Ruzan Network Final Assignment - 082926
Ruzan Network Final Assignment - 082926
Ruzan Network Final Assignment - 082926
Mr.Sudhesh
Assessor Internal Verifier
Unit 02: Networking
Unit(s)
Internal Verifier
Date
signature
Programme Leader
Date
signature (if required)
Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction P1 P2 M1
Descripts
Resubmission Feedback:
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken
place and grades decisions have been agreed at the assessment board.
Action Plan
Summative feedback
Sudesh.bandara@esoft.lk 17.10.2022
Assessor Date
signature
E161001@esoft.acdemy 17.10.2022
Student Date
signature
1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No,
and Page Number on each page. This is useful if individual sheets become detached for
any reason.
5. Use word processing application spell check and grammar check function to help editing
your assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the
body except for the before mentioned compulsory information will result in rejection of
your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as
illness, you may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You
will then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text
citation and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade
could be reduced to A REFERRAL or at worst you could be expelled from the course
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to
present it as my own without attributing the sources in the correct form. I further understand
what it means to copy another’s work.
E161001@esoft.academy 17.10.2022
Student’s Signature: Date:
(Provide E-mail ID) (Provide Submission Date)
Submission format
The submission should be in the form of an individual report written in a concise, formal business style
using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using Harvard
referencing system. Please also provide an end list of references using the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures,
although you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:
SYNTAX SOLUTIONS is a privately owned, well-known Software company located in Colombo. The
Management of SYNTAX SOLUTIONS has purchased a 3-story building in the heart of Matara. They
are planning to make it one of the state-of-the-art companies in Matara with the latest facilities.
Customer Care 10
Finance 25
Legal 5
HR 10
Developers 55
Network Team 5
• 19 2.16 8.10. 0/24 is giv en and sho uld be use d fo r all the departments except the
server room . IPs sho uld assign usi ng DHCP .
• ERP and CRM Sy stems need to be im plem ented in M ata ra branch in local serv ers.
• N umber of s erv ers requir ed for the S erver r oom need to be decided by the
Netwo rk designer and sho uld be assigned with 10.25 4.1. 0/24 subnet. (Uses static
• S al es and Mar keti ng Team need to access Netwo rk reso urces usi ng WI FI
co nnectiv ity .
Assume yo u have been appo inted as the new netwo rk co nsultant o f SYNT AX S OLUTI ONS .
P repare a netwo rk architectural design and im plement it with yo ur suggestio ns and
recommendatio ns to meet the com pany requirements.
(No te : C l ea rl y state you r a ssump tion s. You a re allow ed to d esign th e n etwo rk a cco rding
to you r a ssump tion s, bu t main requi remen ts sho uld n ot b e viol ated)
Ac tiv ity 01
• D iscuss the benefits and co nstraints o f different netwo rk system ty pes that can be
im plemented in the Matara branch and the m ain IEEE Ethernet standards that can
be used in above L AN and WLAN design .
• D iscuss the im po rtance and impact o f netwo rk to po lo g ies and netwo rk proto co l
suites while com paring the main network to po lo gies and netwo rk proto co l suites
that are used in netwo rk design using exam ples . Recomm end suitable netwo rk
topolo gies and network proto co l suites fo r above scenario and justify yo ur answer
with v alid po ints.
• D iscuss the inter -dependence o f wo rkstatio n hardware with networking so ftware and
prov ide exam ples fo r netwo rking so ftware that can be used in abov e netwo rk design.
Ac tiv ity 03
• P repare a written netwo rk design plan to meet the above mentio ned user
requirements including a blueprint drawn using a mo deling too l. ( Ex: M icroso ft Visio ,
EdrawM ax).
Support yo ur answer by pro viding the VL AN and IP subnetting scheme for the above
scenario and the list of dev ices, netwo rk com po nents and software used to design the
netwo rk for abo ve scenario and while justifying yo ur selectio ns.
• Test and ev aluate the proposed design to meet the requirem ents and analy se user
feedback by using a User feedbac k fo rm .
• Install and co nfigure Netwo rk services , devices and applications (Ex: VL AN,D HCP ,
D NS,Pro xy , Web, Etc.) acco rding to the pro posed design to accom plish the user
requirements and design a detailed M aintenance schedule for abov e Netwo rk.
*N ote: - Scr een s hots of C onfig ur ati on scri pts shoul d be pr esented.
Ac tiv ity 04
• Im plement a networked system based o n yo ur prepared design with v alid evidence s
and recommend po tential future enhancements fo r the networked system with valid
justificatio ns to yo ur recommendatio ns. Use critical reflectio n to critically evaluat e
the design, plan, co nfiguration, and testing o f yo ur network while justify ing with v alid
co nclusio ns.
P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Compare common networking principles and how protocols
enable the effectiveness of networked systems.
P3
Discuss the operating principles of networking devices and
server types.
M2
Explore a range of server types and justify the selection of a
server, considering a given scenario regarding cost and
performance optimization.
LO 1 & LO2
D1 Critically evaluate the topology protocol selected for a given
scenario to demonstrate the efficient utilisation of a networking
system.
LO3 : Design efficient networked systems
P5
Design a networked system to meet a given specification.
P6
Test and evaluate the design to meet the requirements and
analyze user feedback.
M3
P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D3
Use critical reflection to evaluate own work and justify valid
conclusions.
Thank You!!!
Networking
Networking is the exchange of information and ideas among people with common
profession or special interest, usually in an informal social setting. Networking often
begins with a single point of common ground.
Professionals use networking to expand their circles of acquaintance, find out about
job opportunities, in their fields, and increase their awareness of news and trends in
their fields or the greater world (KAGAN, n.d.)
Computer network
A computer network is a system that connects two or more computing devices for
transmitting and sharing information. Computing devices include everything from a
mobile phone to server. These devices are connected using physical wires such as
fiber optics but they can also be wireless.
A network topology is the physical and logical arrangement of nodes and connections
in a network. Nodes usually include devices such as switches, routers and software
with switch and router features. Network topologies are often represented as a graph.
Tree topology
Star topology
Advantages Disadvantages
Easier to put in. Extra hardware is required which adds to
cost.
It is very reliable. Performance is predicated on the one
concentrator hub.
It is high performing as no data collisions Requires more cable than a linear bus.
can occur.
Ring topology
Advantages Disadvantages
Minimum collisions. It is expensive.
It is cheap to install. Difficult to troubleshoot the ring.
It is cheap to expand. They were not scalable.
Easy to manage. Total dependence in on one cable
Bus topology
Alternatively referred to as line topology, bus topology is a network setup where each
computer and network device is connected to a single cable or backbone. Depending
on the type of computer network card, a coaxial cable or an RJ-45 network cable is
used to connect them together.
Advantages Disadvantages
It is less expensive. Data traffic is high.
Easy to connect. Data collision is high.
Easy to implement and extend. Used to connect 5-9 systems only.
It is flexible and scalable. Proper termination is required.
Hybrid topology combines two or more topologies. You can see in the above
architecture in such a manner that the resulting network does not exhibit one of the
standard topologies.
For example, as you can see in the above image that in an office in one department,
Star and P2P topology is used. A hybrid topology is always produced when two
different basic network topologies are connected.
Figure 5 hybrid
topology
Advantages
Disadvantages
The 802.3 standard defines the characteristics for Ethernet networks. Ethernet
networking is by far the most widely implemented form of local area networking.
Several Ethernet LAN characteristics are defined in the 802.3 standard.
The 802.11 standard specify the characteristics of wireless LAN Ethernet networks.
Under the banner of 802.11, there are four common wireless standards. These include
802.11, 802.11a, 802.11b and 802.11g. Each of these wireless standards identifies
several characteristics. Here is a review of the 802.11 wireless standards and
characteristics:
Figure 7 PAN
Advantages Disadvantages
It is portable. It is a slow data transfer.
It is reliable. It has a limited range.
It is secure. It interfaces with radio signal.
No extra space requires. It can only be used for the personal area.
Figure 8 LAN
WIDE AREA NETWORK (WAN) A wide area network is a computer network that
covers a large geographical area comprising a region, a country, a continent or even
the whole world. WAN includes the technologies to transmit data, image, audio and
video information over long distances and among different LANs and MANs. (Anon.,
n.d.)
Figure 9 WAN
METROPOLITAN AREA NETWORK (MAN) larger than a LAN but smaller than
a WAN a MAN incorporates elements of both types of networks. It connects multiple
LANs together and spans an entire geographical area such as a city or town (or
sometimes a campus). Ownership and management can be handled by a single person,
but it’s more likely done by a larger company or organization.
Figure 10
MAN
Figure 11 CAN
Advantages Disadvantages
Sharing of data is easy. Limited for connection nodes.
Economical. Maintenance is expensive.
Use a wireless connection.
Transferring files is fast.
Wide area networks is better than other types of network because WANs can
facilitate communication, the sharing of information and much more between
devices from around the world through a WAN provider. WANs can be vital for
international business, but they also essential for everyday use, as the internet is
considered the largest WAN in the world.
1. Wired Network
As well all known “wired” refers to any physical medium made up of cables.
Copper wire, twisted pair or fibre optic cables are all options. A wired network
employs wires to link devices to the internet or another network, such as
laptops or desktop PCs.
1. Physical layer
The lowest layer of the OSI reference model is the physical layer. It is
responsible for the actual physical connection between the devices. The
physical layer contains information in the form of bits. It is responsible for
transmitting individual bits from one node to the text. When receiving data,
this layer will get the signal received and convert it into 0s and 1s and send
them to the Data Link Layer, which will put the frame back together (CRAIG
FREUDENRICH, n.d.)
The data link layer is responsible for the node-to-node delivery of the
message. The main function of this layer is to make sure data transfer is error-
free from one node to another, over the physical layer. When a packet arrives
in a network, it is the responsibility of DLL to transmit it to the Host using its
MAC address (CRAIG FREUDENRICH, n.d.)
3. Network layer
Network layer works for the transmission of knowledge from one host of the
opposite located in several networks. It also takes care of packet routing i.e.,
selection of the shortest path to transmit the packet, from the amount of routes
available. The sender & receiver’s IP addresses are placed within the header
by the network layer.
4. Transport layer
Transport layer provides services to application layer and takes from network
layer. Info within the transport layer is mentioned as segments. It’s liable for
the top to finish delivery of the entire message. The transport layer also
provides the acknowledgment of the successful data transmission and re-
transmits the info if a mistake is found.
5. Session layer
6. Presentation layer
Presentation layer is additionally called the interpretation layer. The data from
the application layer is extracted here and manipulated as per the specified
format to transmit over the network.
7. Application layer
At the very top of the OSI reference modal stack of layers, we discover
application layer which is implemented by the network applications. These
applications produce the info, which has got to be transferred over the
network. This layer also is a window for the appliance services to access the
network and for displaying the received information to the user.
Network Devices
1. Switch
Figure 13 switch
Type of switches
POE switches- A network switch that uses Power over Ethernet is called a POE
Gigabit Ethernet switch. POE switches can handle continuous power and data
transfer over one network cable when linked with several additional network
devices.
Stackable switches- The network can be made simpler and more available with
the use of stackable switches. For example, you can handle all eight of your 48-
port switches as a single unit using stackable switches instead of configuring,
maintaining, and troubleshooting them separately. These eight switches would
operate as a single switch with a real stackable switch because there would be a
single SNMP/RMON agent, single Spanning Tree domain, and single CLI or
Web interface.
Characteristics of Switch
A router is a device like a switch that routes data packets based on their IP
addresses. The router is mainly a Network layer device. Routers normally connect
LANs and WANs together and have a dynamically updating routing table based on
which they make decisions on routing the data packets.
Figure 14 routers
Characteristics of Router
3. Firewall
A firewall is a network security device that monitors and filters incoming and
outgoing network traffic based on an organization’s previously established security
policies. At its most basic, a firewall is essentially the barrier that sits between a
private internet network and the public internet.
Figure 15
firewall
Types of firewalls
• Proxy firewall: This is an old type of firewall device, works as the gateway
between one Networks to another for a particular application. By blocking
direct connections from outside the network, proxy servers can add security
and other features like content caching.
• Virtual firewall: To monitor and secure traffic across physical and virtual
networks, a virtual firewall is normally given as a virtual appliance in a private
cloud (Amazon Web Services, Microsoft Azure, Google Cloud Platform, and
Oracle Cloud Infrastructure. Frequently, a virtual firewall is a crucial element
in software-defined networks.
4.Access Point
• High cost
• Inability to be used alone
• Poor stability
5.Servers
Application servers
Proxy servers act as a bridge between a host server and a client server. A proxy
sends data from a website to your computer IP address after it passes through the
proxy’s server. This practice adds a layer of security sins the information is
requested then transferred from the source to the proxy server and never directly
from a client to another user. A proxy server can filter out various harmful internet
entities. (Anon., n.d.)
Mail server
A mail server is an application that receives incoming e-mails from local users
(people within the same domain) and remote senders and forwards outgoing e-mails
for delivery. (techtarget, n.d.)
Database server
Database servers function as large storage spaces that organizations use and access
to run multiple programs to meet their needs. A database server can run
independently of any database architecture. (Anon., n.d.)
FTP servers are used to relocate files from one computer to another. Uploaded files
move from your computer to the server while downloaded files are extracted from
the server onto your device. File transfer protocol also refers to the method of using
a server to another in order to share data safely. (Anon., n.d.)
• User management
User management is the process of creating accounts for users, authenticating them
and providing access to services. It can be done on an individual level or in groups
like departments that require separate usernames and passwords depending on who’s
using it so there are no leaks from one person onto another’s account – this way
nobody has access everywhere all at once!
This is the ability to handle everything from user permissions and providing
passwords for access. This also covers enforcing security measures so only authorized
personnel can access certain computers or information.
Email is a widely used tool for communication that needs access to the Internet.
According to many businesses, staff members are assigned company-specific email
accounts, which requires them maintain an internal mail server and create messages
on behalf of their organization
The process of sending and receiving emails requires network services, which will
often include adding users as contacts, creating distribution lists, and managing email
attachments such as images, videos, and other files.
• Printing
Shared printing services are a great way for organizations of all sizes to save on
expensive equipment. All users can submit their print jobs when they need them,
without needing individual printers at each desk.
The ability to print from anywhere is a network service that can be accessed through a
web portal or application that will allow the user to send documents, images, and
other data for printing.
Servers
Figure 17
Figure 18
Figure 19
(Anon.,
n.d.)
Work station
Figure 20
(Anon., n.d.)
We need Dell precision tower 7920 workstation and PowerEdge T150 Tower Server
hardware for the Matara branch to receive data backup, control network security, store
all files in one location where authorized customers can connect to them, and increase
performance, the same brand of workstation and server should be used, in addition
application servers, FTP servers, DHCP, DNS servers, web servers and Email servers.
The network’s stability is guaranteed by the servers. It makes it possible for users to
share resources. These server types and pieces of gear will help us grow our company.
2. Client/server NOS
Network Design
The main purpose of Cisco Packet Tracer is to help students learn the principles of
networking with hands-on experience as well as develop cisco technology specific
skills. Since the protocols are implemented in software only method, this tool cannot
replace the hardware routers or switches. Interestingly, this tool does not only include
Cisco products but also many more networking devices.
Using this tool is widely encouraged as it is part of the curriculum like CCNA.
CCENT where faculties use Packet Trace to demonstrate technical concepts and
With a massive library of templates and symbols at your disposal, you can get started
with network design immediately. There are thousands of templates, which are
professionally and intuitively designed, to choose from. Edraw offers excellent file
compatibility, so you can import Visio files and export your diagrams in a range of
formats. This includes Visio, Word, PDF, HTML, JPEG, and more.
Edraw has recently released an online version, which is another major benefit,
allowing you to access the program from anywhere, on any device and on any
operating system. If you have access to the internet, Edraw is at your disposal.
This network design software facilitates collaboration by letting you share diagrams
on social media via an HTML link. Because it’s based on cloud storage, you can work
on a project at the same time as other team members, while on multiple devices. You
can access the Edraw download here, and choose between the Windows, Mac, Linux,
or web versions of the program. (Anon., n.d.)
Microsoft Visio is probably the most well known network mapping and layout
software among Business & IT professionals alike.
Key Features:
The newer versions of Visio now have added functionality that allows people to
comment on your Diagrams through either Visio itself or through a Browser (using
Sharepoint) and even goes as far as built in Instant messaging using either Microsoft
Skype for Business or Lync.
Bundled into the software are over 70 pre-built templates and thousands of Shapes,
including IT focused elements that represent Active Directory components, as well as
detailed network components and Network appliances and routes. (Parker, n.d.)
192.168.10.0 - 192.168.10.1 -
Developers 10 /26 255.255.255.192 192.168.10.63 192.168.10.62
192.168.10.65 -
Finance 20 /27 255.255.255.224 192.168.10.64 -
192.168.10.94
192.168.10.95
192.168.10.97 -
Sales and 30 /27 255.255.255.224 192.168.10.96 -
192.168.10.126
marketing 192.168.10.127
192.168.10.128 -
192.168.10.129 -
Customer 40 /27 255.255.255.240 192.168.10.143
192.168.10.142
care
192.168.10.144 - 192.168.10.145 -
255.255.255.240
HR 50 /28 192.168.10.159 192.168.10.158
Efficient level
Server responses
Overall performance
Network performance
Signature
Activity 4
Figure 25
trunking
switch port
Assigning static IP for server
Telnet Configuration
Figure 28
telnet
configurati
on
Figure 29 pasword
configuration for network
Test case 1
Tester Ruzan
Tester Ruzan
Tester Ruzan
Tester Ruzan
Figure 31
Figure 32
Figure 34
Figure 36
Figure 38
Monitoring network
✓
Data backup
✓
Review
✓
To summarize, a network is two or more computers that are linked together via a
telecommunication system in order to communicate and share resources. Syntax
Solutions would be unable to efficiently share resources and increase productivity
without a network. As you can see, networks provide numerous advantages to end
users. Networks, whether wired or wireless, are an important part of technology.
When it comes to building a network, the key factors that are considered are design,
planning, configuration, and testing. To run a successful network, the company's
requirements, such as managing employee traffic and separating the network
according to departments, must be met. The network design is the next factor to
consider; the design has a large impact on the system and is a major factor to
consider. The network design will then be configured in order to meet the
requirements of Syntax Solutions. Each module must be checked thoroughly for an
error-free network so that the devices can operate efficiently. After that, the network
must be tested before implementation. To test the network, go through each module
looking for any faults that may cause a problem. After each step is successfully
completed, the network will be implemented in Syntax Solutions as shown above.