0% found this document useful (0 votes)
271 views

Networking

This document is an assignment cover sheet for a student named Pradeep Poudel at the International School of Management and Technology. The assignment is for the unit "Aqua IT Solution Network System" and involves designing a network for the Aqua IT Solutions branch in Butwal, Nepal. The student declares that the work is their own and acknowledges the academic integrity policy. The estimated word count is 6,447 words.

Uploaded by

Abish Paudel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
271 views

Networking

This document is an assignment cover sheet for a student named Pradeep Poudel at the International School of Management and Technology. The assignment is for the unit "Aqua IT Solution Network System" and involves designing a network for the Aqua IT Solutions branch in Butwal, Nepal. The student declares that the work is their own and acknowledges the academic integrity policy. The estimated word count is 6,447 words.

Uploaded by

Abish Paudel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 151

INTERNATIONAL SCHOOL OF

MANAGEMENT AND TECHNOLOGY

FACULTY OF COMPUTING

ASSIGNMENT COVER SHEET


This form is to be completed by students submitting assignments of level 4 and level 5.
Students are required to complete all sections and attach to your assignment.

STUDENT DETAILS

STUDENT NAME Pradeep Poudel

STUDENT ID [email protected]

UNIT AND ASSIGNMENT DETAILS

UNIT TITLE Aqua IT Solution Network System

UNIT NUMBER

ASSIGNMENT Aqua IT Solution Network System


TITLE
08/09/2023
ISSUE DATE 03/07/2023 DUE DATE

ASSESSOR Siddhant Bhattarai


NAME

ESTIMATED 6447
WORD LENGTH

SUBMISSION
08/09/2023
HAND IN DATE
DECLERATION AND ACKNOWLEDGEMENT
When submitting assignments, each student must sign a declaration confirming
that the work is their own.

Plagiarism and Collusion


Plagiarism: to use or pass off as one’s own, the writings or ideas of another
without acknowledging or crediting the source from which the ideas are taken.

Collusion: submitting an assignment, project or report completed by another


person and passing it off as one’s.

In accordance with the Academic Integrity and Plagiarism Policy:

1. I declare that:
a) this assignment is entirely my own work, except where I have included fully-
documented references to the work of others,
b) the material contained in this assignment has not previously been submitted
for any other subject at the University or any other educational institution,
except as otherwise permitted,
c) no part of this assignment or product has been submitted by me in another
(previous or current) assessment, except where appropriately referenced, and
with prior permission from the Lecturer / Tutor / Unit Coordinator for this unit.

2. I acknowledge that:
a) if required to do so, I will provide an electronic copy of this assignment to the
assessor;
b) the assessor of this assignment may, for the purpose of assessing this
assignment:
I. reproduce this assignment and provide a copy to another member of
academic staff;
II. communicate a copy of this assignment to a plagiarism checking
service such as Plagiarism Check (which may then retain a copy of this
assignment on its database for the purpose of future plagiarism
checking).

I am aware of and understand that any breaches to the Academic Code of Conduct will
be investigated and sanctioned in accordance with the College Policy.

SIGNATURE DATE
Table of Contents
1 Introduction............................................................................................................................................6
2 Network Types and their Benefits and Constraints...............................................................................7
2.1 Wired Network...............................................................................................................................7
Benefits......................................................................................................................................................7
Constraints.................................................................................................................................................7
2.2 Wireless Network...........................................................................................................................7
Benefits......................................................................................................................................................7
Constraints.................................................................................................................................................8
2.3 Hybrid Network.............................................................................................................................8
Constraints.................................................................................................................................................8
3 Network Standards and their Benefits and Constraints.......................................................................10
3.1 OSI Model....................................................................................................................................10
Application...............................................................................................................................................10
Presentation..............................................................................................................................................10
Session.....................................................................................................................................................11
Transport..................................................................................................................................................11
Network....................................................................................................................................................11
Physical....................................................................................................................................................11
3.2 TCP/IP Protocol...........................................................................................................................13
Application Layer....................................................................................................................................13
Transport layer.........................................................................................................................................13
Internet network layer..............................................................................................................................13
Network interface layer............................................................................................................................14
3.3 802. X...........................................................................................................................................15
4 Definition of Network Topology and its impact on network design...................................................15
4.1 Definition and explanation of network topology.........................................................................15
4.2 Different network design Types of Topology..............................................................................16
Constraints...............................................................................................................................................16
Constraints...............................................................................................................................................17
Constraints...............................................................................................................................................18
Constraints...............................................................................................................................................19
Constraints...............................................................................................................................................20
4.3 Communication and bandwidth requirements.............................................................................21
4.4 Recommendation for Aqua IT Solutions Branch in Butwal........................................................21
5 Networking Protocols and Effective Networked System....................................................................21
5.1 IPv4..............................................................................................................................................21
5.2 IPv6..............................................................................................................................................21
5.3 HTTPS.........................................................................................................................................22
5.4 Recommendation for Aqua IT Solutions Branch in Butwal........................................................22
6 Operating principles of networking devices and Network Server Types............................................22
6.1 Router...........................................................................................................................................23
6.2 Switches.......................................................................................................................................23
6.3 Firewalls.......................................................................................................................................25
6.4 Repeaters......................................................................................................................................25
6.5 Bridges.........................................................................................................................................26
6.6 IOT gateway.................................................................................................................................27
6.7 Domain.........................................................................................................................................27
6.8 Web..............................................................................................................................................27
6.9 File and Database servers.............................................................................................................27
6.10 Access permissions......................................................................................................................29
6.11 Recommendation for Aqua IT Solutions Branch in Butwal........................................................29
7 Workstation hardware and the relevant networking software depend on each other..........................30
7.1 Presentation........................................................................................................................................30
Constraints...............................................................................................................................................48
Evaluation of Network Performance and Scalability:...............................................................................144
Conclusion.................................................................................................................................................145
References..................................................................................................................................................145
8 Bibliography......................................................................................................................................148
1 Introduction
Brief overview of Aqua IT Solutions and the scenario

Aqua IT Solution is the well manages service IT Provider Company. For this company the job
role is to design a network for its newly open branch. We have designed the network according
their requirement of the Aqua IT Solution. Different types of hardware and software are used this
is disuses in brief.

In this activity different terms are explain briefly such as network types of topology along with
their benefit and constraint. Different types of network standard along with their benefit and
constraint. Networking hardware devices along with their working principle. Different type
network topology and their roles in effective networked system.

Objective of Report

The objective of this report is to design a network according to the Aqua IT Solution and meet
their all the requirement with the low cost and using the standard technology available in the
market. This decision may affects to performance, security, reliability, scalability, and cost of the
network.

Goals of Report

The goals of this report are to deliver the service to the Aqua IT Solution with the seamless
technology. While design the network by seeing long term vision for company we have design a
network according to added or remove the devices, easier to maintenance, monitoring, and
management. And the documentation parts help in future reference, troubleshooting and
improvement.
2 Network Types and their Benefits and Constraints

2.1 Wired Network


In this medium data is transmitted through the cable. It is also known as bounded transmission
medium. For example:- Twisted pair cable, Coaxial cable and Optical fiber cable are known as
wired medium. (Business Insider, 2023)

Benefits
It is high Speed, secure and accessibility.

Used for comparatively shorter distance.

Constraints
May effect by the physical medium.

Larger infrastructure required and maintenance.

Inconvenience due to lack of mobility.

2.2 Wireless Network


In this medium data is transmitted through the different wireless devices. It is also known as
unbounded medium transmission medium. Wireless medium transmitting signal over invisible
radio wave instead of wired. For example: - Satellite communication, Microwave are known as
wireless communication (Fortinet , 2023)

Benefits
Faster data transfer compared to wired network and low cost to install.

Easy to install and maintain network as compared to wired network.

Constraints
Connectivity may suffer occasionally which many cause security concern.

Slightly lower and unreliable data transfer speed and required more time to install.

https://www.amazingsupport.co.uk/wired-vs-wireless-networks-advantages-disadvantages/

2.3 Hybrid Network


Networks which have special architecture for broadband access network and combine more than
two or different networking technology is known as hybrid network. Hybrid network is a
computer network that used special architecture for broadband access network technologies are
combined to improve bandwidth. For example a business network that is connecting both
Ethernet and WI-FI consider as the hybrid network. (Amazon , 2023)

Benefits

Reduced the single point failure and it is easy to manage

Multi path intelligence and optimized performance

Constraints
Hybrid network is more complex to design and maintenance compare than traditional network.

It is expensive than other network due to the required more hardware and software.

Required skilled manpower to handle this network because of multiple devices.


3 Network Standards and their Benefits and Constraints

3.1 OSI Model


The Open Systems Interconnection (OSI) model is a reference tool for understanding data
communications between any two networked systems. It divides the communications processes
into seven layers. Each layer both performs specific functions to support the layers above it and
offers services to the layers below it. (Learning Center, 2023)

Application
The application layer is a set of several protocols that network users can use to access shared
network resources such as files, printers, or web pages. It represents services that directly support
software applications for file transfer, database access and electronic mail. There are many
application layer services. For example most widely known implementations of network file
services include NFS and FTP.

Presentation
Presentation layer deals with the form in which information transmitted through the network is
represented, without changing its contents. Information transmitted by the application layer of
one system is always understandable to the application layer of other system. It also provides
data encryption a decryption, which ensures data exchange security for all application services
are also complete at this layer and provide secure efficient data transmission. An example of
such a protocol is secure socket layer (SSL) which ensures secure message exchange for
application –layer protocols of the TCP/IP stack.

Session
Session layer ensure control over interactions between parties. It registers the active parties and
provides the tools for session synchronization. It allows two applications on different computers
to establish, use and end a session. It function like establishes dialog control, regulates side
transmits.

Transport
Transport lay manage transmission packages repackages long message when necessary into
small packets for transmission. Reassembles packets in correct order to get the original message.
It also handles error recognition and recovery. Transport layer at receiving acknowledges packet
delivery. It also resend missing packets.

Network
Manages addressing/routing of data within the subnet. Addresses messages and translates logical
addresses and names into physical addresses. Determines the route from the source to the
destination computer. Manages traffic problems, such as switching, routing, and controlling the
congestion of data packets.

The network layer creates the unified transport system joining several networks, also known as
the in

Data link layer

Data link layer lines in the fifth in the OSI Model. Data link layer is the first layer that operates
in packet-switching model. Data link-layer protocol usually operates within a network that
represents a fragment of a larger network. Data frames are tracked by the media access control
sub layer using the MAC address of the sending and receiving hardware.

Physical
This is the lower level of OSI model. Physical deals with transmission of the byte stream using
physical links such as coaxial cable, twisted pair cable, fiber optic cable or long- distance digital
circuit. It responsible for actual physical connection between the devices. Main function of
physical layer is to flow the data between the connected devices and also defines the
transmission rate bit per second.

Benefits of OSI Model

In computer network this is considered as the standard networking model.

OSI model is most secured network protocol and scalable networking standard.

It is easier to troubleshoot and have different function of each layer.

Constrains of OSI Model

OSI Model does not define any particular protocol.

Each layer can’t work parallel; each layer must wait to receive data from the previous layer.
3.2 TCP/IP Protocol
TCP/IP protocol is name for the Transmission Control Protocols and Internet Protocols.

Figure:- TCP/IP Protocol

Application Layer
Application layer is provided by the program that uses TCP/IP for communication. An
application is a user process cooperating with another process usually on different host. For
example HTP(Hyper Text Transfer), FTP(File Transfer Protocol) and SMTP(Simple mail
transfer protocol) (Networking , 2023)

Transport layer
Transport layer provides end to end data transfer be delivering data from an application to its
remote peer. Multiple applications can be supported simultaneously. The most used transport
protocol is (Transmission Control Protocol) TCP which provide connection oriented reliable data
delivery, duplicate data suppression, congestion control and flow control.

Internet network layer


The internet network layer is also known as the internet layer or network layer provide the
“virtual network” image of internet (this layer shields the higher levels from physical layer). It is
responsible for routing data packet across the network.

Network interface layer


The network interface layer is also known as link layer or data link layer is the interface of actual
network hardware. The main work of this layer is to transfer the data packet on physical layer,
which is vary on the network, WI-FI etc.

Benefits of TCP/IP

It is compatible with the internet, which is the largest

TCP/IP model support variety of applications, protocols, and devices that can communicative
over the internet.

Constraints of TCP/IP

It is less secure and reliable than OSI model.

TCP/IP model does not support encryption, authentication, or error correction.

https://www.linkedin.com/advice/0/what-benefits-drawbacks-using-tcpip-model-over-osi
3.3 802. X
IEEE 802.X is an standardized by the Institute Of Electrical and Electronics Engineers which
define LAN technology of wired network which is widely used. It is especially used in ring
topology of the network. It works on the network interface layer. It is faster way to transmission
of data. (Networking, 2023)

Benefits

802. X supports the scalable network design according to the need.

It has high performance for data transmission.

Constraints

802. X has a limited range and may be affected by the interference signal.

It has complex system as and required more hardware devices to run thus this make it expensive.

4 Definition of Network Topology and its impact on network design


Networking topology is the arrangement for devices to connect the network. These nodes are
connect between the nodes, devices and transmission medium. Different types of networking are
listed below: (Learn Hub, 2023)

BUS Topology

Star Topology

Mesh Topology

Ring Topology

Hybrid Topology

4.1 Definition and explanation of network topology


4.2 Different network design Types of Topology
Bus

Bus topology is set of where each computer is connected to a single network cable. It is also
called the line topology. With the help of network card, coaxial cable or RJ-45 it is used to
connect.

Benefits

It is easy to setup in small network.

It needs less cable compared than other topology. So it is most popular for small network.

It is used when the network installation is small, simple or temporary.

Constraints
It became difficult to find the problem and if the extra node is added it will slow.

It is not suitable for large network .


Star Topology

Star topology where all the computers connect with the help of central device called hub. Hub
connects all the nodes with help of wire. This cable is called a central node, and all other nodes
are connected using this central node. Usually this is popular in LAN network due to inexpensive
and easy tis install.

Benefits

Reliable and robust in nature.

It is easy to find fault in the network.

Constraints
If the center device is distract the entire device is distracted.

Additional device is required (HUB or Switch) which make expensive than other topology.

Ring

Ring topology is a network design where connected device form a circular data channel. It is a
networked device is linked two or more ones by two point on circle. In this topology data is
transmitted from one computer to another computer. It is designed in the form of ring.

Benefits

Data transfer is equal to all the nodes.


Easy to setup the network.

Constraints
Difficult to find the problem in network.

If one node is disconnected whole network is effected.


Mesh

Mesh topology where all the computers are connects to each other in a unique network design. It
is developed a P2P(point-to-point) connection between all the devices of the network. It has high
level of redundancy, if any node is fail it use alternative path to reach its destination. Two types
of mesh topology are:- Partial Mesh Topology and Full Mesh Topology

Benefits

Network can extend without disrupting current users.

It is robust topology.

Every system has its privacy and security.

Constraints
Installation is complex because every node is connected to every node.

It is expensive than other topology.

It required large space to run the cable.


Hybrid Topology

Hybrid topology the central device is located to connect the entire node. By combines of two or
more topologies Hybrid topology is made. In this topology each computer is connect to the
different nodes and which is to troubleshooting process. It is easy to find fault.

Benefits

It offers the easiest method for error detecting and troubleshooting.

It is scalable so you can increase your network size and highly effective and flexible networking
topology.

Constraints
It has complex design

It is expensive as compared to other topology.


4.3 Communication and bandwidth requirements

Identifying the advantages and disadvantages of each to a network

4.4 Recommendation for Aqua IT Solutions Branch in Butwal

5 Networking Protocols and Effective Networked System

5.1 IPv4
It is the first version of internet protocol is used in the large scale. Ipv4 use the protocol are
group of 11 digit separates by period called dotted hexadecimal. Ipv4 is the fourth version of IP,
which establishes the rules for computer networks functioning on the principle of packet
exchange. Devices are uniquely identified to network through an addressing system. Even device
connect to the internet is given a IP address, like 192.168.252.76. The IPV4 utilizes a 32 bit
addressing scheme that can accommodate 2^32 address (to 4.19 billion addresses). With growing
number of internet users we are facing a depletion of IPv4 addresses.

IPv4 Features

1. IPv4 operates as a connectionless protocol enabling the establishment of virtual


connection layer across devices

2. IPv4 is already supported by millions of devices ensuring compatibility and seamless


integration across networks.

https://community.fs.com/blog/ipv4-vs-ipv6-whats-the-difference.html

(https://techterms.com/definition/wired)

Advantage and Limitation

5.2 IPv6
It is the updated version of internet protocol version 6. IPv6 is being implemented to meet the
demand, for Internet addresses. It enables communication and the exchange of information to
occur through a network. IPv6 is an IP address format that consists of 128 bits allowing for a
total of 2^128 internet addresses.

IPv6 Features

1. IPv6 supports both stateless configuration options providing flexibility how devices
obtains their networks.

2. IPv6 an advanced protocol that addresses the limitations of its predecessor while offering
functionality and performance.

https://community.fs.com/blog/ipv4-vs-ipv6-whats-the-difference.html

Advantage and Limitation

5.3 HTTPS
HTTPS states the “Hyper Text Transfer Protocol Secure” is an update version of HTTP
(Hypertext Transfer Protocol) through which the all data communication on the web happen. It is
the main protocol to transfer data over the WWW (World Wide Web). It consists of TLS
(Transfer Layer Security) and SSL (Secure Sockets Layer).

https://www.linkedin.com/pulse/https-explained-patrick-mutabazi

5.4 Recommendation for Aqua IT Solutions Branch in Butwal

6 Operating principles of networking devices and Network Server Types


6.1 Router
Router is a device like a switch that rotes data packets based on their IP address.The router is
mainly a network layer device. Router normally connects with LAN and WAN and have a
dynamically updating routing table base which they make decision on routing the data packets.
The router divides the broadcast domains of hosts connected thorough it (Lifewire , 2023).

Operating Principle of Router

Router transfers the data packet between the different networks and receives the data packet. It
finds out the fastest data path and then sends along this path. Router use “metric value” or
preference number to find out the find out fastest data path.

6.2 Switches
Switch is a multiport networking device that connects other devices through Ethernet. It is design
that can boost its efficiency and performance. Switch use packet switching technique to received,
store and forward data packet. Transmitting of data is switch is full duplex in switch. While
transmitting the data in switch it check the destination address and transmits the packet to the
correct port and also check the collision and other network error before forwarding
(GeeksforGeeks, 2023)

.Operating Principle of Switch

It is a multiport networking device which operates at the OSI model’s data connection layer. It
transmits the data using MAC address. It is essential to every network because link different in a
same network within a premises, such as pc, printer, wireless access point and servers.
6.3 Firewalls
Firewall is a network security hardware or software device which helps to restricts network
traffic within a private network. It helps to control the network security, hacking, and malware. It
creates the safety barrier between a private network and the internet network. Network security is
protect different types of protect like hacker and malware. To maintain this type of security
firewall is installed. A firewall protects a local system of a network system from all the network
based security threat while at the same time it provide access to the outside network through
WAN and internet. It is a system that is designed to prevent unauthorized access from entering a
private network by entering. The purpose is to create a safety barrier between a private network
and the internet network. Firewall is the main component to prevent this problem. (Forcepoint ,
2023)

Operating Principle of Firewalls

6.4 Repeaters
Its job is to regenerate the signal over the same network before the signal became too weak or
corrupted to extend the length to which the signal can be transmitted over the same network.
Repeaters only amplify the single but regenerate it. The signal becomes weak, the copy it bit by
bit and regenerate it at its star topology connectors connecting following the original strength. It
works on a physical layer. (Network, 2023)

Operating Principle of Repeaters

Repeaters pick up a signal and then amplify it, after the amplification signal get ready to be
transmitted which change the frequency of carrier. It is used to increase the signal power of the
signal and transmit it.

6.5 Bridges
Bridges operate in data link layer. Bridge is a repeater with on the functionally of filtering
content by reading the MAC address of the source and destination. It is also called the
interconnecting two LAN network on the same protocol. It has a single input and single output
port, thus making a two port. (GeeksforGeek, 2023)

Types of Bridges

1 Transparent Bridges

2 Source Routing Bridges


6.6 IOT gateway
A gateway is a passage to connect two networks together that may work upon different
networking models. They basically work as the messenger agent that takes data from one system
interpret it and transfer it to another system. Gateways are also called protocol converter and can
operate at any network layer. (OpenAutomationSoftware, 2023)

6.7 Domain
Domain is the group of computer which is used to share the common name and security setting.
Domain is an address use to locate computers and browse to the website. (PDQ, 2023)

For example: - https://ismt.edu.np/

https://www.techopedia.com/definition/1326/domain-networking

6.8 Web
Web server is any software application, computer or networked device that serves files to the
users as per their request. These requests are sent by client devices through HTTP or HTTPS
requests. Popular web server software includes Apache, Microsoft IIS and Nginx. (Developer,
2023)

6.9 File and Database servers


A "File and Database Server" is a type of server designed to handle and manage files and databases for an
organization or network. These servers play a crucial role in modern computing environments by
providing centralized storage, access control, and efficient data management. Here are some key aspects
and functions of a File and Database Server:

File Server:

File Storage: It stores and manages files and documents, making them accessible to authorized users
within a network.

File Sharing: Allows multiple users to access, read, write, and share files, fostering collaboration.

Access Control: Enforces permissions and access rights to ensure data security and privacy.

Data Backup: Often includes features for regular data backups and restoration in case of data loss.

Database Server:

Data Management: Stores, organizes, and manages structured data in databases using database
management systems (DBMS) like MySQL, PostgreSQL, Oracle, or Microsoft SQL Server.

Data Retrieval: Allows users and applications to retrieve, query, and manipulate data efficiently.

Data Security: Implements user authentication, authorization, and encryption to protect sensitive data.

Scalability: Provides scalability options to handle growing data volumes and user demands.

Data Redundancy and Recovery: Often includes mechanisms for data redundancy (e.g., replication) and
recovery (e.g., backups and failover) to ensure data availability and reliability.

Common Use Cases:

Business Operations: Facilitates the storage and sharing of business documents, reports, and records.

Web Applications: Supports web applications by storing and managing data such as user accounts,
product information, and transaction records.

Content Management Systems (CMS): Used as a backend for content-driven websites and applications.

Data Warehousing: Stores and manages large datasets for analytics and reporting purposes.

E-commerce: Manages product catalogs, user accounts, and transaction data for online stores.

Hardware Requirements:
File and database servers typically require robust hardware with sufficient processing power, memory,
and storage capacity to handle data-intensive tasks efficiently.

Redundancy and fault tolerance mechanisms (e.g., RAID arrays) are often employed to minimize
downtime.

Software Requirements:

File servers may run on various operating systems (e.g., Windows Server, Linux, or macOS).

Database servers require a DBMS and related software (e.g., MySQL, PostgreSQL, or Oracle).

Security Considerations:

Ensuring data security and access control is crucial for both file and database servers to protect sensitive
information.

Regular software updates and security patches are essential to mitigate vulnerabilities.

Maintenance:

Regular maintenance, including data backups, software updates, and performance tuning, is necessary to
keep the server running smoothly.

In summary, a File and Database Server is a fundamental component of modern IT infrastructure that
enables efficient data storage, management, and access control. These servers are vital for businesses and
organizations to store, share, and safeguard their data effectively.

6.10 Access permissions


It allows the permission of data transfer to determine the access to the user. It is especially designed in the
organization to control the data flow from one department to other department.

6.11 Recommendation for Aqua IT Solutions Branch in Butwal


7 Workstation hardware and the relevant networking software depend on
each other
Workstation is the hardware device which is the physical layer of the computer component
such as CPU, Mother board, RAM etc. It required the specific software to communicate with
the other network. Workstation software and hardware should be compatible to
communicate each other. If workstation software and hardware are not compatible to
communicate it will not able to connect the network. For example if the NIC card is not
compatible with the workstation it will not connect to the internet. To handle the OS the
microprocessor and hardware should be match according to the requirement. It plays the
importance in the network part. It communicates with computer over the network.

7.1 Presentation
Conclusion

In this activity we have discuses about the network and types of networking devices in briefly.
Different terms are explained briefly such as network types of topology along with their benefit
and constraint. Different types of network standard along with their benefit and constraint. In this
activity it includes networking hardware devices along with their working principle, effective
networked system, to performance, security, reliability, scalability, and cost of the network.
Activity-2

Introduction

Aqua IT Solutions is a company that provides well-managed IT services to its clients. It provides
a service with a new technological devices and application for the general public.

They have approached us to design, implement a network solution to new branch that meets their
specific requirements. We will start through the design, comprehensive implementation plan that
will guide the deployment of the networked solution. Implementation plans we will
ensure that it will meet the entire necessary requirement for Aqua IT Solutions.

Network design

Aqua IT Solutions design a network to meet the entire requirement, which includes improved
operational efficiency, reduce cost and enhance collaboration among employees. Network design
play importance role to reduce cost, get effective network.

Implementation plan

Cisco
Cisco Packet Tracer is a software use to design networking technology use for teaching and
learning program that offers a unique combination of realistic simulation and visualization
experiences. It provides opportunities for multiuser collaboration and competition. It helps
students and teacher collaborate, solve problems and learn concepts in an engaging and dynamic
social environment. It allows students and teachers to design, build, configure, and troubleshoot
complex network using virtual equipment. It helps to teaching and learning for group , individual
, lectures etc. It supports the real world equipment with the simulating features.

Frequently Asked Questions (FAQs) for Cisco Packet Tracer (netacad.com)

Figure: - Cisco Packet Tracer


Networking hardware, software, network addresses and devices and users

Networking Hardware

Switch

Switch is a multiport networking device that connects other devices through Ethernet. It is design
that can boost its efficiency and performance. Switch use packet switching technique to received,
store and forward data packet. Transmitting of data is switch is full duplex in switch. While
transmitting the data in switch it check the destination address and transmits the packet to the
correct port and also check the collision and other network error before forwarding

.Operating Principle of Switch

It is a multiport networking device which operates at the OSI model’s data connection layer. It
transmits the data using MAC address. It is essential to every network because link different in a
same network within a premises, such as pc, printer, wireless access point and servers.

Router

Router is a device like a switch that rotes data packets based on their IP address. The router is
mainly a network layer device. Router normally connects with LAN and WAN and have a
dynamically updating routing table base which they make decision on routing the data packets.
The router divides the broadcast domains of hosts connected thorough it.
Operating Principle of Router

Router transfers the data packet between the different networks and receives the data packet. It
finds out the fastest data path and then sends along this path. Router use “metric value” or
preference number to find out the find out fastest data path.
Copper Straight-Through cable

Straight through cable is twisted pair copper wire cable for RJ-45 cable connector to having the
same pin out. In this cable it consists of one or several pairs of copper wires. These wires are
twisted through the around each other and are insulated with a dielectric polymeric compound. A
cross over cable use to connect the non-similar devices. At the end RJ connector are used to
connect.

Firewall

Firewall is a network security hardware or software device which helps to restricts network
traffic within a private network. It helps to control the network security, hacking, and malware. It
creates the safety barrier between a private network and the internet network. Network security is
protect different types of protect like hacker and malware. To maintain these type of security
firewall is installed. A firewall protects a local system of a network system from all the network
based security threat while at the same time it provide access to the outside network through
WAN and internet. It is a system that is designed to prevent unauthorized access from entering a
private network by entering. The purpose is to create a safety barrier between a private network
and the internet network. Firewall is the main component to prevent this problem.

Assistant Professor (IT), Jagan Institute of Management Studies (JIMS), Rohini, New Delhi-
110085 Affiliated to GGSIPU, Dwarka Sector-16C

Multi-Layer Switch

Multi-layer switch is a networking device that has ability to operate at higher layers of OSI
reference model. Unlike the data link layer (DDL) traditionally used by switches.

Including any network sub domains as well as the physical location of these devices within the
organization

Star Topology
Star topology where all the computers connect with the help of central device called hub. Hub
connects all the nodes with help of wire. This cable is called a central node, and all other nodes
are connected using this central node. Usually this is popular in LAN network due to inexpensive
and easy tis install.

Benefits

Star topology is reliable and robust in nature.

It is easy to find fault in the network and if one node is default other nodes are not affected.

Constraints
If the center device is distract the entire device is distracted.

Additional device is required (HUB or Switch) which make expensive than other topology.

Server Room
Figure: - Server Room

Figure :- DNS Server


Figure:- DHCP Server
Figure:- Email Server
Figure:- FTP Server
IT Department
System Admin
Finance
HR Department
Multi-Layer Switch
Firewall
ISP Router
ASA3
Multilayer Switch
Test plan

Test plan includes brief documentation in written form. It includes the performance requirement
of network and identifies the security vulnerabilities. Test plan is important to increase the
transparency, process of identifying the bug, performance issues and measure the network
parameters.

Test plan should include methodology used to test the network types of tests which was perform
and tools which was used to test.

Test approach

Test schedule

Test resources

Test deliverables

Approvals

A well-written test plan helps to ensuring the quality of network. We can identify and fix the
problem.
Ping Admin and Finance Department
The above message is send from admin department to fiancé department computer and message
is successfully send and received in finance department.

Ping Admin and HR Department

Ping between Admin departments a HR department is successfully message is send.

Ping Admin and IT departments

Ping Admin and Server


Activity 3

1 Introduction

2 Configuration and implementation

3 Cisco

Cisco Packet Tracer is a software use to design networking technology use for teaching and
learning program that offers a unique combination of realistic simulation and visualization
experiences. It provides opportunities for multiuser collaboration and competition. It helps
students and teacher collaborate, solve problems and learn concepts in an engaging and dynamic
social environment. It allows students and teachers to design, build, configure, and troubleshoot
complex network using virtual equipment. Supports a variety of teaching and learning
opportunities such as lectures, group, and individual. It helps to interfacing with the real
equipment.Frequently Asked Questions (FAQs) for Cisco Packet Tracer (netacad.com)
Figure: - Cisco Packet Tracer
4 What is used

Multilayer Switch

Firewall
Server
Router
HR Department
Finance
IT Department

Admin Department

Feedback

Virtual Box

Virtual Box is a simple and cross platform for virtualization application. Virtual is a powerful
x86 and AMD64/Intel64 Virtualization product for enterprise as well as home use. It is has high
performance for enterprise customers, also the only professional solution that is freely available
as open source software under the terms of the GNU General Public License (GPL) version 3. It
supports different operating system like Windows, Linux, macOS, and supports large number of
guest operating system. In update of virtual box support list of features, supported guest
operating system and platforms it runs on. Virtual box supported by large community and their
contribute while oracle ensures the product always meets professional quality criteria. It has
many features like testing, running multiple operating system simultaneously and easy to
installation. It is has easy to back up and disaster recovery.

https://www.virtualbox.org/

https://www.virtualbox.org/manual/ch01.html#virt-why-useful

Uses of Virtual BOX

It is easy to run multiple operating system simultaneously and easy to install virtual machine. It
supports the multiple operating systems like windows, Linux, macOS.
Configuration of Virtual Box Manager

To setup virtual box Virtual Box Manager is open and configuration with it

Step-1 Open Virtual Box Manager

Step-2 Click on Import Virtual Appliance and Select the IOS File
Step-3

Step-4
Step-5

Step-6
Step-7
Step-8

Step-9
Step-10

Step-11
Step-12

Step-13
Step-14

Step-15
Step-16

Step-17
Step-18

Step-19
Step-1

Step-2
Step-3

Step-4

Step-5
Step-6

Step-7
Step-8

Step-9
Step-10
Activity-4

This report shows the evolution of network design for the Aqua IT solution. This report is
prepared to meet the clear view of network design for the CEO and network administer to the
company. It includes the strength, weakness and maintenance part of the network design. For the
future it can be the roadmap for network development team.

Topology and protocols of the network ensure of efficiency for network. A correct network
topology provides the better network performance, reliability and security. For Aqua IT Solution
star topology is used because it can support large number of devices, easy to find the fault in the
network. It is centralized system which is easy to adding and removing. If the one node is fail
other nodes of the network work well and is has easy to find the problem.

Performance is the ability of analyzing and quality of the services for the network in which the
data is transmit measure from the end-user perspective. By analyzing these network metrics,
network a should be secured, scalability and economy.

Network Performance and scalability

The implemented network solution included several security measures to ensure the
confidentiality, integrity, and availability of network resources. These measures included the
implementation of firewalls, access controls, and encryption protocols.

The firewalls were configured to prevent unauthorized access to the network and to monitor
network traffic for suspicious activity. The access controls were used to restrict access to
network resources based on user permissions and roles. The encryption protocols were used to
ensure that data transmitted over the network was secure and protected against interception.

Overall, the network security measures implemented were effective in providing a secure
network infrastructure for Aqua IT Solution. The measures helped to prevent unauthorized
access and protect network resources from threats. (RSS, 2023)

Evaluation of Network Performance and Scalability:


The implemented network solution was designed to provide optimal network performance and
scalability. The use of virtualization technology allowed for the creation of virtual machines that
were utilized to host servers and run applications. This enabled better resource utilization,
reduced hardware costs, and improved scalability.
The network performance was monitored using network monitoring tools that allowed for the
identification and resolution of any issues that affected network performance. The documentation
of the network infrastructure and configuration settings provided a useful reference for future
troubleshooting and network maintenance.

Overall, the implemented network solution provided optimal network performance and
scalability for Aqua IT Solution. The use of virtualization technology allowed for better resource
utilization and improved scalability, while the network monitoring tools and documentation
provided ensured that the network infrastructure could be maintained and optimized over time.
(Computers & Security, 2023)

Conclusion

In conclusion, the implemented network solution for Aqua IT Solution was effective in meeting
the requirements of the company. The network topology design provided scalability, efficient
routing, and effective network segmentation, while the security measures ensured the
confidentiality, integrity, and availability of network resources. The use of virtualization
technology allowed for better resource utilization and improved scalability, while the network.

References
(2023). Retrieved from Fortinet : https://www.fortinet.com/resources/cyberglossary/wireless-network

(2023). Retrieved from Amazon : https://aws.amazon.com/products/networking/hybrid-connectivity/

(2023). Retrieved from Learning Center: https://www.imperva.com/learn/application-security/osi-model/

(2023). Retrieved from Networking : https://www.techtarget.com/searchnetworking/definition/TCP-IP

(2023). Retrieved from Networking: https://www.techtarget.com/searchnetworking/reference/IEEE-802-


Wireless-Standards-Fast-Reference

(2023). Retrieved from Learn Hub: https://learn.g2.com/network-topology

(2023). Retrieved from Lifewire : https://www.lifewire.com/what-is-a-router-2618162

(2023). Retrieved from GeeksforGeeks: https://www.geeksforgeeks.org/what-is-a-network-switch-and-


how-does-it-work/

(2023). Retrieved from Forcepoint : https://www.forcepoint.com/cyber-edu/firewall


(2023). Retrieved from Network: https://www.tutorialspoint.com/what-are-repeaters-in-computer-
network

(2023). Retrieved from GeeksforGeek: https://www.geeksforgeeks.org/what-is-bridge-in-computer-


network-types-uses-functions-differences/

(2023). Retrieved from OpenAutomationSoftware: https://openautomationsoftware.com/open-


automation-systems-blog/what-is-an-iot-gateway/

(2023). Retrieved from PDQ: https://www.pdq.com/sysadmin-glossary/network-domain/

(2023). Retrieved from Developer: https://developer.mozilla.org/en-US/docs/Glossary/World_Wide_Web

(2023, 03 24). Retrieved from RSS: https://www.upguard.com/blog/network-security-assessment

(2023). Retrieved from Computers & Security:


https://www.sciencedirect.com/science/article/pii/S0167404818308952

Business Insider. (2023, 09 06). Retrieved from https://www.businessinsider.com/guides/tech/what-is-


ethernet
8 Bibliography
(2023). Retrieved from Fortinet : https://www.fortinet.com/resources/cyberglossary/wireless-network
(2023). Retrieved from Amazon : https://aws.amazon.com/products/networking/hybrid-connectivity/

(2023). Retrieved from Learning Center: https://www.imperva.com/learn/application-security/osi-model/

(2023). Retrieved from Networking : https://www.techtarget.com/searchnetworking/definition/TCP-IP

(2023). Retrieved from Networking: https://www.techtarget.com/searchnetworking/reference/IEEE-802-


Wireless-Standards-Fast-Reference

(2023). Retrieved from Learn Hub: https://learn.g2.com/network-topology

(2023). Retrieved from Lifewire : https://www.lifewire.com/what-is-a-router-2618162

(2023). Retrieved from GeeksforGeeks: https://www.geeksforgeeks.org/what-is-a-network-switch-and-


how-does-it-work/

(2023). Retrieved from Forcepoint : https://www.forcepoint.com/cyber-edu/firewall

(2023). Retrieved from Network: https://www.tutorialspoint.com/what-are-repeaters-in-computer-


network

(2023). Retrieved from GeeksforGeek: https://www.geeksforgeeks.org/what-is-bridge-in-computer-


network-types-uses-functions-differences/

(2023). Retrieved from OpenAutomationSoftware: https://openautomationsoftware.com/open-


automation-systems-blog/what-is-an-iot-gateway/

(2023). Retrieved from PDQ: https://www.pdq.com/sysadmin-glossary/network-domain/

(2023). Retrieved from Developer: https://developer.mozilla.org/en-US/docs/Glossary/World_Wide_Web

(2023, 03 24). Retrieved from RSS: https://www.upguard.com/blog/network-security-assessment

(2023). Retrieved from Computers & Security:


https://www.sciencedirect.com/science/article/pii/S0167404818308952

Business Insider. (2023, 09 06). Retrieved from https://www.businessinsider.com/guides/tech/what-is-


ethernet

You might also like