E1593583 - UNIT 2 NETWORKING New
E1593583 - UNIT 2 NETWORKING New
Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & P1 P2 M1
Distinction Descripts
* Please note that grade decisions are provisional. They are only confirmed once internal
and external moderation has taken place and grades decisions have been agreed at the
assessment board.
Assignment Feedback
Formative Feedback: Assessor to Student
Action Plan
Summative feedback
Assessor Date
signature
General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment.
Use previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
1. The font size should be 12point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment
No, and Page Number on each page. This is useful if individual sheets become
detached for any reason.
5. Use word processing application spell check and grammar check function to help editing
your assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the
body except for the before mentioned compulsory information will result in rejection of
your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as
illness, you may apply (in writing) for an extension.
8. Failure to achieve at least PASScriteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic REFERRAL.
You will then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly
using HARVARD referencing system to avoid plagiarism. You have to provide both
intext citation and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade
could be reduced to A REFERRAL or at worst you could be expelled from the course
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to
present it as my own without attributing the sources in the correct form. I further understand
what it means to copy another’s work.
[email protected] 11/09/2022
Submission format
The submission should be in the form of an individual reportwritten in a concise, formal business
style using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using
Harvard referencing system. Please also provide an end list of references using the Harvard
referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures,
although you will not be penalised for exceeding the total word limit.
Customer Care 10
Finance 25
Legal 5
HR 10
Developers 55
Network Team 5
• 192.168.10.0/24 is given and should be used for all the departments except the server room.
IPs should assign using DHCP.
• ERP and CRM Systems need to be implemented in Matara branch in local servers.
• Sales and Marketing Team need to access Network resources using WIFI connectivity.
Assume you have been appointed as the new network consultant of SYNTAX SOLUTIONS.
Prepare a network architectural design and implementit with your suggestions and recommendations
to meet the company requirements.
(Note: Clearly state your assumptions. You are allowed to design the network according to your
assumptions, but main requirements should not be violated)
Activity 01
• Discuss the benefits and constraints of different network system typesthat can be
implemented intheMatara branch and themain IEEE Ethernet standards that can be used
in above LAN and WLAN design.
• Discuss the importanceand impact of network topologies and network protocol suites
while comparing the main network topologies and network protocol suites that are used
in network design using examples.Recommend suitable network topologies and network
protocol suites for above scenario and justify your answer with valid points.
• Discuss the inter-dependence ofworkstation hardware with networking software and provide
examples for networking software that can be used in above network design.
Activity 03
• Prepare a written network design plan to meet the above mentioned user requirements including
a blueprint drawn using a modeling tool. (Ex: Microsoft Visio, EdrawMax).
Support your answer by providing the VLAN and IP subnetting scheme for the above scenario
and the list of devices, network components and software used to design the network for above
scenario and while justifying your selections.
• Test and evaluate the proposed design to meet the requirements and analyse user feedback by
using a User feedback form.
• Install and configure Network services, devices and applications (Ex: VLAN,DHCP,
DNS,Proxy, Web, Etc.) according to the proposed design to accomplish the user requirements
and design a detailed Maintenance schedule for above Network.
Activity 04
• Develop test cases and conduct verification (Ex: Ping, extended ping, trace route, telnet, SSH,
etc.) to test the above Network and analyse the test results against the expected results.
P1
Discuss the benefits and constraints of different network types and
standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Compare common networking principles and how protocols enable
the effectiveness of networked systems.
P3
Discuss the operating principles of networking devices and server
types.
P4
Discuss the inter-dependence of workstation hardware with relevant
networking software.
LO 1 &LO2
D1 Critically evaluate the topology protocol selected for a given
scenario to demonstrate the efficient utilisation of a networking
system.
LO3 : Design efficient networked systems
P5
Design a networked system to meet a given specification.
P6
Test and evaluate the design to meet the requirements and analyze
user feedback.
M3
Install and configure network services and applications on your
choice.
D2
Design a maintenance schedule to support the networked system.
P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked systems.
D3
Use critical reflection to evaluate own work and justify valid
conclusions.
Contents
ACKNOWLEDGEMENT........................................................................................................................................................................................20
Activity 1...................................................................................................................................................................................................................21
Scenario.....................................................................................................................................................................................................................21
Computer Network....................................................................................................................................................................................................21
Introduction to network.............................................................................................................................................................................................22
I would like to express my special thanks of gratitude to all the individuals, and I would like to extend my sincere thanks to all of them. Specially
Our Networking lecture Mr. Sudesh for giving us the motivation and providing us with all the requirements and information that we needed to
complete the assignment and helped me in completion of this assignment without any barriers.
THANK YOU…
Scenario
A famous privately held tech company, SYNTAX SOLUTIONS, has chosen to construct a company, three-story structure in Matara. The 152
workers of the Matara branch are splatted into 7 departments. Customer care, sales and marketing, economics, legal, human resources, and
network team departments in general. There is one server room here, and I can propose three. A respected privately held technology firm,
SYNTAX SOLUTIONS, has chosen to construct a product, three-story tower in Matara. The 152 employees of the Matara branch are splatted
into 7 departments. Client service, sales and marketing, economics, legal, human resources, and network team departments in general. I can offer
3 major servers for them as they operate a server room.
A computer network can be simply defined as the joining of two or more linked computers that allows the sharing of files, resources, and
communication. It can also be described as a group of computers sharing resources that are offered by or available on network nodes. The
computers connect with one another by digital connections implementing specified communication protocols. These connections are made up
of telecommunication network technologies, which could be arranged in a range of network topologies and are based on physically linked,
optical, and wireless server means. The type of network varies based on the number of devices as well as the location they are located, and the
distance separated there are from one another. (TECH TARGET)
Introduction to network
An important technological advance transpired in 1936 only with release of the first computer. But this needed until years later, in 1969, for the
first-ever computer-to-computer link to really be established. This innovation acted as the eventual spark for the Internet-driven world in which
we now live.
Government researchers utilized the Internet in the 1960s as a method for data transmission. In the 1960s, computers were big and static, and to
get to the information they carried, one had either drive to the address of the computer or have magnetic computer tapes sent through the
ordinary mail system.
❖ Reliability: -
Reliability advanced knowledge backup. Another copy of the same information is available on another workstation for future use in the
case that such PC becomes compromised or unavailable because of equipment failure, crashes, etc., providing for uninterrupted
operation.
❖ Insufficient independence: -
❖ Expense of Network: –
The equipment and cabling necessary to set up the system could be costly.
Types of networks
We will explain about network types and the three main varieties of networks: LAN, MAN, and WAN. Computers can connect and
communicate with each other via any type of network because to the network.
A PAN can work over cable interfaces like USB or wirelessly. A wireless personal area network (WPAN) is a PAN which uses a less powerful,
summary wireless network technology, including IrDA, Wireless USB, Bluetooth, or ZigBee (WPAN). The range of a WPAN may vary
between a few millimeters and a few meters. WPANs designed for low-power sensor operation are also referred to as low-powered personal
area networks (LPPAN) to identify the processes themselves from low-power wide-area networks (LPWAN). (CLOUD FLARE)
By using wired personal area networks, devices are able short connections with each other. Technology examples include IEEE-1394,
Thunderbolt, and USB.
A wireless personal area network (WPAN) is a personal area network (PAN) with wireless connectivity (WPAN). IEEE 802.15 had developed
standards for a variety of PANs, including Bluetooth, using the ISM band. The Infrared Data Association have developed a standard for WPANs
that are using infrared communications (IrDA). A wireless personal area network (WPAN) is a personal area network (PAN) with wireless
(eTutorials.org )
Positive Aspects: -
Harmful Aspects: -
❖ This range with PAN is restricted.
❖ The gadgets are incompatible
❖ Infrared signals can only be followed in straight lines.
❖ Data transfer is laggy.
❖ It is only suitable for employment in the private domain.
❖ It connects with rf signals.
❖ It still only operates in the few various scenarios.
Ethernet and Wi-Fi are the two most broadly applied technologies for local area networks. Token Ring, AppleTalk, and ARCNET are among
the earlier network technologies.
Ethernet cables are linked to hubs, switches, and routers via their RJ45 ports. Thanks to LAN technology, communication efficiency has
significantly increased. (CISCO)
Figure 3 LAN
(IT Release)
A LAN cable, then, is a cable that connects computers to network switches, and from the switch, it connects to a router, modem, or DSL, that is
what powers your internet from an internet service provider.
Types of Cable:
❖ coaxial Cable
❖ twisted pair Cable
❖ fiber-optic cable
RJ45Connector:
Foil or mesh is applied to hold twisted pair cables that have been shielded from electromagnetic interference (STP). Ethernet cables which are
swift, and gigabit indicate this. And these are some of the distinctions among Fast and Gigabit Ethernet. Foil or mesh is used to contain twisted
100 Mbps is the largest achievable fast Ethernet speed. GBPS is the high rate of gigabit Ethernet.
A set of co - located computers or other devices that form a network based on radio transmissions rather than wired connections is called as a
wireless local-area network (WLAN). (CISCO)
Positive Aspects
❖ Workstations can indeed be joined to or discarded more simply.
❖ You'll even transfer a workstation while maintaining connectivity.
❖ Because that minimizes the demand for physical connections, WLAN is a flexible form of communication.
❖ It's a dependable communication tool.
❖ Because of the confined coverage region, the price is high. ❖ WLAN significantly lowers the level of ownership.
Harmful Aspects
❖ Thunder or rain may make it hard to connect.
❖ There isn't a large amount of space to hide.
❖ Low security enables it for attackers to monitor the sent data.
❖ WLAN uses frequency, which could interfere with other devices that use frequency.
❖ WLAN needs a license.
❖ As there are more connected devices, the data transfer rate reduces.
(JAVAT POINT)
❖ There is a security risk and a setup that makes management difficult due to the multiple LANs that are linked and the size of them.
❖ The construction of the MAN network over a normal phone copper line is not practical due to the low speed that would result. We must
therefore build fiber optics, which is costly to build the first time, if we want high speed.
❖ There is a security concern due to the large number of LANs connected and their size, and the configuration making management
difficult.
❖ MAN networks are more susceptible to stolen by hackers that LAN networks, which raises the risk that our data will be exposed. To
secure data, we need highly trained staff and security equipment.
A wide-area network (WAN) is, its most basic form, a set of networked local-area networks (LANs) or other networks. The Internet is
the largest WAN in the world, and a WAN is essentially a network of networks. A wide-area network (WAN) is, in the most basic
form, a collection of linked local-area networks (LANs) or other networks. The Internet is the most powerful WAN in the world, as well
as a WAN is essentially a network of networks. (CISCO)
Figure 6 WAN
Through publications, conferences, and collaborations with academic institutions, IEEE primarily develops new electronic goods and
services, creates the standards that govern them, and disseminates, publishes, and promotes industry information. Electrical, electronics,
computer engineering, computer science, information technology, and most of their associated fields are the primary areas of interest for
IEEE. Main types of Networking standards
IEEE 802
Wireless IEEE 802 requirements. IEEE 802 is a set of networking standards that includes the requirements for the physical and data-link layers
of technologies such Ethernet and wireless. Local area networks (LANs) and metropolitan area networks must conform to these standards
(MAN).
Network Topologies
The physical and logical structure of a network's links and nodes is known as its topology. Devices like switches, routers, and software with
switch and router features are usually included in nodes.
Bus Topologies
Bus topology, usually called direct topology, is a type of network topology in which each device is connected to the network by an unique
coaxial or RJ-45 network wire. The single RJ-45 network cable or coaxial cable which unites all of the network's devices is referred to as the
bus, backbone, or trunk. Bus topology, also known as line topology, is a type of network topology in which all devices are connected to each
other.
Hybrid Topology
Mesh topology, bus topology, and ring topology are just a few types of network topologies that can be combined to form a hybrid topology. Its
deployment and requirements, such as the desired network's performance, the number of computers, and their location, affect its use and
selection. The structure of a hybrid topology, typically includes various topology, appears in the picture below.
A type of networking named mesh topology includes connecting every computer with every other computer. The connections between devices
occur at random in mesh topology. Computers, switches, hubs, or any other kind of device could be one of the connected nodes. Even if one of
the connections in this topology breaks, it still allows the spread of other nodes. There is no hierarchy, no interdependency, and no consistent
pattern between nodes in this form of topology, which is also very expensive. The mesh topology's connections are not any easier to set.
Types Of MeshTopology:-
1. Fully Connected Mesh topology
2. Partially Connected mesh Topology
Each node in a total mesh network topology has a direct connection to every other node. Just those nodes in a partial mesh topology have deep
links to one another. A node often needs to pass through another node to reach a third node. A full mesh network contains deep links among
each node.
(AFTERACADEMY)
Network Protocols
An established set of standards that control how data is exchanged between various devices connected to the network is known as a network
protocol. In short, it enables linked devices to communicate with one another despite any variations in their inner operations, organizational, or
appearances.
Models
The seven levels that computer systems employ to interact over a network are described by the Open Systems Interconnection (OSI) model.
Early in the 1980s, all significant computer and telecommunications businesses accepted it as the first industry standard for network
communications.
The simplified TCP/IP model, rather than OSI, is the foundation of the modern Internet. The OSI 7-layer model is still extensively used,
nevertheless, as it aids in both isolating and troubleshooting networking issues as well as helping to depict and convey how networks function.
OSI was first presented in 1983 by executives from the biggest computer and telecom firms, and it was accepted as an international standard in
1984 by ISO. (IMPERVA, n.d.)
The physical layer oversees the wired or wireless connections that physically connect network nodes. In addition to defining the
connector, the electrical cable or wireless technology connecting the devices, it oversees bit rate regulation and the transmission of raw
data, which is just a stream of 0s and 1s.
The data link layer creates and breaks connections between two network nodes that are physically close to one another. Frames are
created from packets, which are then sent from destination to source. This layer is made up of two components: Media Access Control
(MAC), which utilizes MAC addresses to connect devices and specifies permissions to transmit and receive data, and Logic Link
Control (LLC), which identifies network protocols, does error checking, and synchronizes frames.
3. NETWORK LAYER
The network layer serves two primary purposes. One is dividing segments to network packets, which are then put back together at the
other end. The alternative method of packet routing involves finding the optimum route through a physical network. To route packets to
a destination node, the network layer needs network addresses, which are commonly Internet Protocol addresses.
4. TRANSPORT LAYER
Data transferred in the session layer is divided into "segments" by the transport layer at the receiving end. On the receiving end, it is in
charge of putting the segments back together in order to create data that the session layer may use. The transport layer performs error
control, which determines whether data was received wrongly and, if not, requests it again, as well as flow control, which sends data at
a pace that fits the connection speed of the receiving device.
5. SESSION LAYER
The session layer establishes sessions, or channels of communication, between devices. It oversees starting sessions, making sure they
are active and open when data is being exchanged, and shutting them down once communication is complete. The session layer can also
establish checkpoints throughout a data transmission, allowing devices to pick up where they left off if the session is terminated.
6. PRESENTATION LAYER
7. APPLICATION LAYER
End-user applications like web browsers and email clients operate at the application layer. It offers protocols that let computer programs
transmit and receive data and give consumers useful information. The Hypertext Transfer Protocol (HTTP), File Transfer Protocol
(FTP), Post Office Protocol (POP), Simple Mail Transfer Protocol (SMTP), and Domain Name System are a few examples of
application layer protocols (DNS). (IMPERVA, n.d.)
TCP/IP is a common term for the overall IP suite, a group of protocols. Although there are other protocols in the suite, TCP and IP are the two
more popular. The TCP/IP protocol suite serves as an abstraction layer between the routing and switching fabric and internet applications.
Qualities Of TCP/IP
TCP provides dependability and guarantees that out-of-order data will be placed back in order.
Supporting from a flexible TCP/IP architecture; allows for ease of adding new equipment to a
network As TCP offers flow control, a sender can never send too much data to a recipient. TCP is a
connection-oriented protocol.
Table 2 TCP/IP
The OSI model uses the two distinct levels of physical and data TCP/IP simply employ one layer (link).
connectivity to explain how the lowest layers behave.
By default, the OSI model is universal. In other words, it enjoys the support of various hardware suppliers. It is used by most computer
networks as their default model. The levels of the OSI model are clearly separate from one another. Changes made to one layer therefore have
no effect on the other. It is quite adaptable as it can be used with both connection-oriented and connectionless services. The separation of the
layers in the OSI model facilitates troubleshooting. By examining each tier, packet prioritization may be better able to determine the problem in
the case of a failure. Since the complete network is evaluated, no time is lost.
I chose the hybrid topology largely because I can combine the star, bus, ring, mesh, and tree topologies into one topology. Because I can build a
network according to the client's choices and needs, this may be the most practical option. As a result, developing my network will be without
challenges.
The final factor that affects my decision is how stable and scalable hybrid topology is. Additionally, the speed of the network greatly rises as a
result of combinations of topologies.
This fact that I can quickly identify and fix issues after building my network is yet another reason, I chose hybrid topology.
Network Devices
Network devices are real tangible things that link computers, printers, fax machines, and other electronic devices to a network. These devices
quickly, securely, and reliably transfer data over the same or separate networks. Wireless router can be either intra- or mutually. A NIC card or
RJ45 connection is an installed device, whereas a router, switch, or other network device is a network component. Let's take a closer look at a
few of these tools.
The below are a few examples of the various network device kinds that can be found in systems.
.
❖ Hub
❖ Switch
❖ Router
❖ Bridge
❖ Gateway
❖ Modem
❖ Repeater
❖ Access Point
Router
A network router is a form of network equipment that is used in computer systems to route traffic from one network to another. These two
networks could be personal or belong to a corporation that is publicly traded. By directing various traffic networks in different directions, a
router, for instance, serves as a traffic cop at a junction.
Figure 12Router
(India Mart)
Positive and Harmful Aspects of Router
It may choose the most efficient route through the internetwork Over a bridge or repeater, a router is more costly.
using dynamic routing algorithms. are computer systems
It offers full routing, flow management, and traffic isolation The router is slower than a bridge or repeater as it has to monitor
services. data transit from the physical to the network layer.
The network manager can set policies based on routing settings Only routable network protocols work with routers; not all network
because they are reprogrammable. protocols are routable.
To save network traffic, create broadcast domains. Need several initial settings on occasion.
Table 4 ASPECTS OF ROUTER
Switch
A router enables you to share a single IP address among many network devices, whereas a network switch connect various devices and
networks to expand the LAN. In plainer terms, the router allows connections between networks while the Ethernet switch generates new
networks. A router enables you to share a single IP address among several network devices, whereas a network switch connects various devices
and networks to expand the LAN. In plainer terms, the router enables connections between networks while the Ethernet switch creates new
networks.
(Infinity-Cable)
Permit many chats to happen at once. Design and configuration should be done right in order to handle
multicast packets.
Logical segmentation is made clearer by supporting VLANs. It may be difficult to identify the cause of a network connectivity
problem while utilizing a switch
The variety of broadcast domains has decreased. High cost
It can map ports to MAPs and used the CAM table. Even when having a small broadcast, they are not as efficient as
routers.
A modem is a device that links your home to your Internet service provider (ISP), such as Xfinity, generally over a coax cable connection. The
modem turns signals from your ISP into signals that may be used by your local devices and the other way around.
Figure 14Modem
(Science ABC)
A WLAN, or wireless local area network, is formed by an access point, typically in an office or big building. An access point transmits a WiFi
signal to a defined region after joining via an Ethernet cable to a wired router, switch, or hub.
A firewall isolates secured internal networks from external, uncontrolled networks like the Internet.
Better privacy and security are ensured Depending on the degree of expertise needed, installing a firewall
could be expensive.
A firewall prevents hackers and remote access. For firewall maintenance and upgrades, extra employees and
resources are required.
Table 8 Firewall
Sever
Figure 17Server
The request-response pattern, when a client submits a request to the server, is the one utilized to create client-server systems most frequently. In
this model, the server does some action and then gives the client a response, usually with a finish or an acknowledgement. A computer is
specialized for operating servers when it is known to as server-class hardware. This means that it is more powerful and dependable than regular
personal computers. Large computing clusters, however, can be built from a variety of cheap, easily replaced server parts.
Application Server
Users on the network will run and use web apps (software that works inside a web browser) on these servers while having to put a copy of it on
their own devices. These servers don't have to be linked to the Internet. Web-enabled PCs function as their clients.
Communication Server
These servers keep up the environment need for one communication endpoint to identify and then communicate with other endpoints.
Depending on the network's openness and security configurations, these servers may or may not include a directory of communication
endpoints and a presence detection service. Their users are points of communication.
Database Server
Catalog Server
These servers keep a table of contents or index of the information that is distributed across a large, distributed network. Computers, users, files
shared via file servers, and web apps all can be part of a distributed network. Directory servers and name servers are a few examples of catalog
servers. Any computer program that must search the network is one of their clients. An email client seeking for an email address, a user looking
for a file, or a Domain member trying to log in are a few instances.
Game Server
Many Personal computers or video game consoles will play multiplayer games according to these servers. Their clientele are personal computers
or gaming consoles.
Computer Server
Over a network, these servers share a large amount of computing resources, such as CPU and random-access memory. These kinds of servers
may be used by any computer program that needs more CPU and RAM than a single computer is verified closely to provide. To implement the
client-server model, which is important, the client must be a networked computer.
Servers
Processer - Intel® Xeon® Silver 4310 2.1G, 12C/24T, 10.4GT/s, 18M Cache, Turbo, HT (120W) DDR4-2666
Hard Drive - 2TB Hard Drive SATA 6Gbps 7.2K 512n 3.5in Hot-Plug
Network Interface: 2/4-port 1GbE LOM; 2/4-port 10GbE LOM (Base-T or SFP+); 1x dedicated 1GbE management port
Power (Energy Star 2.0 compliant): 2x hot swap/redundant: 550W/750W/1100W/1600W 80 PLUS Platinum; or 750W 80 PLUS Titanium; or
48V DC 80 PLUS Platinum
Operating Systems Supported: Microsoft, Red Hat, SUSE, VMware. Visit lenovopress.com/osig for details.
Figure 19 Lenovo
Workstation
Operating System: Windows 10 Pro 64 for Workstation is installed on Windows 11 Pro 64 for Workstation and Windows 11 Pro 64 for
Workstations through downgrade rights.
Memory: Supports both RDIMM and LRDIMM, up to 1 TB DDR4 2933MHz MHz, 16 DIMMs, and 64 GB DIMM capacity.
NVIDIA® RTXTM A5500 24GB, NVIDIA® RTXTM A6000 48GB, and NVIDIA® Quadro® GV100 32GB are the graphics devices.
Up to Dual Intel® Platinum, Gold, and Silver Processor (up to 28 cores, up to 4.4GHz per CPU)
Recommended servers
We install DELL PowerEdge R550 Rack Server and Tower workstation ThinkStation P920 Workstation hardware and applications
server software, DHCP server, File Transfer Protocol server, Email server, DNS server, and WEBServer for the Matara branch so
that we can manage network security and get data backup. We can hold all files in one location so that any authorized user can access
Auvik: -
For Managed Service Providers (MSPs), Auvik is a simple cloud-based network monitoring tool that also includes a complete set of network
control features like IPAM or configuration management.
Zabbix: -
As they claim, Zabbix is an open-source infrastructure tracking system that is capable of monitoring anything. Zabbix is an excellent
option for expensive goods if you are preparing for the heavy configuration effort that comes with open-source monitoring software.
Checkmk: -
Operating on both Linux and Windows, Checkmk is a full IT infrastructure and application monitoring solution. It is supplied as a
subscriptionbased Enterprise edition or an open-source Raw edition.
In a few minutes, a single package can be used to set up the basic monitoring tool. The auto-discovery feature looks for devices and services on
your network and sets up the initial monitoring for you automatically.
Network, synthetic, and real user monitoring, as well as log and application performance management, too are elements of the SaaS-based
monitoring platform Datadog.
ManageEngine OpManager
ManageEngine Zoho Corporation's OpManager is an effective monitoring tool. The instruments focus on infrastructure monitoring and offers
all the features needed for monitoring various network metrics and parameters. Identical to PRTG, it provides iOS and Android mobile apps for
network scanning and simple troubleshooting.
Network Operating OS
An operating system for computers known as a "network operating system" (NOS) is primarily designed to operate workstations, personal
computers, and often older terminals that are linked together over a local area network (LAN). A NOS's supporting software allows resource
sharing and interaction between multiple routers.
A NOS's usual hardware system consisting of several personal computers, a printer, a server, and file servers that are linked by a local network.
The NOS's job is to then offer basic network services and features that handle numerous input requests concurrently in a multiuser
environment.
Microsoft Windows
Apple macOS
Apple's macOS goes head-to-head with Microsoft Windows. Both macOS and Windows are instances of proprietary operating systems, that
denote that the company created, developed, and is currently offering its own OS. They are created and marketed by the businesses; users are
not allowed to meddle with or modify them. The exclusive macOS and OS X operating systems, the first of which was released 20 years ago,
power Apple and Macintosh computers. There are also previous iterations or updates, such as:
3.1
Network Scheme
Figure 21 HP Laptop
Figure 22EDraw
Software
Feedback Form
NAME
TASK
EXCELLENT GOOD WEAK
3.3
Assigning Switchport
VLAN Output
DHCP Configuration
DHCP Output
Enable Password
Figure 35 wireshark 4
An organization's networked maintenance tasks schedule is required. The network needs to be supported and maintained according to
plan to combat risks and failures. Additionally, this will help to maintain and enhance the network in an effective and efficient manner.
Windows Update
Monitoring network
Activity 4
NETWORK SCHEME
Author applied the MESH topology for this network, which not allows for a single point of failure. Additionally, a successful network
can send data through other ports (can discover alternative methods to transfer data) and will not be negatively impacted if one trunk
port goes down under any situation. In this company there are 7 departments so we have segregated this network in to 7 so between
department they can communicate.
Using biometrics devices. It will secure company data or if unauthorised persons accessed devices, he can be a big threat for the company,
prevent from this for the security purpose we can use biometric devices.
We can use cloud backup because of this we can access our data anytime, anywhere it’s also providing a faster transition so we can organise a
remote workspace. Physical damages can’t be done for an example natural disaster so Using cloud backup offers advanced online security.
A unique network should be set up exclusively for the visitor. To avoid this, it is preferable to establish a separate network for the visitors, so
that they may access the internet as they please and the business materials and data can also be secured. The guests who visit our company will
Utilizing biometric tools, we can utilize biometric devices for security purposes to prevent unauthorized individuals from accessing equipment
and gaining access to company data, which could constitute a serious threat to the business.
One option is cloud backup. As a result, we have access to our data from anywhere at any time, and it makes setting up a remote workstation
easier. Because physical damages from a natural disaster, for instance, cannot be repaired, using cloud backup provides superior online
protection.
Conclusions
The network design process begins with acquiring consumer information, and in want to do so, we must engage with the client. Effective
contact with the client enables the assessment of customer requirements.
Some faults were found after testing, but once they were fixed, the network satisfied users and met all SYNTAX Extreme urgency.
DHCP is used to assign IP address. Access point has been created to access WIFI by Sales and Management to meet client requirements. This
network has gone through many errors and has been fixed several times meeting the client requirements of SYNTAX SOLUTION.
The LAN network design of the SYNTAX SOLUTIONS Matara branch is a successful design since it satisfies the needs of users and clients
and fulfils all requirements, such as separating the 7 departments and implementing appropriate security measures.
Mesh topology is the network topology that was employed in the design. Planning for configuration and cable management was difficult, but it
was eventually successful after several attempts. Mesh topology is the ideal topology because it maintains high redundancy and prevents single
points of failure.
Many faults were found during testing, but once they were fixed, the network satisfied users and met all SYNTAX SOLUTION requirements.