0% found this document useful (0 votes)
31 views142 pages

Unit 02 Networking Final

The document outlines an assignment brief for the HND in Computing program focusing on LAN Design & Implementation for Alliance Health. It details the assessment criteria, internal verification process, and specific tasks related to networking principles, devices, and design requirements for a new branch in Matara. The assignment requires students to create a network design plan that meets the company's operational needs while adhering to specified guidelines and deadlines.

Uploaded by

sajath
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views142 pages

Unit 02 Networking Final

The document outlines an assignment brief for the HND in Computing program focusing on LAN Design & Implementation for Alliance Health. It details the assessment criteria, internal verification process, and specific tasks related to networking principles, devices, and design requirements for a new branch in Matara. The assignment requires students to create a network design plan that meets the company's operational needs while adhering to specified guidelines and deadlines.

Uploaded by

sajath
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 142

INTERNAL VERIFICATION – ASSIGNMENT BRIEF

Programme Title: HND in Computing


Assessor Name: Oshada Lokuhetty
Internal Verifier Name:

Unit or Component Number and


Title: Unit 02 - Networking

Assignment title: LAN Design & Implementation for Alliance Health


Assessment criteria targeted by
this assignment brief: LO1, LO2, LO3, LO4

Is this an Authorised Assignment N/A


Brief published by Pearson? If so,
has it been amended by the
Assessor in any way? Please give
details.
(If using the Authorised Assignment Brief
‘off the shelf’ with no amendments, please
answer the question marked * in the
checklist only)

Has this assignment been Yes No


submitted to the Assignment
Checking Service?
(If Yes, please keep a copy of the ACS

feedback with this form)

INTERNAL VERIFIER CHECKLIST Y/N

Are the programme and unit details accurate? Y

*Are clear deadlines for assessment given? TBC

Is the time frame of an appropriate duration? Y

Is there a suitable vocational scenario or context? Y

Are the assessment criteria to be addressed stated accurately? Y

Does each task show which criteria are being addressed? Y

Do the tasks meet the assessment requirements of the unit/s? Y

Is it clear what evidence the learner needs to generate? Y

Is it likely to generate evidence that is valid and sufficient? Y

Overall, is the Assignment fit for purpose? Yes √ No

*If ‘No’ is recorded the Internal Verifier must recommend actions detailing the issues to be addressed. The Assessor
and the Internal Verifier must then confirm that the action has been undertaken and that the Assignment Brief is
authorised for use before being issued to learners.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 1|Page


Action required: Target Date for Date Action
(If none then please state n/a) Completion Completed

General Comments (if appropriate)

Assignment Brief Authorised for Use:

Internal Verifier signature Date

Assessor signature
Date

Lead Internal Verifier signature (if


appropriate) oshada@esoft.lk Date 2022/06/13

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 2|Page


Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)
INTERNAL VERIFICATION – ASSESSMENT DECISIONS

Programme title BTEC Higher National Diploma in Computing

Assessor Internal Verifier


Unit 02: Networking
Unit(s)

Assignment title LAN Design & Implementation for Alliance Health

Student’s name MM.Nashath aara / 00214832


List which assessment criteria Pass Merit Distinction
the Assessor has awarded.

INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded match


those shown in the assignment brief? Y/N

Is the Pass/Merit/Distinction grade awarded


justified by the assessor’s comments on the Y/N
student work?
Has the work been assessed
Y/N
accurately?
Is the feedback to the student:
Give details:
• Constructive? Y/N
• Linked to relevant assessment criteria? Y/N
• Identifying opportunities for Y/N
improved performance?
• Agreeing actions? Y/N
Does the assessment decision need
Y/N
amending?

Assessor signature Date

Internal Verifier signature Date


Programme Leader signature (if required)
Date

Confirm action completed


Remedial action taken
Give details:

Assessor signature Date

Internal Verifier
Date
signature
Programme Leader
Date
signature (if required)

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 3|Page


Higher Nationals - Summative Assignment Feedback Form
Student Name/ID

Unit Title Unit 02: Networking

Assignment Number 1 Assessor


09 / 02 / 2024 Date Received
Submission Date
1st submission
Date Received 2nd
Re-submission Date
submission

Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction P1 P2 M1 D1
Descripts

LO2 Explain networking devices and operations.


Pass, Merit & Distinction P3 P4 M2
Descripts

LO3 Design efficient networked systems.


Pass, Merit & Distinction P5 P6 M3 D2
Descripts

LO4 Implement and diagnose networked systems.


Pass, Merit & Distinction P7 P8 M4
Descripts

Grade: Assessor Signature: Date:

Resubmission Feedback:

Grade: Assessor Signature: Date:

Internal Verifier’s Comments:

Signature & Date:

* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 4|Page


Assignment Feedback
Formative Feedback: Assessor to Student

Action Plan

Summative feedback

Feedback: Student to Assessor

Assessor Date
signature

Student Date
signature

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 5|Page


Pearson Higher Nationals in
Computing
Unit 02: Networking
Assignment 01

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 6|Page


General Guidelines

1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.

Word Processing Rules

1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No,
and Page Number on each page. This is useful if individual sheets become detached for any
reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.

Important Points:

1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body
except for the before mentioned compulsory information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness,
you may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation
and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 7|Page


Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present
it as my own without attributing the sources in the correct form. I further understand what it means
to copy another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of Pearson UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my
own, and where I have made use of another’s work, I will attribute the source in the correct
way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Pearson, UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.

Student’s Signature: Date:


(Provide E-mail ID) (Provide Submission Date)

E220776@esoft.academy 09 / 02 / 2024

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 8|Page


Higher National Diploma in Computing
Assignment Brief
Student Name /ID Number

Unit Number and Title Unit 2: Networking

Academic Year 2022/23

Unit Tutor

Assignment Title LAN Design & Implementation for Alliance Health

Issue Date

Submission Date 09 / 02 / 2024

IV Name & Date

Submission format

The submission should be in the form of an individual report written in a concise, formal business style
using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using Harvard
referencing system. Please also provide an end list of references using the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures,
although you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:

LO1 Examine networking principles and their protocols.

LO2 Explain networking devices and operations.

LO3 Design efficient networked systems.

LO4 Implement and diagnose networked systems.

Assignment Brief and Guidance:

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 9|Page


Scenario

Alliance Health is a technology-enabled solutions company that optimizes the revenue cycle of the
US healthcare industry where its global delivery center is located in Colombo. The company is
planning to expand their business operations with their latest branch at Matara and wants it to be
one of the state-of-the-art companies in Matara with the latest facilities.

Assume you have been appointed as the new network analyst of Alliance Health to plan, design and
restructure the existing network. Prepare a network architectural design and implement it with your
suggestions and recommendations to meet the company requirements.
The floor plan of the head office in Colombo is as follows:
Floor 1:
 Reception area
 Sales & Marketing Department (10 employees)
 Customer Services Area – with Wi-Fi facilities

Floor 2:
 Administration Department (30 Employees)
 HR Department (20 employees)
 Accounting & Finance Department (15 employees)
 Audit Department (5 employees)
 Business Development Department (5 employees)

Floor 3
 Video conferencing room
 IT Department (60 employees)
 The Server Room

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 10 | P a g e


The floor plan of the branch in Matara is as follows:
Floor 1:
 Reception area
 Customer Services Area– with Wi-Fi facilities

Floor 2:
 Administration Department (10 Employees)
 HR Department (7 employees)
 Accounting & Finance Department (8 employees)
 IT Department (50 employees)

Foll ow i ng r equir ements ar e g iv en by the Manag ement.


 All the departments must be separ ated with uni que subnet .

 T he c onfer enci ng r oom of the head offic e and Customer Serv ic es Ar ea s of each
branch are to be equipped w ith Wi -Fi c onnec ti ons .

 C onnec ti vi ty betw een tw o br anc hes (Head Office and M atara ) wo uld allow the
intra branch co nnectiv ity between departments. (Use o f VP N is no t com pulso ry)

 T he nec ess ary I P addr ess cl asses and r ang es m ust be decided by the network
designer and sho uld be use d fo r all the departme nts except the serv er r oom .

 N umber of s erv ers r equi red for the Serv er r oom need to be decided by the Netwo rk
designer and sho uld be assigned with 10 .254. 10.0/ 24 subnet. (Uses static IPs )

 Sal es and Marketi ng Team also needs to access Netwo rk resources usi ng WI FI
co nnectiv ity .

( N o t e : C l e a r l y s t at e y o ur a ss u m pt i o n s . Y ou a re a l l o w e d t o d es i g n t h e ne t w o r k a c c o r d i ng t o y ou r
a s s um p t i on s , bu t m a i n r e q u i r e m en t s sh o u l d n ot b e v i o l a te d )

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 11 | P a g e


Ac tiv ity 01
 D iscuss the benefits and co nstraints o f different netwo rk system types that can be
im plemented in the Matara branch and the m ain IEEE Ethernet standards that can
be used in above L AN and WLAN design .

 D iscuss the im po rtance and im pact o f netwo rk to po lo g ies and assess the m ain
netwo rk proto co l suites that are used in net wo rk design using exam ples .
Recommend suitable netwo rk to po lo gy and netwo rk pro to col s for above scenario
and evaluate with v alid po in ts how the recommended to po lo gy demo nstrates the
efficient utilizatio n o f the netwo rking system of M atara branch.

Ac tiv ity 02
 D iscuss the operating principles o f network dev ices (Ex: Ro uter, Switch, Etc.) and
server ty pes that can be used fo r abov e scenario while explo ring different serv ers
that are av ailable in today’s market with their specifications . Re commend
server/ serv ers fo r the abov e scenario and justify your selectio n with v alid po ints .

 D iscuss the inter -dependence o f workstatio n hardware and netwo rking so ftware
and prov ide exam ples for netwo rking so ftware that can be used in abov e network
design.

Ac tiv ity 03
 P repare a written netwo rk design plan to m eet the abo ve -mentio ned user
requirements including a blueprint drawn using a mo deling too l ( Ex: M icro so ft Visio ,
EdrawM ax) .Test and evaluate the pro posed design by analyzing user feedback with
the aim o f optimizing yo ur design and im prov ing efficiency.

(Suppo rt y our answer by prov iding the VLAN and IP subnetting schem e fo r the abov e
scenario and the list of dev ices, netwo rk com po nents and software used to design the
netwo rk for abo ve scenario and while justifying yo u r selectio ns. )

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 12 | P a g e


 Install and co nfigure Netwo rk serv ices , dev ices and applicatio ns (Ex: VL AN, WiFi,
D NS,Pro xy , Web, Etc.) according to the pro po sed design to accom plish the user
requirements and design a detailed M aintenance schedule for abov e Netwo rk.

*N ote: - Scr een s hots of C onfig ur ati on scri pts shoul d be pr esented.

Ac tiv ity 04
 Im plement a netwo rked system based on yo ur prepared design with v alid
evidence s.

 D evelo p test cases and co nduct verificatio n (Ex: P ing, extended ping, trace ro ute,
telnet, SSH, etc.) to test the above Network and analyse the test results against
the expected results. Recomm end potential future enhancem ents for the
netwo rked sy stem with v alid justificatio ns and critically reflect on the
im plemented netwo rk, including the plan, des ign, configurations, test s and the
decisio ns m ade to enhance the system .

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 13 | P a g e


MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 14 | P a g e
Grading Rubric

Grading Criteria Achieved Feedback

LO1 : Examine networking principles and their protocols.

P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Assess common networking principles and how protocols
enable the effectiveness of networked systems.

LO2 : Explain networking devices and operations

P3
Discuss the operating principles of networking devices and
server types.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 15 | P a g e


P4
Discuss the interdependence of workstation hardware and
relevant networking software
M2
Explore a range of server types and justify the selection of a
server for a given scenario, regarding cost and performance
optimisation

LO 1 & LO2
D1 Evaluate the topology protocol selected for a given scenario and
how it demonstrates the efficient utilisation of a networking
system.
LO3 : Design efficient networked systems

P5
Design a networked system to meet a given specification.
P6
Design a maintenance schedule to support the networked
system.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 16 | P a g e


M3
Analyse user feedback on your designs with the aim of
optimising your design and improving efficiency.
D2
Critically reflect on the implemented network, including the
design and decisions made to enhance the system.
LO4 : Implement and diagnose networked systems

P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D2 Critically reflect on the implemented network, including the
design and decisions made to enhance the system.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 17 | P a g e


LAN Design & Implementation for Alliance
Health

MM. NASHATH AARA


HND IN COMPUTING
52 BATCH

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 18 | P a g e


Table of Contents

ACKNOWLEDGEMENT .............................................................................................22
INTRODUCTION..........................................................................................................22
ACTIVITY 01.................................................................................................................23
1.1.1 COMPUTING NETWORK …………………………………………………… 23
1.1.2 NETWORK ………………………………………………………………..…….23
1.1.3 WHY NETWORK ……………………………………………….……………...23
1.1.4 NETWORK ARCHITECTURE …………….………………...…………...…..24
1.1.4.1 PEER TO PEER NETWORK ………………………………………….24
1.1.4.2CLIENT/ SERVER NETWORK ………………………………………..25
1.1.5 TYPES OF NETWORK …………………………………………………….. 26
1.1.5.1 Personal Area Network (PAN) ………………………………………… 26
1.1.5.2 Local Area Network (LAN) ……………………………………………. 27
1.1.5.3 Wide Area Network (WAN) …………………………………………… 28
1.1.5.4 Metropolitan Area Network (MAN) ………………………………….. 29
1.1.5.5 Wireless Local Area Network (WLAN) …………………………….... 30
1.1.5.6 Storage Area Network (SAN) ……………………………………….... 31
1.1.6 SIGNAL TRANSMISSION MEDIA …………………………………….…... 32
1.1.6.1 Guided Media ………………………………………………………..… 33
1.1.6.2 Unguided Media …………………………………………………..…… 34
1.1.7 IEEE ETHERNET STANDARDS ……………………………………….…. 35
1.2.1 NETWORK TOPOLOGY …………………………………………….….…. 36
1.2.2 Importance of network topology ……………………………………………... 38
1.2.3 Impacts of network topology …………………………………………………. 39
1.2.4 Types of topology ……………………………………………………………… 40
1.2.4.1 BUS TOPOLOGY ……………………………………………………… 41
1.2.4.2 STAR TOPOLOGY ……………………………………………….….... 41
1.2.4.3 RING TOPOLOGY …………………………………………………..... 42
1.2.4.4 MESH TOPOLOGY ………………………………………………....... 43
1.2.4.5 TREE TOPOLOGY ………………………………………………….... 44
1.2.4.6 HYBRID TOPOLOGY ………………………………………………... 45
1.2.5 NETWORK PROTOCOLS …………………………………………….......... 45
1.2.5.1 What is a network protocol? ………………………………………….. 45

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 19 | P a g e


1.2.5.2 Types of Protocols ……………………………………………………… 46
1.2.5.3 Network Protocol Suite ………………………………………………... 52
1.2.5.3.1Open system interconnected reference model (OSI) …..………… 53
1.2.5.3.2 Transmission control protocol / internet protocol model ……..... 55
1.2.6 RECOMMENDATION ………………………………………………………. 56
ACTIVITY 02 ……………………………………………………………………..… 57
2.1.1 NETWORK SYSTEM ………………………………………….…………...... 57
2.1.2 SERVER ADMINISTRATION ……………………………………………… 57
2.1.3 NETWORKING DEVICES …………………………………………………...58
2.1.3.1 Router …………………………………………………………………... 58
2.1.3.2 Switch …………………………………………………………………... 59
2.1.3.3 Modem ………………………………………………………………….. 60
2.1.4 SECURITY DEVICES OF THE NETWORK ………………………….…... 61
2.1.4.1 Firewall ……………………………………………………………….. 61
2.1.4.2 Access Point Control …………………………………………………. 62
2.1.4.3 Proxy server…………………………………………………………... 62
2.1.4.4 IDS ……………………………………………………………………. 62
2.1.4.5 IPS ……………………………………………………………………. 63
2.1.5 SERVERS ……………………………………………………………………... 63
2.1.6 Types of servers ……………………………………………………………….. 63
2.1.7 Recommended server …………………………………...…………………….. 65
2.2.1 WORKSTATIONS ……………………………………………………………. 65
2.2.1.1 Interdependence of workstation hardware …………………………... 66
2.2.2 NETWORK SOFTWARES …………………………………………………... 68
2.2.3 ALLIANCE HEALTH NETWORK SYSTEM …………………………….. 70
2.2.3.1 Cloud Server …………………………………………………………... 71
2.2.3.2 Cloud Server VS VPN Server ………………………………………... 71
2.2.3.3 Cloud Sever VS VPN Server advantage and Disadvantage. ……….. 71
2.2.3.3.1 Cloud server Advantages ………………………………………... 71
2.2.3.3.2 Disadvantages ……………………………………………………. 71
2.2.3.3.3 VPN Server Advantages ………………………………………… 71
2.2.3.3.4 Disadvantages …………………………………………………… 72

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 20 | P a g e


2.2.4 RECOMMENDATION SERVER TO ALLIANCE HEALTH ……………. 73
2.2.5 Why is cloud server usage beneficial for Alliance health? ………………….. 74
2.2.6 Choosing the right topology for Alliance health. ……………………………. 75
ACTIVITY 03 ………………………………………………………………………. 76
3.1.1 NETWORK DESIGN PLAN …………………………………………...…….. 76
3.1.2 IP Address ………………………………………………………….…………... 82
3.1.3 Network maintains a schedule. ……………………………………...………... 87
3.1.4 FEEDBACK ……………………………………………………….…………... 89
3.1.4.1 USER FEEDBACK FORM ……………………………………………. 89
3.1.4.2 USER FEEDBACK RESPONSE ……………………………………… 90
3.2.1 DEVICES, NETWORK COMPONENTS AND SOFTWARES USED IN
DESIGNING THE NETWORK ………………………………………………........ 93
3.2.2 CONFIGURATION OF NETWORK SERVICES, DEVICES AND
APPLICATIONS …………………………………………………………………… 94
3.2.3 MAINTENANCE SCHEDULE FOR THE NETWORK ………….............. 101
ACTIVITY 04 ………………………………………………………………………. 102
4.1.1 NETWORK SCHEME …………………………………………………..……102
4.2.1 Windows server installation …………………………………………………. 103
4.2.2 Ping Command (Network test) ……………………………………………… 114
4.2.3 Active directory configuration ……………………………………………… 119
4.2.4 Network monitoring …………………………………………………………. 131
4.2.5 Network monitoring tools Wireshark ……………………………………… 131
4.2.6 Networking Troubleshooting ………………………………………………. 134
4.2.7 Advice for future for this institution ………………………………………. 136
4.2.8 Critically evaluate the implemented network, including plans and decisions
made to improve the system. …………………………………………………….. 137
4.2.9 TEST CASES ……………………………..………………………………… 138
4.2.10 FUTURE ENHANCEMENTS ………………………………………...….. 140
4.2.11 CONCLUSION …………………………………………...………………,, 140
REFERENCES ….................................................................................................... 141

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 21 | P a g e


ACKNOWLEDGEMENT

I hereby gratefully thank Miss. Haseena for his remarkable coordination and support in the
successful completion of my assignment. The support was immeasurable and also I
thank my subordinates for their support in completion of this assignment in an efficient
way.

Sincerely,

MM.Nashath aara

INTRODUCTION

Alliance health business has chosen to construct a company with three-story building in
Matara. With 145 workers of the Matara branch are spurted into 7 departments such as
sales & marketing, administration, HR, Accounting & finance, Audit, and Business
development departments in general and one server room. It’s decided to design the
network in a state of art companies way.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 22 | P a g e


ACTIVITY 01

1.1 Discuss the benefits and constraints of different network system types that can be
implemented in the Matara branch and the main IEEE Ethernet standards that can be
usedin above LAN and WLAN design.

1.1.1 COMPUTING NETWORK


Interconnection of computing devices that are used to exchange data and resources with
each other. Network protocols are followed during transmission of data and resources
through physical or wireless technologies. computing network is made up of
telecommunication network technologies which can be arranged in a range of network
topologies that are based on physically linked, optical, and wireless.

Figure 1

1.1.2 NETWORK
A network is a collection of computers, servers, mainframes, network devices peripherals,
or any other devices connected to allow data sharing.
An example for network is the internet, which connects millions of people all over the
world.

1.1.3 WHY NETWORK


To communicate from one computer to another computer. Sharing of information over a
geographically wide area, Software, databases and also resources such as printers/scanners
among the users. Its Fast and accuracy with a minimum cost.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 23 | P a g e


Advantages of network

 Problems can be analysed and solved faster


 Information can stored and accessed efficiently
 Security for the information to be accessed
 Advanced backups can be maintained
 Able to access data from anywhere anytime needed
 Resources can be shared through a network such as storage facilities, tools and
environments

Disadvantages of network

 Malware and virus can affect the network

 Unauthorized access to the network data is a risk

 Expenditure will occur

1.1.4 NETWORK ARCHITECTURE


Computer network architecture is defined as physical and logical design of the software,
hardware, protocols and media of transmission of data.
There are two types of network architecture such as peer to peer network and
client/server network.

1.1.4.1 PEER TO PEER NETWORK

Figure 2 peer to peer

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 24 | P a g e


In peer to peer network, each node in the network acts as a server as well as a client. Each
node on this network is known as a peer. There is no a dedicated server. Appropriate for a
small environments. Special permission is assigned to each of the node for sharing
resources but this can lead to a problem if the node with the resources is down. Each
node is capable of requesting services and also can providethe service to other node.

Advantages of peer to peer network


 Less cost because it does not have a dedicated server.
 If one node stops working other nodes will not get affected.
 Easy to set up and maintain.

Disadvantages of peer to peer network


 It is not centralized network so it cannot back up data as the data is from
different locations.
 It has a security issue because the nodes are managed by themselves.

1.1.4.2 CLIENT/ SERVER NETWORK

Figure 3 client server

Client/server network is a network model designed for the end user called clients to access
the resources from a central computer known as a server. The central controlleris known as
the server while all other computer in the network is called as clients.
Server performs all the complicated activities such as security and network management
etc.
The clients are able to communicate with each other through the server. Suitable for a large
network.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 25 | P a g e


Advantages of Client/server network
 It’s a centralized network able to back up data
 Has a dedicated server that improves the overall performance of the whole
system
 Security is better because resources are shared by a single server.
 High speed in sharing resources.

Disadvantages of Client/server network


 Cost is high because server requires a large memory.
 The network operating system (NOS) used to provide the resource to the clientis
expensive.
 Requires a network administrator to manage all the resources.

1.1.5 TYPES OF NETWORK


There are several types of networks such as,
1. Personal area network (PAN)
2. Local area network(LAN)
3. Metropolitan area network(MAN)
4. Wide area network(WAN)
5. Campus area network(CAN)
6. Wireless local area network(WLAN)
7. Storage area network(SAN)

The main types of networks are PAN, LAN, MAN, WAN and WLAN

1.1.5.1 Personal Area Network (PAN)

Interconnection between devices within the range of a person’s private space typically 10
meters. Can be fully wireless or combination of wired and wireless. Devices such as
laptops, mobile, phones and play station are used to develop a personal areanetwork.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 26 | P a g e


Figure 04 Personal Area Network

Advantages of Personal area network


 Data can be transferred through wireless medium
 Multiple devices can be connected to one device at a time
 Low cost way of data transmission
 Easy to use because no hard configuration
 Data transfer is unaffected and portable

Disadvantages of Personal area network


 No long distance in sharing data
 Data interference can occur
 Digital devices are expensive

1.1.5.2 Local Area Network (LAN)

It is a computer network that connects devices within a limited area such as home,
office or a building .also can be wireless or wired

Figure 05 Local Area Network

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 27 | P a g e


Advantages of Local area network
 Able to share computer resources such as hard drives and printersetc...
 Cost of hardware devices are low
 Same software can be used across the network
 Data of the users can be recorded in the server
 Data can be transferred and accessed easily
 Users shares the same internet connection
 Data stored in the server are secured

Disadvantages of Local area network


 Initial cost for configuring the network is high
 There is no sufficient privacy for the users
 Unauthorized access to the server data will cause data repository
 Issues may raise form hardware configuration

1.1.5.3 Wide Area Network (WAN)

It is collection of local area network or other networks to communicate with one


another. Operates beyond the geographic scope of a local area network

Figure 06 Wide Area Network


Advantages of Wide area network
 Geographical coverage is larger
 Allows sharing of resources and software’s
 Allows organizations to create a global integrated network

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 28 | P a g e


Disadvantages of Wide area network
 Initial investment is high
 Difficult to maintain the network , so technicians are recruited
 Due to broad coverage there will be errors and issues
 Less security than LAN and MAN

1.1.5.4 Metropolitan Area Network (MAN)

It covers a larger geographic are by interconnecting different LAN to form a large


network. Has a higher range than LAN

Figure 07 Metropolitan Area Network

Advantages of Metropolitan area network


 More secure than WAN
 Larger than LAN
 Cost effectiveness in sharing resources
 Handling data efficiently
 Easy to implement the link

Disadvantages of Metropolitan area network


 Needs cable to connect one place to another
 Data rate is lower than LAN
 Insufficient security to the network
 Cost is higher than LAN

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 29 | P a g e


1.1.5.5 Wireless Local Area Network (WLAN)

It is a wireless distribution method for two or more devices. Uses high frequency radio
waves and often include an access point to the internet. Allows users to movearound the
coverage area.

Figure 08 Wireless local Area Network

Advantages of Wireless local area network


 Does not require any cable
 Network can be extended easily
 Initiating is easy and fast
 One time investment is only required and cheaper
 Improved and efficiency

Disadvantages of Wireless local area network


 Range of wireless network is minimal
 Experienced technicians are required to install the network
 Fag and radiation can cause network interference
 Has a minimal bandwidth

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 30 | P a g e


1.1.5.6 Storage Area Network (SAN)
A Storage Area Network (SAN) is a dedicated network that provides access to
consolidated, block-level data storage. SANs offer several advantages and disadvantages:

Figure 09 Storage Area Network

Advantages of Storage Area Network

 High Performance: SANs typically provide high-speed, low-latency access to data,


making them suitable for demanding applications that require fast and efficient data
retrieval.
 Scalability: SANs are easily scalable by adding more storage devices or expanding
existing ones. This allows organizations to grow their storage infrastructure to meet
increasing demands.
 Centralized Management:SANs allow for centralized management of storage
resources. This simplifies tasks such as provisioning, monitoring, and maintenance,
leading to improved efficiency.
 Data Availability and Reliability: SANs often incorporate features like RAID
(Redundant Array of Independent Disks) to enhance data availability and reliability.
This helps protect against data loss due to hardware failures.
 Flexible Connectivity: SANs support various connectivity options, including Fibre
Channel and iSCSI, providing flexibility to choose the technology that best suits the
organization's needs.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 31 | P a g e


 Data Sharing: SANs enable multiple servers to access the same storage resources
simultaneously, facilitating data sharing and collaboration among different
applications and users.
 Backup and Recovery: SANs simplify backup and recovery processes. Centralized
management allows for efficient implementation of backup strategies, and SANs
often support features like snapshot and cloning for quick data recovery.

Disadvantages of Storage Area Network (SAN):

 Cost: Implementing a SAN can be expensive due to the need for specialized hardware
such as Fibre Channel switches and HBAs (Host Bus Adapters). The initial
investment and ongoing maintenance costs may be prohibitive for smaller
organizations.
 Complexity: SANs can be complex to set up and manage, requiring skilled personnel
with expertise in storage networking. This complexity can lead to longer deployment
times and increased chances of configuration errors.
 Single Point of Failure: Although SANs often incorporate redundancy and failover
mechanisms, they can still be vulnerable to a single point of failure, such as a failure
in the central storage controller or a critical switch.
 Security Concerns: Because SANs involve the sharing of storage resources among
multiple servers, there can be security concerns. Unauthorized access to the SAN can
potentially lead to data breaches or unauthorized modifications.
 Limited Geographical Flexibility: Traditional SANs are designed for local or campus
environments and may not be well-suited for long-distance data replication.
Implementing SAN solutions over long distances can add complexity and cost.
 Learning Curve: SAN technology requires specialized knowledge, and organizations
may need to invest in training their IT staff or hire external expertise to effectively
manage and troubleshoot SAN environments.

1.1.6 SIGNAL TRANSMISSION MEDIA

In data transmission, the data carried from the source to the receiver is called data
transmission media. The data should be sent to the receiver by the source through a
transmission media

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 32 | P a g e


Transmission media are of two types
 Guided media
Transmitting data using the physical method of cables is called guided media.Cables
that are made of wires are used in this methodology. Such as,
• Coaxial
• Fibre Optics
• Twisted

 Unguided media
Transmitting of data by spreading signals relevant to data transmission in the
atmosphere using non-physical media is called unguided media. Such as,

• Radio wave
• Microwaves
• Infrared

1.1.6.1 Guided Media

 Twisted pair

This cable consists of copper wire covered with a plastic cover. Those pairsare
wrapped around each other. This is done to minimize the electrical shocks and to
prevent mixing of sounds in environments.

Features of this cable are,


 Low cost
 Bandwidth is low
 Cannot travel long distance without repeaters
 Error rate is high
 Cannot use for broadband connection network
 Coaxial cable

This cable is manufactured by placing several plastic covers around the copper wire
covering the mesh. Used for external networks. Plastic cover is placed for facing
environmental conditions such as sunlight and rain situations

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 33 | P a g e


Features of this cable are,
 Noise immunity
 Able to transmit long distances
 Used for both digital and analog signals
 Installation and maintaining is easy
 Cost benefit

 Fibre optics

Used to transmit data using light waves through thin glass or plastic threads. Emits
light waves at the source which is read by a detector at the other end.

Features of this cable are,


 Bandwidth is high
 Immune to electromagnetic interference
 Noise immune
 Able to carry data for long distance
 Cost is high
 Process is sophisticated

1.1.6.2 Unguided Media

 Radio waves

Used to carry information from one physical location to another location.


Electromagnetic are used in this technology based on propagated through the antenna.
Radio waves have different frequencies.

 Microwaves

This is radio transmission wave which is transmitted within an area from 300 MHz to
4 GHz. Transmission such as television, telephone, walkie-talkie waves etc... Are
under these

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 34 | P a g e


Advantages of unguided media
 Ability to connect to the network from anywhere

 Ability to share and exchange information on the network easily which will be
difficult to be done in a wired network
 There is no extra cost because wireless network facility is available

Disadvantages of unguided media


 Raise of security issues
 Noise disturbance
 Illegal access to enter the network is high

1.1.7 IEEE ETHERNET STANDARDS


IEEE develops goods and services with standards that are governed by them. Defined in
a number of IEEE 802.3 .These standards define the physical and data link layer
specification for Ethernet.

Standards applied to LAN model


IEEE 802 Related to LANs and MANs
IEEE 802.1 Related to network management
IEEE 802.2 Related to logical link layer
IEEE 802.3 Related to Ethernet (CSMC / CD)
IEEE 802.4 Related to token bus network
IEEE 802.24 Related to logical link control
IEEE 802.5 Related to token ring network
IEEE 802.6 Related to metropolitan area network
IEEE 802.7 Related to broadband technical advisory group IEEE 802.8
Related to fibre optics technical advisory group

Standards applied to WLAN model

IEEE 802.11 Related to wireless networks


IEEE 802.11a Related to 5GHz, 54MBps, 115 ft
IEEE 802.11b Related to 2.4GHz, 11MBps, 115 ft

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 35 | P a g e


IEEE 802.11c Related to 802.11 MAC layer
IEEE 802.11d Related to extended operation of new WLANs

IEEE 802.3
 Ethernet-based network standards and protocols
 This technology is most commonly used in LANs
 Related to physical layer and media access control (MAC) sub-layer ofthe data
link layer.

IEEE 802.11
 Standard implements to wireless local area network (WLAN)
 Part of IEEE 802 series of local area network (LAN) technicalstandards
 Is used in most home and workplace networks
 Foundation for IEEE 802.11p vehicle-based communication networks

1.2 Discuss the importance and impact of network topologies an d


assess the main network protocol suites that are used in network design
using examples. Recommend suitable network topology and network
protocols for above scenario and evaluate with valid points how the
recommended topology demonstrates the efficient ut ilization of the
networking system of Matara branch.

1.2.1 NETWORK TOPOLOGY


A network topology is a way of connecting the computers and the networking devices in
both physically and logical structure. There are two types of topologies such as physical
topology and logical topology.

Physical topology refers to the physical structure how a network is arranged. Logical
topology refers to the logical communication inside the network by the devices.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 36 | P a g e


Figure 10 Physical and logical topologies

1. Physical Topology
Physical topology indicates arrangement of different elements of a network. It reflects
physical layout of devices and cables to a form a connected network. It is concerned
with essentials of network ignoring minute details like transfer of data and device type.
The pattern of arrangementof nodes (computers) and network cables depends on ease
of installation and setup of the network. It affects cost and bandwidth capacity based on
solution of devices. It takes into account placement of nodes and distance between
them. Devices can be arranged to form a ring (Ring Topology) or linearly connected in
a line called Bus Topology.

2. Logical Topology

Logical Topology reflects arrangement of devices and their communication. It is the


transmissionof data over physical topology. It is independent of physical topology,
irrespective of arrangements of nodes. It is concerned with intricate details of network
like type of devices (switches, routers) chosen and their quality, which affect rate and
speed of data packets delivery.The logical topology ensures optimal flow control that
can be regulated within network.
The data can either flow in a linear pattern called Logical bus or in form of a circle
Logical ring.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 37 | P a g e


1.2.2 Importance of network topology

The importance of network topology lies in its fundamental role in shaping the structure,
efficiency, and functionality of a computer network. Network topology refers to the
arrangement of nodes and connections in a network, determining how data flows between
devices. Here are several key aspects highlighting the importance of network topology:

1. Data Flow Optimization: The topology of a network directly influences how efficiently
data is transmitted between devices. Different topologies offer varying degrees of
efficiency in terms of data transmission speed, latency, and reliability. By selecting an
appropriate topology, organizations can optimize data flow to meet their specific
requirements.

2. Scalability: Network topology impacts the scalability of a network, which refers to its
ability to accommodate growth in terms of the number of users, devices, and data traffic.
Scalable topologies such as mesh or star networks can easily expand to accommodate
additional nodes or increased data demands, ensuring that the network remains effective
as the organization grows.

3. Reliability and Fault Tolerance: Certain network topologies, such as mesh or ring
networks, offer inherent redundancy and fault tolerance. Redundant connections provide
alternative paths for data transmission, minimizing the impact of network failures or cable
breaks. This enhances the reliability of the network and ensures uninterrupted
communication between devices.

4. Performance Optimization: The topology of a network can significantly impact its


performance characteristics, including throughput, latency, and bandwidth utilization. By
choosing an appropriate topology based on performance requirements, organizations can
optimize network performance to meet the demands of their applications and users.

5. Cost-Efficiency: Network topology influences the cost of deploying and maintaining a


network infrastructure. Different topologies have varying equipment and installation costs,
as well as ongoing operational expenses. By selecting a cost-effective topology that meets

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 38 | P a g e


their requirements, organizations can maximize the return on investment in their network
infrastructure.

6. Ease of Management: The topology of a network can affect the ease of network
management and administration. Centralized topologies such as star or tree networks
simplify management tasks by centralizing control and monitoring at a single point. This
reduces complexity and enhances the efficiency of network administration.

7. Security Considerations: Network topology can impact the security of a network by


influencing factors such as access control, traffic segmentation, and monitoring
capabilities. Secure topologies, such as segmented networks or ring networks with access
control mechanisms, can help mitigate security risks and protect sensitive data from
unauthorized access or eavesdropping.

In summary, the importance of network topology lies in its impact on data flow
optimization, scalability, reliability, performance, cost-efficiency, ease of management,
and security considerations. By selecting the appropriate topology based on their specific
requirements and objectives, organizations can build robust, efficient, and secure networks
that support their business needs.

1.2.3 Impacts of network topology

The topology is jointly determined by the network layout and the link dynamics. The
effective topology over which routing paths are established also depends on the choice of
routing destination, which corresponds to the sink placement in the context of WSNs. The
combinationof the network layout, the link dynamics, and the sink placement, which we
simply refer to as network topology, has a large impact on protocol performance.

The performance of a protocol is a function of the topology as well as of the protocol’s


own mechanisms. Thus, we cannot attribute the performance achieved by a protocol
entirely to its mechanisms without considering the state of the network. This makes it
challenging to reasonabout protocol performance on a test bed. With both protocols, we
observe a dichotomy between high-performing and low performing topologies.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 39 | P a g e


The network topology has a significant impact on the performance of collection protocols
in wireless sensor networks. A protocol-independent metric, the Expected Network
Delivery, thatquantifies the delivery performance that a collection protocol can be expected
to achieve giventhe network topology.

A network monitoring solution with a topological approach may help to boost productivity
andsave money. It may also help to free up resources and to help staffers engage quicker
with the broader network.

Therefore, in one form or another, network topology is ideal for businesses of all shapes
and sizes. There are plenty of different topology styles to adopt. Hybrid models, for
example, canscale endlessly – if this is the support you require!

1.2.4 Types of topology


 Bus topology
 Star topology
 Ring topology
 Mesh topology
 Tree topology
 Hybrid topology

1.2.4.1 BUS TOPOLOGY

Figure 11 bus topology

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 40 | P a g e


A structure of connecting computers using a main wire and a drop line cable. The cable
used from the main cable to the device connected to the computer is called drop line cable.
Two cable terminators are connected to the both ends of the cable. When one computer
sends a signal up to the main cable all the connected computers will receive the signal.
Co-axial cable is used as the main cable and also the RJ45 network cable is also used.

Advantages of bus topology


 The length of the wire is required less than the star topology
 As connected in a linear structure the construction is easy
 Expenditure is less
 Easy to update the network without effecting the existing computers

Disadvantages of bus topology


 When the main wire becomes deactivated the whole network becomesdeactivated
 Difficult to troubleshoot
 Two special devices called terminal are fixed to the main cable
 A transmitted data to a selected computer in a network is forwarded to all the
computers in the network
 Not best for large network structures
 Extremely slow when compared to other topologies

1.2.4.2 STAR TOPOLOGY

Figure 12 star topology

Established by connecting all the computers to a central device. A hub or switch can be

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 41 | P a g e


used as a central device. This type of network is used to establish local area network (LAN)
in school, offices and other intuitions

Advantages of star topology


 Easy to implement and build
 Fixing and removing the computers to this network can be done easily
 Easy to troubleshoot
 No data collision can occur

Disadvantages of star topology


 More wires are needed than linear structure
 As the central unit is expensive , the cost is high
 If the central device becomes deactivated all the computers in the network
becomes deactivated

1.2.4.3 RING TOPOLOGY

Figure 13 ring topology

This network is created with wire made like ring. This network doesn’t use a central device.
The data is flown in a single direction. Data is transmitted within the network from one
computer to another and finally reaches to the receivable computer.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 42 | P a g e


Advantages of ring topology
 Data is flown in one direction so the transmission is fast
 Data do not collide in this structure
 A central device is not required
 Low cost
 Uses token ring methodology in the data transmission

Disadvantages of ring topology


 If an error occurs in the main cable the whole network will be collapsed
 Expansion is difficult

1.2.4.4 MESH TOPOLOGY

Figure 14 mesh topology

Connecting all the computers in the network with each other is called meshtopology. Data
transmission can be dispersed using this topology even if one of the links fails.

Advantages of mesh topology


 Able to transmit data to all computers at the same time
 If a computer fails in the network, it doesn’t affect the other computers inthe
network
 Ability to update the network without disturbing the operation of thenetwork
 Data transmission traffic is low

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 43 | P a g e


Disadvantages of mesh topology

 Cost is high when compared to other topologies


 Maintenance is complex
 Installing and implementing is difficult
 Power demanded is high because each node has to stay active all the timeand share
the load

1.2.4.5 TREE TOPOLOGY

Figure 15 tree topology

This structure is created by connecting several star topologies to a bus topology


network. Connecting small star topology network is to enables connection separately

Advantages of tree topology


 Easy to troubleshoot
 Maintenance is simple

Disadvantage of tree topology


 If the main cable gets disconnected the whole network will go down
 Cabling is difficult than other topologies
 Cost is high

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 44 | P a g e


1.2.4.6 HYBRID TOPOLOGY

Figure 16 hybrid topology

Combination of two or more topology together .Each with its own type ofnodes. The
structure of hybrid topology includes various types of topologies

Advantages of hybrid topology


 Easy to update the network
 Easy to troubleshoot
 Reliable and flexible
 Able to design large structure networks
 Data transmission traffic can be handled easily

Disadvantages of hybrid topology


 Cost is high
 Installation is difficult
 Complicated network structure

1.2.5 NETWORK PROTOCOLS

1.2.5.1 What is a network protocol?


A protocol is a collection of instructions for structuring and processing data in networking.
Network protocols are a common language connecting computers. Although the software
and hardware used by the computers in a network may be extremely different, the usage of
protocols enables them to communicate with one another.[ CITATION Clo23 \l 1033 ]
Similar to how two humans from different regions of the world may not speak each other's

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 45 | P a g e


original languages but may nevertheless communicate through a common third language,
standardized protocols are like a common language that computers can utilize. The Internet
Protocol (IP) allows computers to communicate with one another, just as the United
Nationsemploys its six official languages to facilitate communication among its delegates
from across the world. the world. But, if one computer knows the IP protocol and the other
does not, it cannot interact. There are several Internet protocols for various kinds of
procedures.

1.2.5.2 Types of Protocols

1. What is the Internet Protocol (IP)?


The Internet Protocol (IP) is a protocol, or collection of guidelines, for addressing and
routing data packets so they may move between networks and reach their intended location.
Data is split up into smaller packets for transmission across the Internet.[ CITATION
Clo23 \l 1033 ] In order for routers to send packets to the correct place, each packet carries
IP information. Data arrives to the correct location when packets are delivered to the IP
address, which is assigned to every Internet-connected device or domain. linked with them.
Depending on whatever transport protocol is used with IP, the packets are treated
differentlyonce they reach their destination. TCP and UDP are the two most used transport
protocols.

Figure 17 [ CITATION Lel18 \l 1033 ]

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 46 | P a g e


2. What is an IP address? How does IP address work?
An Internet-connected device or domain is allocated an IP address, which is a distinctive
identification. A string of characters, such as "192.168.1.1," makes up each IP address.
Users may visit websites without remembering this long string of characters thanks to DNS
resolvers, which convert human-readable domain names into IP addresses.[ CITATION
Clo23 \l 1033 ] Similar to how both the destination address and the return address are
contained on a piece of mail, each IP packet will carry both the IP address of the device or
domain delivering the packet and the IP address of the intended receiver.

Figure 18 - IP address

3. What is TCP/IP?
As a transport protocol, the Transmission Control Protocol (TCP) establishes the rules for
how data is transmitted and received. Each TCP/IP packet has a TCP header in the data
section. TCP establishes a connection with the destination before to sending any data. After
transmission starts, TCP makes sure that each packet arrives in sequence.[ CITATION
Clo23 \l 1033 ] Each packet that is received over TCP will be acknowledged by the receiver.
If the reception is not acknowledged, missing packets will be forwarded again. TCP is built
for dependability, not speed. Data loading over TCP/IP may take longer if some packets
are missing since TCP must ensure that all packets arrive in sequence. As TCP and IP were
initially intended to be used in tandem, these are frequently referred to as the TCP/IP family.
IP may be used with other transport protocols, though.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 47 | P a g e


Figure 19 - TCP/IP

4. SMTP (Simple Mail Transfer Protocol)


Sending and distributing outgoing emails requires adherence to certain procedures. Using
the email's header, this protocol extracts the recipient's email address and adds the message
to the list of outgoing messages.[ CITATION Gee21 \l 1033 ] Once the email has been
delivered to the recipient's email address, it is also taken off the list of emails to send. Text,
video, images, and other media may be included in the email or message. Certain
communication server rules can be put up with its assistance.

Figure 20 SMTP Protocol

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 48 | P a g e


5. PPP (Point to Point Protocol)
Direct connections between two communicating devices are made using this
communicationprotocol.[ CITATION Gee21 \l 1033 ] This protocol outlines the guidelines
by which two devices will communicate information and authenticate with one another.
PPP is used, for instance, when a user connects his PC to an Internet service provider's
server. Similar to that, PPP is used to link two routers for direct communication.

Figure 21 - Point to Point Protocol

7. FTP (File Transfer Protocol)


File transfers between systems are done using this protocol. This uses a client-server
design.The FTO establishes a connection between the machines and verify them using their
ID andpassword when one machine requests a file transfer from another. And between the
computers, the requested file transfer occurs.

Figure 22 - File Transfer Protocol

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 49 | P a g e


8. SFTP (Secure File Transfer Protocol)
File Transfer Protocol (FTP) over Secure Shell (SSH) is referred to as SFTP, sometimes
known as SSH FTP, since both commands and data are encrypted during transmission. In
order to exchange files and data securely across a secure shell data stream, SFTP functions
as an extension of SSH.[ CITATION Gee21 \l 1033 ] When running commands from the
command line, this protocol is used to connect remotely to other computers.

Figure 23 - Secure File Transfer Protocol

9. HTTP (Hyper Text Transmission Protocol)


The www (world wide web), which defines this protocol for information transport, is
usedto transfer hypertexts via the internet.[ CITATION Gee21 \l 1033 ] The format and
transmission requirements are laid down in this protocol. Moreover, it specifies the
differentsteps that web browsers should perform in response to requests for a certain web
page. As HTTP is the protocol used to transfer text, photos, and other multimedia files on
the World Wide Web, every time a person opens their web browser, they are
inadvertently using HTTP.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 50 | P a g e


Figure 24 HTTP Server

10. Hypertext Transfer Protocol Secure (HTTPS)


(HTTP). Using the SSL/TLS protocol for encryption and authentication, it is used for
securecommunication across a computer network.[ CITATION Gee21 \l 1033 ] In general,
a website uses the HTTP protocol, but if it also accepts sensitive data like credit card
numbers, debit card numbers, OTPs, etc., it must also have an SSL certificate installed to
increase security. So, we should verify if the link is HTTPS or not before entering any
sensitive information on a website. It could not be safe enough to enter important
information if it is not HTTPS.

Figure 25 – Https

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 51 | P a g e


11. TELNET (Terminal Network)
Using the TCP/IP protocol, ISO offers a virtual terminal service. This makes it possible for
local machines to connect to one another. The computer that is connected is referred to as
the remote computer, and the computer that is connected is referred to as the local computer.
We may view any activity taking place on the distant computer in the local computer using
TELNET operation.[ CITATION Gee21 \l 1033 ] This runs on the client/server principle.
The telnet server application is used by the distant computer, while the telnet client program
is used by the local computer. information.

Figure 26 - Terminal Network

1.2.5.3 Network Protocol Suite


Network protocols are the rules and regulation that has to be followed during transmission
of data between devices in a network. Allows easy communication between the devices in
a network and also plays an important role in today’s digital world. It allows
communication between devices by following the rules which is inbuilt in the software
and the hardware of the devices.

The term protocol suite refers to a collection smaller network protocols that function
together. Network protocols are created by networking or information technology
organizations in accordance with industry standards. Every time you connect to the internet
you are assigning network protocols.

There are two types of methodologies to transmit data


 Open system interconnected reference model (OSI)
 Transmission control protocol / internet protocol model

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 52 | P a g e


1.2.5.3.1 Open system interconnected reference model (OSI)

The open system interconnection model is a reference tool for understanding data
communications between any two network systems. It helps to understand the way of data
transmission from a device to a network. This model is introduced by the international
standard organization.

Figure 27 open system interconnection

Importance of OSI model


 To supply a moderate structure to learn the operation of a network
 To understand the connection of data transmission between two devices
 Provides a standard method for data transmission
 Aids in interpreting vendor explanation of production functionalities
 Easy in troubleshooting the network

1. Physical layer
This is the first layer of the OSI model. Flowing of data is occurred in this layer
asfollows,
 Transmission speed of the data
 Voltage required for transmission
 Modulation of signals

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 53 | P a g e


 Multiplexing

Devices such as connectors, modems, repeaters and hubs are used in this layer
Protocol data unit of this layer is bits

2. Data link layer


This is the second layer of the OSI model. This is located between physical layer
andtransport layer,
 Conversion of data packets into bits
 Checking for errors of data
 Stabilizing the connection between the hardware and software

Devices such as network interface cards (NIC), bridge and switch are used in this
layer.
Protocol data unit of this layer is frame

3. Network layer
This is the third layer of the OSI model. Responsible for transferring data between
two different networks,
 Carrying data from one point to another transmission point
 Allocates a suitable path to transmit data
 Identifies the relevant IP address

Devices such as router and 3 layer switch are used in this layerProtocol data unit of
this layer is data packets

4. Transport layer
This is the fourth layer of the OSI model. Responsible for end to end communication
between two devices,
 Forwarding data to the transmission media between the devices
 Controlling the flow of data
 Correcting the errors during transmission of data
 Multiplexing

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 54 | P a g e


Protocol data unit used in this layer is segment/ datagram

5. Session layer
This is the fifth layer of the OSI model. Responsible for starting and stopping
communication between the two devices
 Connecting devices for transmission purpose
 Identifying data exchange methodologies
 Continuing and stopping data transmission
 Selecting a data transmission methodProtocol data unit used in this layer is data

6. Presentation layer
This is the sixth layer of the OSI model. Responsible for translation, encryption and
compression of data.
 Converting data into structures
 Encrypting data
 Decrypting data
 Compressing of data

Protocol data unit used in this layer is data

7. Application layer
This is the seventh layer of the OSI model. Act as an interface to the user to connect
to the network.
 Authentication of users
 Providing required software’s to access the internet
 Browsing the world wide web

Devices such as gateway is used in this layerProtocol data unit used in this layer is
data

1.2.5.3.2 Transmission control protocol / internet protocol model

Above mentioned 7 layer structure was introduced as a 4 layer structure named as


TCP/ IP model. Is being used to transmit data through internet.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 55 | P a g e


Presentation layer and session layer are not available in this model task done by thesetwo
layers are done by application layer.
A layer called network interface has been created amalgamating data link layer and
physical layer.

Figure 28 transmission control protocol

Features of TCP/ IP model


 Dependability and guarantee in data placement during transmission
 Flexible architecture
 Flow control
 Connection oriented

1.2.6 RECOMMENDATION

According to the scenario, I am recommending to implement hybrid topology structure and


OSI model protocol architecture to the network structure.
After comparing all other topology I selected hybrid topology because it is a combination
of several other topologies such bus, star, ring and mesh topologies.
This structure is able create a robust and a reliable network.
We are able to select a appropriate topology according to the structure for example star

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 56 | P a g e


topology to provide a centralized data transmission structure and bus topology to minimize
the cost while interconnecting devices and combing the different types of topologies
together is done by hybrid topology.

The speed of the connection will gradually rises during the interconnection of different
types of topologies and also to identify and troubleshoot the error is reliable.

And also I recommend OSI model because it is supportable to all devices in the network
and also use this model as default model in data transmission. It is easy to troubleshoot
because each unit is separated from each other. It is an adaptable methodology with both
connection oriented and connectionless oriented service. Troubleshooting can be done
easily by examining each packet.

ACTIVITY 02

2.1 Discuss the operating principles of network devices (Ex: Router,


Switch, Etc.) and server types that can be used for above scenario while
exploring different servers that are available in today’s market with
their specifications. Recommend server/servers for the abov e scenario
and justify your selection with valid points.

2.1.1 NETWORK SYSTEM


The programs and device drivers that are associated with the operation of a specific system
are known as system software. The system hardware is made up of adapters and other
devices that provide a connection or interface between the system software and the
physical network. An adapter requires the use of an I/O card slot in thesystem. An
adapter prepares all the incoming and outgoing data, performs address searches, provides
drivers, receivers, and surge protection, supports various interfaces,and relieves the system
processor of many communications tasks in general.

2.1.2 SERVER ADMINISTRATION


Server administration is system responsible for all the process related to managing,
optimizing, and monitoring the servers and the network systems to ensure they work
properly and safely. It is necessary to have 24/7 availability. Although some routing tasks
can be completed during regular hours, such as server fixes or system upgrades must be

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 57 | P a g e


completed after hours to minimize the impact of the service.

2.1.3 NETWORKING DEVICES


Networking devices also can be known as networking hardware’s they physically
allows connectivity communication between the hardware devices.

The operating principle devices of a network are,


 Hub
 Switch
 Router
 Bridge
 Gateway
 Modem
 Repeater
 Access point

2.1.3.1 Router

Figure 29 router
Transmission of data from one place to another in a network is done by a router. Therouter
belongs to the network layer which is the third layer of the OSI model. Consists an
operating system to perform its task with the smallest memory unit. Therefore it operates
similar to a kind of special computer
Uses a routing table when transmitting data in network. MAC addresses of the devices
connected to the router are included in the routing table.
Since a router has two interfaces it has two MAC address one for each. It has two IP address
as well.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 58 | P a g e


When data are transmitted through a network, the transmitted data are entered into frame
by the data link layer connected to the data source. When such a frame is entered into a
router the router removes that frame and creates a new frame instead and forwards it the
transmission path.

Advantages of a router
 Less network traffic due to domain crossing
 Chooses more efficient route through using dynamic routing algorithm
 It provides data flow management and traffic control methodologies
 Network management policy setting are reprogrammable
 Creates broadcast domains to control network traffic

Disadvantages of a router
 Network traffic will be high due to dynamic router communication
 Cost is high
 Slower than a bridge and repeater due to monitoring of data transmission
 All network protocols are not routable
 Initial setting are needed on several occasion

2.1.3.2 Switch

Figure 30 switch
Used to build network units which are established by connecting several computers each
other also used to connect several local area networks.

This device has the availability to check the physical address of the data packet received
and to forward it to the receivables node. This is the main difference between the switch
and a hub.
Transmit signals using full duplex method and has the ability to forward signal for two
directions.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 59 | P a g e


Advantages of a switch
 Centralized management
 Permits multiple connection at once
 Logical segmentation is supportable by VLAN’s
 Broadcast domains are less
 Work load on host PC can be less

Disadvantages of a switch
 Problem arise due to broadcast traffic
 Configuration should be done perfectly to control multiple packets
 Will be difficult to analyze or identify a problem when using a switch
 Cost is high
 Transmission is not efficient as routers
 The network fails is switch is down

2.1.3.3 Modem

Figure 31 modem

A modem is a device that connects your home to your Internet service provider (ISP)
generally over a coax cable connection. The Modem turns signals from your ISP into
signals that may be used by your local devices and the other way around

Advantages of a modem
 Effective for internet connections
 Price is affordable
 Intermediate way for a modem

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 60 | P a g e


Disadvantages of a modem
 Speed is slower than hub.
 Minimum connection can be made at time
 Is ignorant of the route it will take time to arrive

2.1.4 SECURITY DEVICES OF THE NETWORK


In a network portal security is very important because with a lack of security datacan
be lost and stolen will lead to data theft and conflicts.
Security can be enhanced by implementing these methodologies such as
 Firewall
 Access control
 Proxy servers
 IDS
 IPS

2.1.4.1 Firewall
Firewall is a network security method that can be used to monitor incoming and outgoing
network traffic and decided whether to allow or block specific traffic based on defined set
of security rules.

Hackers can access your computer when it is connected to a network and have the ability
to destroy, steal data by using malicious coding. Firewall can be used to stop these
malicious activities. Firewall can be either a software or hardware’
Advantages of firewall
 Enhanced network security and data monitoring
 Privacy and security is ensured
 Prevents from unauthorized access to the network

Disadvantages of firewall
 Slows down the internet connection
 Expert management is required
 Installing firewall could be expensive
 Extra resources are needed to maintain and upgrade the firewall

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 61 | P a g e


 Network will be slowed because each packet will be examined before enteringthe
network

2.1.4.2 Access point control


Access point control is known as to controlling which users have access to thenetwork or
especially sensitive sections of the network. Using security policies, you can restrict
network access to only recognized users and devices or grant limited access to
noncompliant devices or guest users.

Advantages of access point control


 Extended transmission range
 Multiple user access
 Interconnection with multiple APN’s

Disadvantages of access point control


 Not suitable for lone users
 Price is high
 Absence of stable connection

2.1.4.3 Proxy server


It is an intermediate server separating the end users from the websites they browse.Proxy
servers provide varying levels of functionality, security, and privacy depending on your
use case or company policy. If you’re using a proxy server, internet traffic flows through
the proxy server on its way to the address you requested. The request then comes back
through that same proxy server (there are exceptions to this rule), and then the proxy server
forwards the data received from the website to you. Proxy servers act as a firewall and web
filter, provide shared network connections, and cache data to speed up common requests.
A good proxy server keeps users and the internal network protected from the bad stuff that
lives out in the wild internet. Proxy servers can provide a high level of privacy.

2.1.4.4 IDS
An Intrusion Detection System (IDS) is a monitoring system that detects suspicious
activities and generates alerts when they are detected. Based upon these alerts, a security
operations centre (SOC) analyst or incident responder can investigate the issue and take the

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 62 | P a g e


appropriate actions to remediate the threat. Intrusion detection systems are designed to be
deployed in different environments. And like many cyber security solutions, IDS can either
be host-based or network-based. Beyond theirdeployment location

2.1.4.5 IPS
Intrusion prevention system (IPS) is a network security and threat prevention tool system.
Potential threats can be identified and responded. Intrusion prevention systems are thereby
used to examine network traffic flows in order to find malicious software and to prevent
vulnerability exploits. It can be utilized in a security environment by system and security
administrators. An intrusion prevention system will work by scanning through all network
traffic. To do this, an IPS tool will typically sit right behind a firewall, acting as an
additional layer that will observe events for malicious content. In this way, IPS tools are
placed in direct communication paths between a system and network

2.1.5 SERVERS
Server can be program or equipment that provides services to other computers (clients)
through a network or internet is known as server. To provide an efficient service to the
client computers to operation speed of the server, capacity of memory, storage capacity
(data storage) should be extremely high. Sometimes servers are used to meet the increasing
demand of the computers connected to the network.
When a client submits a request to the server, is known as client-server model themost
frequently used model. In this model, the server does some action and then givesthe client
a response, usually with a finish or an acknowledgement. A computer is specialized for
operating servers when it is known to as server-class hardware. Thismeans that it is more
powerful and dependable than regular personal computers.

2.1.6 Types of servers


 Application server- a kind of software operated with web servers, in a network
software created with data files is stored in web servers. This server’s assist in
controlling of data available in such data files, application servers which works in
collaboration with the web servers is called web application server.
 Domain name server- the particular name of the website is called domain name. This
name is created with letters bit it exists in numbers it is difficultto memorize the
numbers therefore we remember by its name so the name types should be changed

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 63 | P a g e


into numbers and that activity is done by the domain name server.
 Web servers – is a type of software that provides web pages to client computers using
the HTTP of World Wide Web. web server software is installed in every host
computers that has included web pages on the internet
 Mail servers- the software used to store email messages received to the users of
internal sever, carry email messages forwarded to the outside parties is called mail
server. There are several protocols for this purpose. SMTP is used to send messages
and POP or IMAP are used to receive messages
Proxy servers- works as an intermediate server between your client computer and
another client on the internet. It will take the client request and perform it on their
behalf. Used for other purposes such as system security, speeding resource access,
tracking internet usage and analyzing local cache
 Communication server- keeps the environment need for one communication endpoint
to identify and then communicate with other endpoints. Depending on the network's
access and security configurations, these servers may or may not include a directory
of communication endpoints and a presence detection service.
 Database server- Any type of data can be kept and shared using these servers through
a network. A structured collection of data with defined propertiesthat are stored
database. Spreadsheets, accounting software, asset management software, and nearly
every other computer program that consumes well-organized data, especially in large
volumes, are clients of these servers.

Some companies that are producing servers to the market are,


 Dell
 Lenovo
 Hawaii
 IBM
 Oracle

There are several kinds of servers in the market such as,


 Rack servers
Rack servers come in 1U, 2U, 4U, and 10U configurations and normallyhave
their own power supply, CPU and RAM. Since one server can be placed directly on
top of another, this sort of server can save space on the floor.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 64 | P a g e


-Cisco UCS C240 M6
-Dell power edge r550
-Lenovo think system sr650

 Tower servers
Are computers with their own methodology. Due to their low component density,
Offer considerably simpler cooling than dense rack or blade servers. Tower servers
have good scalability since an infinite number of servers can be added to the network.
They are not appropriate for data centre’s that will need to be expandable and scalable
in the future.
-Lenovo Think Server TS150

 Blade servers
Is a modular type of server that enables the housing of numerous servers inside of one
enclosure. Within a single enclosure, all blade servers share the same ports, switches,
and power connectors. This means separate cables do not need to be run for each
blade server.
- HPE ProLiant BL460c Gen10

2.1.7 Recommended server


I recommend of utilizing Dell poweredge r550 rack server and server software’s such as
application, mail, DHCP and file transfer servers to this network structure because of
security management, data backup, user access, resource sharing purposes

2.2 Discuss the inter−dependence of workstation hardware and


networking software and provide examples for networking software that
can be used in above network design.

2.2.1 WORKSTATIONS
Are computers designed for a specific feature and advanced features with LAN access.
Business and engineering works are only handled by the work stations.
GUI is important content in the workstation.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 65 | P a g e


Advantages of a workstation
 System performance and speed is high
 Can be used for special computing purposes
 Easy to troubleshoot
 Storage capacity is high

Disadvantages of a workstation
 Physical immovability is complex
 Cost is high
 Electricity consumption is high

2.2.1.1 Interdependence of workstation hardware


The interdependence of workstation hardware refers to the intricate relationship between
various hardware components within a workstation, each contributing to the overall
functionality and performance of the system. Workstation hardware relies on each
component working together harmoniously to execute tasks efficiently. Here's a breakdown
of the interdependence of key workstation hardware components:

1. Central Processing Unit (CPU):


- The CPU serves as the brain of the workstation, executing instructions and performing
calculations.
- Other hardware components, such as memory and storage devices, depend on the CPU
to process data and execute tasks effectively.
- CPU performance affects the overall speed and responsiveness of the workstation,
influencing the efficiency of tasks performed by other hardware components.

2. Random Access Memory (RAM):


- RAM provides temporary storage for data and program instructions that the CPU needs
to access quickly.
- The CPU relies on RAM to store and retrieve data during program execution, with larger
amounts of RAM enabling the workstation to handle more complex tasks and run multiple
programs simultaneously.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 66 | P a g e


- RAM speed and capacity impact overall system performance, with faster and larger
RAM modules improving the responsiveness and multitasking capabilities of the
workstation.

3. Storage Devices (HDDs/SSDs):


- Storage devices, such as hard disk drives (HDDs) and solid-state drives (SSDs), store
data and program files for long-term storage.
- The CPU and other hardware components depend on storage devices to access and
retrieve data when needed for program execution or file manipulation.
- Storage device speed and capacity influence data access times and overall system
performance, with faster and larger storage devices enabling quicker data retrieval and
storage.

4. Motherboard and System Bus:


- The motherboard serves as the main circuit board that connects and integrates various
hardware components within the workstation.
- The system bus on the motherboard facilitates communication between the CPU, RAM,
storage devices, and other peripherals.
- All hardware components rely on the motherboard and system bus to exchange data and
instructions efficiently, with bus speed and bandwidth affecting overall system
performance.

5. Graphics Processing Unit (GPU):


- The GPU is responsible for rendering graphics and images, especially in tasks such as
gaming, video editing, and graphical design.
- The CPU and GPU work together to execute graphics-intensive tasks, with the CPU
handling program logic and the GPU handling graphical computations.
- GPU performance impacts the visual quality and rendering speed of graphics-intensive
applications, with faster GPUs enabling smoother and more responsive graphical output.

6. Input/Output (I/O) Devices:


- Input and output devices, such as keyboards, mice, monitors, and printers, allow users
to interact with the workstation and receive feedback.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 67 | P a g e


- The CPU and other hardware components rely on I/O devices to input data, display
information, and output results, with efficient communication between hardware
components and peripherals essential for user interaction and productivity.

Overall, the interdependence of workstation hardware components ensures that the system
operates efficiently and effectively, with each component playing a crucial role in
executing tasks, processing data, and delivering results. By selecting compatible and high-
performance hardware components and optimizing their configuration, users can maximize
the performance and functionality of their workstations for various computing tasks and
applications.

2.2.2 NETWORK SOFTWARES


Network software refers to a broad category of applications, protocols, and tools designed
to facilitate communication and data exchange within computer networks. Here are some
common types of network software:

1. Network Operating Systems (NOS):


- NOS provides the foundation for managing network resources, including servers,
clients, and peripherals.
- Examples include Windows Server, Linux distributions like Ubuntu Server and
CentOS, and specialized NOS like Novell NetWare.

2. Network Protocols:
- Network protocols define the rules and conventions for communication between devices
on a network.
- Examples include TCP/IP, Ethernet, Wi-Fi (802.11), HTTP, FTP, SMTP, DNS, and
SNMP (Simple Network Management Protocol).

3. Network Monitoring and Management Tools:


- These tools help administrators monitor, analyze, and manage network performance,
availability, and security.
- Examples include Nagios, Zabbix, PRTG Network Monitor, Wireshark, SolarWinds,
Cisco Prime Infrastructure, and NetFlow Analyzer.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 68 | P a g e


4. Firewall and Security Software:
- Firewall software protects networks from unauthorized access and cyber threats by
filtering incoming and outgoing traffic based on predefined security rules.
- Examples include pfSense, Cisco ASA, iptables (Linux firewall), Windows Firewall,
and software-based intrusion detection/prevention systems (IDS/IPS).

5. Virtual Private Network (VPN) Software:


- VPN software allows users to establish secure connections over public networks, such
as the internet, by encrypting data traffic.
- Examples include OpenVPN, Cisco AnyConnect, NordVPN, and ExpressVPN.

6. Remote Access Software:


- Remote access software enables users to access and control computers or network
resources from a remote location.
- Examples include Remote Desktop Protocol (RDP), TeamViewer, VNC (Virtual
Network Computing), and SSH (Secure Shell).

7. Network File Sharing and Storage:


- These tools facilitate the sharing and storage of files and data across a network.
- Examples include Samba (for Windows file sharing on Linux), NFS (Network File
System), FTP servers (File Transfer Protocol), and cloud storage services like Dropbox,
Google Drive, and Microsoft OneDrive.

8. Network Backup and Recovery Software:


- Backup and recovery software help organizations protect their data by creating copies
of critical files and systems and restoring them in case of data loss or system failure.
- Examples include Veeam Backup & Replication, Acronis Backup, Symantec
NetBackup, and Backup Exec.

9. Collaboration and Communication Tools:


- These tools facilitate communication and collaboration among users within a network
or across multiple networks.
- Examples include email servers (Microsoft Exchange, Postfix), instant messaging
(Slack, Microsoft Teams), video conferencing (Zoom, Microsoft Teams, Cisco Webex),

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 69 | P a g e


and collaboration platforms (Microsoft SharePoint, Google Workspace).

10. Network Performance Optimization Tools:


- These tools help optimize network performance by identifying bottlenecks, optimizing
network configurations, and improving network efficiency.
- Examples include network optimization appliances, WAN accelerators, load balancers,
and bandwidth management tools.

These are just a few examples of network software commonly used in various network
environments. Depending on the specific requirements and objectives of an organization,
different combinations of network software may be deployed to build and maintain an
efficient and secure network infrastructure.

Importance of having network software


 To connect with the devices reliably
 To troubleshoot if any error raise
 Easy to communicate with the devices in the network
 Able to enhance efficiency and effectiveness in the system
 Able to analyze the performance of the network

2.2.3 ALLIANCE HEALTH NETWORK SYSTEM


The organization has an action plan that it considers when deciding which server is best
for the Alliance health network system, among other factors being the cost, the number of
security guards, and the future viability of the server. Here are some samples of what would
be suitable in the processes this institution is thinking about.

2.2.3.1 Cloud Server


When choosing a dedicated server for a particular occasion, there are several factors you
should consider ensuring you choose the most appropriate option. Below are some of the
most important factors to consider.

2.2.3.2 Cloud Server VS VPN Server


The functions of a cloud server and a VPN (Virtual Private Network) are two completely
separate technologies. Access to computer resources like processing speed, memory, and

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 70 | P a g e


storage is made possible through cloud servers, which are distant servers located in data
centers. Users are able to save, handle, and access data and applications online. Websites
and online applications, software, and data storage are all common uses for cloud servers.
Yet, a VPN is a safe network connection that gives customers distant access to the internet
or a private network. by encrypting the user's internet data and redirecting it through a
distant server, it establishes a private network. VPNs are often used to preserve user
securityand privacy, to link distant workers to an organization's internal network and to
access material that is prohibited. Although with methods may be used to access resources
remotely, their functions are distinct. The computational resources are provided by a cloud
server, and the secure network connection is created using a VPN. To retain confidentiality
and privacy, it is feasible to connect to a cloud server remotely via a VPN.

2.2.3.3 Cloud Sever VS VPN Server advantage and Disadvantage.


A cloud server and a VPN server are two different types of servers with different purposes.
Following are some of each's benefits and drawbacks:

2.2.3.3.1 Cloud server Advantages


Scalability: Cloud servers are highly scalable, meaning you can easily adjust the
resourcesas per your requirement.
High Availability: Cloud servers are designed for high availability, which means that
theyare built to be always accessible and to withstand hardware failures.
Cost-effective: Cloud servers are cost-effective as you only pay for what you use.
Easy Maintenance: Maintenance is often taken care of by the cloud provider, so you
don'thave to worry about patching, upgrading or managing the hardware.

2.2.3.3.2 Disadvantages
Security: Cloud servers can be vulnerable to security breaches if not properly secured.
Dependence on the provider: You are dependent on the cloud provider for maintaining
andupdating the server.
Latency: Cloud servers can sometimes have higher latency due to the distance between
theserver and the client.

2.2.3.3.3 VPN Server Advantages


Security: VPN servers provide a secure connection between the client and the server,

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 71 | P a g e


protecting your data from potential threats.
Remote access: VPN servers allow remote access to the server and network resources,
making it easy to work from anywhere.
Encryption: VPN servers encrypt your data, making it unreadable to potential attackers.
Anonymity: VPN servers hide your IP address, making it difficult for someone to track
youronline activity.

2.2.3.3.4 Disadvantages
Complexity: Setting up and configuring a VPN server can be complicated and time-
consuming.
Performance: VPN servers can slow down the connection due to encryption and
decryptionoverheads.
Cost: Running a VPN server can be expensive, as it requires dedicated hardware
andsoftware.

Among these, it is important to use cloud server as the most profitable and efficient server
for this organization.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 72 | P a g e


2.2.4 RECOMMENDATION SERVER TO ALLIANCE HEALTH
Model : Dell PowerEdge T30

Processor : Intel(R) Xeon(R) Processor E3-1225 v3 3.2GHz 8MB Cache, 4C/4T,


turbo, 84W -TPM

Ram : 8GB DDR4 UDIMM, 2133 MT/s, ECC X 1

Hard drive : 1TB 7.2K Entry SATA 3.5in Cabled Hard Drive X 1

DVD/RW : DVD+/-RW,SATA,8X,9.5

Power Unit : Single Power Supply, 290W, Bronze

Network : Intel I219-LM Gigabit Ethernet LAN 10/100/100 1-port

Raid : No RAID

Keyboard / Mouse: NO

Operating system: DOS

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 73 | P a g e


• Intel Xeon Processor E3-1220v6, 3.00GHz, 8MB Cache, Turbo,4C/4T 72 W
• 8GB UDIMM, 2400MT/s, Dual Rank, x8 Data Width
• 600GB 10k RPM SAS 12Gbps 512n 2.5in Hot-plug Hard Drive
• PERC H330 RAID Controller, Adapter, Full Height
• DVD+/- RW SATA Internal
• Hot-plug, Redundant Power Supply , 495 W
• On Board LOM 1GBE Dual Port for Towers

2.2.5 Why is cloud server usage beneficial for Alliance health?


Using a cloud server may assist Alliance Health in several ways, including.

Scalability Depending on what Alliance Health requires, cloud servers may simply be
scaled up or down. Therefore, businesses may swiftly raise their server capacity during
periods of high demand and decrease it during times of low traffic, maximizing resource
useand minimizing costs.

Reliability To guarantee high availability and uptime of its cloud servers, cloud service

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 74 | P a g e


providers like Amazon Web Services (AWS) and Microsoft Azure have included
redundancy and failover systems. Guaranteeing that crucial apps and services are
constantlyaccessible, lowers the possibility of downtime and data loss.

Flexibility Cloud servers may be quickly installed and set up to satisfy particular needs.
Alliance Health has a variety of server options.to determine which configurations
and operating systems best suit their applications and workloads. They may maximize
performance, security, and cost with the use of this flexibility.

Cost-effectiveness By eliminating the need for on-site hardware, maintenance, and


support, using cloud servers may save Alliance Health money. Companies may avoid up-
front construction expenses and ongoing maintenance costs by only paying for the
resources they really utilize.

Security Advanced security procedures and compliance certifications used by cloud


service providers guarantee the safety of Alliance Health's data. It is more difficult for
hackers to compromise cloud servers because of firewalls, intrusion detection, and other
securitymeasures.

Overall, using cloud servers can provide Alliance Health with the flexibility, dependability,
and scalability needed to offer patients high-quality medical treatment while lowering costs
and boosting efficiency.

2.2.6 Choosing the right topology for Alliance health.

Star Topology
All nodes in this protocol are linked to a central hub or switch, which serves as the
protocol's single point of control. It is simple to set up and maintain, and it makes network
expansion simple. Yet, if the hub or switch has problems, it may experience a single point
offailure.

Ring Topology
With this protocol, each node serves as a repeater to boost the data and is linked to
the others in a circular loop. It provides for the successful usage of bandwidth and is

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 75 | P a g e


appropriate for tiny networks. Yet, if one node fails, it may experience a single point of
failure.

Bus Topology
All nodes in this protocol are linked together by a single communication channel called a
bus. It provides for the effective utilization of bandwidth and is appropriate for tiny
networks. If the bus has issues, it may experience a single point of failure.

Mesh Topology
All the nodes in this protocol are interconnected in a network-like topology, with
connectivity for fault tolerance. It provides for the effective utilization of bandwidth and is
appropriate for big networks. However, setting it up and keeping it up might be difficult.

Hybrid Topology
This is a combination of two or more topologies, such as a ring topology connected to a
bus topology.

ACTIVITY 03

3.1 Prepare a written networ k design plan to meet the above -mentioned
user requirements including a blueprint drawn using a modeling tool
(Ex: Microsoft Visio, EdrawMax) .T est and evaluate the proposed
design by analyzing user feedback with the aim of optimizing your
design and impro ving efficiency.

3.1.1 NETWORK DESIGN PLAN

Below is the network design created for Alliance health grant institute (Colombo) and
Matara institute. It is created by Cisco Packet Tracer software. TREE topology is the
suggested topology for the network design created for Alliance health institute.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 76 | P a g e


Figure 32 Cisco Packet Tracer

Figure 33 Colombo Branch 3RD Floor Networking Design

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 77 | P a g e


Figure 34 Colombo Networking 2nd Floor Networking Design

Figure 35 Colombo Networking 1st Floor Networking Design

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 78 | P a g e


Figure 36 Mathara Branch 1st Floor Networking Design

Figure 37 Mathara Branch 2ND Networking Design

Figure 38 Mathara Branch 2nd Floor IT Department

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 79 | P a g e


Figure 39 Mathara Branch 2ND Floor IT Department

Figure 40 Mathara Branch 2ND Floor Server Room & IT Department

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 80 | P a g e


Figure 41 Colombo & Mathara Branch Network Design

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 81 | P a g e


3.1.2 IP Address
Branch Room PC ID IP Address
AD1 192.168.15.1
AD2 192.168.15.2
AD3 192.168.15.3
AD4 192.168.15.4
AD5 192.168.15.5
Administration Department AD6 192.168.15.6
AD7 192.168.15.7
AD8 192.168.15.8
AD9 192.168.15.9
AD10 192.168.15.10
HR1 192.168.15.11
HR2 192.168.15.12
HR3 192.168.15.13
HR Department HR4 192.168.15.14
HR5 192.168.15.15
HR6 192.168.15.16
HR7 192.168.15.17
AFD1 192.168.15.18
AFD2 192.168.15.19
AFD3 192.168.15.20
AFD4 192.168.15.21
Accounting & Finance Department AFD5 192.168.15.22
Mathara AFD6 192.168.15.23
AFD7 192.168.15.24
AFD8 192.168.15.25
MIT1 192.168.15.26
MIT2 192.168.15.27
MIT3 192.168.15.28
MIT4 192.168.15.29
MIT5 192.168.15.30
MIT6 192.168.15.31
MIT7 192.168.15.32
MIT8 192.168.15.33
MIT9 192.168.15.34
IT Department MIT10 192.168.15.35
MIT11 192.168.15.36
MIT12 192.168.15.37
MIT13 192.168.15.38
MIT14 192.168.15.39
MIT15 192.168.15.40
MIT16 192.168.15.41
MIT17 192.168.15.42
MIT18 192.168.15.43

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 82 | P a g e


MIT19 192.168.15.44
MIT20 192.168.15.45
MIT21 192.168.15.46
MIT22 192.168.15.47
MIT23 192.168.15.48
MIT24 192.168.15.49
MIT25 192.168.15.50
MIT26 192.168.15.51
MIT27 192.168.15.52
MIT28 192.168.15.53
MIT29 192.168.15.54
MIT30 192.168.15.55
MIT31 192.168.15.56
MIT32 192.168.15.57
MIT33 192.168.15.58
MIT34 192.168.15.59
MIT35 192.168.15.60
MIT36 192.168.15.61
MIT37 192.168.15.62
MIT38 192.168.15.63
MIT39 192.168.15.64
MIT40 192.168.15.65
MIT41 192.168.15.66
MIT42 192.168.15.67
MIT43 192.168.15.68
MIT44 192.168.15.69
MIT45 192.168.15.70
MIT46 192.168.15.71
MIT47 192.168.15.72
MIT48 192.168.15.73
MIT49 192.168.15.74
MIT50 192.168.15.75
CS1 192.168.15.76
CS2 192.168.15.77
Customer Services Area
CS3 192.168.15.78
CS4 192.168.15.79
REP1 192.168.15.80
Reception area
REP2 192.168.15.81
Server 01 10.254.10.1
Server room
Server 02 10.254.10.2
REP1 192.168.16.1
Reception area
REP2 192.168.16.2
Colombo
SMD1 192.168.16.3
Sales and Marketing Department
SMD2 192.168.16.4

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 83 | P a g e


SMD3 192.168.16.5
SMD4 192.168.16.6
SMD5 192.168.16.7
SMD6 192.168.16.8
SMD7 192.168.16.9
SMD8 192.168.16.10
SMD9 192.168.16.11
SMD10 192.168.16.12
CS1 192.168.16.13
Customer Services Area CS2 192.168.16.14
CS3 192.168.16.15
AD1 192.168.16.16
AD2 192.168.16.17
AD3 192.168.16.18
AD4 192.168.16.19
AD5 192.168.16.20
AD6 192.168.16.21
AD7 192.168.16.22
AD8 192.168.16.23
AD9 192.168.16.24
AD10 192.168.16.25
AD11 192.168.16.26
AD12 192.168.16.27
AD13 192.168.16.28
AD14 192.168.16.29
AD15 192.168.16.30
AD16 192.168.16.31
Administration Department
AD17 192.168.16.32
AD18 192.168.16.33
AD19 192.168.16.34
AD20 192.168.16.35
AD21 192.168.16.36
AD22 192.168.16.37
AD23 192.168.16.38
AD24 192.168.16.39
AD25 192.168.16.40
AD26 192.168.16.41
AD27 192.168.16.42
AD28 192.168.16.43
AD29 192.168.16.44
AD30 192.168.16.45
HR1 192.168.16.46
HR Department HR2 192.168.16.47
HR3 192.168.16.48

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 84 | P a g e


HR4 192.168.16.49
HR5 192.168.16.50
HR6 192.168.16.51
HR7 192.168.16.52
HR8 192.168.16.53
HR9 192.168.16.54
HR10 192.168.16.55
HR11 192.168.16.56
HR12 192.168.16.57
HR13 192.168.16.58
HR14 192.168.16.59
HR15 192.168.16.60
HR16 192.168.16.61
HR17 192.168.16.62
HR18 192.168.16.63
HR19 192.168.16.64
HR20 192.168.16.65
AFD1 192.168.16.66
AFD2 192.168.16.67
AFD3 192.168.16.68
AFD4 192.168.16.69
AFD5 192.168.16.70
AFD6 192.168.16.71
AFD7 192.168.16.72
AFD8 192.168.16.73
Accounting & Finance Department
AFD9 192.168.16.74
AFD10 192.168.16.75
AFD11 192.168.16.76
AFD12 192.168.16.77
AFD13 192.168.16.78
AFD14 192.168.16.79
AFD15 192.168.16.80
AD1 192.168.16.81
AD2 192.168.16.82
Audit Department AD3 192.168.16.83
AD4 192.168.16.84
AD5 192.168.16.85
BDD1 192.168.16.86
BDD2 192.168.16.87
Business Development Department BDD3 192.168.16.88
BDD4 192.168.16.89
BDD5 192.168.16.90
VC1 192.168.16.91
Video Conference Room
VC2 192.168.16.92

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 85 | P a g e


VC3 192.168.16.93
VC4 192.168.16.94
Server 01 10.254.10.3
Server 02 10.254.10.4
Server room Server 03 10.254.10.5
Server 04 10.254.10.6
Server 05 10.254.10.7
IT1 192.168.16.100
IT2 192.168.16.101
IT3 192.168.16.102
IT4 192.168.16.103
IT5 192.168.16.104
IT6 192.168.16.105
IT7 192.168.16.106
IT8 192.168.16.107
IT9 192.168.16.108
IT10 192.168.16.109
IT11 192.168.16.110
IT12 192.168.16.111
IT13 192.168.16.112
IT14 192.168.16.113
IT15 192.168.16.114
IT16 192.168.16.115
IT17 192.168.16.116
IT18 192.168.16.117
IT19 192.168.16.118
IT Department IT20 192.168.16.119
IT21 192.168.16.120
IT22 192.168.16.121
IT23 192.168.16.122
IT24 192.168.16.123
IT25 192.168.16.124
IT26 192.168.16.125
IT27 192.168.16.126
IT28 192.168.16.127
IT29 192.168.16.128
IT30 192.168.16.129
IT31 192.168.16.130
IT32 192.168.16.131
IT33 192.168.16.132
IT34 192.168.16.133
IT35 192.168.16.134
IT36 192.168.16.135
IT37 192.168.16.136

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 86 | P a g e


IT38 192.168.16.137
IT39 192.168.16.138
IT40 192.168.16.139
IT41 192.168.16.140
IT42 192.168.16.141
IT43 192.168.16.142
IT44 192.168.16.143
IT45 192.168.16.144
IT46 192.168.16.145
IT47 192.168.16.146
IT48 192.168.16.147
IT49 192.168.16.148
IT50 192.168.16.149
IT51 192.168.16.150
IT52 192.168.16.151
IT53 192.168.16.152
IT54 192.168.16.153
IT55 192.168.16.154
IT56 192.168.16.155
IT57 192.168.16.156
IT58 192.168.16.157
IT59 192.168.16.158
IT60 192.168.16.159
Figure 42 Colombo & Mathara Branch Ip Address

3.1.3 Network maintains a schedule.


The same is true for routine maintenance and upgrades, even though access to the server is
typically required around-the-clock. To avoid inconvenience, we must specify the repair
time of the main system as stated below.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 87 | P a g e


Alliance health maintenance schedule

Daily Weekly Monthly

File server backup

Email server backup

Database server backup

Network scan

Power check

Cable organization

Network documentation

Network update

Device update

Server update

Windows update

Security update

Figure 43 Network maintain schedule

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 88 | P a g e


3.1.4 FEEDBACK

3.1.4.1 USER FEEDBACK FORM

Figure 44 User feed back form

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 89 | P a g e


Figure 45 User feed back form

3.1.4.2 USER FEEDBACK RESPONSES

Figure 46 User feed back Response

Figure 47 User feed back Response

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 90 | P a g e


Figure 48 User feed back Response

Figure 49 User feed back Response

Figure 50 User feed back Response

Figure 51 User feed back Response

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 91 | P a g e


Figure 52 User feed back Response

Figure 53 User feed back Response

Figure 54 User feed back Response

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 92 | P a g e


3.2 Install and configure Network services, devices and applications
(Ex: VLAN,WiFi, DNS,Proxy, Web, Etc.) according to the proposed
design to accomplish the user requirement s and design a detailed
Maintenance schedule for above Network.

3.2.1 DEVICES, NETWORK COMPONENTS AND SOFTWARES USED IN


DESIGNING THE NETWORK

 Router
Cisco 4000 Series Integrated Services Routers is used because it have apredictable
performance, good network service, simplified and protects from threat. Because
of predictable performance, get a high-availability architecturedesigned for sort of
mission-critical branches, very contrary to popular belief. The ISR 4000 delivers high
speed, predictable performance and modularity to really connect from most remote
locations, showing how actually get a high- availability architecture designed for
definitely mission-critical branches, which actually is quite significant. Simplify
network automation and turn hours of work into minutes. And the last is protection,
Protect really your branch site across the LAN and WAN and in the cloud with
security integratedinto the router in an actually big way. You no longer need a kind
of separate security appliance so I recommend this router.

 Switch
Cisco Catalyst 3560 Series Switch is used in this system because it enhancethe
security, improve reliability and its efficiency. integrated network security for before,
during, and after an attack, which basically is fairly significant.And next is about
the reliability, it’s easily definitely managed wired and wireless networks, basically
strengthen security, and for all intents and purposes simplify basically your campus
LAN in a very big way. And the last is about the efficiency, it pave actually your way
to an automated, digital- ready network with access switches in a subtle way. So I
recommend this switch

 P.C
Device name – Acer 14 laptop
Processor – AMD Ryzen 55500U. 4GB RAM, 256GB SSD
Operating system – windows 11

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 93 | P a g e


I recommended this because the performance is great, amazing battery life and three
different work modes can be utilized

 Draw.io
User may develop intriguing charts, presentation, info graphics and other type’s
visual materials.
Operates on WINDOWS, LINUX and MACOS
More than 200 visual info graphics of technical diagram can be created by the user.

 CISCO packet tracer


In this software we can build, set configure and debug a network virtually and manage
it. Also used for educational purposes such as network simulation and visualization.

3.2.2 CONFIGURATION OF NETWORK SERVICES,DEVICES AND


APPLICATIONS

 Assigning VLAN on switch

Figure 55 configuration 1

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 94 | P a g e


 Assigning switchport

Figure 56 configuration 2

 VLAN output

Figure 57 configuration 3

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 95 | P a g e


 Trunking switchport

Figure 58 configuration 4

 DHCP configuration

Figure 59 configuration 5

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 96 | P a g e


 Router configuration

Figure 60 configuration 6

 Enable password for router

Figure 61 configuration 7

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 97 | P a g e


 Ping command

Figure 62 ping command

Network workstation software installation

Figure 63 step 1

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 98 | P a g e


Figure 64 step 2

Figure 65 step 3

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 99 | P a g e


Figure 66 step 4

Figure 67 step 5

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 100 | P a g e


Figure 68 step 6

Figure 69 step 7

3.2.3 MAINTENANCE SCHEDULE FOR THE NETWORK

Maintenance for an organizations network is important and should be done according to


scheduled time. The network should be supported and maintained to minimize risks and
security problems. This procedure can help the network systemto enhance the network in
an effective and efficient methodology way.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 101 | P a g e


PLAN DAILY WEEKLY MONTLY YEARLY
Updates
virus scanning
Backup
File maintenance
General task
Device cleaning
Monitoring network
Network upgrade

Figure 70 Maintanance schedule for the network

ACTIVITY 04

4.1 Implement a networked system based on your prepared design


with valid evidences.

4.1.1 NETWORK SCHEME

Figure 71 network design by Cisco packet tracer

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 102 | P a g e


4.2 Develop test cases and conduct verification (Ex: Pi ng, extended
ping, trace route, telnet, SSH, etc.) to test the above Network and
analyse the test results against the expected results. Recommend
potential future enhancements for the networked system with valid
justifications and critically reflect on the implemented network,
including the plan, design, configurations, tests and the decisions made
to enhance the system.

4.2.1 Windows server installation


An operating system for servers termed Windows Server provides PCs the ability to execute
network functions like print servers, domain controllers, web servers, and file servers. As
a server operating system, it also acts as a foundation for add-on server software like
Exchange Server and SQL Server. For the server machines at my company, Alliance
health,I utilize the Windows Server OS.

Step 1

Insert the Windows Server installation media into the server's CD/DVD drive or USB
port. Boot the server from the installation media. You may need to configure the boot
order in theBIOS/UEFI settings to prioritize the installation media.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 103 | P a g e


Figure 72

Step 2

Click "Next" after choosing the language, time zone, currency, and keyboard input mode
onthe first screen.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 104 | P a g e


Then select "Install Now."

Figure 73

Figure 74

Step 3

After entering the product key, select "Next." Choose "Skip" to complete the installation

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 105 | P a g e


process without activating Windows if you don't have a product key.

Figure 75

Select the type of installation you want to perform.

Figure 76

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 106 | P a g e


Read and accept the license terms and click "Next."

Figure 77

Step 4
You can choose between a custom installation or an upgrade from a previous version of
Windows. For a new installation, select "Custom (advanced)."

Figure 78

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 107 | P a g e


Figure 79

Figure 80

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 108 | P a g e


Step 5
Click "Next" after selecting the disk or partition where you wish to install Windows. On
thispage, you may create and format a new partition if necessary.
The setup procedure will start. Many server reboots will occur while the installation
istaking place.

Figure 81

Figure 82

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 109 | P a g e


Figure 83

Figure 84

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 110 | P a g e


Figure 85

Figure 86

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 111 | P a g e


Step 6

After the installation is complete, you will be prompted to set up the server's initial
configuration, including the administrator password, time zone, and network settings.
Once you have completed the initial configuration, you will be taken to the Windows
Serverdesktop.

Figure 87

Figure 88

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 112 | P a g e


Figure 89

Step 7
Congratulations, you have successfully installed Windows Server!

Figure 90

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 113 | P a g e


4.2.2 Ping Command (Network test)

Step 1
Open a command prompt: Click on the Start button and type "cmd" into the search box,
thenclick on the Command Prompt application that appears in the search results.

Figure 91

Figure 92

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 114 | P a g e


Step 2
Determine the IP address or hostname you want to ping: This could be a website, a local
device, or a remote server. For the purposes of this example, we'll use the Google DNS
server at IP address 192.168.128.18

Figure 93
Step 3
Type "ping" followed by the IP address or hostname you want to ping: In this case, type
"ping 192.168.128.18".

Figure 94

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 115 | P a g e


Step 4
Press Enter: This will send the ping request to the specified IP address.

Figure 95

Step 5
Wait for the response: The ping command will send several packets of data to the specified
IP address and wait for a response. Depending on the network conditions and the response
time of the device you're pinging, this may take anywhere from a few milliseconds to
several seconds.

Figure 96

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 116 | P a g e


Step 6
Exit the command prompt: Once you're done using the ping command, type "exit" and press
Enter to close the command prompt window. That's it! The ping command is a useful tool
for testing network connectivity and troubleshooting issues with remote devices.

Figure 97

Figure 98

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 117 | P a g e


Figure 99

Figure 100

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 118 | P a g e


4.2.3 Active directory configuration
Active Directory is the name of Microsoft's proprietary directory service. It is a Windows
Server program that gives administrators access to and control over permissions to network
resources. Active Directory stores data as objects. An object is a single entity, such as a
user,a party, a program, or a computer, such as a printer. Users, general security concepts,
and tools like computers and printers are all used to categorize items. The following are
the procedures for configuring Active Directory.
Install Windows Server: Windows Server must be set up on your machine before you can
install Active Directory. It may be installed on a virtual system or a real machine.
Promote the server to a domain controller: Once Windows Server is installed, you need
to promote it to a domain controller. This can be done using the Server Manager tool.
Choose the option to add a new role, select Active Directory Domain Services, and follow
the prompts to complete the installation.
Setup the domain: After promoting the server to domain controller status, you must
configure the domain. The domain name, OU creation, and user and group policy definition
all fall under this category.
Create users and groups: You may begin generating users and groups when you've
finished setting the domain. The Active Directory Users and Computers tool, which comes
with Windows Server, may be used to do this.
Set security settings: To make sure that your data is secure, you must configure security
settings for your domain. This entails configuring auditing settings, access control policies,
and authentication methods.
Setup DNS: Active Directory needs DNS for optimal operation. Make sure your domain
controller is set up as a DNS server and that your DNS server is configured correctly.
Configure replication: Replication ensures that changes made to the Active Directory
database are propagated to all domain controllers in the domain. You need to configure
replication settings to ensure that changes are replicated in a timely and efficient manner.
Test the configuration: When you've finished configuring anything, you should test it to
make sure everything is operating as it should. To make sure everything is operating as it
should, utilize tools like the Active Directory Replication Status Tool and the Active
Directory Users and Computers tool.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 119 | P a g e


Figure 101

Figure 102

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 120 | P a g e


Figure 103

Figure 104

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 121 | P a g e


Figure 105

Figure 106

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 122 | P a g e


Figure 107

Figure 108

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 123 | P a g e


Figure 109

Figure 110

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 124 | P a g e


Figure 111

Figure 112

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 125 | P a g e


Figure 113

Figure 114

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 126 | P a g e


Figure 115

Figure 116

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 127 | P a g e


Figure 117

Figure 118

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 128 | P a g e


Figure 119

Figure 120

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 129 | P a g e


Figure 121

Figure 122

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 130 | P a g e


4.2.4 Network monitoring
Network monitoring is the practice of keeping an eye on and analyzing network traffic to
spot and fix issues with network security, performance, and other issues that might
compromise the availability, dependability, and integrity of network resources. In this
process, information regarding network activity, including as traffic patterns, bandwidth
usage, packet loss, and other metrics, is gathered and analyzed using specialized tools and
methodologies. Network monitoring's main objective is to make sure that users can always
access network resources and that they are operating at peak efficiency. This calls for real-
time network traffic monitoring, problem detection and diagnosis, and appropriate
remediation before users are impacted. Depending on the situation, network monitoring
can be done manually or automatically utilizing tools and methods. Network complexity
and resource availability. Network analyzers, packet sniffers, bandwidth monitors,
intrusion detection systems, and firewall logs are a few examples of typical tools and
methods used for network monitoring. These solutions may send out real-time warnings
and notifications about network faults, enabling administrators to spot and fix problems as
they appear. A crucial part of network management, efficient network monitoring may
assist guarantee the availability, dependability, and security of network resources.

4.2.5 Network monitoring toolsWireshark

One of the most useful tools for IT workers is Wireshark, which is the popular network
packet capture program. Wireshark allows you to observe and capture network packets in
detail. After being broken down, these packets can be used for offline or live analysis. With
the aid of this program, you may carefully monitor the network traffic, filter it, and go
deeper to find the root of any problems. Also, this technology aids in network analysis and
ultimately network security. This free Wireshark lesson teaches you how to gather, decode,
filter, and analyze data packets so you can troubleshoot effectively.

The steps for installing Wireshark are as follows.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 131 | P a g e


Step 1

Figure 123

Step 2

Figure 124

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 132 | P a g e


Step 3

Figure 125

4 Steps

Figure 126

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 133 | P a g e


Figure 127

4.2.6 Networking Troubleshooting


The act of locating and fixing difficulties or problems that develop inside a computer
network is known as network troubleshooting. To make ensuring the network is operating
atits best, it entails identifying issues with network devices, protocols, hardware, software,
and other components. Many techniques may be used throughout the network
troubleshooting process, including Information gathering To identify and fix issues, it is
crucial to collect information about the network, including its topology, hardware,
software,protocols, and configuration. Detecting the issue Finding the issue is the next step.
Everything from sluggish network speeds, and connection problems, to hardware or
software faults, might be the cause of this. Isolating the issue When the issue has been
located, the issue must be isolated. This entails focusing the issue on a particular network.
component, such as a server, router, or switch. Problem-solving When the issue has been
identified and isolated, the following stage is to find a solution. This could entail replacing
defective hardware, upgrading firmware or software, or resetting or reconfiguring network
equipment.
To recognize the symptoms, troubleshooting is needed.

Problem:
Everything is working normally, but suddenly the connection go down and comes back.

Troubleshoot steps:
The case may be these things

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 134 | P a g e


 Faulty cable

 Faulty interface

Recommended Actions
 Remove and re-insert the cable on both ends

 Put the same cable on a different interface

 Put the cable on a different switch port

 Swap the cable for a known working cable

Problem:
The network cable plugged in but getting no connection

Troubleshoot steps:
Case maybe
 Network interface card failure

 Network cable was broken

 Switch/router port failure

Recommended Actions:

 Check the network interface card work properly

 Check the network cable damage

 Check the switch or router ports are working and swap the ports

Testing the solution: It's crucial to test the network once an issue has been handled to make
sure it has been rectified and is operating at its best.

In general, network troubleshooting is an essential step in keeping a strong and effective


computer network.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 135 | P a g e


4.2.7 Advice for future for this institution

The networked systems of Alliance Health Corporation might benefit from the following
improvements.

Implement electronic health records (EHR): By enabling medical personnel to access


patient data and medical histories from anywhere in the network, electronic health records
can assist to enhance patient care and efficiency.

Adopt health information exchange (HIE): Health information exchange can help
healthcare professionals safely share patient information. By giving medical personnel
access to comprehensive and accurate patient data, can enhance patient outcomes.

Enhance Network Security: Security is crucial for a healthcare provider. Patient data can
be protected from unwanted access or theft by enhancing network security through the use
of robust authentication and access control methods, encryption of data in transit and at
rest,and intrusion detection and prevention systems.

Implement telemedicine: By enabling medical practitioners to consult with and treat


patients remotely, telemedicine can increase patient access to treatment and lower costs.
Patients who live in rural or isolated places may find this to be extremely helpful.

Use Internet of Things (IoT) gadgets: IoT gadgets may be used to track patient health
and gather information to enhance patient outcomes. Wearable tech may, for instance, be
used totrack patients' vital signs and notify doctors of any worrying changes.

Employ cloud computing: By enabling Alliance Health Corporation to store data and
access applications online, cloud computing can assist to save expenses and enhance
scalability.

Only a handful of the potential improvements for Alliance Health Company's networked
systems are listed above. Depending on the organization's needs and objectives, certain
improvements may be acceptable.

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 136 | P a g e


4.2.8 Critically evaluate the implemented network, including plans and decisions
made toimprove the system.
A network topology known as a tree topology connects several devices in a hierarchical
arrangement. In a branching structure, further devices are connected to the root node, which
acts as the network's central hub, through intermediary nodes.

The following factors should be considered while evaluating the network that has been
builtin a tree topology.

Scalability: The network can be easily expanded by adding additional nodes thanks to the
tree topology's scalability. To make sure that it can support future expansion and shifting
business requirements, the network's design should be examined.

Resilience: The tree topology is relatively resilient, as failures in one branch of the network
do not affect other branches. However, the design should be evaluated to ensure that there
are no single points of failure that could cause significant disruption to the network.

Performance: The network's performance should be analyzed to ensure that it meets the
organization's requirements. This includes factors such as bandwidth, latency, and
throughput. Performance monitoring tools can be used to identify any bottlenecks and areas
for improvement.

Security: The network's security should be evaluated to ensure that it is adequately


protected against unauthorized access and data breaches. This includes factors such as
encryption, authentication, and access control mechanisms. In a tree topology, security can
be enhanced by segmenting the network into smaller sub-networks or VLANs.

Cost: The cost of the network should be evaluated to ensure that it is cost-effective for the
organization. This includes factors such as the cost of hardware, software, maintenance,
and support. The tree topology can be cost-effective, as it requires fewer cables and is
relatively easy to install and manage.

User experience: The network's user experience should be evaluated to ensure that it is
intuitive and user-friendly. This includes factors such as ease of use, responsiveness, and

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 137 | P a g e


reliability. In a tree topology, user experience can be enhanced by ensuring that the network
is well-designed and well-maintained, with a clear hierarchy of nodes.

One should take into account the actions taken to improve the network in addition to the
aforementioned factors. This involves things like modernizing technology, introducing
new software, and putting new security measures in place. The performance, security,
and user experience of the network, as well as their cost-effectiveness, should be taken into
consideration while assessing these choices.

Finally, to make sure the network is successful, efficient, safe, and user-friendly, a critical
analysis of the network implemented in a tree topology should take all of the
aforementioned factors and choices into account.

4.2.9 TEST CASES

CASE TEST CASE DESCRIPTION DETAILS EXPECTED ACTUAL


ID RESULT RESULT
001 Login User tries to log in Username- user should be expected
to the router using cocmain branch able to login results will
password password- match the
99939289 actual result

002 Switch 1 to check that the - Devices that are Expected


switch is connected to the results will
working switchshould be match the
connected actual result
together

003 Invalid login User tries to login Password- User should not Expected result
using 1235764 be able to login will
invalid match the
Passwords actual result

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 138 | P a g e


004 Ping 01 ping HR to 192.168.10.94 ping should Expected result
marketing to be successful will
192.168.10.30 match the
actual result
005 Ping 02 ping HR to 192.168.10.29 ping should Expected result
finance to be successful will
192.168.10.45 match the
actual result

Figure 128 Test cases

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 139 | P a g e


4.2.10 FUTURE ENHANCEMENTS

As the development of the technology sector increases security issues also will gradually
increase so we can improve the encryption system in the network to maintain the
confidentiality matter of the system and by using biometric devices. Reason to implement
this system is to prevent unauthorized access to the data in the system which might be a
serious threat to the organization. Server usually should have more processing power,
memory and storage than client computers. Backup facilities, remote control and security
of the system will be provided by the server. VPN configuration can be implemented to
the system for powerful encrypting to the network for protecting the flow of data online
while browsing the web and to maintainthe internet traffic. Cloud system can also be
implemented to the system to accessdata from anywhere anytime this implementation to
prevent data loss during physical damages, natural disasters or any problem that the system
data cannot be retrieved. A separate network will be implemented to the outside guest to
utilize the network by introducing this methodology the organizations data and resources
can be secured andalso the network crashes can be controlled.

4.2.11 CONCLUSION

The main objective of this system is to store the information of the clients and process the
organizations data that which can be done through this effective communication system.
Some errors were identified but they were fixed eventually. This designed network
complies and satisfies the entire requirement that are requested and proposed by the
ALLIANCE HEALTH. To assign the IP address to the devices in the network DHCP is
utilized.

According to the plan the network the below decisions have been made.
 Devices – Switch , Router
 Network model - MAN
 Network topology - Hybrid topology
 Network Protocols - OSI model
 Security Methodology – Firewall , Proxy server IDS , IPS

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 140 | P a g e


REFERENCES

(computer), S. (., n.d. What is Networking. [Online]


Available at: https://www.techtarget.com/searchnetworking/definition/networking
[Accessed 01 03 2023].
Anon, 2022. What is Peer to Peer Network, and How does it work. [Online] Available at:
https://www.blockchain-council.org/blockchain/peer-to-peer-network/.[Accessed 01
Murch 2023].
Bing.com, n.d. Bing.com. [Online]
Available at: https://th.bing.com/th/id/OIP.hVar_ECvyhkBxsKWaTI-sQHaFi?
pid=ImgDet&rs=1
[Accessed 01 March 2023].
Cloudflare., C. (., n.d. What is a protocol? | Network protocol definition | Cloudflare.
(n.d.).Cloudflare.. [Online]
Available at: https://www.cloudflare.com/learning/network-layer/what-is-a-protocol/.
[Accessed 01 Murch 2023].
Faruk, N., 2014. researchgate. [Online]
Available at: https://www.researchgate.net/figure/Wireless-Local-Area-Network-WLAN-
2014_fig4_325813485
[Accessed 01 Murch 2023].
Gaes, L., 2018. medium.ip.sx. [Online]
Available at: https://medium.ip.sx/ip-dictionary-2-pill-internet-protocol-ee5762ac1c8a
[Accessed 01 Murch 2023].
GeeksforGeeks., (2021). . Types of Internet Protocols.. [Online] Available at:
https://www.geeksforgeeks.org/types-of-internet-protocols/.[Accessed 03 03 2023].
GeeksforGeeks, 2018. Network Devices. [Online]
Available at: https://www.geeksforgeeks.org/network-devices-hub-repeater-bridge-
switch-router-gateways/.
[Accessed 02 March 2023].
Lifewire., n.d. Everything you want to know about Ethernet.. [Online] Available at:
https://www.lifewire.com/introduction-to-ethernet-817550.[Accessed 01 Murch 2023].
Mitchell, B., 2022. lifewire. [Online]
Available at: https://www.lifewire.com/introduction-to-client-server-networks-817420

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 141 | P a g e


[Accessed 01 March 2023].
Networks, 2021 . 11 Types of Networks: Understanding the Differences. [Online]
Available at: https://www.auvik.com/franklyit/blog/types-of-networks/. [Accessed 01
March 2023].
Point., A., n.d. Local Area Network (LAN).. [Online]
Available at: https://assignmentpoint.com/local-area-network-lan[Accessed 01 March
2023].
server, s., 2014. www.slideserve.com. [Online]
Available at: https://www.slideserve.com/nika/komponen-komunikasi-data[Accessed 01
Murch 2023]

MM.Nashath Aara / 00214832 Unit-02 Networking / Assignment 01 142 | P a g e

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy