 Explain networking devices and operations.


Pass, Merit & Distinction P3 P4 M2
Descripts

LO3 Design efficient networked systems.


Pass, Merit & Distinction P5 P6 M3 D2
Descripts

LO4 Implement and diagnose networked systems.


Pass, Merit & Distinction P7 P8 M4
Descripts

Grade: Assessor Signature: Date:

Resubmission Feedback:

Grade: Assessor Signature: Date:

Internal Verifier’s Comments:

Signature & Date:

* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.
Assignment Feedback
Formative Feedback: Assessor to Student
Network protocols to be explained a little bit more

Action Plan
Went more through network protocols and explained more thoroughly about them

Summative feedback

Feedback: Student to Assessor

Thank you for your valuable feedback and guidance. Your assessments have been
insightful and helped me improve my work. Thank you so much for being really kind and
friendly along this journey too...

Assessor Date
signature

Student E181097 Date 27/03/2023


signature
Pearson Higher Nationals in
Computing
Unit 02: Networking
Assignment 01
General Guidelines

1. A Cover page or title page – You should always attach a title page to your assignment. Use previous
page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.

Word Processing Rules

1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.

Important Points:

1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory
information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the
before mentioned compulsory information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will then
be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and
a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course
Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct form. I further understand what it means to copy
another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of Pearson UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my own,
and where I have made use of another’s work, I will attribute the source in the correct way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Pearson, UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.

Student’s Signature: Date:


(E181097) (27/03/2023)
Higher National Diploma in Computing
Assignment Brief
Student Name /ID Number E181097

Unit Number and Title Unit 2: Networking

Academic Year 2022/23

Unit Tutor

Assignment Title LAN Design & Implementation for Alliance Health

Issue Date 05/12/2022

Submission Date 27/03/2023

IV Name & Date

Submission format

The submission should be in the form of an individual report written in a concise, formal business style
using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using Harvard
referencing system. Please also provide an end list of references using the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures,
although you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:

LO1 Examine networking principles and their protocols.

LO2 Explain networking devices and operations.

LO3 Design efficient networked systems.

LO4 Implement and diagnose networked systems.

Assignment Brief and Guidance:


Scenario

Alliance Health is a technology-enabled solutions company that optimizes the revenue cycle of the
US healthcare industry where its global delivery center is located in Colombo. The company is
planning to expand their business operations with their latest branch at Matara and wants it to be
one of the state-of-the-art companies in Matara with the latest facilities.

Assume you have been appointed as the new network analyst of Alliance Health to plan, design and
restructure the existing network. Prepare a network architectural design and implement it with your
suggestions and recommendations to meet the company requirements.
The floor plan of the head office in Colombo is as follows:
Floor 1:
• Reception area
• Sales & Marketing Department (10 employees)
• Customer Services Area – with Wi-Fi facilities

Floor 2:
• Administration Department (30 Employees)
• HR Department (20 employees)
• Accounting & Finance Department (15 employees)
• Audit Department (5 employees)
• Business Development Department (5 employees)

Floor 3
• Video conferencing room
• IT Department (60 employees)
• The Server Room
The floor plan of the branch in Matara is as follows:
Floor 1:
• Reception area
• Customer Services Area– with Wi-Fi facilities

Floor 2:
• Administration Department (10 Employees)
• HR Department (7 employees)
• Accounting & Finance Department (8 employees)
• IT Department (50 employees)

Foll ow i ng r equir ements ar e g iv en by the Manag ement.


• All the departments mus t be separ ated with uni que subnet .

• T he c onfer enci ng r oom of the head offic e and Customer S erv ic es Ar ea s of each
branch are to be equipped w ith Wi -Fi c onnec ti ons .

• C onnec tivi ty betw een tw o br anc hes (Head Office and M atara ) wo uld allow the
intra branch co nnectiv ity between departments. (Use o f VP N is no t com pulso ry)

• T he nec ess ary I P addr ess cl asses and r ang es m ust be decided by the network
designer and sho uld be use d fo r all the departments except the serv er r oom .

• N umber of s erv ers r equi red for the S erv er r oom need to be decided by the Netwo rk
designer and sho uld be assi gned with 10 .254. 10.0/ 24 subnet. (Uses static IPs)

• S al es and Marketi ng Team also needs to access Netwo rk resources usi ng WI FI


co nnectiv ity .

( N ot e : C l e a r l y s t at e y o ur a ss u m pt i o n s . Y ou a re a l l o w e d t o d es i g n t h e ne t w o r k a c c o r d i ng t o y ou r
a s s um p t i on s , bu t m a i n r e q u i r e m en t s sh o u l d n ot b e v i o l a te d )
Ac tiv ity 01
• D iscuss the benefits and co nstraints o f different netwo rk system types that can be
im plemented in the Matara branch and the m ain IEEE Ethernet standards that can
be used in above L AN and WLAN design .

• D iscuss the im po rtance and im pact o f netwo rk to po lo g ies and assess the m ain
netwo rk proto co l suites that are used in netwo rk design using exam ples .
Recommend suitable netwo rk to po lo gy and netwo rk pro to col s for above scenario
and evaluate with v alid po in ts how the recommended to po lo gy demo nstrates the
efficient utilizatio n o f the netwo rking system of M atara branch.

Ac tiv ity 02
• D iscuss the operating principles o f network dev ices (Ex: Ro uter, Switch, Etc.) and
server ty pes that can be used fo r abov e scenario while explo ring different serv ers
that are av ailable in today’s market with their specifications . Re commend
server/ servers fo r the abov e scenario and justify your selectio n with v alid po ints .

• D iscuss the inter -dependence o f workstatio n hardware and netwo rking so ftware
and prov ide exam ples for netwo rking so ftware that can be used in abov e network
design.

Ac tiv ity 03
• P repare a written netwo rk design plan to m eet the abo ve -mentio ned user
requirements including a blueprint drawn using a mo deling too l ( Ex: M icro so ft Visio ,
EdrawM ax) .Test and evaluate the pro posed design by analyzing user feedback with
the aim o f optimizing yo ur design and im prov ing efficiency.

(Suppo rt y our answer by prov iding the VLAN and IP subnetting schem e fo r the abov e
scenario and the list of dev ices, netwo rk com po nents and software used to design the
netwo rk for abo ve scenario and while justifying yo ur selectio ns. )
• Install and co nfigure Netwo rk serv ices , dev ices and applicatio ns (Ex: VL AN, WiFi,
D NS, Pro xy , Web, Etc.) acco rding to the pro po sed design to accom plish the user
requirements and design a detailed M aintenance schedule for abov e Netwo rk.

*N ote: - Scr een s hots of C onfig ur ati on scri pts shoul d be pr esented.

Ac tiv ity 04
• Im plement a netwo rked system based on yo ur prepared design with v alid
evidence s.

• D evelo p test cases and co nduct verificatio n (Ex: P ing, extended ping, trace ro ute,
telnet, SSH, etc.) to test the above Network and analyse the test results against
the expected results. Recomm end potential future enhancem ents for the
netwo rked sy stem with v alid justificatio ns and critically reflect on the
im plemented netwo rk, including the plan, desig n, configurations, test s and the
decisio ns m ade to enhance the system .
Acknowledgement

As I sit here reflecting on the completion of this assignment, I am overwhelmed with gratitude
for all those who have helped me along the way. From the early brainstorming sessions to the
final proofreading, the support and guidance of those around me have been invaluable. I would
like to take this opportunity to express my sincere appreciation to those who have contributed to
this project, in ways big and small.

First and foremost, I would like to thank my Lecturers for their unwavering commitment to my
education and for pushing me to new heights of academic achievement. Their expertise and
enthusiasm have been truly inspiring, and I am grateful for the knowledge and skills I have gained
through their instruction. Thank you so much Mr. Sudesh.

I would also like to extend a heartfelt thank you to my classmates and friends who have provided
endless support and encouragement throughout this process. Your thoughtful insights,
constructive feedback, and unwavering support have been an invaluable source of motivation for
me.

Last but certainly not least, I would like to acknowledge the love and support of my family. Your
unwavering belief in me and your constant encouragement have been the foundation of my
success, and I am forever grateful for all that you do.
In closing, I would like to express my gratitude to all those who have played a role in bringing
this project to fruition. Your contributions have not gone unnoticed, and I am grateful for the
impact you have had on my growth and development as a student and as a person.
Table of Contents
Activity 01....................................................................................................................................... 1
1.1 Introduction ........................................................................................................................... 1
1.2 What is a Network................................................................................................................. 1
1.3 Types of Network Architecture ............................................................................................. 1
1.3.1 Peer-To Peer Network .................................................................................................... 2
1.3.2 Client/Server Network ................................................................................................... 3
1.4 Types of Networks ................................................................................................................ 4
1.4.1 LAN (Local Area Network) ........................................................................................... 4
1.4.2 WAN (Wide Area Network) .......................................................................................... 5
1.4.3 MAN (Metropolitan Area Network) .............................................................................. 7
1.4.4 CAN (Campus Area Network) ....................................................................................... 8
1.4.5 PAN (Personal Area Network) ...................................................................................... 9
1.4.6 WLAN (Wireless Local Area Network) ...................................................................... 10
1.5 IEEE (Institute of Electrical and Electronics Engineers) and the IEEE SA (IEEE Standard
Organization) ............................................................................................................................ 11
1.6 IEEE Ethernet Standards ..................................................................................................... 11
1.6.1 IEEE Ethernet Standards for LAN: .............................................................................. 11
1.6.2 IEEE Ethernet Standards for WLAN: .......................................................................... 12
1.7 Network Topologies ............................................................................................................ 13
1.7.1 Point to Point Topology ............................................................................................... 13
1.7.2 Bus Topology ............................................................................................................... 14
1.7.3 Ring Topology ............................................................................................................. 15
1.7.4 Star Topology ............................................................................................................... 17
1.7.5 Mesh Topology ............................................................................................................ 18
1.7.6 Tree Topology .............................................................................................................. 19
1.7.7 Hybrid Topology .......................................................................................................... 20
1.7.8 Daisy Chain Topology ................................................................................................. 21
1.8 Network Protocols............................................................................................................... 22
1.8.1 Management Protocols ................................................................................................. 22
1.8.2 Security Protocols ........................................................................................................ 23
1.8.3 Communication Protocols ............................................................................................ 23
1.9 Some Other Types of Protocols .......................................................................................... 24
1.10 OSI Model ......................................................................................................................... 25
1.11 TCP/IP Model ................................................................................................................... 27
1.12 Network Design ................................................................................................................ 28
1.13 Suitable Network Topology and Network Protocols for The Above Scenario and Reason
for My Suggestion..................................................................................................................... 29
1.14 Efficient Utilization of the Networking System of Matara Branch .................................. 29
Activity 02..................................................................................................................................... 31
2.1 What are Network Devices ................................................................................................. 31
2.2 Types and Operating principles of Network Devices ......................................................... 31
2.2.1 Hub ............................................................................................................................... 31
2.2.2 Switch........................................................................................................................... 32
2.2.3 Router ........................................................................................................................... 32
2.2.4 Gateway ....................................................................................................................... 33
2.2.5 Firewall ........................................................................................................................ 33
2.2.6 Modem ......................................................................................................................... 34
2.2.7 Access point ................................................................................................................. 34
2.2.8 Bridge ........................................................................................................................... 35
2.2.9 Repeater ....................................................................................................................... 35
2.3 What is a Server .................................................................................................................. 36
2.4 Types of Servers.................................................................................................................. 36
2.4.1 File Server .................................................................................................................... 36
2.4.2 Print Server .................................................................................................................. 36
2.4.3 Application Server ....................................................................................................... 36
2.4.4 Database Server............................................................................................................ 36
2.4.5 Web Server ................................................................................................................... 36
2.4.6 Mail Server ................................................................................................................... 37
2.4.7 DNS Server .................................................................................................................. 37
2.4.8 Proxy Server ................................................................................................................. 37
2.5 The 05 Best Small Business Server Options of 2023 ......................................................... 37
2.5.1 HPE ProLiant ML350 Gen10 ...................................................................................... 37
2.5.2 Dell PowerEdge T40 .................................................................................................... 38
2.5.3 Lenovo ThinkSystem SR550 ....................................................................................... 39
2.5.4 Dell PowerEdge T640 .................................................................................................. 40
2.5.5 Best Small Business NAS: Synology DiskStation DS220j ......................................... 41
2.6 My Selection ....................................................................................................................... 41
2.7 Inter-dependence of Workstation Hardware and Networking Software and Examples for
Networking Software That Can be used in Above Network Design ........................................ 42
Activity 03..................................................................................................................................... 47
3.1 Written Network Design Plan ............................................................................................. 47
3.2 My Network Design (Blue Print) ........................................................................................ 49
3.3 User Feedback and Analysis ............................................................................................... 50
3.3.1 Feedback Form ............................................................................................................. 50
3.3.2 Feedback Form Summary Charts ................................................................................. 55
3.3.3 Feedback Form Suggestions Received ........................................................................ 57
3.3.4 Feedback Form Overall Analysis ................................................................................. 58
3.4 Table That Shows the Departments, Devices used, Subnet Mask, VLAN and IP Subnetting
Scheme for the Above Scenario ................................................................................................ 59
3.5 The Devices Used to Create the Network ........................................................................... 61
3.6 The Software’s Used to Create the Network ...................................................................... 63
3.7 Maintenance Schedule ........................................................................................................ 64
3.8 Evaluation on the Implemented Network, Including the Design and Decisions that can be
Made to Enhance the System .................................................................................................... 66
Activity 04..................................................................................................................................... 67
4.1 Network Design Configurations Done Step by Step Including Installing and Configuring
Network Services, Devices and Application to Implement the System ................................... 67
4.2 Testing ................................................................................................................................. 86
4.3 Testing My Network ........................................................................................................... 87
4.3 Potential Future Enhancements That Could be Done for the Networked Systems ............ 94
4.4 My Reflection on the Implemented Network ..................................................................... 96
References ................................................................................................................................. 97
Table Of Figures

Figure 1 (Peer-to-Peer network) .................................................................................................. 2


Figure 2 (Client/Server network)................................................................................................. 3
Figure 3 (LAN) .............................................................................................................................. 4
Figure 4 (WAN) ............................................................................................................................. 6
Figure 5 (MAN) ............................................................................................................................. 7
Figure 6 (CAN) .............................................................................................................................. 8
Figure 7 (PAN) .............................................................................................................................. 9
Figure 8 (WLAN) ........................................................................................................................ 10
Figure 9 (Point-to-Point topology) ............................................................................................. 14
Figure 10 (Bus Topology) ........................................................................................................... 15
Figure 11 (Ring Topology) ......................................................................................................... 16
Figure 12 (Star Topology) .......................................................................................................... 17
Figure 13 (Mesh Topology) ........................................................................................................ 19
Figure 14 (Tree Topology) .......................................................................................................... 20
Figure 15 (Hybrid Topology) ..................................................................................................... 21
Figure 16 (OSI Model) ................................................................................................................ 25
Figure 17 (TCP/IP Model) .......................................................................................................... 27
Activity 01

1.1 Introduction

Alliance Health is a technology-enabled solutions company which is planning to expand their


business operations with their latest branch at Matara and wants it to be one of the state-of-the-
art companies in Matara with the latest facilities. They me want to prepare a network architectural
design and implement it with the most efficient suggestions and recommendations to meet the
company requirements.

1.2 What is a Network


A computer network consists of multiple devices linked with each other to transfer data, share
resources and exchange files. The devices are linked using cables, telephone lines, radio
waves, satellites or infrared beams. Networks are categorized depending on structure, size,
bandwidth.
Features of computer network:
• Back up and roll back is easy.
• File sharing.
• Software and hardware sharing.
• Speed of communication.
• Security.
• Scalability.
• Reliability (Anon., 2022).

1.3 Types of Network Architecture


A computer network architecture is the physical and logical design of the software, hardware,
protocols and media of data transmission. It shows how the computers are organized and the
respective tasks are allocated.
➢ The two main network architecture types are:

Nabeel Naushad Networking 01


1
1.3.1 Peer-To Peer Network
In this network the computers are linked together with equal privilege and responsibilities for
processing data. Used in small environments and doesn’t have a unique server.

Figure 1 (Peer-to-Peer network)

Advantages:
• Less costly
• Other computers can work even if one stops working.
• Easy to setup and maintain.

Disadvantage:
• Since it doesn’t contain the centralized system, it cannot back up data.
• Contains security issues.

Nabeel Naushad Networking 01


2
1.3.2 Client/Server Network
Designed for end users (Clients) to access resources such as video, songs etc. from the server.
The server is responsible for all major operations and management or resources such as files,
printer etc.

Figure 2 (Client/Server network)

Advantages:
• Data can back up easily.
• Has a dedicated server that improves overall performance.
• Better security.
• Quick data sharing.

Disadvantages:
• Expensive.
• The cost of Network Operating Server (NOS) for the server is high.
• Requires a network administrator to manage resources (Anon., n.d.).

Nabeel Naushad Networking 01


3
1.4 Types of Networks
There are a number of network types. Here are few popular types of networks that could be
used;

1.4.1 LAN (Local Area Network)


This network interconnects computers and devices within a limited area such as a school,
laboratory, home or office.

Figure 3 (LAN)

Characteristics:
• It’s a private network.
• Relatively higher speed.
• Contains various kinds of media access methods like token ring and ethernet.

Advantages:
• Less hardware cost since resources like printers, DVD-ROM, hard-disks could be

Nabeel Naushad Networking 01


4
shared.
• Same software could be used.
• Data could be stored at a single hard-disk of server computer.
• Easy data transfer.
• Data are more secure.
• Able to share a single internet connection.

Disadvantages:
• Installation cost is high.
• Does not offer good privacy.
• Requires a LAN administrator due to constant failures in software and hardware setups.

1.4.2 WAN (Wide Area Network)


It’s a computer network that extends over a large geographical area. There are 03 types of
WAN networks;
1. Internet
2. Enterprise network
3. Global network

Nabeel Naushad Networking 01


5
Figure 4 (WAN)

Characteristics:
• Software files will be shared among all users.
• Can be used by any organizations to form its global integrated network.
Advantages:
• Covers a large geographical area.
• Works using radio transmitters and receivers built into client.
Disadvantages:
• Setup cost is high.

Nabeel Naushad Networking 01


6
• High maintenance.
• There are more errors and issues.
• Lower security compared to other networks.

1.4.3 MAN (Metropolitan Area Network)


A network that is larger than LAN and smaller that WAN located in a single geographical area.
Ex: Cable TV network, ATM, FDDI etc.

Figure 5 (MAN)

Characteristics:
• Mostly covers towns and cities.
• Mostly uses Fiber Optics.
• Data rates are sufficient for distributed computing applications.
Advantages:
• Fast communication.
• Supports an extensive size network.

Nabeel Naushad Networking 01


7
• Supports data transfer in both directions concurrently.

Disadvantages:
• Need more cables.
• Tough to secure from hackers.

1.4.4 CAN (Campus Area Network)


A computer network that spans a limited geographical area such as a university campus
building. It interconnects multiple LANs within a campus or corporate.

Figure 6 (CAN)

Advantages:
• High speed.
• Built-in error detection.
• Robust.
• Low cost to initialize.

Nabeel Naushad Networking 01


8
• Flexible.

Disadvantages:
• Doesn’t support maximum number of nodes.
• Maintenance is costly.
• Undesirable interactions between nodes.

1.4.5 PAN (Personal Area Network)


It is a network that connects devices within an individual person’s workspace.

Figure 7 (PAN)

Characteristics:
• Allows handling IT devices at the surrounding of a single user.
• Can be wirelessly connected to internet called WPAN.

Nabeel Naushad Networking 01


9
Advantages:
• Secure and safe.
• Offers short-range solution up to 10 meters.

Disadvantages:
• May establish bad connection to other network at the same radio bands.
• Covers only a limited distance.

1.4.6 WLAN (Wireless Local Area Network)


It is a similar to a LAN but does not rely on cables to connect to connect to the network. WIFI
is a type of WLAN.

Figure 8 (WLAN)

Characteristics:
• Includes an access point employed to attach the web.
• Uses radio signals, infrared beams or lasers to communicate.
• Follows a typical named IEEE 802.11.
• Easy to implement and use in house or other places.

Nabeel Naushad Networking 01


10
Advantages:
• Reliable
• It’s a versatile way of communication.
• Easy to feature or remove workstations.
• Able to connect devices from anywhere within the access point.

Disadvantages:
• Requires license.
• Spreads a limited area.
• Data transfer rate decreases if number of connected devices increase.
• Communication may interfere due to bad weather.
• Low security (Anon., n.d.).

1.5 IEEE (Institute of Electrical and Electronics Engineers) and the IEEE SA (IEEE
Standard Organization)
The IEEE SA is not a body formally established organization by the government but rather a
community. The IEEE (Institute of Electrical and Electronics Engineers) is a professional
association that develops, defines and reviews electronics and computer science standards.
Their mission is to advance technology for the benefit of humanity.

1.6 IEEE Ethernet Standards

1.6.1 IEEE Ethernet Standards for LAN:


The IEEE ethernet standards define the rules for configuring an ethernet network and also
specifies how an ethernet network communicate with one another. It defines the physical layer
and data link layers media access control (MAC) of wired ethernet. Ethernet is defined in a
number of IEEE 802.3 standards (Anon., n.d.).
Few IEEE 802.X:
• IEEE 802 – LAN/MAN

Nabeel Naushad Networking 01


11
• IEEE 802.1 – Standards for LAN/MAN bridging and management and remote
media access control (MAC) bridging.
• IEEE 802.2 – Standards or Logical Link Control (LLC) standards for
connectivity.
• IEEE 802.3 – Ethernet Standards for Center Multiple Access with Collision
Detection. (CSMA/CD)
• IEEE 802.4 – Standards for token passing bus access.
• IEEE 802.5 – Standards for token ring access and for communications between
LANs MANs.
• IEEE 802.6 – Standards for information exchange between systems.
• IEEE 802.7 – Standards for broadband LAN cabling.
• IEEE 802.8 – Fiber optic connection.
• IEEE 802.9 – Standards for integrated services, like voice and data.
• IEEE 802.10 – Standards for LAN/MAN security implementations.

1.6.2 IEEE Ethernet Standards for WLAN:


The standard working group on wireless local area networks, popularly known as
WIFI is IEEE 802.11. There are several standards of IEEE 802.11 WLANs.

Standards of IEEE 802.11:

• IEEE 802.11 – 1997: the WLAN standard was originally 1 Mbit/s and 2Mbit/s,
2.4 GHz RF and infrared (IR) standard (1997), all the others listed below are
Amendments to this standard, exceed for Recommended Practices 802.11F and
802.11T.
• IEEE 802.11a: 54 Mbit/s, 5 GHz standard (1999, shipping products in 2001).
• IEEE 802.11b: Enhancements to 802.11 to support 5.5 Mbit/s and 11 Mbit/s
(1999).
• IEEE 802.11c: Bridge operation procedures; included in the IEEE 802.1D
standard (2001).
• IEEE 802.11d: International (country-to-country) roaming extensions (2001).

Nabeel Naushad Networking 01


12
• IEEE 802.11f: Inter-Access Point Protocol (2003) Withdrawn February 2006.
• IEEE 802.11g: 54 Mbit/s, 2.4 GHz standard (backwards compatible with b)
(2003).
• IEEE 802.11h: Spectrum Managed 802,11a (5 GHz) for European compatibility
(2004).
• IEEE 802.11i: Enhanced security (2004)
• IEEE 802.11j: Extensions for Japan (2004).
• IEEE 802.11-2007: A new release of the standard that includes amendments a,
b. d, e, g, h, i and j.

1.7 Network Topologies


Network topologies are the arrangement of the devices in a communication network. There are
numerous ways the network could be arranged, all with different pros and cons and the type of
use expected from the user. Topologies could be divided into physical and logical. The
ethernet protocol is the most common protocol used for logical topology.

Physical Topologies
Any structure interconnected to each other in a Local Area Network (LAN) is called
physical topology. The network is physically laid and acts as a map for various
devices to connect with each other showing how the cables and the type of cables
used in connecting the devices.

➢ Types of physical network topologies:

1.7.1 Point to Point Topology


Point to Point topology is the simplest topology that connects 02 nodes with a common link.
When changing a channel in TV using a remote a point-to-point connection is established.

Nabeel Naushad Networking 01


13
Figure 9 (Point-to-Point topology)

Advantages:

• Has the highest bandwidth.


• Very fast.
• Easy to connect, handle and maintain.

Disadvantages:

• Can only be used in very small areas.


• If any of the two nodes stop working, data cannot be transferred.

1.7.2 Bus Topology


It is a type of network where all the devices and computers are connected to a single central
cable. Terminators are connected to the ends of the topology to delete bouncing data.
Establishing this topology is much easier than any other topologies.

Nabeel Naushad Networking 01


14
Figure 10 (Bus Topology)

Advantages:

• Coaxial or twisted pairs cables are mostly used.


• Cost for cable is less.
• Installation and troubleshooting techniques are easy and well-known.

Disadvantages:

• If the main cable fails the whole system crashes.


• If network traffic is high, it increases collisions in the network.
• Adding new devices may slow down the network.
• low security.

1.7.3 Ring Topology


The topology forms a ring connecting the devices with exactly two other neighboring devices.
Repeaters are used to prevent data loss. The signals travel in a loop in one direction and pass
through each computer until it reaches the destination.

Nabeel Naushad Networking 01


15
Figure 11 (Ring Topology)

Advantages:

• Data transmission is high speed.


• Collisions are minimum.
• Cheap to install.
• Less costly in maintenance and so than a star topology.

Disadvantages:

• Failure in a single node can collapse the entire network.


• Troubleshooting is difficult.
• Addition or removal of stations could disturb the network.

Nabeel Naushad Networking 01


16
• Less secure.

1.7.4 Star Topology


In star topology, all the devices are connected to a single hub through cable. The hub is the
central node and all other nodes are connected to it. Coaxial cables or RJ 45 cables are used to
connect the computers.

Figure 12 (Star Topology)

Nabeel Naushad Networking 01


17
Advantages:

• Easy to set up.


• Each device only needs one port to connect to the hub.
• Its Robust.
• Easy to detect fault and isolate.
• Cost-effective.

Disadvantages:

• If the central hub fails the whole system fails.


• Installation Cost is high.
• The performance is based on the hub.

1.7.5 Mesh Topology


In Mesh topology all devices are connected to another via particular channel.

➢ Mesh topology comes in two types;


1. Full Mesh.
2. Partial Mesh.

Nabeel Naushad Networking 01


18
Figure 13 (Mesh Topology)

Advantages:

➢ Fast communication.
➢ Faults could be diagnosed easily.
➢ Provides security and privacy.

Disadvantages:

➢ Installation and configuration are difficult.


➢ Cost of cables is high.
➢ Maintenance cost is high.

1.7.6 Tree Topology


A tree topology network is arranged similar to the branches of a tree. This network uses both
star and bus topology. Single node failure doesn’t cause network failure.

Nabeel Naushad Networking 01


19
Figure 14 (Tree Topology)

Advantages:

• Flexible.
• Networks could be isolated and prioritized from different computers.
• Easy to detect and correct errors.

Disadvantages:

• If the central hub fails the entire system fails.


• Costly.
• If new devices are added, it’s difficult to reconfigure.

1.7.7 Hybrid Topology


This topology is a combination of all the types of topologies above (Bus, Ring, Star, Mesh,
Tree). Used when the nodes are free to take any form, for example could be a combination of
ring and star or a combination of any other types.

Nabeel Naushad Networking 01


20
Figure 15 (Hybrid Topology)

Advantages:
• Very flexible.
• Network can be easily expanded.
• Reliable.

Disadvantages:
• Very challenging to design the architecture of a hybrid topology and to maintain it.
• Hubs used here are very expensive.
• Requires a lot of cabling and network devices

1.7.8 Daisy Chain Topology


The network connects one network node to the other in a chain or line without a dominant
device. A Daisy Chain topology can be ring or linear.

Advantages:
• Additional cables are not required.

Nabeel Naushad Networking 01


21
• Simple and fast data transmission.
• Less costly to setup.

Disadvantages:
• Speed reduces if number of nodes increases.
• All computer needs two transmitters and receivers for communication (Anon., n.d.).

1.8 Network Protocols


Network protocol is a set of rules used to format and process data. It is used as a common
language by computer to communicate with each other. Network protocols can be
categorized into 03:

1.8.1 Management Protocols


Helps describe the process and rules that maintain and monitor the network, communicates the
requirements across the network and also helps with trouble shooting network connection
between client and host.
• Examples of management protocols are ICMP, FTP, POP3, SNMP, Gopher and Telnet.

Simple Network Management Protocol (SNMP)


SNMP is a way of talking to network elements that you want to monitor. More specifically and
technically, it’s a standard protocol defined by the Internet Architecture Board used for
managing network devices connected over an IP. SNMP allows devices on a network to
communicate, regardless of hardware and software. It is the most ubiquitous way to monitor
network devices today.

Virtual Local Area Networks (VLANs)


VLANs (Virtual Local Area Networks) is a protocol used to create logical subnetworks within a
physical network, enabling network administrators to group devices based on factors such as
location, function, or security. VLANs improve network management, security, and performance
by reducing broadcast traffic and creating isolated virtual networks.

Nabeel Naushad Networking 01


22
Internet Control Message Protocol (ICMP)
ICMP a network monitoring protocol that’s designed specifically for error reporting. Network
devices rely on ICMP to transmit error messages. ICMP is a connectionless protocol which is
not associated with transport layer protocols like TCP or UDP (Anon., n.d.).

1.8.2 Security Protocols


Secures data by ensuring unauthorized users can’t access the network data.
• Examples of security protocols are TSL, HTTPS and SSL.

Secure Sockets Layer protocol (SSL)


SSL is an encryption-based Internet security protocol that protects confidentiality and integrity
of data. It is used to ensure the privacy and authenticity of data over the internet. TLS/SSL
website has “HTTPS” in its URL rather than “HTTP”.

Transport Layer Security (TLS)


Transport Layer Security is widely used for the privacy and security of data over the internet.
TLS uses a pseudo-random algorithm to generate the master secret which is a key used for the
encryption between the protocol client and protocol server.

Secure HyperText Transfer Protocol (SHTTP)


Secure HyperText Transfer Protocol is a collection of security measures like Establishing
strong passwords, setting up a firewall, thinking of antivirus protection, and so on designed to
secure internet communication. Its services are quite comparable to those of the SSL protocol
(Anon., n.d.).

1.8.3 Communication Protocols


Sets the rules for data transmission over the network.
• Examples of communication protocols are HTTP, DHCP, IP, TCP/IP, ARP, OSPF,
UDP and BGP

TCP/IP (Transmission Control Protocol/Internet Protocol)


TCP/IP is a communication protocol suite used to interconnect network devices on the
internet, as well as in private computer networks. It provides a standardized set of rules for
transmitting and receiving data over networks, with TCP managing data delivery between

Nabeel Naushad Networking 01


23
applications and IP managing packet addressing and routing between networks. TCP/IP is
widely used in applications such as web browsing, email, file transfer, and remote access, and
is essential to the functioning of the internet (Anon., n.d.).

Dynamic Host Configuration Protocol (DHCP)


Dynamic Host Configuration Protocol (DHCP) is a protocol used in computer networks that
automates the process of assigning IP addresses to network devices. DHCP eliminates the need
for manual IP address assignment, making it easier for users to connect to a network. With
DHCP, network administrators can centrally manage and configure IP address settings for all
devices connected to the network. DHCP assigns IP addresses dynamically, which means that
devices can be added or removed from the network without any manual configuration (Anon.,
n.d.).

Open Shortest Path First (OSPF)


OSPF is a link-state routing protocol designed by IETF for Interior Gateway Protocol. It finds
the shortest path between source and destination routers using its Shortest Path First algorithm.
OSPF operates at the network layer with a protocol number of 89 and AD value of 110. It uses
multicast addresses 224.0.0.5 and 224.0.0.6 for communication and updates to DR/BDR
(Anon., n.d.)

HyperText Transfer Protocol (HTTP)


Communication between client and server happens through the HTTP request/response circle.
HTTP is an application layer protocol that is sent over a TCP connection. In addition to
fetching HTML documents, it can also fetch images and videos or post content to servers.

1.9 Some Other Types of Protocols

1. Trivial File Transfer Protocol (TFTP)


2. Address Resolution Protocol (ARP)
3. Domain Name System (DNS)
4. Internet Message Access Protocol (IMAP)
5. Dynamic Host Configuration Protocol (DHCP)
6. Resource Location Protocol (RLP)

Nabeel Naushad Networking 01


24
7. Session Initiation Protocol (SIP)
8. Server Message Block (SMB)
9. Simple Network Management Protocol (SNMP)
10. Secure Shell (SSH)
11. Virtual Network Computing (VNC) (Anon., n.d.)

1.10 OSI Model


The Open Systems Interconnection (OSI) model describes the seven layers computer systems uses
to communicate over a network.

Figure 16 (OSI Model)

The seven layers are:


7. Application Layer
Here’s where the human-computer interaction takes place, where applications can access
the network services.
Few examples of application layer protocols;(HTTP, FTP, POP, SMTP, DNS)

6. Presentation Layer
Ensures whether the data is usable and prepares for transmission over the session layer
Data is encrypted over here.
5. Session Layer

Nabeel Naushad Networking 01


25
It is responsible for opening sessions, ensuring they remain open and functional while data
is being transferred and closing them when communication ends.

4. Transport Layer
The layer transmits data using the transmitting protocols including TCP and UDP.
It controls how much data to be sent, at what rate and where it goes.

3. Network Layer
The network layer breaks up segments into network packets, reassembles the packets on
the receiving end and route the packets by selecting the best path.

2. Data Link Layer


It breaks up packets into frames and sends them from source to destination.

1. Physical Layer
The layer is responsible for physical cable or wireless connection between network nodes
and transmission of raw data (0s and 1s).

Advantages of OSI model:


• Supports most networks.
• Changes in a layer will not cause any affect in other layers.
• Devices will be able to support each other.
• Flexible.
• Troubleshooting is easier.

Disadvantages of OSI model:


• Practical implementation is impossible.
• Less effective.
• Complex.
• Layers cannot work in parallel (Anon., n.d.).

Nabeel Naushad Networking 01


26
1.11 TCP/IP Model
It stands for Transmission Control Protocol/Internet Protocol. It’s a concise version of the OSI
model. It specifies how data is exchanged over the internet by providing end-to-end
communication that identify how it should be broken into packets, addressed, transmitted, routed
and received at the destination.

Figure 17 (TCP/IP Model)

➢ It consists of 04 layers:
1) Network Access Layer
Corresponds the combination of Data Link Layer and Physical Layer in OSI
model. Protocols here allows physical transmission of data.

2) Internet Layer.
Performs similar to the network layer in OSI model. The main protocols in this
layer are IP, ICMP and ARP.

3) Transport Layer.

Nabeel Naushad Networking 01


27
This layer is comparable to the transport layer of OSI model. The two main
protocols Present here are TCP and UDP

4) Application Layer
It performs the functions of the Application, Presentation and Session Layers in
OSI model.
Advantages of TCP/IP model:
• Helps establish network connections in different types of computers.
• Work independent of the OS.
• Supports many network routings.
• Its and open protocol suite.

Disadvantages of TCP/IP model:


• Complicated and a bit difficult to setup.
• Not easy to replace protocols.
• Designed for WAN.
• Transport layer does not guarantee the delivery of packets (Anon., n.d.).

1.12 Network Design


Network design refers to planning of the implementation of a computer network infrastructure.
It involves evaluating, understanding and scoping the network that is to be implemented.
Network designs includes the following:
• Logical map of the network to be designed.
• Cabling structure.
• Quality, type and location of network devices such as routers, switches, servers
etc.
• Ip addressing structure.
• Network security architecture and overall network security processes (Anon.,
n.d.).

Nabeel Naushad Networking 01


28
1.13 Suitable Network Topology and Network Protocols for The Above Scenario and
Reason for My Suggestion
Based on the given requirements and the floor plans provided, I would
recommend using a mesh network topology for Alliance Health's head office in
Colombo and their branch in Matara. A mesh topology would allow each
department to communicate directly with each other, without the need for a
central hub or server. This will improve network performance and increase
reliability since there is no single point of failure. It will also be scalable and
adaptable to the company's future expansion plans.

For network protocols, I suggest using TCP/IP as it is widely used and


compatible with most network environments. VLANs can be used to create
virtual LANs that will help separate departments into unique subnets for s ecurity
purposes. OSPF can be used as the routing protocol, allowing for efficient
routing of data packets. SNMP can be utilized to monitor the network and
diagnose problems, while DHCP can be used to automate IP address assignment
to devices on the networ k.

1.14 Efficient Utilization of the Networking System of Matara Branch


Mesh network topology for Alliance Health's Matara branch offers several
advantages that demonstrate the efficient utilization of the networking system:

Decentralized Network: The mesh network topology allows each department to


communicate with each other directly, without the need for a central hub or
server. This results in a more efficient flow of information and quicker decision -
making processes, leading to improved productivity and streamlined processes.

Unique Subnets: The use of unique subnets for each department ensures network
security and prevents unauthorized access to sensitive data. It also enables
efficient management of the network and allows for quick troubleshooting of
any issues that arise.

Nabeel Naushad Networking 01


29
Scalability: The mesh topology is scalable and adaptable to the company's future
expansion plans. This makes it a cost -effective and efficient solution for
Alliance Health's networking needs, allowing the company to easily add n ew
departments or branches as needed.

Reliable Connectivity: The mesh network topology offers reliable connectivity


with no single point of failure, ensuring uninterrupted network services and
operations. This is particularly important for the Matara bran ch, which needs to
provide excellent customer service and support to its clients.

Wi-Fi Connectivity: The Customer Services Area of the Matara branch is


equipped with Wi -Fi facilities, which will improve customer experience and
allow for more efficient service delivery. This feature will also allow the Sales
and Marketing Team to access network resources using Wi -Fi connectivity,
further improving productivity and efficiency.

Intra-Branch Connectivity: The mesh network topology allows for conn ectivity
between the head office and Matara branch, enabling intra -branch
communication and collaboration between departments. This will facilitate
better coordination and improved decision -making processes, making it easier
for Alliance Health to achieve its business goals.

The use of OSPF as the routing protocol ensures efficient routing of data packets,
while SNMP can be used to monitor the network and diagnose problems. The
topology protocol also enables scalability, making it a cost -effective and
efficient solution for Alliance Health's networking needs. It allows the company
to easily add new departments or branches as needed, without causing disruption
to the existing network. This is particularly important for a growing company
like Alliance Health.

Nabeel Naushad Networking 01


30
Activity 02

2.1 What are Network Devices


Physical devices that are used to connect computers, printers, fax machines and other electronic
devices to a network are called network devices. These devices transfer data in a fast, secure and
correct way over same or different networks (Anon., n.d.).

2.2 Types and Operating principles of Network Devices

2.2.1 Hub

A hub is a basically multi-port repeater. A hub is a basic network device that connects multiple
devices in a local network and forwards data between them. Hubs cannot filter data, so data
packets are sent to all connected devices. They do not have the intelligence to find out the best
path for data packets which leads to inefficiencies and wastage.

Types of Hubs:
• Active Hub
• Passive Hub
• Intelligent Hub

Nabeel Naushad Networking 01


31
2.2.2 Switch

A switch is a network device that connects multiple devices in a local network and forwards data
between them using MAC addresses. The switch can perform error checking before forwarding
data, which makes it very efficient as it does not forward packets that have errors and forward
good packets selectively to the correct port only. There are a number of types of switches.

2.2.3 Router

A router is a network device that connects multiple networks and forwards data packets between
them. Routers normally connect LANs and WANs and have a dynamically updating routing
table based on which they make decisions on routing the data packets.

Nabeel Naushad Networking 01


32
2.2.4 Gateway

A gateway is a passage to connect two networks that may work upon different networking
models. They work as messenger agents that take data from one system, interpret it, and transfer
it to another system. They are also called as protocol converter

2.2.5 Firewall

A firewall is a network device that inspects network traffic and blocks unauthorized access to the
network. Firewalls can be hardware or software-based and can enforce security policies to
protect against attacks.

Nabeel Naushad Networking 01


33
2.2.6 Modem

A modem is a network device that converts digital signals from a computer into analog signals
that can be transmitted over a phone line or cable. Modems enable devices to connect to the
Internet and other networks.

Types of Modems:
• Simple.
• Half Duplex.
• Full Duplex.

2.2.7 Access point

Nabeel Naushad Networking 01


34
An access point is a network device that enables wireless devices to connect to a wired network.
Access points typically support one or more wireless standards, such as Wi-Fi, and can provide
network access to a wide range of devices.

2.2.8 Bridge

A bridge is a network device that connects two or more network segments together and forwards
data packets between them. It is a repeater, with add on the functionality of filtering content by
reading the MAC addresses of the source and destination. It is a 2-port device.

Types of Bridges:
• Transparent Bridges
• Source Routing Bridges

2.2.9 Repeater

A repeater regenerates the signal over the same network before the signal becomes too weak or
corrupted to extend the length to which the signal can be transmitted over the same network.
They do not amplify the signal. When the signal becomes weak, they copy it bit by bit and
regenerate it at its star topology connectors connecting if original strength improving the signal
strength. It’s a 2-port device (Anon., n.d.).

Nabeel Naushad Networking 01


35
2.3 What is a Server
A server is a computer program or device that provides a service to another computer program
and its user, also known as the client. These services include sharing data or resources among
multiple clients, or performing computation for a client. Multiple clients can be served by a
single server, and a single client can use multiple servers (Anon., n.d.).

2.4 Types of Servers

2.4.1 File Server

A file server shares files and folders, storage space to hold files and folders, or both, over a
network Networked computers are the intended clients, even though local programs can be
clients

2.4.2 Print Server

Print servers are used to manage print queues and make printers available to multiple users on a
network which eliminates the hassle of physical access. Their clients are computers in need of
printing something.

2.4.3 Application Server

An application server is a server that runs and manages applications that can be accessed by
client devices over the network. Their clients are computers with a web browser.

2.4.4 Database Server


These servers maintain and shares any form of database by managing and providing access to
large amounts of data over a network.

2.4.5 Web Server


A web server is a server that hosts websites and serves web pages to client devices over the
internet or an intranet. Web servers are used to host websites, web applications, and web
services.

Nabeel Naushad Networking 01


36
2.4.6 Mail Server
A mail server is a server that manages email messages and delivers them to client devices over a
network. Clients of these servers are senders and recipients of email

2.4.7 DNS Server


A DNS server is a server that translates domain names into IP addresses. DNS servers are used to
manage domain name registration and resolution and to provide a mapping between domain
names and IP addresses.

2.4.8 Proxy Server


A proxy server is a server that acts as an intermediary between client devices and other servers
on the internet or an intranet. Reasons to use a proxy server includes content control and
filtering, improving traffic performance, preventing unauthorized network access or simply
routing the traffic over a large and complex network. There clients are any networked computer
(Anon., n.d.).

2.5 The 05 Best Small Business Server Options of 2023

2.5.1 HPE ProLiant ML350 Gen10

Nabeel Naushad Networking 01


37
The ProLiant ML350 is HP's top-of-the-line tower server, with an Intel Xeon Bronze 3206R
processor, 16GB of memory, a 500-watt power supply, and four full-sized drive bays in its base
configuration. It can support two processors, up to Xeon Gold 5218R, 32GB of RAM, and dual
800-watt power supplies. The Xeon processors support up to 1TB of ECC memory, and the
ML350 has 12 memory slots for expansion. It's perfect for email, network storage, or database
servers.
The ProLiant ML350 is a highly expandable server that can hold up to 24 small or 12 large
drives with additional cages. It has eight PCIe 3.0 slots for adding new cards, up to 100Gb
Ethernet, and can convert from a tower to a 5U rack server (Anon., n.d.).
Pros:
• Dual Xeon processor sockets
• Multiple expansion options

Cons:
• High-end configs are pricey

2.5.2 Dell PowerEdge T40

Nabeel Naushad Networking 01


38
The PowerEdge T40 is a cost-effective server for small businesses with a quad-core Intel Xeon
E-2224G, 8GB of DDR4 ECC memory, and a 1TB hard drive. It can hold up to 12TB of storage,
64GB of RAM, and has PCI expandability with six USB 3.1 ports and gigabit Ethernet. Dell
offers excellent business support with one year of next business day hardware support, with the
option of four-hour, "mission critical" support (Anon., n.d.).
Pros:
• Inexpensive
• Great connectivity options, internally & externally
Cons:
• Less expandability than other options

2.5.3 Lenovo ThinkSystem SR550

The Lenovo ThinkSystem SR3550 is a highly scalable 2U rackmount server with PCIe
expansion, hot-swappable drive bays, software RAID support, and dual second-generation Xeon
Platinum processors. The SR550 offers room to grow with hot-swap drive bays for up to 16 SFF
drives and support for dual power supplies. It also comes with Lenovo’s XClarity Controller for
easy maintenance and automation. A small business server with enterprise aspirations, the SR550
is a great foundation for a larger data center (Anon., n.d.).

Nabeel Naushad Networking 01


39
Pros:
• Massive room to expand
• Excellent hardware selection across configs
Cons:
• Expensive
• Requires a server rack

2.5.4 Dell PowerEdge T640

The T640 is Dell's priciest tower server with dual Xeon sockets, support for up to 216TB
storage, dual 10Gb Ethernet, and multiple PCIe 3.0 x16 slots. Its extra PCIe slots and dual 10Gb
Ethernet are ideal for tasks such as machine learning, while its hardware RAID support, EMC
server tools, and hot-plug features make it a scalable solution for small businesses (Anon., n.d.).
Pros:
• Dual 10Gb Ethernet ports
• Hardware RAID support
Cons:
• Expensive

Nabeel Naushad Networking 01


40
2.5.5 Best Small Business NAS: Synology DiskStation DS220j

If it’s all about basic file storage in a business, a Synology NAS like the DiskStation DS220j is a
great option. With two drive bays, up to 32TB of storage, and useful software included, it's an
affordable solution (Anon., n.d.).
Pros:
• Very affordable
• Dedicated operating system
• Android & iOS apps
Cons:
• Limited & basic

2.6 My Selection
I recommend the HPE ProLiant ML350 Gen10 server for the Server Room at Alliance Health.
This server is a high-performance, reliable, and scalable option that can accommodate the needs
of a healthcare organization such as Alliance Health.

Nabeel Naushad Networking 01


41
The HPE ProLiant ML350 Gen10 offers exceptional processing power, memory capacity, and
storage capability, which makes it suitable for hosting critical applications like the Electronic
Medical Record (EMR) system. Additionally, it is highly reliable and offers advanced features
such as redundant power supplies, RAID support, and hot-swappable components. This ensures
that the server is always available and reduces the risk of downtime or data loss.

Moreover, the HPE ProLiant ML350 Gen10 is a highly scalable server that can accommodate
future growth of Alliance Health. It offers flexible expansion options for memory, storage, and
network connectivity, which allows the server to be easily upgraded as the organization's needs
change. Finally, HPE is a leading vendor in the server market and offers excellent support for
its products, including regular firmware and software updates, technical support, and service
options such as onsite maintenance.

2.7 Inter-dependence of Workstation Hardware and Networking Software and Examples


for Networking Software That Can be used in Above Network Design

The network design of Alliance Health involves connecting multiple workstations to each other
through a network. Workstation hardware refers to the physical components of a computer that
are required to perform various tasks such as processing data, storing information, and displaying
output. These components include
CPU (Central Processing Unit):
The CPU is the computer's brain, processing instructions from programs to input, store, and
output data. It has a control unit to interpret instructions and an ALU to perform arithmetic and
logic operations. Without a CPU, programs could not run on a computer (Anon., n.d.).

GPU (Graphics Processing Unit):


A GPU is a computer chip that rapidly renders graphics and images through parallel processing.
Originally, CPUs performed these tasks, but GPUs were developed to offload them and improve
3D rendering. GPUs are commonly used in PC gaming and are also being used to accelerate
workloads in AI and other fields (Anon., n.d.).

Nabeel Naushad Networking 01


42
RAM (Random Access Memory):
RAM is a type of computer memory that can be both written to and read from by the CPU. It
stores data and programs temporarily while the computer is running, but loses all its contents
when the machine is turned off (Anon., n.d.).

Storage (Hard disk drives, Solid State Drives, etc.):


Storage devices like HDDs and SSDs store data permanently even when the computer is turned
off. HDDs use spinning disks while SSDs use flash memory.

Network Interface Card (NIC):


A Network Interface Card (NIC) is essential for connecting a computer to a network. It's a circuit
board that provides a dedicated network connection and is also known as a network adapter or
LAN adapter (Anon., n.d.).

And some other components include Motherboard, Power Supply Unit, Cooling System (Fans,
Liquid Cooling, etc.), Input/Output devices (Keyboard, Mouse, Monitor, etc.), Workstation
chassis or case.

Hardware components alone cannot establish communication and connectivity on the network.
Networking software is also required to manage the data transmission, routing, and other
network functions. Networking software includes various protocols such as TCP/IP, HTTP, FTP,
DNS, and others that allow data to be transmitted across the network. Networking software also
includes applications such as firewalls, routers, switches, and hubs that help to manage and
control network traffic. Some examples of networking software that can be used in this scenario
include:

Network operating systems (NOS):


These are specialized software platforms that provide network management functions like user
authentication, file sharing, and print services. There are Two types of NOS, Peer to Peer and
Client server. In this scenario, examples of NOS that can be used include:
Windows Server, Linux, and macOS Server (Anon., n.d.).

Nabeel Naushad Networking 01


43
Virtual Private Network (VPN) software: VPN software enables secure and encrypted
communication between two or more devices over an unsecured network like the internet. In this
scenario, VPN software can be used to establish secure communication between the Head Office
and the Matara branch. Here’s about 05 best VPN:
• CyberGhost: Affordable VPN with good value for startups, offers 256-bit encryption, 5
simultaneous connections, 3800 servers in 60 countries, and does not offer advanced
control features for heavy usage.
• ExpressVPN: Fast and reliable VPN that unblocks most restricted sites, provides
military-grade encryption, 3 simultaneous connections, 1500 servers in 94 countries, and
does not offer advanced controls for businesses.
• Encrypt.me: Simple and flexible VPN for small businesses, offers unlimited simultaneous
connections, 78 locations on six continents, DNS protection, content filtering, and private
endpoints, and stores some amount of data logs.
• Hotspot Shield: Popular VPN with super-fast speeds and unlimited bandwidth, offers
customized admin console, 5 devices per account, servers in 115 locations, 256-bit
encryption, and does not offer 100% zero-logging.
• HostNoc: Server hosting company that rents private company VPNs to organizations,
offers 99.99% uptime security guarantee, 5 devices per account, limited disk space, and
no yearly payment option (Anon., n.d.).

Network monitoring software: This software is used to monitor the performance and availability
of the network and its components. Examples of some network monitoring software that can be
used in this network design include:
• SolarWinds Network Performance Monitor: SolarWinds Network Performance Monitor
is a top-tier network monitoring tool that uses SNMP to collect device reports. Its support
advisors have deep technical knowledge and the product is highly customizable with an
easy-to-use interface. You can create customized dashboards, topology maps, alerts, and
more.
• PRTG Network Monitor from Paessler: PRTG Network Monitor is known for advanced
infrastructure management. It displays network performance and alerts in a hierarchical

Nabeel Naushad Networking 01


44
view. It uses various technologies to monitor IT infrastructure, including SNMP, WMI,
SSH, and HTTP requests.
• Nagios XI: Nagios XI offers flexible pricing and is suitable for freelancers, SMBs, and
large corporations. It has a free version, open-source, one-time license, and subscription
options. The tool allows for extreme flexibility in monitoring and alerting through its
adaptability to plugins.
• Auvik: Auvik is a SaaS platform that automates network discovery and mapping to
centralize monitoring of multiple sites.

Firewall software: Firewall software is used to protect the network from unauthorized access and
malware. In this scenario, firewall software can be used to secure the network from external
threats and restrict access to certain network resources. Some top Firewall software’s:
• SolarWinds Network Firewall Security Management: SolarWinds Security Event
Manager is a network firewall security management tool that provides continuous
monitoring and real-time event correlation to catch suspicious activities. It offers real-
time visibility into network firewall security and helps to detect security violations
through policy checks.
• ManageEngine Firewall Analyzer: It is a firewall management software suitable for
network and security admins of small to enterprise-scale private or government IT
infrastructures. The tool continuously monitors firewall logs to identify suspicious
activity and provides real-time visibility into firewall security. It helps to detect security
vulnerabilities in firewall policies.
• System Mechanic Ultimate Defense: A security, privacy, and performance suite with
anti-malware, password management, and malware removal features. It has System
Shield with proactive and reactive detection, and a Malware Killer with Scan Cloud-
based scanning.
• Norton Free Firewall: It is a part of Norton Antivirus and Norton Internet Security,
known as Smart Firewall. It blocks or flags programs using a database of programs.

Workstation hardware and networking software are two critical components of a computer
network that are closely interdependent on each other. Some examples of how they are related:

Nabeel Naushad Networking 01


45
• The NIC is a critical component of workstation hardware that enables communication
with other devices in a network. However, the NIC cannot function without the
appropriate networking software, such as the network driver, that allows it to
communicate with other devices using specific protocols.
• The CPU is responsible for processing data and executing instructions, and its speed and
capacity directly affect the speed at which data can be transmitted over the network.
However, the performance of the CPU can be limited by the networking software that is
used, such as the TCP/IP protocol, which controls the flow of data over the network.

To ensure optimal network performance, it is essential to select hardware components that are
compatible with the networking software and to configure the software appropriately to work
with the hardware.

Nabeel Naushad Networking 01


46
Activity 03

3.1 Written Network Design Plan


Network Topology:
The proposed network topology for both the head office and the branch in Matara is a Mesh
network topology.

IP Addressing Scheme:
The IP addressing scheme that can be used for the network is IPv4. To avoid IP conflicts, we can
use private IP address ranges for all departments. Each department can be assigned a unique
subnet as requested in the scenario with the following IP address ranges:
Head Office:
Reception area: 10.1.1.0/24
Sales & Marketing Department: 10.1.2.0/24
Customer Services Area: 10.1.3.0/24
Administration Department: 10.1.4.0/24
HR Department: 10.1.5.0/24
Accounting & Finance Department: 10.1.6.0/24
Audit Department: 10.1.7.0/24
Business Development Department: 10.1.8.0/24
Video Conferencing Room: 10.1.9.0/24
IT Department: 10.1.10.0/24
Server Room: 10.254.10.0/24 (Static IPs)

Matara Branch:
Reception area: 10.2.1.0/24
Customer Services Area: 10.2.2.0/24
Administration Department: 10.2.3.0/24
HR Department: 10.2.4.0/24
Accounting & Finance Department: 10.2.5.0/24
IT Department: 10.2.6.0/24

Nabeel Naushad Networking 01


47
Network Devices:
The following network devices are required to set up the network:
Switches: Access switches will be installed on each floor and departments to provide
connectivity to devices on each floor. Distribution switches will be installed in each building to
connect the access switches and provide connectivity to the core switches.
Routers: Routers will be installed to connect the head office and the branch in Matara.
Wireless Access Points (WAPs): WAPs will be installed in the head office and the branch in
Matara to provide Wi-Fi connectivity.

Network Security (These won’t be implemented in my system here but could be done in real):
To secure the network, the following measures can be implemented:
Access control lists (ACLs) can be set up on the routers to restrict access to the network.
Virtual private network (VPN) connections can be established between the head office and the
branch in Matara to ensure secure communication between the two locations.
Firewalls can be installed to filter incoming and outgoing traffic.

Server Room:
The server room will be equipped with the following equipment:
Servers: Ten servers will be installed in the server room.

These also can be added but won’t be in my system for the scenario -
Storage Devices: Storage devices such as NAS or SAN will be installed to store data.
Backup System: A backup system will be installed to ensure data integrity and availability in
case of a disaster.

Network Management:
To manage the network, the following measures can be implemented (But I won’t be able to do it
in my system for now):
Network Monitoring: A network monitoring tool can be installed to monitor network activity and
troubleshoot any issues.

Nabeel Naushad Networking 01


48
Configuration Management: A configuration management tool can be used to manage network
device configurations and ensure consistency across the network.
Network Documentation: A network documentation tool can be used to maintain an up-to-date
record of the network topology, IP addressing, and other network configurations.

Sales and Marketing Department Access:


The Sales and Marketing department will be provided with Wi-Fi connectivity to access network
resources.

3.2 My Network Design (Blue Print)

Nabeel Naushad Networking 01


49
3.3 User Feedback and Analysis

3.3.1 Feedback Form

Nabeel Naushad Networking 01


50
Nabeel Naushad Networking 01
51
Nabeel Naushad Networking 01
52
Nabeel Naushad Networking 01
53
Responses

Nabeel Naushad Networking 01


54
3.3.2 Feedback Form Summary Charts

Nabeel Naushad Networking 01


55
Nabeel Naushad Networking 01
56
3.3.3 Feedback Form Suggestions Received

Nabeel Naushad Networking 01


57
3.3.4 Feedback Form Overall Analysis
Majority of users found my network design easy to understand and follow, and that it meets the
company's requirements well. This indicates that my design is effective in its purpose and can be
easily communicated to others. The feedback that my network design is very organized and
structured is also positive, as it suggests that my design is efficient and easy to navigate.
However, some users noted that it was slightly hard to understand the design, which could be an
area for improvement. Regarding resource utilization and data transfer, most users found my
design to be efficient. This is a good sign, as it suggests that I have taken these factors into
account when creating the design. However, a few users suggested that I could make the design
even more efficient by implementing a cloud system, which would allow for more streamlined
data transfer and potentially improve security and accessibility as well.

When it comes to security and accessibility, most users found my network design to be good, but
a few suggested that I could focus more on the security of the network. This is an important
consideration, as security is a crucial factor in any network design. I may want to consider
implementing additional security measures, such as firewalls or intrusion detection systems, to
further enhance the security of the network. In terms of future growth and expansion, most users
felt that my network design took these factors into account somewhat well or very well. This is a
positive sign, as it suggests that your design has room for growth and scalability.

Finally, the fact that most users were satisfied with my network design overall is a good
indication that I have created an effective and efficient design. However, it's important to
continue gathering feedback and making improvements where necessary to ensure that the
design remains up-to-date and meets the changing needs of the company. In addition, one user
suggested that I could potentially save costs by only using one switch instead of two for a
particular floor. Another user suggested reducing the number of PCs in the IT department to
make the space less compact.

Overall, the user feedback on my network design is largely positive, but there are a few areas
where I could potentially make some improvements to optimize the system and improve
efficiency. By taking these suggestions into account and continuing to gather feedback, I can
create a network design that meets the needs of the company and its users.

Nabeel Naushad Networking 01


58
3.4 Table That Shows the Departments, Devices used, Subnet Mask, VLAN and IP
Subnetting Scheme for the Above Scenario

Head Office:
Department VLAN IP Address Subnet Mask Devices
Access point,
Reception area 10 10.1.1.0/24 255.255.255.0
phone, Switch
Sales team
Sales & computers (05),
Marketing 20 10.1.2.0/24 255.255.255.0 Laptops (02),
Department phone, printer,
Switch
Customer
service
Customer
30 10.1.3.0/24 255.255.255.0 computers (02),
Services Area
phone, printer,
Switch
Administration
computers (10),
Administration
40 10.1.4.0/24 255.255.255.0 Laptop (02),
Department
phone, printer,
Switch
HR team
computers (04),
HR phone, Laptop
50 10.1.5.0/24 255.255.255.0
Department (01), Access
point, printer,
Switch
Accounting & Accounting &
Finance 60 10.1.6.0/24 255.255.255.0 finance
Department computers (03),

Nabeel Naushad Networking 01


59
Laptop (02),
phone, printer,
Switch
Audit team
Audit computers (02),
70 10.1.7.0/24 255.255.255.0
Department Laptop (02),
phone, Switch
Business
Business development
Development 80 10.1.8.0/24 255.255.255.0 computers (02),
Department phone, printer,
Switch
Video
conferencing
Video
computers (02),
Conferencing 90 10.1.9.0/24 255.255.255.0
Laptop, camera,
Room
microphones,
Switch
IT team
computers (50),
IT Department 100 10.1.10.0/24 255.255.255.0
phone, printer,
Switch
Servers, Switch,
Server Room 200 10.254.10.0/24 255.255.255.0
Computer

Matara Branch:
Department VLAN IP Address Subnet Mask Devices
Access point,
Reception area 10 10.2.1.0/24 255.255.255.0
Switch

Nabeel Naushad Networking 01


60
Customer
service, Switch
Customer
20 10.2.2.0/24 255.255.255.0 computers (02),
Services Area
phone, printer,
Laptop, Switch
Administration
computers (04),
Administration
30 10.2.3.0/24 255.255.255.0 Laptop (02),
Department
phone, printer,
Switch
HR team
HR computers (03),
40 10.2.4.0/24 255.255.255.0
Department Laptop, phone,
printer, Switch
Accounting &
finance
Accounting &
computers (04),
Finance 50 10.2.5.0/24 255.255.255.0
Laptop (02),
Department
phone, printer,
Switch
IT team
computers (40),
IT Department 60 10.2.6.0/24 255.255.255.0 Laptop (02),
phone, printer,
Switch

3.5 The Devices Used to Create the Network


Router 1941: The Cisco 1941 router is a modular router designed for small to medium-sized
businesses. It supports multiple WAN technologies, including T1/E1, ADSL2/2+, and 3G, and
has built-in security features, such as firewall and VPN support. In Packet Tracer, you can use

Nabeel Naushad Networking 01


61
the 1941 router to simulate the connection between multiple networks and manage the flow of
data between them.

Switch 2960: The Cisco 2960 switch is a fixed-configuration switch designed for small to
medium-sized businesses. It supports advanced features, such as QoS (Quality of Service),
VLANs, and STP (Spanning Tree Protocol), and has built-in security features, such as ACLs
(Access Control Lists) and port security. In Packet Tracer, you can use the 2960 switch to
connect multiple devices within a single network and manage the flow of data between them.

Access point: An access point is a wireless networking device that allows wireless devices to
connect to a wired network. In Packet Tracer, you can use the access point to simulate a wireless
network and test the connectivity of wireless devices within the network. Access points typically
support different wireless standards, such as 802.11n and 802.11ac, and have built-in security
features, such as WPA2 (Wi-Fi Protected Access II) and MAC (Media Access Control) filtering.

Cisco wireless router: It provides a secure, reliable, and scalable wireless network. It offers
excellent security features, including encryption and access control, to protect my network from
unauthorized access and other security threats. Using a Cisco wireless router in my network can
ensure the confidentiality, integrity, and availability of the network.

IP Phone (7960): The Cisco 7960 IP Phone is a VoIP (Voice over Internet Protocol) phone that
supports SIP (Session Initiation Protocol) and SCCP (Skinny Client Control Protocol) protocols.
It has a built-in Ethernet switch that allows you to connect a PC to the phone and share the same
network connection. In Packet Tracer, you can use the 7960 IP Phone to simulate a VoIP
network and test the connectivity of IP phones within the network.

Printer: A printer is a device that allows you to print documents and other materials. In Packet
Tracer, you can use a printer to test the connectivity between a computer and a printer within a
network. Printers typically support different connection methods, such as USB, Ethernet, and
Wi-Fi, and have different printing technologies, such as laser and inkjet.

Nabeel Naushad Networking 01


62
PC: A PC (personal computer) is a common device that is used for work, browsing the Internet,
and other tasks. In Packet Tracer, you can use a PC to simulate a computer within a network and
test its connectivity with other devices.

Laptop: A laptop is a portable computer that is similar to a PC but is designed to be more mobile.
In Packet Tracer, you can use a laptop to simulate a mobile device within a network and test its
connectivity with other devices. Laptops typically have built-in Wi-Fi and Ethernet connections,
as well as different hardware specifications, such as screen size and battery life.

Server: The server in Cisco Packet Tracer can be configured to provide specific services using a
variety of protocols, such as HTTP, FTP, SMTP, DNS, and DHCP. It can also be connected to
other network devices, such as routers, switches, and firewalls, to allow network users to access
its services. Using a server in Packet Tracer can provide many benefits and help to create a more
efficient and secure network environment.

Copper straight through cable: A straight-through cable is a type of Ethernet cable that is used to
connect different networking devices, such as a switch and a router. In Packet Tracer, you can
use a straight-through cable to connect different devices within a network. Straight-through
cables have the same wiring on both ends and are commonly used for connecting dissimilar
devices.

Copper cross-over cable: A crossover cable is a type of Ethernet cable that is used to connect
similar networking devices, such as a switch and a switch, or a PC and a PC.

3.6 The Software’s Used to Create the Network

I used Cisco Packet Tracer for building my network. It is a powerful network simulation tool that
allows users to create virtual network models and simulate the behaviour of network devices and
connections. It is a versatile platform that can be used to design, configure, and troubleshoot
network infrastructures of varying sizes and complexities. Packet Tracer offers a range of
features that enable users to create and configure network topologies, test network protocols, and

Nabeel Naushad Networking 01


63
simulate network traffic. It provides an intuitive interface that allows users to drag and drop
network devices and connections onto a virtual canvas, and configure them using a range of
menus and dialogs. Users can create and configure switches, routers, firewalls, servers, and other
network devices, and connect them to form complex network topologies. Packet Tracer also
supports a wide range of network protocols, including TCP/IP, DNS, DHCP, SNMP, and more,
allowing users to simulate the behaviour of real-world networks. Cisco Packet Tracer is an
excellent option for learning about network design, configuration, and troubleshooting. It is
widely used in educational settings to teach networking concepts, and is also used by network
professionals to test and validate network configurations. Packet Tracer provides a safe and cost-
effective way to simulate network behaviour and test different network scenarios without the
need for expensive physical hardware. Its user-friendly interface and support for a wide range of
network protocols make it an excellent choice for learning about networking concepts and
practicing network design and troubleshooting skills.

For the drawing of the network diagram (Blue print) I used Visual Paradigm. It is a cloud-based
visual modelling tool that allows users to create professional-looking diagrams, including
network topologies, traffic visualization, and device configuration. It offers a rich library of
symbols and supports various export options. Its collaboration and communication features make
it ideal for this. It is a powerful and user-friendly tool for network design and planning.

3.7 Maintenance Schedule


Maintenance Task Frequency Responsible Party Description/Notes
Update firmware for
all network devices to
Firmware updates Network
Quarterly ensure optimal
for network devices Administrator
performance and
security.
Test the backup
Backup system
Monthly IT Team system to ensure data
testing
integrity and

Nabeel Naushad Networking 01


64
availability in case of
a disaster.
Monitor network
performance to
Network
Network identify and
performance Daily
Administrator troubleshoot issues
monitoring
before they impact
users.
Ensure consistency
Configuration Network across the network by
Monthly
management Administrator managing device
configurations.
Inspect network
devices for any
Physical inspection
Quarterly IT Team physical damage or
of network devices
signs of wear and
tear.
Scan all devices for
Virus and malware viruses and malware
Weekly IT Team
scans to prevent potential
security breaches.
Review and update
user accounts to
User account
Quarterly HR Team ensure that access is
management
granted only to
authorized personnel.
Review and update
Review and update network
Network
network Bi-annually documentation to
Administrator
documentation ensure that it is up-to-
date and accurate.

Nabeel Naushad Networking 01


65
Ensure proper cable
Cable Management Monthly Network Technician organization and
labeling
Perform security
Security Audit Annually Security Analyst audit to identify
vulnerabilities
Test UPS and
Power Backup
Quarterly Facilities Manager generator systems for
Testing
backup power supply
Provide training for
User Training As needed HR Manager users on network and
security best practices

3.8 Evaluation on the Implemented Network, Including the Design and Decisions that can
be Made to Enhance the System
The network is well-organized and meets the requirements of the company. The use of a Mesh
network topology provides redundancy and ensures that there is no single point of failure. The IP
addressing scheme is also well thought-out and avoids conflicts by using private IP address
ranges for each department. The inclusion of switches, routers, and wireless access points
provides the necessary connectivity for the network. However, the lack of additional security
measures such as firewalls and access control lists are a potential area for improvement, as
suggested by user feedback.
The server room is adequately equipped with ten servers, although the addition of storage
devices and a backup system could enhance data availability and integrity. Network management
tools such as network monitoring, configuration management, and documentation are also
important components that can ensure optimal network performance and consistency. The Sales
and Marketing department's access to the network via Wi-Fi connectivity is a convenient
solution, although it is important to ensure that appropriate security measures are in place to
protect network resources.
In terms of user feedback, the suggestion to consider adding a cloud system to the network
design could potentially improve resource utilization and data transfer. The focus on network

Nabeel Naushad Networking 01


66
security is also a valid point, and implementing additional measures could further enhance
network protection.

The suggestion to reduce costs by using only one switch instead of two for a particular floor is
also worth considering, although it is important to ensure that this does not compromise network
performance. Similarly, reducing the number of PCs in the IT department could improve space
utilization and make the environment less congested.

Overall, the network design plan is well thought-out and meets the requirements of the company.
However, there are areas for improvement, and it is important to consider feedback from users to
optimize the system's efficiency and effectiveness.

Activity 04

4.1 Network Design Configurations Done Step by Step Including Installing and
Configuring Network Services, Devices and Application to Implement the System

Turning the Line connected between main switch and router Up in both departments

Nabeel Naushad Networking 01


67
Creating Vlans for Each Departments in both Head Office and Matara Branch

Nabeel Naushad Networking 01


68
Nabeel Naushad Networking 01
69
Nabeel Naushad Networking 01
70
Creating a Domain for Both Branches and Setting the Name and Setting the VTP Mode as Server
in Main Switch

Trunking all the Switches in both the branches and setting the VTP mode as client except the
main switch

Nabeel Naushad Networking 01


71
Nabeel Naushad Networking 01
72
Nabeel Naushad Networking 01
73
Assigning Ports to Every Switches in the Departments

Nabeel Naushad Networking 01


74
Creating Sub Interfaces (Encapsulation)

Nabeel Naushad Networking 01


75
Nabeel Naushad Networking 01
76
Creating DHCP Pool and assigning IP address and default router

Nabeel Naushad Networking 01


77
IP requests are successfully given using DHCP

Nabeel Naushad Networking 01


78
Nabeel Naushad Networking 01
79
Excluding IP Addresses

IP Routing to connect both the Branches

Nabeel Naushad Networking 01


80
Nabeel Naushad Networking 01
81
Installing and Configuring WIFI

Installing and Configuring DNS

Nabeel Naushad Networking 01


82
Installing and Configuring Web Server

Nabeel Naushad Networking 01


83
Nabeel Naushad Networking 01
84
Installing and Configuring Proxy Server

Nabeel Naushad Networking 01


85
Setting Console Passwords and Passwords for Privilege mode for all Switches and Routers

4.2 Testing
Testing refers to the process of verifying the functionality, performance, and security of a
network infrastructure, including its devices, protocols, and applications. The purpose of testing
is to identify any issues or defects that may affect the network's ability to meet its intended goals,
such as availability, reliability, and security.
Testing is crucial in networking because it helps to ensure that the network infrastructure is
working as expected, and that it can support the intended applications and services. Through
testing, we can identify and resolve issues before they impact the end-users, thereby improving

Nabeel Naushad Networking 01


86
the overall quality of service. Additionally, testing can help to validate the network's security
posture, ensuring that it is adequately protected against potential threats and vulnerabilities
(Anon., n.d.).

4.3 Testing My Network

Test ID Name Description/ Data Expected Results Comment


User tries to use System should provide The login was
T001 Login Correct Password in access for the user successful and no
Router mode issues was found

Actual Result

Test ID Name Description/ Data Expected Results Comment


User tries to use
The login for privilege
Login to Correct Password in System should provide
mode too worked as
T002 Privilege in User mode to access for the Privilege
expected and had no
Mode access the privilege Exec mode
issues
mode

Nabeel Naushad Networking 01


87
Actual Result

Test ID Name Description/ Data Expected Results Comment


Ping the IP address of The ping was
a device on the same successful and the reply
department with same was received from the
Successful ping response
T003 Ping Test IP address range (PC pc that was pinged so
without being timed out
with IP 10.1.10.7 was the system is working
ping in PC with IP fine within the
10.1.10.4) department

Actual Result

Test ID Name Description/ Data Expected Results Comment


Ping the IP address of The ping was
a device on a successful and the reply
Extended
T004 different department Successful ping response was received from the
Ping Test
with different IP pc that was pinged so
ranges (PC with IP the system is working

Nabeel Naushad Networking 01


88
10.1.9.4 was ping in fine, department to
PC with IP 10.1.6.4) department

Actual Result

Test ID Name Description/ Data Expected Results Comment


Tracing the route
from one device to The trace was
Trace Successful trace route
T005 another device on a successful with all the
Route Test with all hops showing
different network in hops
the other branch

Actual Result

Test ID Name Description/ Data Expected Results Comment


The PC was connected
Connecting to a PC
Successful connection to successfully, hence
T006 Telnet Test using telnet protocol
PC telnet is working
in the same router
without any issues

Nabeel Naushad Networking 01


89
Actual Result

Test ID Name Description/ Data Expected Results Comment


The expected outcome
Connect to a device Successful connection to was not received.
T007 SSH Test
using SSH protocol device Guess there are errors
with Configuring ssh

Actual Result

Test ID Name Description/ Data Expected Results Comment


Verify VLAN
connectivity by
connecting two
Devices are
devices on the same
Successful communicating within
VLAN VLAN (Pinging the
T008 communication between the created Vlans
Test pc in the same
devices perfectly without any
department with the
issues.
same Vlan where the
network ID is
10.1.10.0)

Nabeel Naushad Networking 01


90
Actual Result

Test ID Name Description/ Data Expected Results Comment


Verifying DHCP
functionality by DHCP requests were
DHCP obtaining IP address Successful acquisition of successfully obtained
T009
Pool Test automatically That IP address for all the devices not
were assigned to only the PCs
Vlans to PCs

Nabeel Naushad Networking 01


91
Actual Result

Test ID Name Description/ Data Expected Results Comment


Connecting to a
wireless Router and
verifying internet
The laptop successfully
connectivity an
Successful internet received the DHCP,
whether DHCP is
T0010 WAP Test connectivity and DHCP hence the wireless
assigned to the device
request being accepted router is working
(IP address of the
perfect
router is 10.1.9.5 and
address are assigned
from 10.1.9.100)

Nabeel Naushad Networking 01


92
Actual Result

Test ID Name Description/ Data Expected Results Comment


The Vlans were created
Checking whether the
Show Vlan Vlan should have been in both the branches as
T0011 Vlans are created as
Brief created as Configured configured and had no
Configured
issues

Actual Result

Test ID Name Description/ Data Expected Results Comment

Nabeel Naushad Networking 01


93
User tries ping the
Pcs from a separate
network (A PC from
Pin was successful and
External Matara branch with
Ping should be had no issues with the
T0012 Network network 10.1.9.0 will
successful communication
Ping be pinged in a PC
between branches
from the head office
with network
10.2.3.0)

Actual Result

4.3 Potential Future Enhancements That Could be Done for the Networked Systems
There are several potential future enhancements that can be implemented to improve the security
and performance of the networked systems in the future. Here are some of them,
• Firewall: Implementing a firewall can add an extra layer of security to the network. The
firewall can be configured to restrict access to the network based on predefined rules, and
to monitor incoming and outgoing traffic for any malicious activity.
• Intrusion Prevention System (IPS): An IPS can be installed to detect and prevent any
attempts to exploit vulnerabilities in the network. It can also detect and block any known
attacks, and can alert the network administrator of any suspicious activity.

Nabeel Naushad Networking 01


94
• Intrusion Detection System (IDS): An IDS can be installed to monitor network traffic and
detect any suspicious activity. It can identify potential security breaches and alert the
network administrator, who can then take appropriate action.
• Baseline in Network: Setting up a baseline for the network can provide a point of
reference for network performance. It can help identify any changes in network
behaviour that may indicate a problem or potential issue. This can help network
administrators to diagnose and troubleshoot network problems quickly and efficiently.
• Network Monitoring and Management: Implementing advanced network monitoring and
management tools can help improve network performance, identify potential security
threats, and enable faster incident response.
• Use of Storage Devices: Implementing storage devices such as NAS or SAN can provide
centralized storage for data, making it easier to manage and backup. This can improve
data availability and reduce the risk of data loss in case of a disaster.
• Security Information and Event Management (SIEM): SIEM tools can be used to collect
and analyse security-related data from across the network. This can help identify
potential security incidents and enable faster incident response.
• Disaster Recovery (DR) and Business Continuity (BC) Planning: Implementing a
comprehensive DR and BC plan can help ensure that critical business systems and data
are protected in the event of a disaster. This can help minimize downtime and reduce the
risk of data loss.

• Cloud-based Solutions: Cloud-based solutions can provide a more scalable and flexible
infrastructure for the network. This can also help reduce hardware costs and improve
reliability.
• Quality of Service (QoS): QoS can be implemented to prioritize network traffic and
ensure that critical applications and services receive the necessary bandwidth and
resources. This can help to improve application performance and user experience.
• Network Automation: Network automation can be implemented to automate routine
network management tasks and improve network efficiency. This can help to reduce
manual labour costs and minimize errors caused by manual configuration.

Nabeel Naushad Networking 01


95
• Software-Defined Networking (SDN): SDN can be implemented to provide better
network flexibility and control by separating the network control plane from the data
plane. This can help to improve network performance, reduce costs, and simplify network
management.

4.4 My Reflection on the Implemented Network


Upon reflection, I am extremely satisfied with the plan, design, configurations, and tests that
were implemented to enhance the networked systems. The design was carefully thought out,
taking into account the specific requirements of the organization, and the resulting
implementation has provided a robust and reliable network that meets the organization's needs.
The decision to use VLANs to separate each department was a wise one, as it has provided a
more secure network and allowed for more efficient management of resources. Additionally,
configuring the switches to trunk, creating sub-interfaces, and assigning IP addresses to each
department has helped to ensure that the network is stable and that each department has access to
the resources they require.

I am also pleased with the tests that were conducted, including ping, extended ping, trace route,
telnet, SSH, login, and VLAN tests. The majority of the tests had positive outcomes, which
indicates that the network is functioning as intended.
Looking towards the future, I believe that there are several potential enhancements that could be
implemented to further improve the network. These include the implementation of a firewall,
IPS, IDS, and SIEM tools to provide additional layers of security and advanced monitoring
capabilities. Additionally, setting up a baseline for the network, implementing advanced network
monitoring and management tools, and using storage devices such as NAS or SAN can help
improve performance, availability, and data backup and recovery. Overall, I am extremely
pleased with the network implementation and believe that it provides a solid foundation for the
Alliance Health network structure. With ongoing maintenance and periodic updates to address
emerging threats and technologies, I am confident that the network will continue to meet the
needs of the organization and support its continued success.

Nabeel Naushad Networking 01


96
References
Anon., 2022. fcit.usf.edu. [Online]
Available at: https://fcit.usf.edu/network/chap1/chap1.htm
Anon., n.d. [Online]
Available at: https://www.geeksforgeeks.org/tcp-ip-model/
Anon., n.d. cloudwards. [Online]
Available at: https://www.cloudwards.net/best-small-business-server/
[Accessed 24 Feb 2023].
Anon., n.d. computerhope. [Online]
Available at: https://www.computerhope.com/jargon/n/network.htm
[Accessed 25 Feb 2023].
Anon., n.d. geeksforgeeks. [Online]
Available at: https://www.geeksforgeeks.org/layers-of-osi-model/
[Accessed 10 Jan 2023].
Anon., n.d. geeksforgeeks. [Online]
Available at: https://www.geeksforgeeks.org/tcp-ip-model/
[Accessed 10 Jan 2023].
Anon., n.d. geeksforgeeks. [Online]
Available at: https://www.geeksforgeeks.org/network-devices-hub-repeater-bridge-switch-
router-gateways/
[Accessed 24 Feb 2023].
Anon., n.d. geeksforgeeks. [Online]
Available at: https://www.geeksforgeeks.org/network-devices-hub-repeater-bridge-switch-
router-gateways/
[Accessed 24 Feb 2023].
Anon., n.d. geeksforgeeks. [Online]
Available at: https://www.geeksforgeeks.org/servers-in-computer-network/
[Accessed 24 Feb 2023].
Anon., n.d. geeksforgeeks. [Online]
Available at: https://www.geeksforgeeks.org/servers-in-computer-network/
[Accessed 24 Feb 2023].
Anon., n.d. geeksforgeeks. [Online]
Available at: https://www.geeksforgeeks.org/open-shortest-path-first-ospf-protocol-states/
[Accessed 20 Jan 2023].
Anon., n.d. Geeksforgeeks. [Online]
Available at: https://www.geeksforgeeks.org/types-of-internet-security-protocols/
[Accessed 11 Feb 2023].
Anon., n.d. guru99. [Online]
Available at: https://www.guru99.com/types-of-computer-network.html
[Accessed 24 Dec 2022].

Nabeel Naushad Networking 01


97
Anon., n.d. javatpoint. [Online]
Available at: https://www.javatpoint.com/computer-network-topologies
[Accessed 05 Jan 2023].
Anon., n.d. javatpoint. [Online]
Available at: https://www.javatpoint.com/dynamic-host-configuration-protocol
[Accessed 20 Jan 2023].
Anon., n.d. Javatpoint. [Online]
Available at: https://www.javatpoint.com/computer-network-architecture
[Accessed 20 Dec 2022].
Anon., n.d. Jones IT. [Online]
Available at: https://www.itjones.com/blogs/basics-of-computer-networking-communication-
protocols
[Accessed 11 Feb 2023].
Anon., n.d. khanacademy. [Online]
Available at: https://www.khanacademy.org/computing/computers-and-
internet/xcae6f4a7ff015e7d:computers/xcae6f4a7ff015e7d:computer-components/a/central-
processing-unit-cpu
[Accessed 25 Feb 2023].
Anon., n.d. lemp. [Online]
Available at: https://lemp.io/why-workstation-hardware-interdependent-to-networking-
operating-system/
[Accessed 25 Feb 2023].
Anon., n.d. manageengine. [Online]
Available at: https://www.manageengine.com/network-monitoring/network-protocols.html
[Accessed Jan 2023].
Anon., n.d. manageengine. [Online]
Available at: https://www.manageengine.com/network-monitoring/network-protocols.html
[Accessed 10 Jan 2023].
Anon., n.d. Obkio. [Online]
Available at: https://obkio.com/blog/network-
testing/#:~:text=Network%20Testing%20(or%20network%20performance,changes%2C%20an
d%20measure%20network%20performance.
[Accessed 05th March 2023].
Anon., n.d. Park Place Technologies. [Online]
Available at: https://www.parkplacetechnologies.com/blog/types-of-network-management-
protocols/
[Accessed 11 2023 Feb].
Anon., n.d. spiceworks. [Online]
Available at: https://www.spiceworks.com/collaboration/remote-support/articles/top-10-
vpn-software/
[Accessed 25 Feb 2023].

Nabeel Naushad Networking 01


98
Anon., n.d. study-ccna.com. [Online]
Available at: https://study-ccna.com/ieee-ethernet-standards/
[Accessed 26 Dec 2022].
Anon., n.d. techopedia. [Online]
Available at: https://www.techopedia.com/definition/30186/network-design
[Accessed 11 Jan 2023].
Anon., n.d. techtarget. [Online]
Available at: https://www.techtarget.com/searchnetworking/definition/network-operating-
system
[Accessed 25 Feb 2023].
Anon., n.d. techtarget. [Online]
Available at: https://www.techtarget.com/searchnetworking/definition/TCP-
IP#:~:text=TCP%2FIP%20stands%20for%20Transmission,(an%20intranet%20or%20extranet).
[Accessed 20 Jan 2023].
Anon., n.d. techtarget. [Online]
Available at: https://www.techtarget.com/searchvirtualdesktop/definition/GPU-graphics-
processing-unit
[Accessed 25 Feb 2023].
Anon., n.d. techtarget. [Online]
Available at: https://www.techtarget.com/searchstorage/definition/RAM-random-access-
memory
[Accessed 25 Feb 2023].
Anon., n.d. tutorialspoint. [Online]
Available at:
https://www.tutorialspoint.com/communication_technologies/communication_technologies_
network_devices.htm
[Accessed 23 Feb 2023].
Anon., n.d. tutorialspoint. [Online]
Available at: https://www.tutorialspoint.com/what-is-network-interface-card-nic
[Accessed 25 Feb 2023].

Nabeel Naushad Networking 01


99
Grading Rubric

Grading Criteria Achieved Feedback

LO1 : Examine networking principles and their protocols.

P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Assess common networking principles and how protocols
enable the effectiveness of networked systems.

LO2 : Explain networking devices and operations

P3
Discuss the operating principles of networking devices and
server types.

Nabeel Naushad Networking 01


100
P4
Discuss the interdependence of workstation hardware and
relevant networking software
M2
Explore a range of server types and justify the selection of a
server for a given scenario, regarding cost and performance
optimisation

LO 1 & LO2
D1 Evaluate the topology protocol selected for a given scenario and
how it demonstrates the efficient utilisation of a networking
system.
LO3 : Design efficient networked systems

P5
Design a networked system to meet a given specification.
P6
Design a maintenance schedule to support the networked
system.

Nabeel Naushad Networking 01


101
M3
Analyse user feedback on your designs with the aim of
optimising your design and improving efficiency.
D2
Critically reflect on the implemented network, including the
design and decisions made to enhance the system.
LO4 : Implement and diagnose networked systems

P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D2 Critically reflect on the implemented network, including the
design and decisions made to enhance the system.

Nabeel Naushad Networking 01


102

You might also like