Unit 02 Networking Final
Unit 02 Networking Final
*If ‘No’ is recorded the Internal Verifier must recommend actions detailing the issues to be addressed. The Assessor
and the Internal Verifier must then confirm that the action has been undertaken and that the Assignment Brief is
authorised for use before being issued to learners.
Assessor signature
Date
Internal Verifier
Date
signature
Programme Leader
Date
signature (if required)
Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction P1 P2 M1 D1
Descripts
Resubmission Feedback:
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.
Action Plan
Summative feedback
Assessor Date
signature
Student Date
signature
1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No,
and Page Number on each page. This is useful if individual sheets become detached for any
reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body
except for the before mentioned compulsory information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness,
you may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation
and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present
it as my own without attributing the sources in the correct form. I further understand what it means
to copy another’s work.
E220776@esoft.academy 09 / 02 / 2024
Unit Tutor
Issue Date
Submission format
The submission should be in the form of an individual report written in a concise, formal business style
using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using Harvard
referencing system. Please also provide an end list of references using the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures,
although you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:
Alliance Health is a technology-enabled solutions company that optimizes the revenue cycle of the
US healthcare industry where its global delivery center is located in Colombo. The company is
planning to expand their business operations with their latest branch at Matara and wants it to be
one of the state-of-the-art companies in Matara with the latest facilities.
Assume you have been appointed as the new network analyst of Alliance Health to plan, design and
restructure the existing network. Prepare a network architectural design and implement it with your
suggestions and recommendations to meet the company requirements.
The floor plan of the head office in Colombo is as follows:
Floor 1:
Reception area
Sales & Marketing Department (10 employees)
Customer Services Area – with Wi-Fi facilities
Floor 2:
Administration Department (30 Employees)
HR Department (20 employees)
Accounting & Finance Department (15 employees)
Audit Department (5 employees)
Business Development Department (5 employees)
Floor 3
Video conferencing room
IT Department (60 employees)
The Server Room
Floor 2:
Administration Department (10 Employees)
HR Department (7 employees)
Accounting & Finance Department (8 employees)
IT Department (50 employees)
T he c onfer enci ng r oom of the head offic e and Customer Serv ic es Ar ea s of each
branch are to be equipped w ith Wi -Fi c onnec ti ons .
C onnec ti vi ty betw een tw o br anc hes (Head Office and M atara ) wo uld allow the
intra branch co nnectiv ity between departments. (Use o f VP N is no t com pulso ry)
T he nec ess ary I P addr ess cl asses and r ang es m ust be decided by the network
designer and sho uld be use d fo r all the departme nts except the serv er r oom .
N umber of s erv ers r equi red for the Serv er r oom need to be decided by the Netwo rk
designer and sho uld be assigned with 10 .254. 10.0/ 24 subnet. (Uses static IPs )
Sal es and Marketi ng Team also needs to access Netwo rk resources usi ng WI FI
co nnectiv ity .
( N o t e : C l e a r l y s t at e y o ur a ss u m pt i o n s . Y ou a re a l l o w e d t o d es i g n t h e ne t w o r k a c c o r d i ng t o y ou r
a s s um p t i on s , bu t m a i n r e q u i r e m en t s sh o u l d n ot b e v i o l a te d )
D iscuss the im po rtance and im pact o f netwo rk to po lo g ies and assess the m ain
netwo rk proto co l suites that are used in net wo rk design using exam ples .
Recommend suitable netwo rk to po lo gy and netwo rk pro to col s for above scenario
and evaluate with v alid po in ts how the recommended to po lo gy demo nstrates the
efficient utilizatio n o f the netwo rking system of M atara branch.
Ac tiv ity 02
D iscuss the operating principles o f network dev ices (Ex: Ro uter, Switch, Etc.) and
server ty pes that can be used fo r abov e scenario while explo ring different serv ers
that are av ailable in today’s market with their specifications . Re commend
server/ serv ers fo r the abov e scenario and justify your selectio n with v alid po ints .
D iscuss the inter -dependence o f workstatio n hardware and netwo rking so ftware
and prov ide exam ples for netwo rking so ftware that can be used in abov e network
design.
Ac tiv ity 03
P repare a written netwo rk design plan to m eet the abo ve -mentio ned user
requirements including a blueprint drawn using a mo deling too l ( Ex: M icro so ft Visio ,
EdrawM ax) .Test and evaluate the pro posed design by analyzing user feedback with
the aim o f optimizing yo ur design and im prov ing efficiency.
(Suppo rt y our answer by prov iding the VLAN and IP subnetting schem e fo r the abov e
scenario and the list of dev ices, netwo rk com po nents and software used to design the
netwo rk for abo ve scenario and while justifying yo u r selectio ns. )
*N ote: - Scr een s hots of C onfig ur ati on scri pts shoul d be pr esented.
Ac tiv ity 04
Im plement a netwo rked system based on yo ur prepared design with v alid
evidence s.
D evelo p test cases and co nduct verificatio n (Ex: P ing, extended ping, trace ro ute,
telnet, SSH, etc.) to test the above Network and analyse the test results against
the expected results. Recomm end potential future enhancem ents for the
netwo rked sy stem with v alid justificatio ns and critically reflect on the
im plemented netwo rk, including the plan, des ign, configurations, test s and the
decisio ns m ade to enhance the system .
P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Assess common networking principles and how protocols
enable the effectiveness of networked systems.
P3
Discuss the operating principles of networking devices and
server types.
LO 1 & LO2
D1 Evaluate the topology protocol selected for a given scenario and
how it demonstrates the efficient utilisation of a networking
system.
LO3 : Design efficient networked systems
P5
Design a networked system to meet a given specification.
P6
Design a maintenance schedule to support the networked
system.
P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D2 Critically reflect on the implemented network, including the
design and decisions made to enhance the system.
ACKNOWLEDGEMENT .............................................................................................22
INTRODUCTION..........................................................................................................22
ACTIVITY 01.................................................................................................................23
1.1.1 COMPUTING NETWORK …………………………………………………… 23
1.1.2 NETWORK ………………………………………………………………..…….23
1.1.3 WHY NETWORK ……………………………………………….……………...23
1.1.4 NETWORK ARCHITECTURE …………….………………...…………...…..24
1.1.4.1 PEER TO PEER NETWORK ………………………………………….24
1.1.4.2CLIENT/ SERVER NETWORK ………………………………………..25
1.1.5 TYPES OF NETWORK …………………………………………………….. 26
1.1.5.1 Personal Area Network (PAN) ………………………………………… 26
1.1.5.2 Local Area Network (LAN) ……………………………………………. 27
1.1.5.3 Wide Area Network (WAN) …………………………………………… 28
1.1.5.4 Metropolitan Area Network (MAN) ………………………………….. 29
1.1.5.5 Wireless Local Area Network (WLAN) …………………………….... 30
1.1.5.6 Storage Area Network (SAN) ……………………………………….... 31
1.1.6 SIGNAL TRANSMISSION MEDIA …………………………………….…... 32
1.1.6.1 Guided Media ………………………………………………………..… 33
1.1.6.2 Unguided Media …………………………………………………..…… 34
1.1.7 IEEE ETHERNET STANDARDS ……………………………………….…. 35
1.2.1 NETWORK TOPOLOGY …………………………………………….….…. 36
1.2.2 Importance of network topology ……………………………………………... 38
1.2.3 Impacts of network topology …………………………………………………. 39
1.2.4 Types of topology ……………………………………………………………… 40
1.2.4.1 BUS TOPOLOGY ……………………………………………………… 41
1.2.4.2 STAR TOPOLOGY ……………………………………………….….... 41
1.2.4.3 RING TOPOLOGY …………………………………………………..... 42
1.2.4.4 MESH TOPOLOGY ………………………………………………....... 43
1.2.4.5 TREE TOPOLOGY ………………………………………………….... 44
1.2.4.6 HYBRID TOPOLOGY ………………………………………………... 45
1.2.5 NETWORK PROTOCOLS …………………………………………….......... 45
1.2.5.1 What is a network protocol? ………………………………………….. 45
I hereby gratefully thank Miss. Haseena for his remarkable coordination and support in the
successful completion of my assignment. The support was immeasurable and also I
thank my subordinates for their support in completion of this assignment in an efficient
way.
Sincerely,
MM.Nashath aara
INTRODUCTION
Alliance health business has chosen to construct a company with three-story building in
Matara. With 145 workers of the Matara branch are spurted into 7 departments such as
sales & marketing, administration, HR, Accounting & finance, Audit, and Business
development departments in general and one server room. It’s decided to design the
network in a state of art companies way.
1.1 Discuss the benefits and constraints of different network system types that can be
implemented in the Matara branch and the main IEEE Ethernet standards that can be
usedin above LAN and WLAN design.
Figure 1
1.1.2 NETWORK
A network is a collection of computers, servers, mainframes, network devices peripherals,
or any other devices connected to allow data sharing.
An example for network is the internet, which connects millions of people all over the
world.
Disadvantages of network
Client/server network is a network model designed for the end user called clients to access
the resources from a central computer known as a server. The central controlleris known as
the server while all other computer in the network is called as clients.
Server performs all the complicated activities such as security and network management
etc.
The clients are able to communicate with each other through the server. Suitable for a large
network.
The main types of networks are PAN, LAN, MAN, WAN and WLAN
Interconnection between devices within the range of a person’s private space typically 10
meters. Can be fully wireless or combination of wired and wireless. Devices such as
laptops, mobile, phones and play station are used to develop a personal areanetwork.
It is a computer network that connects devices within a limited area such as home,
office or a building .also can be wireless or wired
It is a wireless distribution method for two or more devices. Uses high frequency radio
waves and often include an access point to the internet. Allows users to movearound the
coverage area.
Cost: Implementing a SAN can be expensive due to the need for specialized hardware
such as Fibre Channel switches and HBAs (Host Bus Adapters). The initial
investment and ongoing maintenance costs may be prohibitive for smaller
organizations.
Complexity: SANs can be complex to set up and manage, requiring skilled personnel
with expertise in storage networking. This complexity can lead to longer deployment
times and increased chances of configuration errors.
Single Point of Failure: Although SANs often incorporate redundancy and failover
mechanisms, they can still be vulnerable to a single point of failure, such as a failure
in the central storage controller or a critical switch.
Security Concerns: Because SANs involve the sharing of storage resources among
multiple servers, there can be security concerns. Unauthorized access to the SAN can
potentially lead to data breaches or unauthorized modifications.
Limited Geographical Flexibility: Traditional SANs are designed for local or campus
environments and may not be well-suited for long-distance data replication.
Implementing SAN solutions over long distances can add complexity and cost.
Learning Curve: SAN technology requires specialized knowledge, and organizations
may need to invest in training their IT staff or hire external expertise to effectively
manage and troubleshoot SAN environments.
In data transmission, the data carried from the source to the receiver is called data
transmission media. The data should be sent to the receiver by the source through a
transmission media
Unguided media
Transmitting of data by spreading signals relevant to data transmission in the
atmosphere using non-physical media is called unguided media. Such as,
• Radio wave
• Microwaves
• Infrared
Twisted pair
This cable consists of copper wire covered with a plastic cover. Those pairsare
wrapped around each other. This is done to minimize the electrical shocks and to
prevent mixing of sounds in environments.
This cable is manufactured by placing several plastic covers around the copper wire
covering the mesh. Used for external networks. Plastic cover is placed for facing
environmental conditions such as sunlight and rain situations
Fibre optics
Used to transmit data using light waves through thin glass or plastic threads. Emits
light waves at the source which is read by a detector at the other end.
Radio waves
Microwaves
This is radio transmission wave which is transmitted within an area from 300 MHz to
4 GHz. Transmission such as television, telephone, walkie-talkie waves etc... Are
under these
Ability to share and exchange information on the network easily which will be
difficult to be done in a wired network
There is no extra cost because wireless network facility is available
IEEE 802.3
Ethernet-based network standards and protocols
This technology is most commonly used in LANs
Related to physical layer and media access control (MAC) sub-layer ofthe data
link layer.
IEEE 802.11
Standard implements to wireless local area network (WLAN)
Part of IEEE 802 series of local area network (LAN) technicalstandards
Is used in most home and workplace networks
Foundation for IEEE 802.11p vehicle-based communication networks
Physical topology refers to the physical structure how a network is arranged. Logical
topology refers to the logical communication inside the network by the devices.
1. Physical Topology
Physical topology indicates arrangement of different elements of a network. It reflects
physical layout of devices and cables to a form a connected network. It is concerned
with essentials of network ignoring minute details like transfer of data and device type.
The pattern of arrangementof nodes (computers) and network cables depends on ease
of installation and setup of the network. It affects cost and bandwidth capacity based on
solution of devices. It takes into account placement of nodes and distance between
them. Devices can be arranged to form a ring (Ring Topology) or linearly connected in
a line called Bus Topology.
2. Logical Topology
The importance of network topology lies in its fundamental role in shaping the structure,
efficiency, and functionality of a computer network. Network topology refers to the
arrangement of nodes and connections in a network, determining how data flows between
devices. Here are several key aspects highlighting the importance of network topology:
1. Data Flow Optimization: The topology of a network directly influences how efficiently
data is transmitted between devices. Different topologies offer varying degrees of
efficiency in terms of data transmission speed, latency, and reliability. By selecting an
appropriate topology, organizations can optimize data flow to meet their specific
requirements.
2. Scalability: Network topology impacts the scalability of a network, which refers to its
ability to accommodate growth in terms of the number of users, devices, and data traffic.
Scalable topologies such as mesh or star networks can easily expand to accommodate
additional nodes or increased data demands, ensuring that the network remains effective
as the organization grows.
3. Reliability and Fault Tolerance: Certain network topologies, such as mesh or ring
networks, offer inherent redundancy and fault tolerance. Redundant connections provide
alternative paths for data transmission, minimizing the impact of network failures or cable
breaks. This enhances the reliability of the network and ensures uninterrupted
communication between devices.
6. Ease of Management: The topology of a network can affect the ease of network
management and administration. Centralized topologies such as star or tree networks
simplify management tasks by centralizing control and monitoring at a single point. This
reduces complexity and enhances the efficiency of network administration.
In summary, the importance of network topology lies in its impact on data flow
optimization, scalability, reliability, performance, cost-efficiency, ease of management,
and security considerations. By selecting the appropriate topology based on their specific
requirements and objectives, organizations can build robust, efficient, and secure networks
that support their business needs.
The topology is jointly determined by the network layout and the link dynamics. The
effective topology over which routing paths are established also depends on the choice of
routing destination, which corresponds to the sink placement in the context of WSNs. The
combinationof the network layout, the link dynamics, and the sink placement, which we
simply refer to as network topology, has a large impact on protocol performance.
A network monitoring solution with a topological approach may help to boost productivity
andsave money. It may also help to free up resources and to help staffers engage quicker
with the broader network.
Therefore, in one form or another, network topology is ideal for businesses of all shapes
and sizes. There are plenty of different topology styles to adopt. Hybrid models, for
example, canscale endlessly – if this is the support you require!
Established by connecting all the computers to a central device. A hub or switch can be
This network is created with wire made like ring. This network doesn’t use a central device.
The data is flown in a single direction. Data is transmitted within the network from one
computer to another and finally reaches to the receivable computer.
Connecting all the computers in the network with each other is called meshtopology. Data
transmission can be dispersed using this topology even if one of the links fails.
Combination of two or more topology together .Each with its own type ofnodes. The
structure of hybrid topology includes various types of topologies
Figure 18 - IP address
3. What is TCP/IP?
As a transport protocol, the Transmission Control Protocol (TCP) establishes the rules for
how data is transmitted and received. Each TCP/IP packet has a TCP header in the data
section. TCP establishes a connection with the destination before to sending any data. After
transmission starts, TCP makes sure that each packet arrives in sequence.[ CITATION
Clo23 \l 1033 ] Each packet that is received over TCP will be acknowledged by the receiver.
If the reception is not acknowledged, missing packets will be forwarded again. TCP is built
for dependability, not speed. Data loading over TCP/IP may take longer if some packets
are missing since TCP must ensure that all packets arrive in sequence. As TCP and IP were
initially intended to be used in tandem, these are frequently referred to as the TCP/IP family.
IP may be used with other transport protocols, though.
Figure 25 – Https
The term protocol suite refers to a collection smaller network protocols that function
together. Network protocols are created by networking or information technology
organizations in accordance with industry standards. Every time you connect to the internet
you are assigning network protocols.
The open system interconnection model is a reference tool for understanding data
communications between any two network systems. It helps to understand the way of data
transmission from a device to a network. This model is introduced by the international
standard organization.
1. Physical layer
This is the first layer of the OSI model. Flowing of data is occurred in this layer
asfollows,
Transmission speed of the data
Voltage required for transmission
Modulation of signals
Devices such as connectors, modems, repeaters and hubs are used in this layer
Protocol data unit of this layer is bits
Devices such as network interface cards (NIC), bridge and switch are used in this
layer.
Protocol data unit of this layer is frame
3. Network layer
This is the third layer of the OSI model. Responsible for transferring data between
two different networks,
Carrying data from one point to another transmission point
Allocates a suitable path to transmit data
Identifies the relevant IP address
Devices such as router and 3 layer switch are used in this layerProtocol data unit of
this layer is data packets
4. Transport layer
This is the fourth layer of the OSI model. Responsible for end to end communication
between two devices,
Forwarding data to the transmission media between the devices
Controlling the flow of data
Correcting the errors during transmission of data
Multiplexing
5. Session layer
This is the fifth layer of the OSI model. Responsible for starting and stopping
communication between the two devices
Connecting devices for transmission purpose
Identifying data exchange methodologies
Continuing and stopping data transmission
Selecting a data transmission methodProtocol data unit used in this layer is data
6. Presentation layer
This is the sixth layer of the OSI model. Responsible for translation, encryption and
compression of data.
Converting data into structures
Encrypting data
Decrypting data
Compressing of data
7. Application layer
This is the seventh layer of the OSI model. Act as an interface to the user to connect
to the network.
Authentication of users
Providing required software’s to access the internet
Browsing the world wide web
Devices such as gateway is used in this layerProtocol data unit used in this layer is
data
1.2.6 RECOMMENDATION
The speed of the connection will gradually rises during the interconnection of different
types of topologies and also to identify and troubleshoot the error is reliable.
And also I recommend OSI model because it is supportable to all devices in the network
and also use this model as default model in data transmission. It is easy to troubleshoot
because each unit is separated from each other. It is an adaptable methodology with both
connection oriented and connectionless oriented service. Troubleshooting can be done
easily by examining each packet.
ACTIVITY 02
2.1.3.1 Router
Figure 29 router
Transmission of data from one place to another in a network is done by a router. Therouter
belongs to the network layer which is the third layer of the OSI model. Consists an
operating system to perform its task with the smallest memory unit. Therefore it operates
similar to a kind of special computer
Uses a routing table when transmitting data in network. MAC addresses of the devices
connected to the router are included in the routing table.
Since a router has two interfaces it has two MAC address one for each. It has two IP address
as well.
Advantages of a router
Less network traffic due to domain crossing
Chooses more efficient route through using dynamic routing algorithm
It provides data flow management and traffic control methodologies
Network management policy setting are reprogrammable
Creates broadcast domains to control network traffic
Disadvantages of a router
Network traffic will be high due to dynamic router communication
Cost is high
Slower than a bridge and repeater due to monitoring of data transmission
All network protocols are not routable
Initial setting are needed on several occasion
2.1.3.2 Switch
Figure 30 switch
Used to build network units which are established by connecting several computers each
other also used to connect several local area networks.
This device has the availability to check the physical address of the data packet received
and to forward it to the receivables node. This is the main difference between the switch
and a hub.
Transmit signals using full duplex method and has the ability to forward signal for two
directions.
Disadvantages of a switch
Problem arise due to broadcast traffic
Configuration should be done perfectly to control multiple packets
Will be difficult to analyze or identify a problem when using a switch
Cost is high
Transmission is not efficient as routers
The network fails is switch is down
2.1.3.3 Modem
Figure 31 modem
A modem is a device that connects your home to your Internet service provider (ISP)
generally over a coax cable connection. The Modem turns signals from your ISP into
signals that may be used by your local devices and the other way around
Advantages of a modem
Effective for internet connections
Price is affordable
Intermediate way for a modem
2.1.4.1 Firewall
Firewall is a network security method that can be used to monitor incoming and outgoing
network traffic and decided whether to allow or block specific traffic based on defined set
of security rules.
Hackers can access your computer when it is connected to a network and have the ability
to destroy, steal data by using malicious coding. Firewall can be used to stop these
malicious activities. Firewall can be either a software or hardware’
Advantages of firewall
Enhanced network security and data monitoring
Privacy and security is ensured
Prevents from unauthorized access to the network
Disadvantages of firewall
Slows down the internet connection
Expert management is required
Installing firewall could be expensive
Extra resources are needed to maintain and upgrade the firewall
2.1.4.4 IDS
An Intrusion Detection System (IDS) is a monitoring system that detects suspicious
activities and generates alerts when they are detected. Based upon these alerts, a security
operations centre (SOC) analyst or incident responder can investigate the issue and take the
2.1.4.5 IPS
Intrusion prevention system (IPS) is a network security and threat prevention tool system.
Potential threats can be identified and responded. Intrusion prevention systems are thereby
used to examine network traffic flows in order to find malicious software and to prevent
vulnerability exploits. It can be utilized in a security environment by system and security
administrators. An intrusion prevention system will work by scanning through all network
traffic. To do this, an IPS tool will typically sit right behind a firewall, acting as an
additional layer that will observe events for malicious content. In this way, IPS tools are
placed in direct communication paths between a system and network
2.1.5 SERVERS
Server can be program or equipment that provides services to other computers (clients)
through a network or internet is known as server. To provide an efficient service to the
client computers to operation speed of the server, capacity of memory, storage capacity
(data storage) should be extremely high. Sometimes servers are used to meet the increasing
demand of the computers connected to the network.
When a client submits a request to the server, is known as client-server model themost
frequently used model. In this model, the server does some action and then givesthe client
a response, usually with a finish or an acknowledgement. A computer is specialized for
operating servers when it is known to as server-class hardware. Thismeans that it is more
powerful and dependable than regular personal computers.
Tower servers
Are computers with their own methodology. Due to their low component density,
Offer considerably simpler cooling than dense rack or blade servers. Tower servers
have good scalability since an infinite number of servers can be added to the network.
They are not appropriate for data centre’s that will need to be expandable and scalable
in the future.
-Lenovo Think Server TS150
Blade servers
Is a modular type of server that enables the housing of numerous servers inside of one
enclosure. Within a single enclosure, all blade servers share the same ports, switches,
and power connectors. This means separate cables do not need to be run for each
blade server.
- HPE ProLiant BL460c Gen10
2.2.1 WORKSTATIONS
Are computers designed for a specific feature and advanced features with LAN access.
Business and engineering works are only handled by the work stations.
GUI is important content in the workstation.
Disadvantages of a workstation
Physical immovability is complex
Cost is high
Electricity consumption is high
Overall, the interdependence of workstation hardware components ensures that the system
operates efficiently and effectively, with each component playing a crucial role in
executing tasks, processing data, and delivering results. By selecting compatible and high-
performance hardware components and optimizing their configuration, users can maximize
the performance and functionality of their workstations for various computing tasks and
applications.
2. Network Protocols:
- Network protocols define the rules and conventions for communication between devices
on a network.
- Examples include TCP/IP, Ethernet, Wi-Fi (802.11), HTTP, FTP, SMTP, DNS, and
SNMP (Simple Network Management Protocol).
These are just a few examples of network software commonly used in various network
environments. Depending on the specific requirements and objectives of an organization,
different combinations of network software may be deployed to build and maintain an
efficient and secure network infrastructure.
2.2.3.3.2 Disadvantages
Security: Cloud servers can be vulnerable to security breaches if not properly secured.
Dependence on the provider: You are dependent on the cloud provider for maintaining
andupdating the server.
Latency: Cloud servers can sometimes have higher latency due to the distance between
theserver and the client.
2.2.3.3.4 Disadvantages
Complexity: Setting up and configuring a VPN server can be complicated and time-
consuming.
Performance: VPN servers can slow down the connection due to encryption and
decryptionoverheads.
Cost: Running a VPN server can be expensive, as it requires dedicated hardware
andsoftware.
Among these, it is important to use cloud server as the most profitable and efficient server
for this organization.
Hard drive : 1TB 7.2K Entry SATA 3.5in Cabled Hard Drive X 1
DVD/RW : DVD+/-RW,SATA,8X,9.5
Raid : No RAID
Keyboard / Mouse: NO
Scalability Depending on what Alliance Health requires, cloud servers may simply be
scaled up or down. Therefore, businesses may swiftly raise their server capacity during
periods of high demand and decrease it during times of low traffic, maximizing resource
useand minimizing costs.
Reliability To guarantee high availability and uptime of its cloud servers, cloud service
Flexibility Cloud servers may be quickly installed and set up to satisfy particular needs.
Alliance Health has a variety of server options.to determine which configurations
and operating systems best suit their applications and workloads. They may maximize
performance, security, and cost with the use of this flexibility.
Overall, using cloud servers can provide Alliance Health with the flexibility, dependability,
and scalability needed to offer patients high-quality medical treatment while lowering costs
and boosting efficiency.
Star Topology
All nodes in this protocol are linked to a central hub or switch, which serves as the
protocol's single point of control. It is simple to set up and maintain, and it makes network
expansion simple. Yet, if the hub or switch has problems, it may experience a single point
offailure.
Ring Topology
With this protocol, each node serves as a repeater to boost the data and is linked to
the others in a circular loop. It provides for the successful usage of bandwidth and is
Bus Topology
All nodes in this protocol are linked together by a single communication channel called a
bus. It provides for the effective utilization of bandwidth and is appropriate for tiny
networks. If the bus has issues, it may experience a single point of failure.
Mesh Topology
All the nodes in this protocol are interconnected in a network-like topology, with
connectivity for fault tolerance. It provides for the effective utilization of bandwidth and is
appropriate for big networks. However, setting it up and keeping it up might be difficult.
Hybrid Topology
This is a combination of two or more topologies, such as a ring topology connected to a
bus topology.
ACTIVITY 03
3.1 Prepare a written networ k design plan to meet the above -mentioned
user requirements including a blueprint drawn using a modeling tool
(Ex: Microsoft Visio, EdrawMax) .T est and evaluate the proposed
design by analyzing user feedback with the aim of optimizing your
design and impro ving efficiency.
Below is the network design created for Alliance health grant institute (Colombo) and
Matara institute. It is created by Cisco Packet Tracer software. TREE topology is the
suggested topology for the network design created for Alliance health institute.
Network scan
Power check
Cable organization
Network documentation
Network update
Device update
Server update
Windows update
Security update
Router
Cisco 4000 Series Integrated Services Routers is used because it have apredictable
performance, good network service, simplified and protects from threat. Because
of predictable performance, get a high-availability architecturedesigned for sort of
mission-critical branches, very contrary to popular belief. The ISR 4000 delivers high
speed, predictable performance and modularity to really connect from most remote
locations, showing how actually get a high- availability architecture designed for
definitely mission-critical branches, which actually is quite significant. Simplify
network automation and turn hours of work into minutes. And the last is protection,
Protect really your branch site across the LAN and WAN and in the cloud with
security integratedinto the router in an actually big way. You no longer need a kind
of separate security appliance so I recommend this router.
Switch
Cisco Catalyst 3560 Series Switch is used in this system because it enhancethe
security, improve reliability and its efficiency. integrated network security for before,
during, and after an attack, which basically is fairly significant.And next is about
the reliability, it’s easily definitely managed wired and wireless networks, basically
strengthen security, and for all intents and purposes simplify basically your campus
LAN in a very big way. And the last is about the efficiency, it pave actually your way
to an automated, digital- ready network with access switches in a subtle way. So I
recommend this switch
P.C
Device name – Acer 14 laptop
Processor – AMD Ryzen 55500U. 4GB RAM, 256GB SSD
Operating system – windows 11
Draw.io
User may develop intriguing charts, presentation, info graphics and other type’s
visual materials.
Operates on WINDOWS, LINUX and MACOS
More than 200 visual info graphics of technical diagram can be created by the user.
Figure 55 configuration 1
Figure 56 configuration 2
VLAN output
Figure 57 configuration 3
Figure 58 configuration 4
DHCP configuration
Figure 59 configuration 5
Figure 60 configuration 6
Figure 61 configuration 7
Figure 63 step 1
Figure 65 step 3
Figure 67 step 5
Figure 69 step 7
ACTIVITY 04
Step 1
Insert the Windows Server installation media into the server's CD/DVD drive or USB
port. Boot the server from the installation media. You may need to configure the boot
order in theBIOS/UEFI settings to prioritize the installation media.
Step 2
Click "Next" after choosing the language, time zone, currency, and keyboard input mode
onthe first screen.
Figure 73
Figure 74
Step 3
After entering the product key, select "Next." Choose "Skip" to complete the installation
Figure 75
Figure 76
Figure 77
Step 4
You can choose between a custom installation or an upgrade from a previous version of
Windows. For a new installation, select "Custom (advanced)."
Figure 78
Figure 80
Figure 81
Figure 82
Figure 84
Figure 86
After the installation is complete, you will be prompted to set up the server's initial
configuration, including the administrator password, time zone, and network settings.
Once you have completed the initial configuration, you will be taken to the Windows
Serverdesktop.
Figure 87
Figure 88
Step 7
Congratulations, you have successfully installed Windows Server!
Figure 90
Step 1
Open a command prompt: Click on the Start button and type "cmd" into the search box,
thenclick on the Command Prompt application that appears in the search results.
Figure 91
Figure 92
Figure 93
Step 3
Type "ping" followed by the IP address or hostname you want to ping: In this case, type
"ping 192.168.128.18".
Figure 94
Figure 95
Step 5
Wait for the response: The ping command will send several packets of data to the specified
IP address and wait for a response. Depending on the network conditions and the response
time of the device you're pinging, this may take anywhere from a few milliseconds to
several seconds.
Figure 96
Figure 97
Figure 98
Figure 100
Figure 102
Figure 104
Figure 106
Figure 108
Figure 110
Figure 112
Figure 114
Figure 116
Figure 118
Figure 120
Figure 122
One of the most useful tools for IT workers is Wireshark, which is the popular network
packet capture program. Wireshark allows you to observe and capture network packets in
detail. After being broken down, these packets can be used for offline or live analysis. With
the aid of this program, you may carefully monitor the network traffic, filter it, and go
deeper to find the root of any problems. Also, this technology aids in network analysis and
ultimately network security. This free Wireshark lesson teaches you how to gather, decode,
filter, and analyze data packets so you can troubleshoot effectively.
Figure 123
Step 2
Figure 124
Figure 125
4 Steps
Figure 126
Problem:
Everything is working normally, but suddenly the connection go down and comes back.
Troubleshoot steps:
The case may be these things
Faulty interface
Recommended Actions
Remove and re-insert the cable on both ends
Problem:
The network cable plugged in but getting no connection
Troubleshoot steps:
Case maybe
Network interface card failure
Recommended Actions:
Check the switch or router ports are working and swap the ports
Testing the solution: It's crucial to test the network once an issue has been handled to make
sure it has been rectified and is operating at its best.
The networked systems of Alliance Health Corporation might benefit from the following
improvements.
Adopt health information exchange (HIE): Health information exchange can help
healthcare professionals safely share patient information. By giving medical personnel
access to comprehensive and accurate patient data, can enhance patient outcomes.
Enhance Network Security: Security is crucial for a healthcare provider. Patient data can
be protected from unwanted access or theft by enhancing network security through the use
of robust authentication and access control methods, encryption of data in transit and at
rest,and intrusion detection and prevention systems.
Use Internet of Things (IoT) gadgets: IoT gadgets may be used to track patient health
and gather information to enhance patient outcomes. Wearable tech may, for instance, be
used totrack patients' vital signs and notify doctors of any worrying changes.
Employ cloud computing: By enabling Alliance Health Corporation to store data and
access applications online, cloud computing can assist to save expenses and enhance
scalability.
Only a handful of the potential improvements for Alliance Health Company's networked
systems are listed above. Depending on the organization's needs and objectives, certain
improvements may be acceptable.
The following factors should be considered while evaluating the network that has been
builtin a tree topology.
Scalability: The network can be easily expanded by adding additional nodes thanks to the
tree topology's scalability. To make sure that it can support future expansion and shifting
business requirements, the network's design should be examined.
Resilience: The tree topology is relatively resilient, as failures in one branch of the network
do not affect other branches. However, the design should be evaluated to ensure that there
are no single points of failure that could cause significant disruption to the network.
Performance: The network's performance should be analyzed to ensure that it meets the
organization's requirements. This includes factors such as bandwidth, latency, and
throughput. Performance monitoring tools can be used to identify any bottlenecks and areas
for improvement.
Cost: The cost of the network should be evaluated to ensure that it is cost-effective for the
organization. This includes factors such as the cost of hardware, software, maintenance,
and support. The tree topology can be cost-effective, as it requires fewer cables and is
relatively easy to install and manage.
User experience: The network's user experience should be evaluated to ensure that it is
intuitive and user-friendly. This includes factors such as ease of use, responsiveness, and
One should take into account the actions taken to improve the network in addition to the
aforementioned factors. This involves things like modernizing technology, introducing
new software, and putting new security measures in place. The performance, security,
and user experience of the network, as well as their cost-effectiveness, should be taken into
consideration while assessing these choices.
Finally, to make sure the network is successful, efficient, safe, and user-friendly, a critical
analysis of the network implemented in a tree topology should take all of the
aforementioned factors and choices into account.
003 Invalid login User tries to login Password- User should not Expected result
using 1235764 be able to login will
invalid match the
Passwords actual result
As the development of the technology sector increases security issues also will gradually
increase so we can improve the encryption system in the network to maintain the
confidentiality matter of the system and by using biometric devices. Reason to implement
this system is to prevent unauthorized access to the data in the system which might be a
serious threat to the organization. Server usually should have more processing power,
memory and storage than client computers. Backup facilities, remote control and security
of the system will be provided by the server. VPN configuration can be implemented to
the system for powerful encrypting to the network for protecting the flow of data online
while browsing the web and to maintainthe internet traffic. Cloud system can also be
implemented to the system to accessdata from anywhere anytime this implementation to
prevent data loss during physical damages, natural disasters or any problem that the system
data cannot be retrieved. A separate network will be implemented to the outside guest to
utilize the network by introducing this methodology the organizations data and resources
can be secured andalso the network crashes can be controlled.
4.2.11 CONCLUSION
The main objective of this system is to store the information of the clients and process the
organizations data that which can be done through this effective communication system.
Some errors were identified but they were fixed eventually. This designed network
complies and satisfies the entire requirement that are requested and proposed by the
ALLIANCE HEALTH. To assign the IP address to the devices in the network DHCP is
utilized.
According to the plan the network the below decisions have been made.
Devices – Switch , Router
Network model - MAN
Network topology - Hybrid topology
Network Protocols - OSI model
Security Methodology – Firewall , Proxy server IDS , IPS