Unit 02 Networking Redone
Unit 02 Networking Redone
Assessor signature
Date
Higher Nationals
M M Yahya Ahkam Networking Assignment 01 2|Page
Internal verification of assessment decisions – BTEC (RQF)
INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Programme title BTEC Higher National Diploma in Computing
Programme Leader
signature (if required) Date
Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction P1 P2 M1 D1
Descripts
Resubmission Feedback:
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.
Action Plan
Summative feedback
Assessor Date
signature
Student Date
signature
1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body
except for the before mentioned compulsory information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and
a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct form. I further understand what it means to
copy another’s work.
[email protected] 25.10.2023
Student’s Signature: Date:
(Provide E-mail ID) (Provide Submission Date)
Issue Date
Submission format
The submission should be in the form of an individual report written in a concise, formal business style
using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using Harvard
referencing system. Please also provide an end list of references using the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures, although
you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:
Alliance Health is a technology-enabled solutions company that optimizes the revenue cycle of the US
healthcare industry where its global delivery center is located in Colombo. The company is planning to
expand their business operations with their latest branch at Matara and wants it to be one of the
state-of-the-art companies in Matara with the latest facilities.
Assume you have been appointed as the new network analyst of Alliance Health to plan, design and
restructure the existing network. Prepare a network architectural design and implement it with your
suggestions and recommendations to meet the company requirements.
The floor plan of the head office in Colombo is as follows:
Floor 1:
Reception area
Sales & Marketing Department (10 employees)
Customer Services Area – with Wi-Fi facilities
Floor 2:
Administration Department (30 Employees)
HR Department (20 employees)
Accounting & Finance Department (15 employees)
Audit Department (5 employees)
Business Development Department (5 employees)
Floor 3
Video conferencing room
IT Department (60 employees)
The Server Room
Floor 2:
Administration Department (10 Employees)
HR Department (7 employees)
Accounting & Finance Department (8 employees)
IT Department (50 employees)
The conferencing room of the head office and Customer Services Areas of each
branch are to be equipped with Wi-Fi connections .
Connectivity between two branches (Head Office and Matara) would allow the intra
branch connectivity between departments. (Use of VPN is not compulsory)
The necessary IP address classes and ranges must be decided by the network
designer and should be used for all the departments except the server room .
Number of servers required for the Server room need to be decided by the
Network designer and should be assigned with 10.254.10.0/24 subnet. (Uses static
IPs )
Sales and Marketing Team also needs to access Network resources using WIFI
connectivity.
(Note: Clearly state your assumptions. You are allowed to design the network according to your
assumptions, but main requirements should not be violated)
Discuss the importance and impact of network topologies and assess the main
network protocol suites that are used in network design using examples.
Recommend suitable network topology and network protocols for above scenario
and evaluate with valid points how the recommended topology demonstrates the
efficient utilization of the networking system of Matara branch.
Activity 02
Discuss the operating principles of network devices (Ex: Router, Switch, Etc.) and
server types that can be used for above scenario while exploring different servers
that are available in today’s market with their specifications. Recommend
server/servers for the above scenario and justify your selection with valid points.
Activity 03
Prepare a written network design plan to meet the above-mentioned user
requirements including a blueprint drawn using a modeling tool (Ex: Microsoft Visio,
EdrawMax) .T est and evaluate the proposed design by analyzing user feedback with
the aim of optimizing your design and improving efficiency.
(Support your answer by providing the VLAN and IP subnetting scheme for the above
scenario and the list of devices, network components and software used to design the
Install and configure Network services, devices and applications (Ex: VLAN,WiFi,
DNS,Proxy, Web, Etc.) according to the proposed design to accomplish the user
requirements and design a detailed Maintenance schedule for above Network.
Activity 04
Implement a networked system based on your prepared design with valid evidences.
Develop test cases and conduct verification (Ex: Ping, extended ping, trace route,
telnet, SSH, etc.) to test the above Network and analyse the test results against the
expected results. Recommend potential future enhancements for the networked
system with valid justifications and critically reflect on the implemented network,
including the plan, design, configurations, tests and the decisions made to enhance
the system.
P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Assess common networking principles and how protocols enable
the effectiveness of networked systems.
P3
Discuss the operating principles of networking devices and
server types.
P4
M M Yahya Ahkam Networking Assignment 01 16 | P a g e
Discuss the interdependence of workstation hardware and
relevant networking software
M2
Explore a range of server types and justify the selection of a
server for a given scenario, regarding cost and performance
optimisation
LO 1 & LO2
D1 Evaluate the topology protocol selected for a given scenario and
how it demonstrates the efficient utilisation of a networking system.
LO3 : Design efficient networked systems
P5
Design a networked system to meet a given specification.
P6
Design a maintenance schedule to support the networked
system.
M3
P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D2 Critically reflect on the implemented network, including the
design and decisions made to enhance the system.
I would like to take this opportunity to sincerely thank everyone who has assisted me in
completing this assignment. I would want to express my gratitude to Mrs.Fathima, the
professor at the ESOFT Metro Campus, for her tireless efforts to guide and instruct us as we
work toward our academic objectives. Thanks to her expertise, experience, and dedication, I
now have a deeper understanding of each of our specific subjects of study and practical skills
that will help us in our future careers. She taught real estate in this unit. She gave us
instructions on how to accomplish the task. I was able to complete this homework
satisfactorily because of this.
I would want to sincerely thank everyone who has assisted me in my studies and application
of networking. The following individuals have my sincere gratitude for their crucial work,
which has greatly enhanced the enlightening nature of this encounter. I would like to begin by
thanking my teacher for her guidance and expertise during this study session. His passion for
teaching and ability to simplify difficult tasks have made a significant contribution to my
grasp of networking.
Figure 1 network
ARPA, a Department of Defense agency in the United States, developed
this packet-switched network in the late 1960s (Kinza Yasar, n.d.).
The following are the two most common computer network architectures:
1. Client-server: In this architecture, there are numerous clients, or
nodes, and a central server that is at least one network node. In this
Bus Topology
In a bus topology, every node is connected by a single cable, or bus. The
spine of the network is the primary cable. In a bus topology, the bus
connects each node to the drop lines and taps. In this situation, the
connections between the nodes and the central wire or bus are called
drop lines. The drop line and the main central cable are connected with
the help of the Taps, a three-way connector.
Advantages of Bus Topology
Less cabling: A common wire connects all nodes in a bus
topology.
Less Expensive: Bus topology is less expensive because it uses a
common wire.
Small network: This is best suited for situations where only a few
computers are required for connection establishment.
Upgradeable: A new node can be added or removed in this
topology without affecting the other nodes.
Disadvantages of Bus Topology
Reduced signal strength: To connect a more significant number of
nodes, we must increase the number of Taps, Drop Lines, and the
central cable. And increasing these things will weaken the signal.
Core failure: If the main central cable becomes damaged or faulty,
the entire network will fail.
Mesh Topology
A network architecture known as mesh topology links the machines
together via a number of redundant connections. There are several ways
to go between computers. It is devoid of any hub, switch, or central
computer that functions as a communication point.
Star Topology
In a network topology like this, a hub connects every computer. Every
other node is connected to a central node. Because it's inexpensive and
simple to set up, this kind of network topology can be used for local area
networks.
Hybrid Topology
Hybrid topology is a combination of two or more of the basic topologies.
For example, a star-bus topology is a hybrid topology that combines the
star and bus topologies.
There are thousands of different network protocols, but they all perform
one of three primary actions:
Communication
Network management
Security
Physical Topology.
The best physical topology for this network is tree topology. because
there are two VLANs on this network, and these two VLANs will be
associated with a second switch, which will be connected to the router.
Logical Topology
For this scenario, For the logical topology type, tree topology is
appropriate. As a result, this network has a high and efficient data flow
and is simple to operate with this topology.
TCP (Transmission Control Protocol)
IP (Internet Protocol)
Web surfing – HTTP (Hypertext Transfer Protocol) Port 80 & 443
File Transferring – FTP (File Transfer Protocol) Port 20 & 21
Manage network device secure – SSH (Secured Shell) Port 22
Remote Access – Telnet Port 23
Email send – SMTP (Simple Mail Transfer Protocol) Port 25
Convert domain to IP address – DNS (Domain Name Service) Port
OSI Model
The International Organization for Standardization created the Open System
Intercommunication (OSI) paradigm in 1984. A homogeneous structural architecture that
describes network communication is the OSI model. There are seven layers in the Open
Systems Interconnect paradigm. When it comes to diagnosing network issues, the OSI Model
is quite helpful.
TCP/IP Model
The internet is built upon the TCP/IP protocol, which is a somewhat cohesive suite of linked
protocols rather than a single system. It can be used with a variety of Network Interface layer
protocols, such as Ethernet, in addition to Token Ring and FDDI protocols. The OSI model
2.1.Networking devices
Network Devices: Network devices, also known as networking hardware,
network devices are the actual hardware pieces that enable interactivity
and communication amongst other hardware on a computer network
(Schrader, 2019).
For example, Repeater, Hub, Bridge, Switch, Routers, Gateway and NIC,
etc.
Figure 14 Router
Figure 15 HUB
3. Bridge:
By connecting two or more LANs, a network bridge effectively unifies
the disparate LANs into a single domain. In this sense, a bridge differs
from a router, which permits connection between various networks but
treats them as separate systems. Bridge devices have switching
capabilities, with which they forward incoming data frames by
examining media access control (MAC) addresses. A bridge creates a
lookup table of MAC addresses and port locations with each frame it
Figure 16 Bridge
4. Gateway:
A gateway is a network node that connects discrete networks or systems
that use different protocols, enabling data to flow between the networks.
Gateways use multiple protocols and translate an incoming packet's
information and protocol to make it compatible with the destination
environment. After a gateway processes the data packet, it typically
forwards it on to a router, which sends the packet toward its destination
within the network. Types of gateways include routers, web application
firewalls and email security gateways. Gateways are also frequently used
5. Access point:
An access point (AP) is a device that sends and receives data wirelessly
over radio frequencies, using 2.4 GHz or 5 GHz bands. In order for clients
—such as laptops or mobile phones—to join the wireless LAN that the AP
has established, they must first establish a wireless connection with the
AP. The AP is physically connected via an Ethernet cable to a wired LAN
router or switch, giving it access to the internet and the entire network.
Wireless teams must take into account a variety of considerations when
deploying APs, including channel interference, attenuation, and location,
all of which can affect signal strength. Engineers typically install access
points (APs) on walls or ceilings to optimize signal coverage and reduce
potential obstructions.
6. Modem:
A modem's primary function is to transform signals between devices,
such as analog to digital, by modulating and demodulating them.
These days, the most popular kind of modem is an internet modem,
Figure 19 Modem
7. Switch:
A network switch uses the MAC address of an incoming frame to
determine its destination before forwarding the data to the appropriate
device. Devices often use Ethernet cables to connect to a switch's ports.
When transferring frames, the switch refers to an address table that has
stored the MAC addresses of such devices in. Switches transfer data
straight to the designated destination port, whereas routers forward data
to an IP address or network.
Figure 21 Repeater
2.2. Servers
Network servers are high-powered computers used as a central location
for information and different applications that users on a network share.
During their peak, network servers had sufficient power to manage
numerous applications and a large number of user files. But with today's
powerful CPUs and virtualization, the word "network" is sometimes
omitted from the term, leaving only the concept of the general-purpose
server.
Saving work on your local device is a good place to start when working
with critical applications or files, but what happens if you lose access to
2. Email Servers:
A mail server processes and distributes email messages through a
network. It's a service that receives emails sent by users and routes
them to a different server. Furthermore, it sends emails to end-user
devices, which include home and workplace personal computers.
Simple Mail Transfer Protocol is commonly used by email servers
(SMTP). Even though several protocols are supported by
contemporary mail servers, SMTP is still frequently used. Integrating
email servers with web servers is now the most popular setup for
email servers. This enables users to present data on a website in a
graphical way.
3. Application Server:
4. Proxy Server:
Customer resource requests are routed through the server to the
servers hosting the requested resources. It represents the users while
submitting requests, hiding their IP address from the resource
server. Authentication, content screening, error correction, recording,
and monitoring are just a few of the many uses for proxy servers.
5. DNS Server:
The fundamental job of a DNS server is to translate domain names
into the corresponding IP addresses. Additionally, it guarantees that
businesses receive appropriate brand names and that users do not
need to memorize IP addresses. The majority of customers get their
DNS servers from their own ISPs. Still, a number of companies
provide this search for free. People who are especially concerned
about protecting their online privacy frequently use these backup
DNS servers. There is a hierarchy in the way DNS servers are
grouped, with some servers being more dependable than others.
6. FTP Server:
The only purpose of a File Transfer Protocol (FTP) server is to enable
file transfers between users. Clients are granted authorization to
upload and download files from the server following successful
authentication with an FTP client. They can also get whatever file
they want by accessing the contents of the server.
7. File Servers:
8. Web Server:
The main job of a web server is to host webpages. They take requests
through the Hypertext Transfer Protocol (HTTP), which facilitates the
sharing of websites. Web browsers submit requests over HTTP to
servers in order to initiate communication. The computer then
returns the desired data as a result. They receive and store data sent
by user agents. Web servers typically lack a graphical user interface.
This ensures there is enough energy to run the server's operating
system and applications and prevents the server's memory from
running out.
To ensure that their devices can connect with each other efficiently,
users of workstation hardware must have an operating system
specifically designed for networking. Although networking operating
systems come in many variations, workstation hardware usually supports
only a handful of them. A company may find it difficult to transition to a
new networking operating system if its current one is no longer
supported.
The networking design for Alliance Health was created using EdrawMax, a versatile all-in-
one design program highly regarded for its flexibility. EdrawMax empowers users to easily
generate a wide range of visually appealing designs, including floor plans, mind maps,
infographics, network diagrams, flowcharts, and organizational charts. Its extensive library of
templates and symbols enables users to quickly create graphics tailored to their specific
requirements, be it for educational, commercial, or social purposes. With support for
importing and exporting files in formats like Word, PDF, Visio, HTML, PPT, and JPEG,
EdrawMax offers adaptability and flexibility. This facilitates smooth collaboration and
sharing of graphics among team members, who can access cloud-stored files from any device
at any time.
• Main Server
• Router – 1
• Switches – 5
• RJ45 Cables
• Wi – Fi
• PCs
Software Components
• Operating System (Windows/Linux)
• Protocols (TCP/IP)
To ensure reliable, fast, and secure communication, I deployed multiple switches, each
dedicated to a specific department. This strategy enhances connectivity and reliability,
ensuring that any issues affecting one department do not impact others. Additionally, a
central router connects all switches, facilitating efficient inter-departmental communication.
Moreover, a central Main Server is integrated into the network to manage storage and
support network applications, ensuring centralized data management and accessibility
across all departments.
Monthly Maintenance
1. Software Updates:
Update apps, operating systems, and network management software on a regular
basis. To guarantee system stability and security, apply patches and security updates.
2. Performance Monitoring:
To find any network bottlenecks, congestion, or unused resources, do performance
analysis and monitoring.
3. Backup Verification:
Verify the backups' accessibility and integrity for both data and configurations.
Make sure the backups are current.
Weekly Maintenance:
1. Hardware Check:
Verify the physical state of network hardware, such as servers, switches, and routers,
to make sure everything is in excellent operating order. As needed, clean and swap
out components.
2. Security Assessment:
Perform a thorough security evaluation that includes penetration testing and
vulnerability scanning. Take care of any flaws or vulnerabilities discovered.
3. Policy and Procedure Review:
Examine and revise the network's policies and guidelines. Make sure they comply
with the most recent standards for compliance and best practices.
Install and configure Network services, devices, and applications (Ex: VLAN,
Wi-Fi, DNS, Proxy, Web, Etc.)
1. open windows server 2012 R2 and click install.
4. select custom
Open Server Manager > Open “Manage” > Add Roles and Features > Select Role Base
Installation >Click Next and continue >Then Select Active Directory Domain Service Role
> Click Next and Install
NetBIOS name is used for legacy domain controller to identify existing domain control.
Notification Bar > Configure >Add a New Forest > Name ABC.Com > Click Next >
Recover Password > Next > NetBIOS > Default > Next > Install.
Login to Client PC> Right click “This PC”> Properties> Change Settings> Change> in the
domain box fill the “Domain Name” > Click OK>Auto Restart the computer.
*The first domain controller will be a DNS server with the default configuration
This is used to configure the host name into IP address. Without this cannot access to other
computers by the name.
Right click Domain Name> New Host> Dialog Box> Company Name> IP Address> Add
Host> OK> Done.
DHCP Configuration
Dynamic Host Configuration is a network management protocol used for dynamically assign
IP in the network. This is how we configure to enclave film network a DHCP Server.
Login to Server > Server Manager> Manage> Add Roles and Features> Next> In the Dialog
Box click “DHCP Server Enable”> Click Next to the Installation> Install> Notification
Bar> DHCP Configuration Complete > Next >
Although Active Directory should provide the authorization for issue IP address from
DHCP Server.
Server Manager> Tools> DHCP> Server name> IPV4 and IPV6> Right click IPV4> Select
“New Scope”> Click Next> Name of Scope> IP Address range> Next> Least Duration(This
means once a clients gets an IP Address it will be valid within the least duration) > Next>
As next option DHCP scope need to be configured> Route Default gateway IP Address>
Next> Configure Domain Name and DNS server IP Address> Next> Activate the DHCP
Scope
Login Server Manager>Add Roles and Features> Click Next> Select Next again> Click the
Web Server Enable > Click Next> Click Next >Then Install