Networking
Networking
FACULTY OF COMPUTING
STUDENT DETAILS
STUDENT ID [email protected]
UNIT NUMBER
ESTIMATED 6447
WORD LENGTH
SUBMISSION
08/09/2023
HAND IN DATE
DECLERATION AND ACKNOWLEDGEMENT
When submitting assignments, each student must sign a declaration confirming
that the work is their own.
1. I declare that:
a) this assignment is entirely my own work, except where I have included fully-
documented references to the work of others,
b) the material contained in this assignment has not previously been submitted
for any other subject at the University or any other educational institution,
except as otherwise permitted,
c) no part of this assignment or product has been submitted by me in another
(previous or current) assessment, except where appropriately referenced, and
with prior permission from the Lecturer / Tutor / Unit Coordinator for this unit.
2. I acknowledge that:
a) if required to do so, I will provide an electronic copy of this assignment to the
assessor;
b) the assessor of this assignment may, for the purpose of assessing this
assignment:
I. reproduce this assignment and provide a copy to another member of
academic staff;
II. communicate a copy of this assignment to a plagiarism checking
service such as Plagiarism Check (which may then retain a copy of this
assignment on its database for the purpose of future plagiarism
checking).
I am aware of and understand that any breaches to the Academic Code of Conduct will
be investigated and sanctioned in accordance with the College Policy.
SIGNATURE DATE
Table of Contents
1 Introduction............................................................................................................................................6
2 Network Types and their Benefits and Constraints...............................................................................7
2.1 Wired Network...............................................................................................................................7
Benefits......................................................................................................................................................7
Constraints.................................................................................................................................................7
2.2 Wireless Network...........................................................................................................................7
Benefits......................................................................................................................................................7
Constraints.................................................................................................................................................8
2.3 Hybrid Network.............................................................................................................................8
Constraints.................................................................................................................................................8
3 Network Standards and their Benefits and Constraints.......................................................................10
3.1 OSI Model....................................................................................................................................10
Application...............................................................................................................................................10
Presentation..............................................................................................................................................10
Session.....................................................................................................................................................11
Transport..................................................................................................................................................11
Network....................................................................................................................................................11
Physical....................................................................................................................................................11
3.2 TCP/IP Protocol...........................................................................................................................13
Application Layer....................................................................................................................................13
Transport layer.........................................................................................................................................13
Internet network layer..............................................................................................................................13
Network interface layer............................................................................................................................14
3.3 802. X...........................................................................................................................................15
4 Definition of Network Topology and its impact on network design...................................................15
4.1 Definition and explanation of network topology.........................................................................15
4.2 Different network design Types of Topology..............................................................................16
Constraints...............................................................................................................................................16
Constraints...............................................................................................................................................17
Constraints...............................................................................................................................................18
Constraints...............................................................................................................................................19
Constraints...............................................................................................................................................20
4.3 Communication and bandwidth requirements.............................................................................21
4.4 Recommendation for Aqua IT Solutions Branch in Butwal........................................................21
5 Networking Protocols and Effective Networked System....................................................................21
5.1 IPv4..............................................................................................................................................21
5.2 IPv6..............................................................................................................................................21
5.3 HTTPS.........................................................................................................................................22
5.4 Recommendation for Aqua IT Solutions Branch in Butwal........................................................22
6 Operating principles of networking devices and Network Server Types............................................22
6.1 Router...........................................................................................................................................23
6.2 Switches.......................................................................................................................................23
6.3 Firewalls.......................................................................................................................................25
6.4 Repeaters......................................................................................................................................25
6.5 Bridges.........................................................................................................................................26
6.6 IOT gateway.................................................................................................................................27
6.7 Domain.........................................................................................................................................27
6.8 Web..............................................................................................................................................27
6.9 File and Database servers.............................................................................................................27
6.10 Access permissions......................................................................................................................29
6.11 Recommendation for Aqua IT Solutions Branch in Butwal........................................................29
7 Workstation hardware and the relevant networking software depend on each other..........................30
7.1 Presentation........................................................................................................................................30
Constraints...............................................................................................................................................48
Evaluation of Network Performance and Scalability:...............................................................................144
Conclusion.................................................................................................................................................145
References..................................................................................................................................................145
8 Bibliography......................................................................................................................................148
1 Introduction
Brief overview of Aqua IT Solutions and the scenario
Aqua IT Solution is the well manages service IT Provider Company. For this company the job
role is to design a network for its newly open branch. We have designed the network according
their requirement of the Aqua IT Solution. Different types of hardware and software are used this
is disuses in brief.
In this activity different terms are explain briefly such as network types of topology along with
their benefit and constraint. Different types of network standard along with their benefit and
constraint. Networking hardware devices along with their working principle. Different type
network topology and their roles in effective networked system.
Objective of Report
The objective of this report is to design a network according to the Aqua IT Solution and meet
their all the requirement with the low cost and using the standard technology available in the
market. This decision may affects to performance, security, reliability, scalability, and cost of the
network.
Goals of Report
The goals of this report are to deliver the service to the Aqua IT Solution with the seamless
technology. While design the network by seeing long term vision for company we have design a
network according to added or remove the devices, easier to maintenance, monitoring, and
management. And the documentation parts help in future reference, troubleshooting and
improvement.
2 Network Types and their Benefits and Constraints
Benefits
It is high Speed, secure and accessibility.
Constraints
May effect by the physical medium.
Benefits
Faster data transfer compared to wired network and low cost to install.
Constraints
Connectivity may suffer occasionally which many cause security concern.
Slightly lower and unreliable data transfer speed and required more time to install.
https://www.amazingsupport.co.uk/wired-vs-wireless-networks-advantages-disadvantages/
Benefits
Constraints
Hybrid network is more complex to design and maintenance compare than traditional network.
It is expensive than other network due to the required more hardware and software.
Application
The application layer is a set of several protocols that network users can use to access shared
network resources such as files, printers, or web pages. It represents services that directly support
software applications for file transfer, database access and electronic mail. There are many
application layer services. For example most widely known implementations of network file
services include NFS and FTP.
Presentation
Presentation layer deals with the form in which information transmitted through the network is
represented, without changing its contents. Information transmitted by the application layer of
one system is always understandable to the application layer of other system. It also provides
data encryption a decryption, which ensures data exchange security for all application services
are also complete at this layer and provide secure efficient data transmission. An example of
such a protocol is secure socket layer (SSL) which ensures secure message exchange for
application –layer protocols of the TCP/IP stack.
Session
Session layer ensure control over interactions between parties. It registers the active parties and
provides the tools for session synchronization. It allows two applications on different computers
to establish, use and end a session. It function like establishes dialog control, regulates side
transmits.
Transport
Transport lay manage transmission packages repackages long message when necessary into
small packets for transmission. Reassembles packets in correct order to get the original message.
It also handles error recognition and recovery. Transport layer at receiving acknowledges packet
delivery. It also resend missing packets.
Network
Manages addressing/routing of data within the subnet. Addresses messages and translates logical
addresses and names into physical addresses. Determines the route from the source to the
destination computer. Manages traffic problems, such as switching, routing, and controlling the
congestion of data packets.
The network layer creates the unified transport system joining several networks, also known as
the in
Data link layer lines in the fifth in the OSI Model. Data link layer is the first layer that operates
in packet-switching model. Data link-layer protocol usually operates within a network that
represents a fragment of a larger network. Data frames are tracked by the media access control
sub layer using the MAC address of the sending and receiving hardware.
Physical
This is the lower level of OSI model. Physical deals with transmission of the byte stream using
physical links such as coaxial cable, twisted pair cable, fiber optic cable or long- distance digital
circuit. It responsible for actual physical connection between the devices. Main function of
physical layer is to flow the data between the connected devices and also defines the
transmission rate bit per second.
OSI model is most secured network protocol and scalable networking standard.
Each layer can’t work parallel; each layer must wait to receive data from the previous layer.
3.2 TCP/IP Protocol
TCP/IP protocol is name for the Transmission Control Protocols and Internet Protocols.
Application Layer
Application layer is provided by the program that uses TCP/IP for communication. An
application is a user process cooperating with another process usually on different host. For
example HTP(Hyper Text Transfer), FTP(File Transfer Protocol) and SMTP(Simple mail
transfer protocol) (Networking , 2023)
Transport layer
Transport layer provides end to end data transfer be delivering data from an application to its
remote peer. Multiple applications can be supported simultaneously. The most used transport
protocol is (Transmission Control Protocol) TCP which provide connection oriented reliable data
delivery, duplicate data suppression, congestion control and flow control.
Benefits of TCP/IP
TCP/IP model support variety of applications, protocols, and devices that can communicative
over the internet.
Constraints of TCP/IP
https://www.linkedin.com/advice/0/what-benefits-drawbacks-using-tcpip-model-over-osi
3.3 802. X
IEEE 802.X is an standardized by the Institute Of Electrical and Electronics Engineers which
define LAN technology of wired network which is widely used. It is especially used in ring
topology of the network. It works on the network interface layer. It is faster way to transmission
of data. (Networking, 2023)
Benefits
Constraints
802. X has a limited range and may be affected by the interference signal.
It has complex system as and required more hardware devices to run thus this make it expensive.
BUS Topology
Star Topology
Mesh Topology
Ring Topology
Hybrid Topology
Bus topology is set of where each computer is connected to a single network cable. It is also
called the line topology. With the help of network card, coaxial cable or RJ-45 it is used to
connect.
Benefits
It needs less cable compared than other topology. So it is most popular for small network.
Constraints
It became difficult to find the problem and if the extra node is added it will slow.
Star topology where all the computers connect with the help of central device called hub. Hub
connects all the nodes with help of wire. This cable is called a central node, and all other nodes
are connected using this central node. Usually this is popular in LAN network due to inexpensive
and easy tis install.
Benefits
Constraints
If the center device is distract the entire device is distracted.
Additional device is required (HUB or Switch) which make expensive than other topology.
Ring
Ring topology is a network design where connected device form a circular data channel. It is a
networked device is linked two or more ones by two point on circle. In this topology data is
transmitted from one computer to another computer. It is designed in the form of ring.
Benefits
Constraints
Difficult to find the problem in network.
Mesh topology where all the computers are connects to each other in a unique network design. It
is developed a P2P(point-to-point) connection between all the devices of the network. It has high
level of redundancy, if any node is fail it use alternative path to reach its destination. Two types
of mesh topology are:- Partial Mesh Topology and Full Mesh Topology
Benefits
It is robust topology.
Constraints
Installation is complex because every node is connected to every node.
Hybrid topology the central device is located to connect the entire node. By combines of two or
more topologies Hybrid topology is made. In this topology each computer is connect to the
different nodes and which is to troubleshooting process. It is easy to find fault.
Benefits
It is scalable so you can increase your network size and highly effective and flexible networking
topology.
Constraints
It has complex design
5.1 IPv4
It is the first version of internet protocol is used in the large scale. Ipv4 use the protocol are
group of 11 digit separates by period called dotted hexadecimal. Ipv4 is the fourth version of IP,
which establishes the rules for computer networks functioning on the principle of packet
exchange. Devices are uniquely identified to network through an addressing system. Even device
connect to the internet is given a IP address, like 192.168.252.76. The IPV4 utilizes a 32 bit
addressing scheme that can accommodate 2^32 address (to 4.19 billion addresses). With growing
number of internet users we are facing a depletion of IPv4 addresses.
IPv4 Features
https://community.fs.com/blog/ipv4-vs-ipv6-whats-the-difference.html
(https://techterms.com/definition/wired)
5.2 IPv6
It is the updated version of internet protocol version 6. IPv6 is being implemented to meet the
demand, for Internet addresses. It enables communication and the exchange of information to
occur through a network. IPv6 is an IP address format that consists of 128 bits allowing for a
total of 2^128 internet addresses.
IPv6 Features
1. IPv6 supports both stateless configuration options providing flexibility how devices
obtains their networks.
2. IPv6 an advanced protocol that addresses the limitations of its predecessor while offering
functionality and performance.
https://community.fs.com/blog/ipv4-vs-ipv6-whats-the-difference.html
5.3 HTTPS
HTTPS states the “Hyper Text Transfer Protocol Secure” is an update version of HTTP
(Hypertext Transfer Protocol) through which the all data communication on the web happen. It is
the main protocol to transfer data over the WWW (World Wide Web). It consists of TLS
(Transfer Layer Security) and SSL (Secure Sockets Layer).
https://www.linkedin.com/pulse/https-explained-patrick-mutabazi
Router transfers the data packet between the different networks and receives the data packet. It
finds out the fastest data path and then sends along this path. Router use “metric value” or
preference number to find out the find out fastest data path.
6.2 Switches
Switch is a multiport networking device that connects other devices through Ethernet. It is design
that can boost its efficiency and performance. Switch use packet switching technique to received,
store and forward data packet. Transmitting of data is switch is full duplex in switch. While
transmitting the data in switch it check the destination address and transmits the packet to the
correct port and also check the collision and other network error before forwarding
(GeeksforGeeks, 2023)
It is a multiport networking device which operates at the OSI model’s data connection layer. It
transmits the data using MAC address. It is essential to every network because link different in a
same network within a premises, such as pc, printer, wireless access point and servers.
6.3 Firewalls
Firewall is a network security hardware or software device which helps to restricts network
traffic within a private network. It helps to control the network security, hacking, and malware. It
creates the safety barrier between a private network and the internet network. Network security is
protect different types of protect like hacker and malware. To maintain this type of security
firewall is installed. A firewall protects a local system of a network system from all the network
based security threat while at the same time it provide access to the outside network through
WAN and internet. It is a system that is designed to prevent unauthorized access from entering a
private network by entering. The purpose is to create a safety barrier between a private network
and the internet network. Firewall is the main component to prevent this problem. (Forcepoint ,
2023)
6.4 Repeaters
Its job is to regenerate the signal over the same network before the signal became too weak or
corrupted to extend the length to which the signal can be transmitted over the same network.
Repeaters only amplify the single but regenerate it. The signal becomes weak, the copy it bit by
bit and regenerate it at its star topology connectors connecting following the original strength. It
works on a physical layer. (Network, 2023)
Repeaters pick up a signal and then amplify it, after the amplification signal get ready to be
transmitted which change the frequency of carrier. It is used to increase the signal power of the
signal and transmit it.
6.5 Bridges
Bridges operate in data link layer. Bridge is a repeater with on the functionally of filtering
content by reading the MAC address of the source and destination. It is also called the
interconnecting two LAN network on the same protocol. It has a single input and single output
port, thus making a two port. (GeeksforGeek, 2023)
Types of Bridges
1 Transparent Bridges
6.7 Domain
Domain is the group of computer which is used to share the common name and security setting.
Domain is an address use to locate computers and browse to the website. (PDQ, 2023)
https://www.techopedia.com/definition/1326/domain-networking
6.8 Web
Web server is any software application, computer or networked device that serves files to the
users as per their request. These requests are sent by client devices through HTTP or HTTPS
requests. Popular web server software includes Apache, Microsoft IIS and Nginx. (Developer,
2023)
File Server:
File Storage: It stores and manages files and documents, making them accessible to authorized users
within a network.
File Sharing: Allows multiple users to access, read, write, and share files, fostering collaboration.
Access Control: Enforces permissions and access rights to ensure data security and privacy.
Data Backup: Often includes features for regular data backups and restoration in case of data loss.
Database Server:
Data Management: Stores, organizes, and manages structured data in databases using database
management systems (DBMS) like MySQL, PostgreSQL, Oracle, or Microsoft SQL Server.
Data Retrieval: Allows users and applications to retrieve, query, and manipulate data efficiently.
Data Security: Implements user authentication, authorization, and encryption to protect sensitive data.
Scalability: Provides scalability options to handle growing data volumes and user demands.
Data Redundancy and Recovery: Often includes mechanisms for data redundancy (e.g., replication) and
recovery (e.g., backups and failover) to ensure data availability and reliability.
Business Operations: Facilitates the storage and sharing of business documents, reports, and records.
Web Applications: Supports web applications by storing and managing data such as user accounts,
product information, and transaction records.
Content Management Systems (CMS): Used as a backend for content-driven websites and applications.
Data Warehousing: Stores and manages large datasets for analytics and reporting purposes.
E-commerce: Manages product catalogs, user accounts, and transaction data for online stores.
Hardware Requirements:
File and database servers typically require robust hardware with sufficient processing power, memory,
and storage capacity to handle data-intensive tasks efficiently.
Redundancy and fault tolerance mechanisms (e.g., RAID arrays) are often employed to minimize
downtime.
Software Requirements:
File servers may run on various operating systems (e.g., Windows Server, Linux, or macOS).
Database servers require a DBMS and related software (e.g., MySQL, PostgreSQL, or Oracle).
Security Considerations:
Ensuring data security and access control is crucial for both file and database servers to protect sensitive
information.
Regular software updates and security patches are essential to mitigate vulnerabilities.
Maintenance:
Regular maintenance, including data backups, software updates, and performance tuning, is necessary to
keep the server running smoothly.
In summary, a File and Database Server is a fundamental component of modern IT infrastructure that
enables efficient data storage, management, and access control. These servers are vital for businesses and
organizations to store, share, and safeguard their data effectively.
7.1 Presentation
Conclusion
In this activity we have discuses about the network and types of networking devices in briefly.
Different terms are explained briefly such as network types of topology along with their benefit
and constraint. Different types of network standard along with their benefit and constraint. In this
activity it includes networking hardware devices along with their working principle, effective
networked system, to performance, security, reliability, scalability, and cost of the network.
Activity-2
Introduction
Aqua IT Solutions is a company that provides well-managed IT services to its clients. It provides
a service with a new technological devices and application for the general public.
They have approached us to design, implement a network solution to new branch that meets their
specific requirements. We will start through the design, comprehensive implementation plan that
will guide the deployment of the networked solution. Implementation plans we will
ensure that it will meet the entire necessary requirement for Aqua IT Solutions.
Network design
Aqua IT Solutions design a network to meet the entire requirement, which includes improved
operational efficiency, reduce cost and enhance collaboration among employees. Network design
play importance role to reduce cost, get effective network.
Implementation plan
Cisco
Cisco Packet Tracer is a software use to design networking technology use for teaching and
learning program that offers a unique combination of realistic simulation and visualization
experiences. It provides opportunities for multiuser collaboration and competition. It helps
students and teacher collaborate, solve problems and learn concepts in an engaging and dynamic
social environment. It allows students and teachers to design, build, configure, and troubleshoot
complex network using virtual equipment. It helps to teaching and learning for group , individual
, lectures etc. It supports the real world equipment with the simulating features.
Networking Hardware
Switch
Switch is a multiport networking device that connects other devices through Ethernet. It is design
that can boost its efficiency and performance. Switch use packet switching technique to received,
store and forward data packet. Transmitting of data is switch is full duplex in switch. While
transmitting the data in switch it check the destination address and transmits the packet to the
correct port and also check the collision and other network error before forwarding
It is a multiport networking device which operates at the OSI model’s data connection layer. It
transmits the data using MAC address. It is essential to every network because link different in a
same network within a premises, such as pc, printer, wireless access point and servers.
Router
Router is a device like a switch that rotes data packets based on their IP address. The router is
mainly a network layer device. Router normally connects with LAN and WAN and have a
dynamically updating routing table base which they make decision on routing the data packets.
The router divides the broadcast domains of hosts connected thorough it.
Operating Principle of Router
Router transfers the data packet between the different networks and receives the data packet. It
finds out the fastest data path and then sends along this path. Router use “metric value” or
preference number to find out the find out fastest data path.
Copper Straight-Through cable
Straight through cable is twisted pair copper wire cable for RJ-45 cable connector to having the
same pin out. In this cable it consists of one or several pairs of copper wires. These wires are
twisted through the around each other and are insulated with a dielectric polymeric compound. A
cross over cable use to connect the non-similar devices. At the end RJ connector are used to
connect.
Firewall
Firewall is a network security hardware or software device which helps to restricts network
traffic within a private network. It helps to control the network security, hacking, and malware. It
creates the safety barrier between a private network and the internet network. Network security is
protect different types of protect like hacker and malware. To maintain these type of security
firewall is installed. A firewall protects a local system of a network system from all the network
based security threat while at the same time it provide access to the outside network through
WAN and internet. It is a system that is designed to prevent unauthorized access from entering a
private network by entering. The purpose is to create a safety barrier between a private network
and the internet network. Firewall is the main component to prevent this problem.
Assistant Professor (IT), Jagan Institute of Management Studies (JIMS), Rohini, New Delhi-
110085 Affiliated to GGSIPU, Dwarka Sector-16C
Multi-Layer Switch
Multi-layer switch is a networking device that has ability to operate at higher layers of OSI
reference model. Unlike the data link layer (DDL) traditionally used by switches.
Including any network sub domains as well as the physical location of these devices within the
organization
Star Topology
Star topology where all the computers connect with the help of central device called hub. Hub
connects all the nodes with help of wire. This cable is called a central node, and all other nodes
are connected using this central node. Usually this is popular in LAN network due to inexpensive
and easy tis install.
Benefits
It is easy to find fault in the network and if one node is default other nodes are not affected.
Constraints
If the center device is distract the entire device is distracted.
Additional device is required (HUB or Switch) which make expensive than other topology.
Server Room
Figure: - Server Room
Test plan includes brief documentation in written form. It includes the performance requirement
of network and identifies the security vulnerabilities. Test plan is important to increase the
transparency, process of identifying the bug, performance issues and measure the network
parameters.
Test plan should include methodology used to test the network types of tests which was perform
and tools which was used to test.
Test approach
Test schedule
Test resources
Test deliverables
Approvals
A well-written test plan helps to ensuring the quality of network. We can identify and fix the
problem.
Ping Admin and Finance Department
The above message is send from admin department to fiancé department computer and message
is successfully send and received in finance department.
1 Introduction
3 Cisco
Cisco Packet Tracer is a software use to design networking technology use for teaching and
learning program that offers a unique combination of realistic simulation and visualization
experiences. It provides opportunities for multiuser collaboration and competition. It helps
students and teacher collaborate, solve problems and learn concepts in an engaging and dynamic
social environment. It allows students and teachers to design, build, configure, and troubleshoot
complex network using virtual equipment. Supports a variety of teaching and learning
opportunities such as lectures, group, and individual. It helps to interfacing with the real
equipment.Frequently Asked Questions (FAQs) for Cisco Packet Tracer (netacad.com)
Figure: - Cisco Packet Tracer
4 What is used
Multilayer Switch
Firewall
Server
Router
HR Department
Finance
IT Department
Admin Department
Feedback
Virtual Box
Virtual Box is a simple and cross platform for virtualization application. Virtual is a powerful
x86 and AMD64/Intel64 Virtualization product for enterprise as well as home use. It is has high
performance for enterprise customers, also the only professional solution that is freely available
as open source software under the terms of the GNU General Public License (GPL) version 3. It
supports different operating system like Windows, Linux, macOS, and supports large number of
guest operating system. In update of virtual box support list of features, supported guest
operating system and platforms it runs on. Virtual box supported by large community and their
contribute while oracle ensures the product always meets professional quality criteria. It has
many features like testing, running multiple operating system simultaneously and easy to
installation. It is has easy to back up and disaster recovery.
https://www.virtualbox.org/
https://www.virtualbox.org/manual/ch01.html#virt-why-useful
It is easy to run multiple operating system simultaneously and easy to install virtual machine. It
supports the multiple operating systems like windows, Linux, macOS.
Configuration of Virtual Box Manager
To setup virtual box Virtual Box Manager is open and configuration with it
Step-2 Click on Import Virtual Appliance and Select the IOS File
Step-3
Step-4
Step-5
Step-6
Step-7
Step-8
Step-9
Step-10
Step-11
Step-12
Step-13
Step-14
Step-15
Step-16
Step-17
Step-18
Step-19
Step-1
Step-2
Step-3
Step-4
Step-5
Step-6
Step-7
Step-8
Step-9
Step-10
Activity-4
This report shows the evolution of network design for the Aqua IT solution. This report is
prepared to meet the clear view of network design for the CEO and network administer to the
company. It includes the strength, weakness and maintenance part of the network design. For the
future it can be the roadmap for network development team.
Topology and protocols of the network ensure of efficiency for network. A correct network
topology provides the better network performance, reliability and security. For Aqua IT Solution
star topology is used because it can support large number of devices, easy to find the fault in the
network. It is centralized system which is easy to adding and removing. If the one node is fail
other nodes of the network work well and is has easy to find the problem.
Performance is the ability of analyzing and quality of the services for the network in which the
data is transmit measure from the end-user perspective. By analyzing these network metrics,
network a should be secured, scalability and economy.
The implemented network solution included several security measures to ensure the
confidentiality, integrity, and availability of network resources. These measures included the
implementation of firewalls, access controls, and encryption protocols.
The firewalls were configured to prevent unauthorized access to the network and to monitor
network traffic for suspicious activity. The access controls were used to restrict access to
network resources based on user permissions and roles. The encryption protocols were used to
ensure that data transmitted over the network was secure and protected against interception.
Overall, the network security measures implemented were effective in providing a secure
network infrastructure for Aqua IT Solution. The measures helped to prevent unauthorized
access and protect network resources from threats. (RSS, 2023)
Overall, the implemented network solution provided optimal network performance and
scalability for Aqua IT Solution. The use of virtualization technology allowed for better resource
utilization and improved scalability, while the network monitoring tools and documentation
provided ensured that the network infrastructure could be maintained and optimized over time.
(Computers & Security, 2023)
Conclusion
In conclusion, the implemented network solution for Aqua IT Solution was effective in meeting
the requirements of the company. The network topology design provided scalability, efficient
routing, and effective network segmentation, while the security measures ensured the
confidentiality, integrity, and availability of network resources. The use of virtualization
technology allowed for better resource utilization and improved scalability, while the network.
References
(2023). Retrieved from Fortinet : https://www.fortinet.com/resources/cyberglossary/wireless-network