0% found this document useful (0 votes)
467 views

Network - Assignment 0001 (1) 1

Network assignment

Uploaded by

Malshi Dilinika
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
467 views

Network - Assignment 0001 (1) 1

Network assignment

Uploaded by

Malshi Dilinika
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 58

INTERNAL VERIFICATION – ASSIGNMENT BRIEF

Programme Title: HND in Computing

Assessor Name: G.Malshi Dilinika

Internal Verifier Name: Mr.Sahan de Silva

Unit or Component Number


Unit 02 - Networking
and Title:

Assignment title: LAN Design & Implementation for Alliance Health

Assessment criteria targeted


LO1, LO2, LO3, LO4
by this assignment brief:

Is this an Authorised N/A


Assignment Brief published
by Pearson? If so, has it been
amended by the Assessor in
any way? Please give details.
(If using the Authorised
Assignment Brief ‘off the shelf’
with no amendments, please
answer the question marked *
in the checklist only)

Has this assignment been Yes No


submitted to the Assignment
Checking Service?
(If Yes, please keep a copy of the
ACS feedback with this form)

INTERNAL VERIFIER CHECKLIST Y/N

Are the programme and unit details accurate? Y

*Are clear deadlines for assessment given? TBC

Is the time frame of an appropriate duration? Y


Is there a suitable vocational scenario or context? Y

Are the assessment criteria to be addressed stated accurately? Y

Does each task show which criteria are being addressed? Y

Do the tasks meet the assessment requirements of the unit/s? Y

Is it clear what evidence the learner needs to generate? Y

Is it likely to generate evidence that is valid and sufficient? Y

Overall, is the Assignment fit for purpose? Yes No

*If ‘No’ is recorded the Internal Verifier must recommend actions detailing the issues to be
addressed. The Assessor and the Internal Verifier must then confirm that the action has been
undertaken and that the Assignment Brief is authorised for use before being issued to learners.
Action required: Target Date Date
for Action
(If none then please state n/a) Completion Completed

General Comments (if appropriate)

Assignment Brief Authorised for Use:

Internal Verifier signature Date

Assessor signature
Date

Lead Internal Verifier


Date
signature (if appropriate)
Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)

INTERNAL VERIFICATION – ASSESSMENT DECISIONS


Programme title BTEC Higher National Diploma in Computing
Mr.Tharindu Wijethilake Mr.Sahan de Silva
Assessor Internal
Verifier
Unit 02: Networking
Unit(s)
LAN Design & Implementation for Alliance Health
Assignment title
G.Malshi Dilinika
Student’s name
List which assessment Pass Merit Distinction
criteria the Assessor has
awarded.
INTERNAL VERIFIER CHECKLIST
Do the assessment criteria awarded
match those shown in the assignment
brief?
Y/N
Is the Pass/Merit/Distinction grade
awarded justified by the assessor’s
Y/N
comments on the student work?
Has the work been assessed
accurately?
Y/N
Is the feedback to the student:
Give details:
• Constructive?

• Linked to relevant assessment criteria? Y/N


• Identifying opportunities for improved Y/N
performance?
Y/N
• Agreeing actions?

Y/N
Does the assessment decision need
amending?
Y/N

Assessor signature Date

Internal Verifier signature Date


Programme Leader signature (if
required)
Date

Confirm action completed


Remedial action
taken
Give details:

Assessor signature Date


Internal Verifier
signature
Date
Programme Leader
signature (if
Date
required)
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID G.Malshi Dilinika
Unit Title Unit 02: Networking
Assignment 1 Assessor Mr.Tharindu
Number Wijethilake
2024/04/23 Date Received 1st
submission
Submission Date
Date Received
2nd submission
Re-submission
Date

Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & P1 P2 M1 D1
Distinction Descripts

LO2 Explain networking devices and operations.


Pass, Merit & P3 P4 M2
Distinction Descripts

LO3 Design efficient networked systems.


Pass, Merit & P5 P6 M3 D2
Distinction Descripts

LO4 Implement and diagnose networked systems.


Pass, Merit & P7 P8 M4
Distinction Descripts
Grade: Assessor Signature: Date:
Resubmission Feedback:

Grade: Assessor Signature: Date:


Internal Verifier’s Comments:

Signature & Date:

* Please note that grade decisions are provisional. They are only confirmed once internal and
external moderation has taken place and grades decisions have been agreed at the assessment
board.

Assignment Feedback
Formative Feedback: Assessor to Student

Action Plan

Summative feedback
Feedback: Student to Assessor

Assessor Date
signature

Student signature Date

Pearson Higher Nationals in


Computing
Unit 02: Networking
Assignment 01

General Guidelines

1. A Cover page or title page – You should always attach a title page to your assignment.
Use previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
Word Processing Rules

1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment
No, and Page Number on each page. This is useful if individual sheets become
detached for any reason.
5. Use word processing application spell check and grammar check function to help editing
your assignment.
Important Points:

1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the
body except for the before mentioned compulsory information will result in rejection of
your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as
illness, you may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL.
You will then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text
citation and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade
could be reduced to A REFERRAL or at worst you could be expelled from the course
Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to
present it as my own without attributing the sources in the correct form. I further understand
what it means to copy another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of Pearson UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be
my own, and where I have made use of another’s work, I will attribute the source in the
correct way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Pearson, UK.
6. I understand that my assignment will not be considered as submitted if this document is
not attached to the assignment.

Student’s Signature: Date:


(Provide E-mail ID) (Provide Submission Date)
Higher National Diploma in Computing
Assignment Brief
Student Name /ID Number G.Malshi Dilinika
Unit Number and Title Unit 2: Networking
Academic Year 2022/23
Unit Tutor
Assignment Title LAN Design & Implementation for Alliance Health
Issue Date 2024/03/30
Submission Date 2024/04/23
IV Name & Date

Submission format

The submission should be in the form of an individual report written in a concise, formal business
style using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using
Harvard referencing system. Please also provide an end list of references using the Harvard
referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures,
although you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:

LO1 Examine networking principles and their protocols.

LO2 Explain networking devices and operations.

LO3 Design efficient networked systems.

LO4 Implement and diagnose networked systems.


Assignment Brief and Guidance:

Scenario
Alliance Health is a technology-enabled solutions company that optimizes the revenue cycle of the
US healthcare industry where its global delivery center is located in Colombo. The company is
planning to expand their business operations with their latest branch at Matara and wants it to be one
of the state-of-the-art companies in Matara with the latest facilities.

Assume you have been appointed as the new network analyst of Alliance Health to plan, design and
restructure the existing network. Prepare a network architectural design and implement it with your
suggestions and recommendations to meet the company requirements.
The floor plan of the head office in Colombo is as follows:
Floor 1:
 Reception area
 Sales & Marketing Department (10 employees)
 Customer Services Area – with Wi-Fi facilities

Floor 2:
 Administration Department (30 Employees)
 HR Department (20 employees)
 Accounting & Finance Department (15 employees)
 Audit Department (5 employees)
 Business Development Department (5 employees)

Floor 3
 Video conferencing room
 IT Department (60 employees)
 The Server Room

The floor plan of the branch in Matara is as follows:


Floor 1:
 Reception area
 Customer Services Area– with Wi-Fi facilities

Floor 2:
 Administration Department (10 Employees)
 HR Department (7 employees)
 Accounting & Finance Department (8 employees)
 IT Department (50 employees)

Following requirements are given by the Management.


 All the departments must be separated with unique subnet.
 The conferencing room of the head office and Customer Services Areas of each branch are
to be equipped with Wi-Fi connections.
 Connectivity between two branches (Head Office and Matara) would allow the intra branch
connectivity between departments. (Use of VPN is not compulsory)
 The necessary IP address classes and ranges must be decided by the network designer and
should be used for all the departments except the server room.
 Number of servers required for the Server room need to be decided by the Network
designer and should be assigned with 10.254.10.0/24 subnet. (Uses static IPs)
 Sales and Marketing Team also needs to access Network resources using WIFI connectivity.
(Note: Clearly state your assumptions. You are allowed to design the network according to your
assumptions, but main requirements should not be violated)
Activity 01
 Discuss the benefits and constraints of different network system types that can be
implemented in the Matara branch and the main IEEE Ethernet standards that can be used in
above LAN and WLAN design.

 Discuss the importance and impact of network topologies and assess the main network
protocol suites that are used in network design using examples. Recommend suitable network
topology and network protocols for above scenario and evaluate with valid points how the
recommended topology demonstrates the efficient utilization of the networking system of
Matara branch.

Activity 02
 Discuss the operating principles of network devices (Ex: Router, Switch, Etc.) and server
types that can be used for above scenario while exploring different servers that are available in
today’s market with their specifications. Recommend server/servers for the above scenario and
justify your selection with valid points.

 Discuss the inter-dependence of workstation hardware and networking software and provide
examples for networking software that can be used in above network design.

Activity 03
 Prepare a written network design plan to meet the above-mentioned user requirements
including a blueprint drawn using a modeling tool (Ex: Microsoft Visio, EdrawMax) .Test and
evaluate the proposed design by analyzing user feedback with the aim of optimizing your
design and improving efficiency.

(Support your answer by providing the VLAN and IP subnetting scheme for the above scenario and
the list of devices, network components and software used to design the network for above scenario
and while justifying your selections.)
 Install and configure Network services, devices and applications (Ex: VLAN,WiFi,
DNS,Proxy, Web, Etc.) according to the proposed design to accomplish the user requirements
and design a detailed Maintenance schedule for above Network.

*Note: - Screen shots of Configuration scripts should be presented.

Activity 04
 Implement a networked system based on your prepared design with valid evidences.

 Develop test cases and conduct verification (Ex: Ping, extended ping, trace route, telnet, SSH,
etc.) to test the above Network and analyse the test results against the expected results.
Recommend potential future enhancements for the networked system with valid justifications
and critically reflect on the implemented network, including the plan, design, configurations,
tests and the decisions made to enhance the system.
Grading Rubric

Grading Criteria Achieved Feedback

LO1 : Examine networking principles and their protocols.

P1
Discuss the benefits and constraints of different network types and
standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Assess common networking principles and how protocols enable the
effectiveness of networked systems.
LO2 : Explain networking devices and operations

P3
Discuss the operating principles of networking devices and server
types.
P4
Discuss the interdependence of workstation hardware and relevant
networking software
M2
Explore a range of server types and justify the selection of a server
for a given scenario, regarding cost and performance optimisation
LO 1 & LO2
D1 Evaluate the topology protocol selected for a given scenario and
how it demonstrates the efficient utilisation of a networking system.
LO3 : Design efficient networked systems

P5
Design a networked system to meet a given specification.
P6
Design a maintenance schedule to support the networked system.

M3
Analyse user feedback on your designs with the aim of optimising
your design and improving efficiency.
D2
Critically reflect on the implemented network, including the design
and decisions made to enhance the system.

LO4 : Implement and diagnose networked systems

P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
LAN Design & Implem
M4
Recommend potential enhancements for the networked systems.
Unit 02 - Networking
D2 Critically reflect on the implemented network, including the
design and decisions made to enhance the system.

1
Table of Contents
INTRODUCTION........................................................................................................................4
TYPES OF NETWORK SYSTEMS......................................Error! Bookmark not defined.
NETWORK TOPOLOGY........................................................................................................6
NETWORK PROTOCOLS......................................................................................................9
OPERATING PRINCIPLES OF NETWORK DEVICES......................................................12
HARDWARE REQUIREMENTS..........................................................................................14
SOFTWARE REQUIREMENTS...........................................................................................16
NETWORK DESIGNING PLAN..............................................................................................18
NETWORK ARCHITECTURE DESIGN..............................................................................19
NETWORK DESIGN.............................................................................................................24
TESTING EVALUATION..........................................................................................................27
RECOMMENDATIONS AND FUTURE ENHANCEMENTS.............................................38
References...................................................................................................................................38

2
INTRODUCTION

If to summarize, the system of a network is an interconnection of devices - the servers, printers,


computers etc., that are linked together to share their resources and communicate data. A few are
the best parts of a system network such as more productiveness, clear data flow, lower expenses
and centralised resources.

TYPES OF NETWORK SYSTEMS

There are several types of network systems, including:There are several types of network
systems, including:

1. LAN (Local area network)


It is decided on a collection of devices serving in the same vicinity, a home, for instance, or an
office area or building. They are ordinarily used by units within and with the ability to share data
among the network devices. Typically, they are owned and controlled by one enterprise or a
person. One of the significant advantages of a LAN over other systems is that a LAN has fewer
devices and covers a small geographical area, therefore, they tend to be more dependable and
faster.

2. WAN (short for Wide Area Network)


It is a link, good enough to establish a network that interconnects devices across the globe,
ranging from a few offices in a particular city to all the cities and even nations. Most of the time
WANs utilize service providers to provide connectivity, and these service providers are the
telecom companies and internet service providers. WANs between devices touched by the globe
with maximum speed and access to the Web resources and services of the Cloud are provided.
While WANs can leverage an array of connections like the internet, satellite, or leased lines to
deliver the data.

3. When MAN (Metropolitan Area Network) deployed, it offered wider access to the internet, so
that people could open more communications and opportunities, thus skyrocketed the affect of
internet extension.
Metropolitan area network (MAN) is a kind of communication network that connects the
different devices inside a city. Government and administrative buildings, schools and hospitals,
and other large organizations with several locations within the city area, with local networks
could be a perfect opportunity to employ MANs. Electronic communication among Earth

3
spacecraft and astronauts can be made using various channels such as satellite links, microwave
links, and fiber optic cables.
1. Using the wireless connection within the local area network or WLAN (wireless local area
network).

It's a common type of the wireless network that joins via high frequency radio waves instead of
cables. Users of WLANs mostly employ such networks in households, workplace, and public
areas like coffee shops and airports. Convenience of using WLANs stems from the fact that they
utilize without causing any physical cord to connect the users to the network. Although WLANs
could be less reliable and their speeds slower than traditional LANs, WLANs are the way to go.
They allow students to surf the internet from any corner of the library or sit under a shade from
the sun, studying when they want.

2. Through a CAN (Campus Area Network), we will also set up smart sensors powered by
renewable energy sources to monitor and manage our campus' environment, energy use, and
other sustainability metrics.

It is more like a web that proves for the connecting the individual devices in the big organization.
Campus. CANs ensure that users work with the necessary files and send emails while they are at
the campus, along with other services such as copying and printing. CANs can be interconnected
via different techniques, including through wireless or fibre optic cables. Large networks
belonging to the organizations depend on the CAN for sensitive data; therefore, they may require
extra to other types.

3. A framed Personal Area Network (PAN)

It can be narrowed down as the network that ties pieces of equipment within the person’s
immediate periphery, often just several meters apart. Both wired and wireless ports can serve as a
PAN network, able to hold anything from printers to tablets, computers, cellphones or personal
digital assistances. Conveying information and enabling data sharing among devices that share a

4
close vicinity (expected to be wireless) is a common application of PANs. Take the example of
music being broadcast through a wireless speaker from a smartphone using the PAN protocol.
Moreover, someone else can print a paper from their laptops if they connect to internet via PAN
also. Wireless devices can easily communicate with each other thanks to Bluetooth; hence it is
mostly used to build local networks. In addition to these technologies, namely infrared, Zigbee,
and Near Field Communication (NFC), are the ones being used to enable the PANs. Comitfluence
PANs can be used in numerous industries like entertainment, healthcare and home automation.
For instance, a PAN can be used to link a patient's medical device—like a heart monitor—to the
device of a healthcare professional, enabling real-time patient health monitoring. For a more
engaging gaming experience, a wireless controller and game console can be linked via a PAN.
PANs have the benefit of being portable and simple to use, as they can be assembled and
disassembled with simplicity. Furthermore, PANs usually consume little power, which makes
them perfect for usage in battery-operated devices like laptops and smartphones.
Physical cables used to carry data signals, such as twisted pair, coaxial, and fibre optic cables,
are referred to as guided media. Although guided media might be expensive to install and
maintain, it offers high bandwidth, low error rates, and security.
Data signals are transmitted by unguided media—radio waves, microwaves, and infrared—
instead of physical cables. Although unguided media is simple to set up, there may be
security risks, signal deterioration, and interference.

NETWORK TOPOLOGY
The manner in which the devices are embedded or configured logically and physically on the
network is called the network topology. It the network's physical composition which is called the
physical topology and the data flowing within the network through wire is its data flow referred
to as the logical topology.

Common physical network topologies include:


Bus Topology: The bus topology is a physical star structure consisting of a backbone that is a
long cable to which all network devices are connected. This pole is responsible for the two-way
data transmission; geographically closer devices receive and send date. On the one hand, it is it
that is easy to be implemented as well as it is general. On the other hand, it has the drawback of
being the single point of failure.

5
Star Topology: Devices in star topology connected to a hub or a switch in the middle of the
design function as the center of the circle for transferring data. A single device, either a hub
(switch) or an internet router, will receive and soon transmit data flowing from the source
device to the destination one thereby. This topology has two key advantages over bus
topology: It is also easy to install and test compared to C, and C++ has better performance.

Ring Topology: The pendulum movement takes a circular path and it is connected in a ring
topology, where each device is connected to the devices which are positioned on the left and right
of it. The unwinding of data is known as a single path, to which the devices repeat that data
onward to the next one. E gal as all nodes can communicate with each other due to this topology's
main benefit namely, communication network formation but any faulty device can the cause of
whole network shock.

6
Mesh Topology: A mesh network topology helps have many paths for data to travel over
which can be from devices to other devices. This resilient network is undeniably surfacing
from the fact that each device connects to every other device in the network, thereby, making
it immensely sturdy against failures. Unlike a city log, which has fewer connections, the main
drawback of a city web is its extensive assets.

Tree Topology: The natural disposition of a tree topology is that it has its root node at the top
followed by devices located in a hierarchical manner. From the main node a branch is extended;
the branches from the parent can have the self breed branches; and sub-branches are extend from
the root. Yet, its highly scalable feature and well structured design enable the network to support
the traffic of gigantic networks but the failure of the root node will bring the whole network
down.
The impact of network topology on a network includes factors such
as reliability, scalability, and performance.

7
IEEE Standards
Ethernet (IEEE 802.3), Wi-Fi (IEEE 802.11), and VoIP (Voice over Internet Protocol) are among
the IEEE Ethernet standards. Wi-Fi is a wireless networking technology, whereas Ethernet is a
wired networking technology used for local area networks. VoIP is a protocol that enables voice
over IP network communication.

The original Ethernet standard, IEEE 802.3, outlines the fundamental characteristics of Ethernet
networks, including the usage of fibre optic or twisted pair cable and the CSMA/CD (carrier
sense multiple access with collision detection) protocol. It can handle 100 Mbps, 1 Gbps, and 10
Mbps of data.

IEEE 802.3u: Also referred to as Fast Ethernet, this standard employs the same CSMA/CD
protocol as IEEE 802.3 and allows data rates up to 100 Mbps.

The Gigabit Ethernet standard, or IEEE 802.3ab, allows data rates of up to 1 Gbps when
employing twisted pair wires over copper cabling. It used 8b/10b encoding, a different encoding
system than earlier Ethernet specifications.

The IEEE 802.11 standard, commonly referred to as Wi-Fi, governs WLANs. It outlines the
requirements and procedures needed for wireless device communication. Several sub-standards,
including 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, and 802.11ax, are part of the 802.11
standard.

The data rates, frequency ranges, and modulation techniques vary across different sub-standards.
One standard, IEEE 802.3z, supports speeds of up to 1 Gbps with fibre optic cabling. Another
standard, IEEE 802.3ae, allows for data rates of up to 10 Gbps when using fibre optic cable.
Furthermore, IEEE 802.3ba supports data rates of 40 Gbps and 100 Gbps with fibre optic cable.
IEEE 802.3, IEEE 802.3u, IEEE 802.3ab, IEEE 802.11, IEEE 802.3z, IEEE 802.3ae, and IEEE
802.3ba are key IEEE Ethernet standards used in LAN and WLAN design.

NETWORK PROTOCOLS
The OSI model and TCP/IP are two examples of networking protocol suites that serve as the
building blocks for communication on networks. The OSI model consists of seven levels, each
with its own set of protocols and functions. These are the layers:

• Physical layer: uses a physical media to send raw bit streams.

8
• Data link layer: enables error detection and correction while organising bits into frames.

• Network layer: use logical addressing to route packets across a network

• Transport layer: facilitates end-to-end communication between programmes running on various


hardware.

• Session layer: creates and maintains links between programmes

• Presentation layer: converts data between network and application formats.

• Application layer: gives apps access to services

TCP/IP is a protocol suite that is commonly used for internet communication. It includes four
layers:

• Network access layer: provides physical access to the network

• Internet layer: routes data between networks

• Transport layer: provides reliable data transfer between devices

• Application layer: provides services to applications

9
Based on the provided floor plans, I would recommend the following network architectural design
for Alliance Health:Based on the provided floor plans, I would recommend the following network
architectural design for Alliance Health:

1. Network Topology:
A star topology, which would suit to both the Matara branch and the Colombo head office is
preferred. This is a strong model that in turn, is not highly vulnerable to traffic volumes, with its
maintenance and debug features being user-friendly, as well. In the head office of the company in
Colombo area, server room on the third-floor may serve as the main hub in the star topology while
the local IT department of Matara branch may dwell a special hub or switch that are differentiated
from them.

2. Ethernet Standards:
Untuk LAN, saya akan menyarankan bahasa Ethernet (IEEE 802.3) dengan kabel Apik, Cat6 atau
lebih berhasil pada departemen utama dan Cabangnya. This may be for the management of heavy
network traffic, and offering secured and reliable connections.
For faster connection speed and support for many devices, I would encourage having Wi-Fi 6
standard (IEEE 802.11ax) for the wireless network. This would be primarily in the customer support
services areas.

3. Network Protocols:
TCP/IP protocol suite being highly utilized and having the right features for modern network context,
suggesting a use of it for a network protocol implementation.

4. Network Security:
Setting firewall in position to avoid being targeted from outside the network as well as to prevent
unauthorized users from being able to access the network that is aimed at securing the network. The
fact is that appropriate access controls together with regular security audits are impossible to do
without.

5. Server Room:
The server room on the third floor of the main office needs to be equipped with a cooling system, a
fire suppression system, and electricity backup systems among other things to prevent interruption of
power supply to these servers.

6. Virtual Private Network (VPN):


Obviously the VPN is the best way to reach all of the corporate data over the internet by employees
or customers. With this the data transmissions between bank and employee will be encrypted and this
will allow remote access with security.

10
7. Network Monitoring:
To control the network performance a monitoring tool that can identify and solve a problem is
deployable and equally provide stellar views so that the network can work at its efficient capacity
should be considered .

Through the implementation of the aforementioned recommendations, Alliance Health will be able to
reap benefits of secure and reliable network to facilitate all their business operations and develop
management and information exchange among various personnels in their organization.

OPERATING PRINCIPLES OF NETWORK DEVICES

Router:
The encrypted data is regularly exchanged within the networks, and a router is a network
device that is used to connect several networks and route data among them. The device makes
use of the principle that the packets of the data move forwarding their destination IP address.
Router, which is essentially a layer 3 device in the OSI model, belongs to the network layer
of the network addressing paradigm. They proposed that the firewalls and NATs (Network
Address Translation) maybe features of security that can be provided by them.

Switch:

Switching is a kind of network gear that is responsible for putting data to correct device or about
connecting inside a chosen network. It performs by the principle that it is the destination MAC
address that is used to determine the required route of the forwarding of data. VLANs and QoS as
well as switches with VLNs and QoS are two features that switches can provide. Switches

11
operate at the data connection layer of the OSI model i.e laylow Layer 2.

Firewall:
Specific filtering application programs, send and receive only the necessary data from
connected network devices and suppress the packets that you have decided are inappropriate.
It operates by opening and taking readers through the protocols and the ports, as well as
source and destination IP addresses, and factors that help to decide if the data is allowed or
denied. Firewalls can work with different abilities like VPN (Virtual Private Network) and
IDS/IPS (Intrusion Detection System/Intrusion Prevention System) and their function can be
either network layer (Layer 3) or application layer (Layer 7) of the OSI model.

12
SERVER TYPES

File Server:

network approaching to file as standalone units are organized and handled with file servers as
their source. And further, it also allows users to offer a place for files and aids in sharing files and
controlling accesses of many user either be individuals or organizations. Chpears have
functionality such as RAID (Redundant Array of Independent Discs) to protect data through
redundancy and backup, and they can be used virtually or physically.

Web Server:

Web servers are a kind of a specialized software, which use the internet for hosting and delivering
web pages and application. It can allow for both the load balancing task and the content caching
as well. In addition, it is responsible for HTTP (Hypertext Transfer Protocol) and HTTPS
(Hypertext Transfer Protocol Secure) services. SSL, which is offered by either virtual or physical
web servers, is one of the functions that internet traffic is encrypted and able to be protected.

An application server is another name for a server program which is responsible for running and
hosting applications over a network. It may surely be installed for databases connectivity, and
also, it may be used to manage transactions in addition to creating space for applications code to
run in. The application servers, among the others, gives you high availability clustering, and
therefore it can be virtually or physical dependent.

Suggested Server in this Scenario:

In view of the fact that has been raised, then Alliance Health could have an option that would suit
its environment, use of file server. These servers can be managed centrally by departments and
staff members and provide an individual access to decentralized files and storage management.
Besides, it allows creating files that can be shared with several people or groups in other to suit
their needs. As far as requirements goes, for my opinion, I suggest a server with a quad core
processor, at least 8GB of RAM and at least 1TB of stranded (RAID 1 or RAID 5). The server
system should include manageability and monitoring from remote place along with dual i./c
(Power supplies). By using a server – grade version of either Linux or Windows operation
systems, the company’s specific demands and selections could be met. All things considered, a
file server would give Alliance Health's many departments and personnel the storage and
management tools they require, and a well-designed server with the right redundancy and
management features would guarantee high availability and security of the organization's data.
The particular devices and applications used in the design would determine the hardware and
software requirements for the proposed networking system. Here are a few standard prerequisites,
though:

13
HARDWARE REQUIREMENTS

Network Devices:

Network devices, or the hardware devices that are used to manage and control the flow of data
connection in a network, is among the first approached. Certain network devices such as routers,
switches, firewalls, and access points are a common part of network setups.

• Routers: Router is known for uniting different networks to each other and, moreover, it
performs the role of task-solving between them. Their function is rather comparable to the human
spine in a networked connection, being a reliable transit way of data transfers across the network.
Security is a very important aspect of this kind of service and it can be achieved via firewall
protection, VPN connectivity, and intrusion detection/prevention measures.

• Switches: Dip and jin cannot be compared at all. They can work as a network traffic balancing
mechanism and may also be useful in bandwidth management.

• Firewalls: A firewall serves to block access from any unauthorized intruders, this unique
software or hardware based approach works to filter the inbound and outbound network traffic.
They are either hardware or software-based and as such they can be used to admmit or to keep
unauthorized traffic out depending on a specific criteria.

• Access Points: Access points whose function is to create network link for electronic devices on a
network. They can be autonomous entities or a part of the larger system that includes the routers
and switches, and they provide an opportunity to connect to the network wirelessly.

Servers:

Within the bounds of networking, servers are computers that are intended to supply applications
and services to users all around the world. Given that we can mention not only the examples of
such servers, we can specify, for instance, DNS servers, DHCP servers, and the like.

• DNS Servers: DNS servers are employed to recast the domain names into the IP addresses that
are subsequently used to look for and talk with other devices on a network.

• DHCP Servers: Lately DHCP servers provide IP addresses to network devices without human
touching. This ensures that network management is simplified, and the network traffic cannot
cause conflicts between devices sharing the same IP address.

14
• Proxy Servers: Proxy servers are an intermediate unfication of the networks and the Internet that
provides a transmission. Among various uses they can be deployed to remove unnecessary traffic,
to provide better performance & include more featureslike security.

Workstations:

Enterprise specific configurations of workstation which are dedicated for the employees to
connect to network and its software. They will be considered desktop and laptops that come with
installed application suites namely email, web browsers, and productivity programs.

Network Cables and Connectors:

Cables and connections for the fibre optic are overtly used to achieve the wired connection
among devices on the network. There are mostly two types of network cables available in the
market, i.e., Ethernet cables and fiber optic cables. However, there is also noteworthy presence of
coaxial cables in the market. Connectors are employed to link cables to various devices; there are,
however, different types available - such as RJ-45, BNC, and SC.

Wireless Access Points:

Channels which take the shape of wireless access points are responsible for enabling wireless
connectivity in devices within a network. Standalone, or an integrated into a router and switch is
the choice users can deal with. Wireless connections enabled by them are their main feature.

Power Supply and Backup Systems:Power Supply and Backup Systems:

It is often a part of the power supply and backup system that keeps on devices networked are on
the uninterrupted power. This could also encompass batteries, UPSs and backup generators which
are all able to be integrated without much effort into the existing systems.

Physical Security Measures:

The use of physical safety measures is aimed at securing the equipment containing the network
from any unauthorized access or theft. The security mechanisms then range from locks, access
control systems, security cameras and alarms. They will hinder the physical damage to network
equipment, the illegal usage of the network by harmful and prying people alike, and will allow to
keep the network running for continuous use.

15
SOFTWARE REQUIREMENTS
• Network operating system such as Windows Server, Linux, or Cisco IOS

• Network management software for monitoring and configuring network devices

• Antivirus software to protect against malware and other threats

• Firewall software to control network traffic and protect against unauthorized access

• Applications for providing network services, such as DNS, DHCP, and proxy servers

• Applications for collaboration, such as email, instant messaging, and video


conferencing
It is important to ensure that all hardware and software components meet the minimum
system requirements for the operating system and applications being used. Additionally,
regular updates and patches should be applied to ensure the security and stability of the
network.

For the network services, devices, and applications, the following components can be used:

• Router: The router can be used to connect the Alliance Health network with the
internet. A router with multiple WAN interfaces can be used to support multiple
internet connections for redundancy purposes.

• Switches: Switches can be used to connect the various devices within the network.
VLANs can be used to segregate the network traffic based on department or function.

• Wireless Access Points: Wireless access points can be used to provide Wi-Fi access
to users within the network.

• Firewall: A firewall can be used to protect the network from unauthorized access and
prevent malware attacks.

• DNS Server: A DNS server can be used to translate domain names into IP addresses
for devices within the network.

• Proxy Server: A proxy server can be used to manage and control internet access for
users within the network.

• Web Server: A web server can be used to host the company's website and other
webbased applications.

16
NETWORK DESIGNING PLAN

For VLAN and IP subnetting scheme, the following scheme can be used:

1. VLAN 10 - Sales & Marketing Department

2. VLAN 20 - Customer Services Area

3. VLAN 30 - Administration Department

4. VLAN 40 - HR Department

5. VLAN 50 - Accounting & Finance Department

6. VLAN 60 - Audit Department

7. VLAN 70 - Business Development Department

8. VLAN 80 - Video conferencing room

9. VLAN 90 - IT Department

10. VLAN 100 - Server Room

NETWORK ARCHITECTURE DESIGN

17
Head Office in Colombo:

• Assign unique subnets for each department:


Subnet mask: 255.255.255.0
IP address range: 10.0.0.0/24

Floor 1:
• Reception area: 10.0.0.1
• Sales & Marketing Department (10 employees): 10.0.0.2 - 10.0.0.11
• Customer Services Area (Wi-Fi enabled): 10.0.0.12 - 10.0.0.254

Floor 2:
• Administration Department (30 Employees): 10.0.1.1 -
10.0.1.30
• HR Department (20 employees): 10.0.1.31 - 10.0.1.50
• Accounting & Finance Department (15 employees): 10.0.1.51 -
10.0.1.65
• Audit Department (5 employees): 10.0.1.66 - 10.0.1.70
• Business Development Department (5 employees): 10.0.1.71 -
10.0.1.75

Floor 3:
• Video conferencing room: 10.0.2.1
• IT Department (60 employees): 10.0.2.2 - 10.0.2.61
• Server Room: 10.254.10.0/24

- Provide Wi-Fi connections in the conferencing room and Customer Services Areas

- Create VLANs for each department to enhance network security

- Deploy a firewall to safeguard against unauthorized access and cyber attacks

- Employ a redundant network design for maximum uptime

- Utilize switches with Quality of Service (QoS) to prioritize network traffic

18
Matara Branch Network Design:

Subnet mask: 255.255.255.0

IP address range: 192.168.0.0/24

Floor 1:

• Reception area: 192.168.0.1

• Customer Services Area (Wi-Fi enabled): 192.168.0.2 - 192.168.0.254

Floor 2:

• Administration Department (10 Employees): 192.168.1.1 - 192.168.1.10

• HR Department (7 employees): 192.168.1.11 - 192.168.1.17

• Accounting & Finance Department (8 employees): 192.168.1.18 - 192.168.1.25

• IT Department (50 employees): 192.168.1.26 - 192.168.1.75

- Provide Wi-Fi connections in the Customer Services Area

- Create separate VLANs for each department to enhance network security

- Install a firewall to block unauthorized access and cyber attacks

- Implement a backup network setup to guarantee reliability

- Ensure secure communication between branches by setting up a Virtual Private Network (VPN)

Server Room:

- Configure the servers to use the 10.254.10.0/24 subnet for static IP addresses
- Install servers with redundant power supplies and storage devices for added reliability
- Develop a backup strategy for the servers to protect against data loss
- Implement a monitoring system to monitor the servers' health and performance.

For the Sales and Marketing Team:

19
- Provide Wi-Fi connections for the Sales and Marketing Department to access network
resources.
This network architecture design will meet the company's requirements for the network
design and provide a secure, reliable, and high-performing network infrastructure.

Floor Plan

The planning of IP subnetting for each VLAN can be tailored according to the device count and
future expansion needs of different departments. To ensure consistent network availability, a
thorough maintenance schedule can be devised, encompassing tasks such as regular device and
server backups, firmware updates, and security patch installations. Routine network assessments
can also be conducted to guarantee optimal network performance.

20
1st Floor

2nd Floor

21
System Implementation

Steps to follow for implementation.

• Procure necessary hardware and software components as per the designed plan.
• Physically install and configure the network components such as switches, routers, firewalls,
servers, etc., as per the designed plan.
• Configure the network devices by setting up the VLANs and subnetting schemes as per the
design.

22
• Configure the network services such as DHCP, DNS, proxy, web, etc., on the servers as per
the design.
• Test the network components and services by running various verification tests such as ping,
extended ping, trace route, telnet, SSH, etc.
• Analyze the test results against the expected results and make necessary changes to
improve the system performance.
• Document the entire implementation process, including the configurations, tests, and
results, for future reference.

NETWORK DESIGN

23
Hardware/ Devices/Services Quantity Price Per Unit Price
Shielded CAT cables 5500ft Rs.180 Rs.990000
50 port switch – Cisco SG 200 15 Rs.47250 Rs.708750
26 port switch - Cisco SG 200 20 Rs.24300 Rs. 486000
CISCO ASA Firewall 10 Rs.81000 Rs. 810000
Wi-Fi Routers - Prolink 30 Rs.4800 Rs.144000
Prolink - H5004N
IP phones – Cisco 30 Rs. 6750 Rs.202500
MC Orion 1 Rs.34970 Rs.34970
U 7500

Data storage Devices - - Estimated


Rs.400000
Auto loaders and Tape 75 Rs.135000 Rs.1012500
drives -HP Storage LTO
Ultrium Tape

Web Cam- HP webcam 20 Rs.6650 Rs.132300


HD
Endpoint devices 10 Rs.58500 Rs.585000
VPN service - Rs.2300 Deposite
per month
Rs.5000
Internet service- SLT business To all Rs.19800 Installation
package branc per month price
hes Rs.3000
Guardian Elite 100 kW 2 Rs.1560000 Rs.3120000
Generator

Microwave antennas 2 Rs.9450 Rs.18900

TOTAL Rs.86529
20

24
25
TESTING EVALUATION
To test the implemented network, we can use various verification tools such as ping, extended
ping, trace route, telnet, SSH, etc. The following are some sample test cases that can be
performed:To test the implemented network, we can use various verification tools such as
ping, extended ping, trace route, telnet, SSH, etc. The following are some sample test cases
that can be performed:

1. Ping test: As you test, note whether the connectivity between the devices in the network
during the testing is ensured. We are able to ping devices from the switch to see if those
devices are reachable or inaccessible; hence, we can determine their status.

2. Extended ping test: This offers us the flexibility to adjust parameters like the source IP
address, size of packets, and ports, to make a thorough assessment of the network. 3. Trace
route: This path displays the route that under that packet is passed. Route Testing is a way of
detecting routes that are not coping well in the network.

4. Telnet: By means of this test we shall SE set up a remote connection with all HET devices
in is the network. This function is what we are using to monitor the set-up of our equipment.

5. SSH: This test is very telemetric and helps in providing secure access to the devices.

We finally get to conduct the verification tests and compare the attained test results with the
expected results to find out if there exist any problems in the network. Where any problem is
found, we can provide professional recommendation by best suitable solutions for the
networked system. Some potential future enhancements could include:Some potential future
enhancements could include:

• The utility should seek to create redundancy in the grid to enhance availability and decrease
downtime.

• An example of a security measure here might be by including firewalls, intrusion detection


systems, and antivirus software to the network in order to protect it from cyber attacks.

• Introduction of QoS (Quality of Service) mechanisms to segment high-priority traffic and


guarantee minimum bandwidth level for critical networks.

26
• NAC which supports the Fisheries authorities to Control the network Access and Secure
from Unauthorized access.

• Having a successful monitoring network as well as proactively identifying and resolving the
network issues.

Overall, the implemented network design plan should be regularly reviewed and updated to
ensure it meets the evolving needs of the organization. Critical reflection on the plan, design,
configurations, tests, and decisions made to enhance the system should also be conducted to
identify areas for improvement and ensure the network continues to operate efficiently and
effectively.

To test and evaluate the network design, the following steps can be taken:To test and evaluate
the network design, the following steps can be taken:
• Testing connectivity: Continue the connectivity test both in each department and with the
Head office to Matara division and make sure all devices are interconnected with each other.
Apply these tools which are of great help in the areas of link performance evaluation to solve
the problems associated networking such as loss of network connections.
• Load testing: Perform the load testing for the purpose to green light the network that it is
ready for predicted traffic and number of devices. Employ tools such iperf, JMeter, or
LoadRunner to simulate high network traffic and assess the network's performance.2023-05-
20T06:24:37.826703+00:00
• Security testing: Do the security testing to assess if there are any vulnerabilities or
weaknesses in the existing network security. Take advantage of Nessus, Nmap and Metasploit
tools to discover security issues within the company's framework and also act to resolve it.
• User feedback: It is advisable to seek comments from employees individually to check their
opinions about the network performance and function; and feedback from the whole
department. To collect community involvement on the problems like network speed,
dependability, and ease of use survey or interviews will be a good option.
• Performance monitoring: As far as performance of the network is concerned monitor it
regularly to keep on meeting with the organizational requirements. Utilize these tools –
Nagios, Zabbix or PRTG – to monitor your network performance and accordingly build up the
reports of your network usage, uptime and other key performance indicators.
Constructing the validation of the experiment using data obtained from tests and users’
comments the network design may be appraised on its efficiency to attain the network
managers’ requirements. Observing the timely identification of any problem issues and ever
improving the network design by installing new hardware and software and introducing the
security measures can be taken, also. A reliable diagnostic mechanism, such as regular

27
network testing and monitoring, can guarantee that the network endures the organization's
requirements over time.

Test Case Test Case Expected ult Actual Result Pass/Fail


ID Description Res
1 Ping the default Successful ping Successful ping Pass
gateway from response response
PC1
2 Ping the default Successful ping Successful ping Pass
gateway from response response
PC2
3 Ping PC2 from Successful ping Successful ping Pass
PC1 response response
4 Ping PC1 from Successful ping Successful ping Pass
PC2 response response
5 Perform extended Successful ping Successful ping Pass
ping to PC1 from response with response with
PC2 extended options extended options
6 Perform extended Successful ping Successful ping Pass
ping to PC2 from response with response with
PC1 extended options extended options
7 Perform Successful Successful Pass
traceroute traceroute to PC2 traceroute to PC2
from PC1 with 1 hop with 1 hop
to PC2
8 Perform Successful Successful Pass
traceroute traceroute to PC1 traceroute to PC1
from PC2 with 1 hop with 1 hop
to PC1
9 Telnet from PC1 Successful telnet Successful telnet Pass
to the router connection to the connection to the
router router
10 SSH from PC1 to Successful SSH Successful SSH Pass
the switch connection to the connection to the
switch switch
Based on the test results, all test cases passed successfully, indicating that the network is
configured and functioning properly according to the designed plan. However, there is always
room for improvement and future enhancements, such as implementing redundant links for
increased network reliability and creating additional VLANs for better network segmentation
and security. Additionally, regular maintenance and updates should be performed to ensure
the network remains secure and optimized.

28
Testing Requirements

1. All the departments should be separated by unique subnet.

2. For all the departments, IP address should be assigned using DHCP.

3. ERP and CRM systems should be implemented in servers.

4. High level redundancy is expected in the system.


5. Sales and Marketing need to access the network using Wi-Fi.

6. Proper security mechanisms should be implemented.

All the departments should be separated by unique subnet.


The testing requirement "All the departments should be separated by unique subnet" means
that each department in the Head Office and Matara Branch network should be allocated a
unique IP subnet. This ensures that the network traffic of each department is isolated from
other departments, improving network performance and security.

29
IP addresses should be assigned by DHCP
The testing requirement "IP addresses should be assigned by DHCP" means that instead of
assigning static IP addresses manually to each device in the network, the network will use a
Dynamic Host Configuration Protocol (DHCP) server to automatically assign IP addresses to
devices as they join the network.

• This testing requirement has several benefits:

• It reduces the amount of manual configuration required for each device on the network.

• It ensures that each device on the network is assigned a unique IP address, which helps to
prevent IP address conflicts.

• It allows for easier management and troubleshooting of the network, as administrators


can view and manage IP address assignments from a central DHCP server.

30
ERP and CRM systems should be implemented in servers.

31
ERP (Enterprise Resource Planning) and CRM (Customer Relationship Management) are
enterprise software systems that assist business in dealing with financial activity, human
resource, supply chain, customers` relationships and other matters.

To implement ERP and CRM systems in the servers for the above system, the following steps
can be taken:To implement ERP and CRM systems in the servers for the above system, the
following steps can be taken:

Identify the requirements and select the appropriate ERP and CRM software: The preliminary
step is to identify the very requirements of the business, the systems; that meet them.
Nowadays, the ERP and CRM program options are pretty extensive in the market and each
supplier has its own specifications. The proposed piece of software must be able to interact
correctly with all the current systems and software in the network.

Configure the servers to meet the requirements of the ERP and CRM software: After the
software has been identified the next step is to configure the servers that would be deployed to
support the features of the ERP system and the CRM software. This encompasses
subscriptions to a database system and dealing with middleware, and adjusting network
connection and security options.

To complete the setup of the servers, the ERP and CRM software must be installed. Multiple
copies of the applications will be set up for various departments within the company. After
installation, the software will undergo thorough testing to ensure it functions properly. Speed
and responsiveness will be key metrics in evaluating its performance. Lastly, users will
receive training on how to effectively utilize the ERP and CRM software. Training sessions
will be provided to ensure a smooth transition to using the new software.

High level redundancy is expected in the system.

In order to increase reliability and uptime, redundant servers can be implemented by setting up multiple
servers for each department. By storing data on multiple servers simultaneously, redundancy is provided
in case one server fails. This can be achieved through server clustering, where multiple servers
collaborate as a unified system to ensure redundancy. Similarly, redundant power supplies can be
installed in servers and network equipment to prevent downtime in case of power supply failures. By
using Uninterruptible Power Supply (UPS) systems, backup power is provided during power outages or
failures, allowing the other power supply to take over seamlessly.

32
Creating redundant network connections involves establishing multiple connections between
devices in the network. This can be done using Network Interface Cards (NICs) or switches
that support link aggregation, allowing multiple connections to be merged into one logical
connection. Load balancing is another strategy that can help distribute network traffic across
several servers to prevent any single server from being overwhelmed and failing. Load
balancing software or hardware can automatically distribute network traffic among servers
based on specific rules.
Backup and disaster recovery are vital components of any organization's IT strategy. Having a

solid plan in place ensures that data can be retrieved in the event of system failures or disasters.

This includes backing up data to offsite locations, utilizing data replication software to

duplicate data across multiple servers, and regularly testing disaster recovery protocols to

guarantee their effectiveness. By incorporating these precautions, the network system can

achieve a high level of redundancy, thus enhancing its ability to withstand hardware failures,

power outages, or other potential disruptions, and ensuring continued availability and

functionality.

Sales and Marketing need to access the network using Wi-Fi.


"In the system mentioned above, the Sales and Marketing teams need to access network
resources via Wi-Fi connectivity. This requires them to connect wirelessly to the company
network using their laptops or other Wi-Fi-enabled devices. To facilitate this, Wi-Fi access
points can be set up in both the Sales and Marketing department and the Customer Services
Areas of each branch. These access points can be set up with strong encryption protocols like
WPA2 to ensure secure access to the network. To guarantee that the Sales and Marketing
teams can access the necessary resources, the network should be configured to allow wireless
devices to connect to the same subnets used by wired devices.
This can be achieved through the use of VLANs, which allow multiple subnets to be used on
the same physical network infrastructure. Additionally, the network should be designed to
ensure that there is sufficient bandwidth available to support the needs of the Sales and
Marketing teams. This can involve configuring Quality of Service (QoS) settings to prioritize
network traffic for these departments, as well as ensuring that there is adequate bandwidth
available for wireless devices. Overall, by providing Wi-Fi access to the Sales and Marketing
teams, the company can enable these departments to work more efficiently and effectively,
while also ensuring that they have secure access to the resources they need to do their jobs. To
test this requirement, the network administrator can set up a DHCP server on the network and
configure it to automatically assign IP addresses to devices that join the network. The
administrator can then test to ensure that devices are properly receiving IP addresses from the
DHCP server by connecting devices to the network and checking their assigned IP addresses.
Additionally, the administrator can test to ensure that there are no IP address conflicts on the

33
network by monitoring the DHCP server logs and checking for any duplicate IP address
assignments.

34
35
Steps involved in installing and configuring network services and applications.

Determine the requirements: Identify the network services and applications needed to meet the
organization's requirements. This could include services such as DNS, DHCP, file sharing, and
email servers, and applications such as video conferencing software, web servers, and virtual
private network (VPN) services.

Choose the appropriate hardware and software: Select the hardware and software needed to
support the network services and applications. Consider factors such as the number of users,
expected network traffic, and security requirements when choosing hardware and software.

Install and configure the hardware: Install and configure any hardware needed to support the
network services and applications, such as servers, switches, routers, and firewalls.

Install and configure the software: Install and configure the software needed to support the
network services and applications. This could involve installing and configuring operating
systems, database software, and specific network services and applications.

Test and verify the configuration: Test and verify that the network services and applications are
functioning as expected. This could involve testing connectivity, verifying that services are
responding, and conducting load testing to ensure that the network can handle the expected
traffic.

36
Monitor and maintain the network services and applications: Once the network services and
applications are installed and configured, it's important to monitor and maintain them to ensure
that they continue to function properly. This could involve monitoring logs, applying software
patches and updates, and conducting regular performance tuning and optimization.

RECOMMENDATIONS AND FUTURE ENHANCEMENTS

In terms of potential future enhancements, some recommendations could be:


Implementing more advanced security measures such as intrusion detection and prevention systems,
network access control, and security information and event management systems.
Upgrading the network components to newer models or technologies to keep up with evolving
industry standards and requirements.
Implementing automation and orchestration tools to streamline network management and reduce
manual efforts.

Integrating cloud services and technologies to improve scalability and flexibility of the network.
Implementing network virtualization technologies such as software-defined networking
(SDN) and network function virtualization (NFV) to improve network agility and reduce
hardware dependencies.
Overall, it is important to constantly review and assess the network performance and make necessary
improvements to meet the evolving business needs and industry standards.

References

1. Arora, V., & Gupta, S. (2019). Design and implementation of a redundant network for
high availability. International Journal of Computer Networks and Communications
Security, 7(3), 49-56.

2. Cisco. (2018). VLANs and VLAN trunking protocol (VTP) configuration. Retrieved
from https://www.cisco.com/c/en/us/support/docs/lan-switching/vlans/40960-
vlanconfiguration-ccna.html

3. DiPietro, R. B. (2019). Introduction to modern network security (2nd ed.). Boca


Raton, FL: CRC Press.

4. Forouzan, B. A. (2017). Data communications and networking (5th ed.). New York,
NY: McGraw-Hill Education.

37
5. Kizza, J. M. (2017). Computer network security (4th ed.). New York, NY: Springer. 6.
Li, C., Li, S., & Liu, S. (2018). Research and implementation of QoS for Ethernet
LANs. Journal of Physics: Conference Series, 1069, 012066.

7. Oracle. (2019). Network redundancy. Retrieved from


https://docs.oracle.com/enus/iaas/Content/Network/Concepts/networkredundancy.htm

8. Parikh, V. P. (2018). Virtual private network (VPN) deployment. Journal of Computer


Networks and Communications, 2018, 1-8.
9. Tanenbaum, A. S., & Wetherall, D. (2019). Computer networks (6th ed.). New York, NY:
Pearson.

10. Zhang, J., & Yu, H. (2017). Research on the design and implementation of the server room
monitoring system. 2017 2nd IEEE International Conference on Computer and
Communications (ICCC), 1663-1667.

38

You might also like