0% found this document useful (0 votes)
38 views

Unit 02 Networking Redone

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views

Unit 02 Networking Redone

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 103

INTERNAL VERIFICATION – ASSIGNMENT BRIEF

Programme Title: HND in Computing


Assessor Name: Oshada Lokuhetty
Internal Verifier Name:

Unit or Component Number


and Title: Unit 02 - Networking

Assignment title: LAN Design & Implementation for Alliance Health


Assessment criteria targeted
by this assignment brief: LO1, LO2, LO3, LO4

Is this an Authorised N/A


Assignment Brief published
by Pearson? If so, has it been
amended by the Assessor in
any way? Please give details.
(If using the Authorised Assignment
Brief ‘off the shelf’ with no
amendments, please answer the
question marked * in the checklist
only)

Has this assignment been Yes No


submitted to the Assignment
Checking Service?
(If Yes, please keep a copy of the

ACS feedback with this form)

INTERNAL VERIFIER CHECKLIST Y/N

Are the programme and unit details accurate? Y

*Are clear deadlines for assessment given? TBC

Is the time frame of an appropriate duration? Y

Is there a suitable vocational scenario or context? Y

Are the assessment criteria to be addressed stated accurately? Y

Does each task show which criteria are being addressed? Y

Do the tasks meet the assessment requirements of the unit/s? Y

Is it clear what evidence the learner needs to generate? Y

Is it likely to generate evidence that is valid and sufficient? Y

Overall, is the Assignment fit for purpose? Yes √ No


*If ‘No’ is recorded the Internal Verifier must recommend actions detailing the issues to be addressed.
The Assessor and the Internal Verifier must then confirm that the action has been undertaken and that
the Assignment Brief is authorised for use before being issued to learners.

M M Yahya Ahkam Networking Assignment 01 1|Page


Date
Target Date
Action required: Action
for
(If none then please state n/a) Complete
Completion
d

General Comments (if appropriate)

Assignment Brief Authorised for Use:

Internal Verifier signature Date

Assessor signature
Date

Lead Internal Verifier


signature (if appropriate) [email protected] Date 2022/06/13

Higher Nationals
M M Yahya Ahkam Networking Assignment 01 2|Page
Internal verification of assessment decisions – BTEC (RQF)
INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Programme title BTEC Higher National Diploma in Computing

Assessor Internal Verifier


Unit 02: Networking
Unit(s)
LAN Design & Implementation for Alliance Health
Assignment title
Munawwar Mohamed Yahya Ahkam
Student’s name
List which assessment criteria Pass Merit Distinction
the Assessor has awarded.

INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded match


those shown in the assignment brief? Y/N

Is the Pass/Merit/Distinction grade awarded


justified by the assessor’s comments on the Y/N
student work?
Has the work been assessed Y/N
accurately?
Is the feedback to the student:
Give details:
• Constructive? Y/N
• Linked to relevant assessment criteria? Y/N
Y/N
• Identifying opportunities for
improved performance?
Y/N
• Agreeing actions?
Does the assessment decision need Y/N
amending?

Assessor signature Date

Internal Verifier signature Date


Programme Leader signature (if required)
Date
Confirm action completed
Remedial action taken
Give details:

Assessor signature Date


Internal Verifier
signature Date

Programme Leader
signature (if required) Date

M M Yahya Ahkam Networking Assignment 01 3|Page


Higher Nationals - Summative Assignment Feedback Form
Student Name/ID Munawwar Mohamed Yahya Ahkam
Unit Title Unit 02: Networking

Assignment Number 1 Assessor


25.10.2023 Date Received
Submission Date 1st submission
09/11/2024 Date Received 2nd
Re-submission Date submission

Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction P1 P2 M1 D1
Descripts

LO2 Explain networking devices and operations.


Pass, Merit & Distinction P3 P4 M2
Descripts

LO3 Design efficient networked systems.


Pass, Merit & Distinction P5 P6 M3 D2
Descripts

LO4 Implement and diagnose networked systems.


Pass, Merit & Distinction P7 P8 M4
Descripts

Grade: Assessor Signature: Date:

Resubmission Feedback:

Grade: Assessor Signature: Date:

Internal Verifier’s Comments:

Signature & Date:

* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.

M M Yahya Ahkam Networking Assignment 01 4|Page


Assignment Feedback
Formative Feedback: Assessor to Student

Action Plan

Summative feedback

Feedback: Student to Assessor

Assessor Date
signature

Student Date
signature

M M Yahya Ahkam Networking Assignment 01 5|Page


Pearson Higher Nationals in
Computing
Unit 02: Networking
Assignment 01

M M Yahya Ahkam Networking Assignment 01 6|Page


General Guidelines

1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.

Word Processing Rules

1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.

Important Points:

1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body
except for the before mentioned compulsory information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and
a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course

M M Yahya Ahkam Networking Assignment 01 7|Page


M M Yahya Ahkam Networking Assignment 01 8|Page
Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct form. I further understand what it means to
copy another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of Pearson UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my
own, and where I have made use of another’s work, I will attribute the source in the correct
way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Pearson, UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.

[email protected] 25.10.2023
Student’s Signature: Date:
(Provide E-mail ID) (Provide Submission Date)

M M Yahya Ahkam Networking Assignment 01 9|Page


Higher National Diploma in Computing
Assignment Brief
Student Name /ID Number Munawwar Muhamed Yahya Ahkam COL00194129

Unit Number and Title Unit 2: Networking

Academic Year 2022/23

Unit Tutor Mrs. Fathima

Assignment Title LAN Design & Implementation for Alliance Health

Issue Date

Submission Date 25.10.2023

IV Name & Date

Submission format

The submission should be in the form of an individual report written in a concise, formal business style
using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using Harvard
referencing system. Please also provide an end list of references using the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures, although
you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:

LO1 Examine networking principles and their protocols.

LO2 Explain networking devices and operations.

LO3 Design efficient networked systems.

LO4 Implement and diagnose networked systems.

Assignment Brief and Guidance:

M M Yahya Ahkam Networking Assignment 01 10 | P a g e


Scenario

Alliance Health is a technology-enabled solutions company that optimizes the revenue cycle of the US
healthcare industry where its global delivery center is located in Colombo. The company is planning to
expand their business operations with their latest branch at Matara and wants it to be one of the
state-of-the-art companies in Matara with the latest facilities.

Assume you have been appointed as the new network analyst of Alliance Health to plan, design and
restructure the existing network. Prepare a network architectural design and implement it with your
suggestions and recommendations to meet the company requirements.
The floor plan of the head office in Colombo is as follows:
Floor 1:
 Reception area
 Sales & Marketing Department (10 employees)
 Customer Services Area – with Wi-Fi facilities

Floor 2:
 Administration Department (30 Employees)
 HR Department (20 employees)
 Accounting & Finance Department (15 employees)
 Audit Department (5 employees)
 Business Development Department (5 employees)

Floor 3
 Video conferencing room
 IT Department (60 employees)
 The Server Room

M M Yahya Ahkam Networking Assignment 01 11 | P a g e


The floor plan of the branch in Matara is as follows:
Floor 1:
 Reception area
 Customer Services Area– with Wi-Fi facilities

Floor 2:
 Administration Department (10 Employees)
 HR Department (7 employees)
 Accounting & Finance Department (8 employees)
 IT Department (50 employees)

Following requirements are given by the Management.


 All the departments must be separated with unique subnet .

 The conferencing room of the head office and Customer Services Areas of each
branch are to be equipped with Wi-Fi connections .

 Connectivity between two branches (Head Office and Matara) would allow the intra
branch connectivity between departments. (Use of VPN is not compulsory)

 The necessary IP address classes and ranges must be decided by the network
designer and should be used for all the departments except the server room .

 Number of servers required for the Server room need to be decided by the
Network designer and should be assigned with 10.254.10.0/24 subnet. (Uses static
IPs )

 Sales and Marketing Team also needs to access Network resources using WIFI
connectivity.

(Note: Clearly state your assumptions. You are allowed to design the network according to your
assumptions, but main requirements should not be violated)

M M Yahya Ahkam Networking Assignment 01 12 | P a g e


Activity 01
 Discuss the benefits and constraints of different network system types that can be
implemented in the Matara branch and the main IEEE Ethernet standards that can
be used in above LAN and WLAN design.

 Discuss the importance and impact of network topologies and assess the main
network protocol suites that are used in network design using examples.
Recommend suitable network topology and network protocols for above scenario
and evaluate with valid points how the recommended topology demonstrates the
efficient utilization of the networking system of Matara branch.

Activity 02
 Discuss the operating principles of network devices (Ex: Router, Switch, Etc.) and
server types that can be used for above scenario while exploring different servers
that are available in today’s market with their specifications. Recommend
server/servers for the above scenario and justify your selection with valid points.

 Discuss the inter-dependence of workstation hardware and networking software


and provide examples for networking software that can be used in above network
design.

Activity 03
 Prepare a written network design plan to meet the above-mentioned user
requirements including a blueprint drawn using a modeling tool (Ex: Microsoft Visio,
EdrawMax) .T est and evaluate the proposed design by analyzing user feedback with
the aim of optimizing your design and improving efficiency.

(Support your answer by providing the VLAN and IP subnetting scheme for the above
scenario and the list of devices, network components and software used to design the

M M Yahya Ahkam Networking Assignment 01 13 | P a g e


network for above scenario and while justifying your selections.)

 Install and configure Network services, devices and applications (Ex: VLAN,WiFi,
DNS,Proxy, Web, Etc.) according to the proposed design to accomplish the user
requirements and design a detailed Maintenance schedule for above Network.

*Note: - Screen shots of Configuration scripts should be presented.

Activity 04
 Implement a networked system based on your prepared design with valid evidences.

 Develop test cases and conduct verification (Ex: Ping, extended ping, trace route,
telnet, SSH, etc.) to test the above Network and analyse the test results against the
expected results. Recommend potential future enhancements for the networked
system with valid justifications and critically reflect on the implemented network,
including the plan, design, configurations, tests and the decisions made to enhance
the system.

M M Yahya Ahkam Networking Assignment 01 14 | P a g e


M M Yahya Ahkam Networking Assignment 01 15 | P a g e
Grading Rubric

Grading Criteria Achieved Feedback

LO1 : Examine networking principles and their protocols.

P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Assess common networking principles and how protocols enable
the effectiveness of networked systems.

LO2 : Explain networking devices and operations

P3
Discuss the operating principles of networking devices and
server types.
P4
M M Yahya Ahkam Networking Assignment 01 16 | P a g e
Discuss the interdependence of workstation hardware and
relevant networking software
M2
Explore a range of server types and justify the selection of a
server for a given scenario, regarding cost and performance
optimisation

LO 1 & LO2
D1 Evaluate the topology protocol selected for a given scenario and
how it demonstrates the efficient utilisation of a networking system.
LO3 : Design efficient networked systems

P5
Design a networked system to meet a given specification.
P6
Design a maintenance schedule to support the networked
system.

M3

M M Yahya Ahkam Networking Assignment 01 17 | P a g e


Analyse user feedback on your designs with the aim of
optimising your design and improving efficiency.
D2
Critically reflect on the implemented network, including the
design and decisions made to enhance the system.
LO4 : Implement and diagnose networked systems

P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D2 Critically reflect on the implemented network, including the
design and decisions made to enhance the system.

M M Yahya Ahkam Networking Assignment 01 18 | P a g e


Acknowledgment

I would like to take this opportunity to sincerely thank everyone who has assisted me in
completing this assignment. I would want to express my gratitude to Mrs.Fathima, the
professor at the ESOFT Metro Campus, for her tireless efforts to guide and instruct us as we
work toward our academic objectives. Thanks to her expertise, experience, and dedication, I
now have a deeper understanding of each of our specific subjects of study and practical skills
that will help us in our future careers. She taught real estate in this unit. She gave us
instructions on how to accomplish the task. I was able to complete this homework
satisfactorily because of this.

I would want to sincerely thank everyone who has assisted me in my studies and application
of networking. The following individuals have my sincere gratitude for their crucial work,
which has greatly enhanced the enlightening nature of this encounter. I would like to begin by
thanking my teacher for her guidance and expertise during this study session. His passion for
teaching and ability to simplify difficult tasks have made a significant contribution to my
grasp of networking.

M M Yahya Ahkam Networking Assignment 01 19 | P a g e


Contents
1. Introduction about network and types of Network........................................................24
1.1 What is network?................................................................................................... 24
1.2 How does computer network works......................................................................25
1.3 Types of network devices.......................................................................................27
1.3.1 Local Area Network (LAN)...................................................................................27
1.3.1.1 Benefits and constraint of Local Area Network..........................................28
1.3.2 Metropolitan Area Network (MAN)....................................................................29
1.3.3.1 Benefits and constraint of Metropolitan Area Network (MAN)..................30
1.3.3 Personal Area Network (PAN).............................................................................30
1.3.3.1 Benefits and constraint of Personal Area Network (PAN)...........................32
1.3.4 Wide Area Network (WAN).................................................................................34
1.3.4.1 Benefits and constraint of Wide Area Network (WAN)...............................35
1.4 Network standards.................................................................................................36
1.5 Network Topology..................................................................................................37
1.5. Network Protocol................................................................................................... 43
2. Networking Devices and Servers....................................................................................47
2.1. Networking devices............................................................................................47
2.2.1. Types of Networking devices..........................................................................47
2.2. Servers....................................................................................................................52
2.2.1. Types of servers..............................................................................................53
2.3. inter-dependence of workstation hardware and networking software.................55
3. Network design and Blueprints...........................................................................57
Designing the plan for alliance health................................................................................57
Implementing the Network................................................................................................59
Design a maintenance schedule to support the networked system...................................71
4. Implement a networked system based on your prepared design with valid evidence.
Develop test cases and conduct verification (Ex: Ping, extended ping, trace route, telnet, SSH,
etc.) to test the above Network...............................................................................................76
Develop test cases and conduct verification......................................................................97
References............................................................................................................................103

M M Yahya Ahkam Networking Assignment 01 20 | P a g e


Figure 1 network.................................................................................................................... 24
Figure 2 client server network................................................................................................25
Figure 3 Peer-to-peer network...............................................................................................26
Figure 4 Local Area Network (LA)...........................................................................................27
Figure 5 MAN Netwot.............................................................................................................29
Figure 6 Personal Aea Network (PAN)....................................................................................31
Figure 7 Wide Area Network (WAN).......................................................................................34
Figure 8 Bus Topology............................................................................................................ 39
Figure 9 Ring Topologies.........................................................................................................39
Figure 10 Mesh Topology.......................................................................................................40
Figure 11 Tree Topology.........................................................................................................41
Figure 12 Star Topology..........................................................................................................42
Figure 13 Hybrid Topology..................................................................................................... 43
Figure 14 Router.....................................................................................................................47
Figure 15 HUB.........................................................................................................................48
Figure 16 Bridge..................................................................................................................... 49
Figure 17 Gateway..................................................................................................................49
Figure 18 Access Point............................................................................................................50
Figure 19 Modem................................................................................................................... 51
Figure 20 Switch..................................................................................................................... 51
Figure 21 Repeater................................................................................................................. 52
Figure 22 Bluprint of Matara branch......................................................................................57
Figure 23 Blueprint of Colombo branch.................................................................................58
Figure 24 Network system......................................................................................................60
Figure 25 IP Allocation for Alliance Health Colombo..............................................................60
Figure 26 IP Allocation for Alliance Health Matara.................................................................60
Figure 27 Cisco Packet Tracer Network Prototype 1..............................................................64
Figure 28 Cisco Packet Tracer Network Prototype 2..............................................................64
Figure 29 VLAN SWITCHPORT Configuration..........................................................................65
Figure 30 Router IP Address Configuration............................................................................66
Figure 31 Router show run Configuration 1...........................................................................67
Figure 32 Router show run Configuration 2...........................................................................68
Figure 33 Router show run Configuration 3...........................................................................69
Figure 34 Router show run Configuration 4...........................................................................70

M M Yahya Ahkam Networking Assignment 01 21 | P a g e


1. Introduction about network and types of
Network
1.1 What is network?
A computer network is a group of interconnected computing devices that
exchange data and resources with each other. A network connection
between these devices can be established using cable or wireless media.
After a link is made, data is exchanged between the networked devices
using communication protocols such TCP/IP, Simple Mail Transfer
Protocol, and Hypertext Transfer Protocol. The Advanced Research
Projects Agency Network was the first computer network in existence.

Figure 1 network
ARPA, a Department of Defense agency in the United States, developed
this packet-switched network in the late 1960s (Kinza Yasar, n.d.).

M M Yahya Ahkam Networking Assignment 01 22 | P a g e


1.2 How does computer network works.
In order for devices connected to a computer network to communicate
with one another on other computer networks and the internet, their IP
addresses must be resolved into hostnames by a domain name system
server. The transfer of data among endpoints is also specified by a
number of protocols and algorithms. For network systems to function, a
set of rules or regulations must be adhered to. The International
Organization for Standardization, the American National Standards
Institute, IEEE, and other standards organizations create standards,
which are a collection of data communication guidelines needed for
information sharing between devices. For instance, the 802.11 standard
describes connectivity for wireless local area networks (WLANs), while
the Ethernet standard creates a common communication language for
cable or physical networks (Kinza Yasar, n.d.).

A computer network must be physically and logically designed in such a


way that makes it possible for the underlying network elements to
communicate with each other. This layout of a computer network is
known as the computer network architecture.

The following are the two most common computer network architectures:
1. Client-server: In this architecture, there are numerous clients, or
nodes, and a central server that is at least one network node. In this

M M Yahya Ahkam Networking Assignment 01 23 | P a g e


paradigm, all resources are installed on the central server, which is
requested by the clients instead of sharing resources.

2. Peer-to-peer (P2P): On this network, every connected device has the


same privileges and acts both as the client and the server. The
network as a whole shares each peer's resources, including memory,
processing power, and printing capabilities. A lot of businesses host
memory-intensive programs, such three-dimensional graphics, across
several network devices using the P2P architecture.

Figure 2 client server network

Figure 3 Peer-to-peer network

Network capacity is another important consideration in a well-defined


computer network. The amount of traffic that a network can handle at
any given time and yet maintain service-level agreements is known as its
capacity. It is expressed in terms of bandwidth, which is the highest
amount of bits per second that a network device is theoretically capable
of carrying.

M M Yahya Ahkam Networking Assignment 01 24 | P a g e


1.3 Types of network devices
There are mainly four types of networks.
1. Local Area Network (LAN).
2. Metropolitan Area Network (MAN).
3. Personal Area Network (PAN).
4. Wide Area Network (WAN).

1.3.1 Local Area Network (LAN).


A collection of connected computers and peripherals in a small
space, such as a home, office building, lab, or school, is called a local
area network, or LAN. For sharing resources like files, printers, games,
and other applications, this is a very helpful network. A LAN network can
be as simple as connecting a person's office or home computers and
printer. LANs will be utilized as one kind of communication medium in

Figure 4 Local Area Network (LA)


general. Less than 5000 networked devices spread over multiple
buildings make up this network (Williams, n.d.).
Features of LAN Network.
 Network size is limited to a small geographical area, presently to a few
kilometers.
 Data transfer rate is generally high. They range from 100 Mbps to 1000
Mbps.

M M Yahya Ahkam Networking Assignment 01 25 | P a g e


 Generally speaking, a LAN only makes use of one kind of
communication medium, most frequently category 5 coaxial cables.
 The topologies of LANs set them apart from other types of networks.
Common topologies include mesh, star, ring, and bus.
 Typically, a LAN can only have a certain number of computers
connected. in other word, LAN scalability is restricted.

1.3.1.1 Benefits and constraint of Local Area Network


LAN Network benefits LAN Network constraint
 Resources sharing:  restricted geographic coverage,

Every resource is linked to a usually confined to a school or


single network, allowing building.
computers to exchange  limited ability to scale for bigger
resources with one another networks.
when needed. Hardware drives,  susceptible to security lapses
printers, scanners, modems, in the absence of appropriate
and DVD drives are some of
safeguards.
these resources. You can save
 Important information about
money by not having to
purchase different resources for an organization may be
every computer. accessible to unauthorized
 Internet sharing: users if the LAN administrator
Every PC has a shared internet is unable to safeguard the
connection. This technology is
central database.
an additional kind of local area
 It does not provide good
network (LAN), wherein the
primary Internet connection is privacy because the LAN
linked to a server and dispersed administrator can view the
among the linked machines via personal data files of any LAN
the operating system. user.
 Data security:
Data will be easier to handle in a single
location, increasing data security.
 Easy and fast communication:
In local area networks,
computers can exchange data
and messages easily and
quickly. This saves time and

M M Yahya Ahkam Networking Assignment 01 26 | P a g e


gets things done faster.

Table 1Benefits and constraint of LAN

1.3.2 Metropolitan Area Network (MAN).


A computer network that covers a metropolitan area, usually a
city, is called a Metropolitan Area Network (MAN). It offers fast data
transfer between various LANs (Local Area Networks) and WANs (Wide
Area Networks), including audio, video, and data transport. A MAN's
primary function is to link the various local area networks (LANs) in a city
together so that users may access the internet and share resources and
data. Larger than a LAN but smaller than a WAN, a MAN usually spans

Figure 5 MAN Netwot


many kilometers in space (VishwashVishwakarma, n.d.).
Features of Metropolitan Area Network (MAN).
 Users with internet connectivity can access and use computer
resources within this network.
 The FDDI (Fiber Distributed Data interface), ATM (Asynchronous
Transfer Mode), and MDS (Switched Multi-Megabit Data Service)
technologies are utilized in MAN networks.
 A MAN {Metro Politian Area} is installed in a big organization or in
a university.

M M Yahya Ahkam Networking Assignment 01 27 | P a g e


 The MAN uses numerous LAN networks for connectivity.

1.3.3.1 Benefits and constraint of Metropolitan Area Network (MAN).

Table 2benefits and constraint of MAN Network

MAN Network benefits MAN Network constraint


 Cost-effective:  Bandwidth Constraints:
MAN requires fewer resources MANs frequently have

compare to WAN. This saves bandwidth restrictions, and in


order to maintain optimal
the implementation cost.
performance, network
 Secure:
administrators must make sure
MAN provides more security
the network stays within these
as compared to WAN and it is
bounds.
easy to implement.  Bandwidth Constraints:
 Improved communication: Certain applications, such as
MANs can improve real-time video conferencing or
communication within online gaming, may have strict
organizations by allowing for latency requirements within a

faster and more efficient MAN. Network administrators

sharing of data and need to manage the network to


meet these constraints.
resources.
 Security Constraints:
 Improved performance and
Security is crucial in any
productivity
network. In a MAN, security
constraints may include
implementing firewalls,
intrusion detection systems,
and encryption to protect data
as it traverses the network.

M M Yahya Ahkam Networking Assignment 01 28 | P a g e


1.3.3 Personal Area Network (PAN).
A PAN network is a kind of network that links devices that are nearby.
The purpose of a PAN is to link small devices to one another. To establish
the connection, no routers nor a direct internet connection are required.
Users of personal area networks can create an ad hoc network and
exchange data between small devices (Finlay, D., 2016).

The connection can be wireless or wired and is limited to a few meters.


Depending on the technology used, a line-of-sight connection is also
required. You can set up wireless PANs using these technologies:
 Bluetooth
 Infrared (IR)
 Wi-Fi

Figure 6 Personal Aea Network (PAN)


Features of Personal Area Network (PAN).
 Control the PAN network conducted through private authority.
 In connecting several individuals using access points to connect
PCs, laptops, and various home security system devices based on
communication data, television, and also the internet network.
 Sending personal data.
 The distance is only a few meters.
 Using techniques such as WAP, Bluetooth, infrared, Wi-Fi and
others.

M M Yahya Ahkam Networking Assignment 01 29 | P a g e


1.3.3.1 Benefits and constraint of Personal Area Network (PAN).

Table 3 Benefits and constraint of PAN.

PAN Network benefits PAN Network constraint


 Security:  Limited Range:
Personal Area Network is more PANs are far more limited in range
secure as compared to other than other kinds of networks. For

networks that are wired such example, the normal range of


Bluetooth is about 30 feet (10
as Ethernet. Data encryption is
meters). When devices need to
used by Personal Area Networks
communicate over longer
to secure data that is
distances, this range limitation
consumed or transferred by
may become an obstacle.
networked devices. To prevent  Interference:
assault or disruption from any PANs frequently use unlicensed
other party outside the frequency ranges, which can cause
network, all devices wishing to interference from neighboring
transmit data within it must networks or devices. The

first obtain permission from the consistency and quality of

authorized party. connections may be impacted by


this interference.
 Easy to use:
 Data Transfer Speed:
Personal area networks are
PANs are limited in their ability to
user-friendly and simple to use.
send huge volumes of data quickly
The gadgets link to other
because of their comparatively
devices that are available
modest data transfer speeds. For
without any issues. The user instance, streaming HD video may
has access to the device list

M M Yahya Ahkam Networking Assignment 01 30 | P a g e


and can choose any device that not be appropriate via Bluetooth.
is listed. The gadget  Device Compatibility:

immediately establishes a It can be difficult to get multiple


devices and protocols in a PAN to
connection after being chosen.
work together. The PAN
Because each device has a
technologies that each device
distinct IP address, they are
supports varies, which may restrict
also easily recognizable and
the devices' capacity to connect
straightforward to operate. and communicate with one
 Cost Effective: another.
There is no need for cables or
wires to establish a connection
between devices because they
are all connected to the
network. Radio frequency
technology is used to connect
the gadgets instead of cords.
The gadgets connect to other
devices in the network using
Bluetooth or Wi-Fi. There are no
extra data fees associated with
using the internet.
Consequently, a personal area
network is less expensive than
other types of networks.
 Synchronization:
In personal area networks,
synchronizing data is simple.
The network's connected
gadgets can readily
synchronize their data. Users
can upload, download, and
exchange data amongst their
network-connected devices.

M M Yahya Ahkam Networking Assignment 01 31 | P a g e


 Versatile:
A personal area network has
several applications. It is
utilized in numerous devices,
including smart TVs, printers,
headphones, AC remotes, and
Bluetooth. Personal area
networks are employed in
smaller area applications due to
their ease of connection.

1.3.4 Wide Area Network (WAN).


In order for the component networks to exchange data inside the
designated WAN group, a wide area network (WAN) is a connected
collection of telecommunication networks dispersed across a vast
geographic region spanning many cities, territories, or nations.
a wide area network (WAN) is any collection of networks that are not
physically close to one another. Given that devices located in different
parts of the world may connect with one another, it follows that the
public internet that we use on a daily basis is a form of wide area
network (WAN). Wide area networks, however, have more specialized
uses in enterprise IT. It describes a collection of interconnected
networks that function in a private setting and are usually managed by
one organization, a conglomerate, the government, or a collection of
government agencies (BasuMallick, 2022).

M M Yahya Ahkam Networking Assignment 01 32 | P a g e


Figure 7 Wide Area Network (WAN)

Features of Wide Area Network (WAN).


 A wide area network (WAN) has the capacity to link numerous
computers over a large distance.
 A WAN enables your other sites to access the same information in
real-time if you need to connect places over a wide geographic
area, such as a country or region.
 Integrate and link MANs, LANs, and more networks into your WAN
to provide a comprehensive experience.
 Usually constructed with resilience and redundancy to make sure
your end users connecting to your WAN are unaffected in the event
of a line breakdown.
 often exclusive networks for one company

1.3.4.1 Benefits and constraint of Wide Area Network (WAN).

Table 4 Benefits and constraint oF WAN

WAN Network benefits WAN Network constraint


 Large area coverage:  Bandwidth Limitations:
WAN covers a large In general, local area networks
geographical area (1000 km or (LANs) have more bandwidth
more than). than wide area networks (WANs).

M M Yahya Ahkam Networking Assignment 01 33 | P a g e


 Higher bandwidth: The speed at which data may be
WAN networks usually cover sent between sites may be
large geographical areas. impacted by this limitation,
Ex.1000 km or more than the which may lead to reduced data
wide area network has higher transfer rates.
bandwidth than LAN and MAN  Cost:
networks. The expenses associated with
 Centralized data: WAN infrastructure expansion
You can share the data and upkeep may restrict the
connected to every device in funds available for network
the respective network by upgrades and enhancements.
using the WAN network.  Scalability:
 Message Exchange: WANs must be designed to
With the help of the Internet of accommodate growth and
Things (IoT) and LAN, a sudden scalability, as the network
growth of WAN-based devices requirements of an organization
can be seen. With the aid of may change over time.
widely used apps like  Quality of Service (QoS):
WhatsApp and Messenger, this To satisfy performance
messaging conversation can be requirements, it is imperative to
completed more quickly. make sure that bandwidth
allocation on the WAN gives
precedence to vital applications.
 Security Concerns:
WANs are more susceptible to
security risks that could
jeopardize sensitive data and the
integrity of the network, such as
malware, unauthorized access,
and data breaches.

M M Yahya Ahkam Networking Assignment 01 34 | P a g e


1.4 Network standards
In essence, standards offer a guarantee for data and telecommunication
compatibility. It offers guidelines for what should be included in
communications with other countries. The data transmission guidelines
required for networking technologies and procedures to work together
are defined by networking standards. Standards support the
development and upkeep of free markets by enabling competition
amongst sellers based on the caliber of their goods while ensuring
compatibility with already-available goods (Griffin, n.d.).
E.g.: IEEE 802 – About LAN & MAN

There are many standards organizations around the world.


 ISO (International Organization for Standardizations)
 ANSI(American National Standards Institute
 IEEE (Institute of Electrical and Electronic Engineers)
 ITIC (Information Technology Industrial Council)
 IETF (Internet Engineering Task Force)
 W3C (World Wide web Consortium)

ISO (International Organization for Standardizations)


ISO standards are varied and far reaching, covering many different areas
of life. More than 100 standards groups from around the world have
joined together to form this federation.

ANSI (American National Standards Institute

M M Yahya Ahkam Networking Assignment 01 35 | P a g e


ANSI is primary organization for fostering the development of technology
standards in the United States and providing various set of rules and
standard for Data Communication.

IEEE (Institute of Electrical and Electronic Engineers)


It is US based professional organization of electronic, computer and
communication engineering. It provides various set of rules and standard
in communication and networking field.

IETF (Internet Engineering Task Force)


The organization that is in charge of the Internet's protocols.

W3C (World Wide web Consortium)


The World Wide Web Consortium is an international organization that develops standards
for the World Wide Web.

1.5 Network Topology


A network topology is the physical and logical arrangement of nodes and
connections in a network. Devices like switches, routers, and software
with switch and router functions are typically included in nodes. Network
topologies are frequently shown as graphs. The configuration of networks
and the relative positions of traffic flows are described by network
topologies. Network topology diagrams can be used by administrators to
identify the best locations for each node and the best route for traffic
flow. A well-defined and organized network architecture makes it easier
for a company to identify problems and resolve them, increasing the
effectiveness of data transport (Gillis, n.d.).

There are various types of network topology in a computer network, such


as:

M M Yahya Ahkam Networking Assignment 01 36 | P a g e


 Bus Topology
 Ring Topology
 Mesh Topology
 Tree Topology
 Star Topology
 Hybrid Topology

Bus Topology
In a bus topology, every node is connected by a single cable, or bus. The
spine of the network is the primary cable. In a bus topology, the bus
connects each node to the drop lines and taps. In this situation, the
connections between the nodes and the central wire or bus are called
drop lines. The drop line and the main central cable are connected with
the help of the Taps, a three-way connector.
Advantages of Bus Topology
 Less cabling: A common wire connects all nodes in a bus
topology.
 Less Expensive: Bus topology is less expensive because it uses a
common wire.
 Small network: This is best suited for situations where only a few
computers are required for connection establishment.
 Upgradeable: A new node can be added or removed in this
topology without affecting the other nodes.
Disadvantages of Bus Topology
 Reduced signal strength: To connect a more significant number of
nodes, we must increase the number of Taps, Drop Lines, and the
central cable. And increasing these things will weaken the signal.
 Core failure: If the main central cable becomes damaged or faulty,
the entire network will fail.

M M Yahya Ahkam Networking Assignment 01 37 | P a g e


 Low security: This is a significant security issue because all nodes
in the network can hear what data is transmitted to other nodes in

Figure 8 Bus Topology


the network.
Ring Topology
Every computer in a ring topology is connected to every other computer
on both sides. A ring is formed when the final computer is connected to
the first. With this topology, any computer can have precisely two
neighbors.

Figure 9 Ring Topologies

Advantages of Ring Topology


 Token system: Data can only be sent by nodes that possess
tokens.
 Less Cabling: Less cabling is needed because each node is
responsible for managing the cable to its nearest neighbor.

M M Yahya Ahkam Networking Assignment 01 38 | P a g e


 Easier troubleshooting: Because nodes or cable defects are clearly
visible, it is easier to manage and install.
Disadvantages of Ring Topology
 Difficult to upgrade: Because it interferes with network operations,
adding or removing nodes is problematic.
 Network failure: A single system crash affects the network's ability
to function as a whole.

Mesh Topology
A network architecture known as mesh topology links the machines
together via a number of redundant connections. There are several ways
to go between computers. It is devoid of any hub, switch, or central
computer that functions as a communication point.

Figure 10 Mesh Topology

Advantages of Mesh Topology

M M Yahya Ahkam Networking Assignment 01 39 | P a g e


 Consistent: Mesh topology networks are dependable because
connected computers can still communicate with one another even
in the event of a connection breakdown.
 High-speed information exchange: Nodes can communicate with
each other very quickly.
 Simpler reconfiguration: Adding new devices wouldn't obstruct
existing devices' ability to communicate with one another.
Disadvantages of Ring Topology
 cost: Compared to other topologies, a mesh topology employs
more transmission media and contains more connected devices,
including routers.
 High maintenance: Mesh topology networks require a lot of upkeep
and management.
 Efficiency: This architecture has a large number of redundant
connections, which lowers network efficiency.
Tree Topology
Tree topologies are also known as hierarchical topology, as the root node
connects all other nodes to form a hierarchy. The fact that this topology
merges multiple star topologies into a single bus has earned it the
moniker "Star Bus topology." A common network architecture that
resembles bus and star topologies is tree topology.

Figure 11 Tree Topology

Advantages of Tree Topology

M M Yahya Ahkam Networking Assignment 01 40 | P a g e


 Because of its tree-like structure, which enables each node to hold
its child, it helps with structuring. And the network as a whole may
be considerably easier to organize as a result.
 All nodes are able to establish connections with the big and
intermediate networks.
 Node expansion: In this network configuration, adding more nodes
is both feasible and simple.
Disadvantages of Tree Topology
 Expensive: It could not be efficient to manage every node in its
offspring. The cost of cabling will also increase.
 Network failure: Every other node could become disconnected if
the main central node or any other link fails.

Star Topology
In a network topology like this, a hub connects every computer. Every
other node is connected to a central node. Because it's inexpensive and
simple to set up, this kind of network topology can be used for local area
networks.

Figure 12 Star Topology

Advantages of Star Topology

M M Yahya Ahkam Networking Assignment 01 41 | P a g e


 Preventing network failure: The impacted nodes will be the only
ones to fail, with the rest nodes continuing to operate.
 Performance: Excellent performance with less network traffic and
few nodes.
 Upgrade: It's easy to add, remove, and move devices with this
topology.
Disadvantages of Star Topology
 Expensive: Installing star topology comes at a considerable
expense.
 Slow connection: The bus may occasionally become noticeably
slower due to high network traffic.

Hybrid Topology
Hybrid topology is a combination of two or more of the basic topologies.
For example, a star-bus topology is a hybrid topology that combines the
star and bus topologies.

Figure 13 Hybrid Topology

Advantages of Hybrid Topology


 Numerous benefits: These kinds of network topologies incorporate
the benefits of several different topologies into one topology.
 Scalable: Because it is simple to incorporate new hardware
components, hybrid networks are readily scalable.

M M Yahya Ahkam Networking Assignment 01 42 | P a g e


 Traffic: These network topologies are incredibly adaptable and
dependable, and they can manage large volumes of traffic.
Disadvantages of Hybrid Topology
 Expensive: This kind of topology is quite costly since it incorporates
the advantages of several topologies into a single topology.
 Complex design: It's challenging to create a hybrid topology.

1.5. Network Protocol


An established set of guidelines that specify how data is transferred
between various devices connected to the same network is known as a
network protocol. In essence, it makes it possible for linked devices to
speak with one another in spite of variations in their underlying
architecture, procedures, or structures. Network protocols are essential
to contemporary digital communications because they make it possible
to communicate with people anywhere in the globe. Similar to how two
people may communicate more easily when they speak the same
language, network protocols allow devices to communicate with one
another through preset rules that are incorporated into the hardware and
software of the devices. Without the use of network protocols, both wide
area networks (WAN) and local area networks (LAN) could not operate as
they do now (Kinza Yasar, n.d.).

There are thousands of different network protocols, but they all perform
one of three primary actions:
 Communication
 Network management
 Security

I recommend using a Hybrid Network Topology for Alliance Health's


Matara branch. A hybrid topology combines the advantages of different

M M Yahya Ahkam Networking Assignment 01 43 | P a g e


network topologies to address specific needs efficiently. In this scenario,
a combination of Star and Bus Topologies will be suitable.

Physical Topology.
The best physical topology for this network is tree topology. because
there are two VLANs on this network, and these two VLANs will be
associated with a second switch, which will be connected to the router.

Logical Topology
For this scenario, For the logical topology type, tree topology is
appropriate. As a result, this network has a high and efficient data flow
and is simple to operate with this topology.
 TCP (Transmission Control Protocol)
 IP (Internet Protocol)
 Web surfing – HTTP (Hypertext Transfer Protocol) Port 80 & 443
 File Transferring – FTP (File Transfer Protocol) Port 20 & 21
 Manage network device secure – SSH (Secured Shell) Port 22
 Remote Access – Telnet Port 23
 Email send – SMTP (Simple Mail Transfer Protocol) Port 25
 Convert domain to IP address – DNS (Domain Name Service) Port
OSI Model
The International Organization for Standardization created the Open System
Intercommunication (OSI) paradigm in 1984. A homogeneous structural architecture that
describes network communication is the OSI model. There are seven layers in the Open
Systems Interconnect paradigm. When it comes to diagnosing network issues, the OSI Model
is quite helpful.

TCP/IP Model
The internet is built upon the TCP/IP protocol, which is a somewhat cohesive suite of linked
protocols rather than a single system. It can be used with a variety of Network Interface layer
protocols, such as Ethernet, in addition to Token Ring and FDDI protocols. The OSI model

M M Yahya Ahkam Networking Assignment 01 44 | P a g e


and the TCP/IP model are identical. The OSI model was developed before this one. This has
more to do with modern network architectures than the OSI model.

Suitable network Topology


Numerous criteria, including the number of nodes to be included in the
network, their geographical distance from one another, finances,
maintenance, operational flexibility, and more, must be taken into
consideration while choosing the best network topology. Each topology
that was previously covered has pros and cons of its own. As a result, it is
subjective to develop and configure the ideal networking model. It is
crucial for any business to compile all criteria and demands prior to
implementing a certain network topology.

Suitable network protocol


An established set of guidelines that control data transmission between
various devices connected to the same network is known as a network
protocol. In essence, it lets linked devices communicate with one another
without requiring adjustments to their underlying architecture,
procedures, or structures. These are the handful of protocols that the new
network solution will employ. When establishing new networks, IPv4, Fast
Ethernet, TCP, and DNS are preferred over IPv6. The ability to monitor
network manipulation is increased by the IPv4 protocol, and configuring
IPv4 settings is far simpler than IPv6 settings. Using Fast Ethernet
interface for network cabling is the new network solution. Most network
switches and routers are compatible with Fast Ethernet, which offers
100Mbps of bandwidth for networking.

M M Yahya Ahkam Networking Assignment 01 45 | P a g e


2. Networking Devices and Servers

2.1.Networking devices
Network Devices: Network devices, also known as networking hardware,
network devices are the actual hardware pieces that enable interactivity
and communication amongst other hardware on a computer network
(Schrader, 2019).
For example, Repeater, Hub, Bridge, Switch, Routers, Gateway and NIC,
etc.

2.2.1. Types of Networking devices


1. Router:
A router directs data requests from one network to another. Routers
examine incoming packets to determine the appropriate destination IP
address and then forward the packet to that destination. A router can
facilitate internet access by connecting to a modem or by acting as a
modem-router combo. Routing tables, which include route information
such IP addresses and interfaces, are maintained and used by routers.
When a router examines a packet, it consults the routing table to
determine the most direct route to the intended destination. Routing
protocols are used by routers to exchange data and communicate.

Figure 14 Router

M M Yahya Ahkam Networking Assignment 01 46 | P a g e


2. Hub:
A hub is a physical device used to join multiple devices on the same LAN.
For example, a laptop, desktop computer and printer can connect into a
hub's ports with Ethernet cables and be part of the same local network. A
hub must connect to a router or switch in order to communicate outside
its LAN. Hub devices can also connect to each other to expand the
overall network. As long as the hub's settings are set up to accommodate
the incoming data's formatting, it can handle both digital and analog
data. Hubs only transmit data packets to all connected devices; they
don't carry out addressing or packet filtering tasks. According to the
Open Systems Interconnection (OSI) paradigm, hubs function at the
Physical layer.

Figure 15 HUB

3. Bridge:
By connecting two or more LANs, a network bridge effectively unifies
the disparate LANs into a single domain. In this sense, a bridge differs
from a router, which permits connection between various networks but
treats them as separate systems. Bridge devices have switching
capabilities, with which they forward incoming data frames by
examining media access control (MAC) addresses. A bridge creates a
lookup table of MAC addresses and port locations with each frame it

M M Yahya Ahkam Networking Assignment 01 47 | P a g e


receives. When a MAC address is outside of the bridge's domain, the
bridge consults this database to decide whether to forward a frame
along or discard it.

Figure 16 Bridge

4. Gateway:
A gateway is a network node that connects discrete networks or systems
that use different protocols, enabling data to flow between the networks.
Gateways use multiple protocols and translate an incoming packet's
information and protocol to make it compatible with the destination
environment. After a gateway processes the data packet, it typically
forwards it on to a router, which sends the packet toward its destination
within the network. Types of gateways include routers, web application
firewalls and email security gateways. Gateways are also frequently used

M M Yahya Ahkam Networking Assignment 01 48 | P a g e


within IoT and cloud environments. Gateways can operate at any layer of
the OSI model.

5. Access point:
An access point (AP) is a device that sends and receives data wirelessly
over radio frequencies, using 2.4 GHz or 5 GHz bands. In order for clients
—such as laptops or mobile phones—to join the wireless LAN that the AP
has established, they must first establish a wireless connection with the
AP. The AP is physically connected via an Ethernet cable to a wired LAN
router or switch, giving it access to the internet and the entire network.
Wireless teams must take into account a variety of considerations when
deploying APs, including channel interference, attenuation, and location,
all of which can affect signal strength. Engineers typically install access
points (APs) on walls or ceilings to optimize signal coverage and reduce
potential obstructions.

Figure 18 Access Point

6. Modem:
A modem's primary function is to transform signals between devices,
such as analog to digital, by modulating and demodulating them.
These days, the most popular kind of modem is an internet modem,

M M Yahya Ahkam Networking Assignment 01 49 | P a g e


which makes it easier to access the internet by receiving signals from
an ISP and transforming them into digital or radio signals, or any other
format that connected devices can use. Usually, a modem is connected
to a router, which relays internet access to other devices on the
network after receiving it from the modem. Modems can connect via
Wi-Fi, DSL, fiber, or Ethernet cables. Modems with integrated routing
and firewalling capabilities are often offered by ISPs.

Figure 19 Modem

7. Switch:
A network switch uses the MAC address of an incoming frame to
determine its destination before forwarding the data to the appropriate
device. Devices often use Ethernet cables to connect to a switch's ports.
When transferring frames, the switch refers to an address table that has
stored the MAC addresses of such devices in. Switches transfer data
straight to the designated destination port, whereas routers forward data
to an IP address or network.

M M Yahya Ahkam Networking Assignment 01 50 | P a g e


8. Repeater:
A signal is amplified and resent to its intended location via a repeater.
Repeaters are used to increase a signal's range, avoid interference,
and fight attenuation. Although they are frequently utilized in wireless
networks, they can also be used with TV broadcasts, telephones, and
Fiber optics. A basic repeater has just two ports: one for incoming
signals and one for outgoing signals. In contrast, a hub allows
numerous devices connected to its ports to receive stronger signals.

Figure 21 Repeater

2.2. Servers
Network servers are high-powered computers used as a central location
for information and different applications that users on a network share.
During their peak, network servers had sufficient power to manage
numerous applications and a large number of user files. But with today's
powerful CPUs and virtualization, the word "network" is sometimes
omitted from the term, leaving only the concept of the general-purpose
server.
Saving work on your local device is a good place to start when working
with critical applications or files, but what happens if you lose access to

M M Yahya Ahkam Networking Assignment 01 51 | P a g e


it? In order to solve this issue, network servers host the files and
applications that are most important to the network and provide
constant, real-time access (Ingalls, 2021).

2.2.1. Types of servers


There are many different types of servers.
1. Database Servers:
They are employed in the network-based storage and distribution of
various databases. A structured data set with predefined properties
that may be shown in a table is called a database. Spreadsheets,
accountancy programs, and any other software program requiring
large-scale access to organized data are among the clients of
database servers. This kind of server allows you to periodically
backup your data from a designated place.

2. Email Servers:
A mail server processes and distributes email messages through a
network. It's a service that receives emails sent by users and routes
them to a different server. Furthermore, it sends emails to end-user
devices, which include home and workplace personal computers.
Simple Mail Transfer Protocol is commonly used by email servers
(SMTP). Even though several protocols are supported by
contemporary mail servers, SMTP is still frequently used. Integrating
email servers with web servers is now the most popular setup for
email servers. This enables users to present data on a website in a
graphical way.

3. Application Server:

M M Yahya Ahkam Networking Assignment 01 52 | P a g e


Application servers act as a link between end users and database
servers. Customers are able to obtain apps without having to
download them to their devices. They are the greatest choice for
business use since they can effectively host big amounts of
application data for numerous users at once.

4. Proxy Server:
Customer resource requests are routed through the server to the
servers hosting the requested resources. It represents the users while
submitting requests, hiding their IP address from the resource
server. Authentication, content screening, error correction, recording,
and monitoring are just a few of the many uses for proxy servers.

5. DNS Server:
The fundamental job of a DNS server is to translate domain names
into the corresponding IP addresses. Additionally, it guarantees that
businesses receive appropriate brand names and that users do not
need to memorize IP addresses. The majority of customers get their
DNS servers from their own ISPs. Still, a number of companies
provide this search for free. People who are especially concerned
about protecting their online privacy frequently use these backup
DNS servers. There is a hierarchy in the way DNS servers are
grouped, with some servers being more dependable than others.

6. FTP Server:
The only purpose of a File Transfer Protocol (FTP) server is to enable
file transfers between users. Clients are granted authorization to
upload and download files from the server following successful
authentication with an FTP client. They can also get whatever file
they want by accessing the contents of the server.

7. File Servers:

M M Yahya Ahkam Networking Assignment 01 53 | P a g e


More advanced file servers have the ability to map networked data
onto disks. It lets users to use the file browser on their PC to explore
directories. The primary advantage of a server is the ability for users
to upload and download shared files. It is the administrator's
responsibility to manage who has access to what files. File servers
run under Linux or Windows Active Directory and are frequently seen
in office networks.

8. Web Server:
The main job of a web server is to host webpages. They take requests
through the Hypertext Transfer Protocol (HTTP), which facilitates the
sharing of websites. Web browsers submit requests over HTTP to
servers in order to initiate communication. The computer then
returns the desired data as a result. They receive and store data sent
by user agents. Web servers typically lack a graphical user interface.
This ensures there is enough energy to run the server's operating
system and applications and prevents the server's memory from
running out.

2.3. inter-dependence of workstation hardware and networking


software

A critical component of computer systems and network functionality is


the interdependence between networking software and workstation
hardware. Workstations are personal computers used by end users that

M M Yahya Ahkam Networking Assignment 01 54 | P a g e


communicate and interact with other devices on a network using both
hardware and software components.

To ensure that their devices can connect with each other efficiently,
users of workstation hardware must have an operating system
specifically designed for networking. Although networking operating
systems come in many variations, workstation hardware usually supports
only a handful of them. A company may find it difficult to transition to a
new networking operating system if its current one is no longer
supported.

The hardware components of a workstation are interdependent in that


they need to function well together in order to perform at their best for a
variety of tasks, such as graphic design, 3D modeling, scientific
simulations, and other demanding applications.

The term "interdependence of networking software" describes how


various software components interact and depend on one another in a
computer network ecosystem in order for the network to run efficiently.
A vast array of applications and protocols that enable data exchange and
communication between devices and systems are included in networking
software.
This interdependence can be divided into a number of important
categories:
1. Network Interface Card (NIC):
A Network Interface Card is necessary for workstations; it can be
installed as an additional piece of hardware or built into the
motherboard. To link the workstation to the network, the NIC
hardware is required. The networking program cannot
communicate with other devices if the NIC isn't working properly.
2. Device Drivers:
Device drivers are software components that enable the NIC and
other hardware components to communicate with the operating

M M Yahya Ahkam Networking Assignment 01 55 | P a g e


system. These drivers enable the networking software—whether it
be an operating system component or an application from a third
party—to properly connect with the hardware.
3. Bandwidth and Speed:
The speed and effectiveness of network communications are
influenced by the hardware performance of the workstation,
including the NIC, CPU, and RAM. The network's capabilities may be
restricted by inadequate hardware, resulting in bottlenecks and
slower data transport.
4. Scalability:
The workstation's hardware may need to be updated or changed
when network needs change in order to support faster networking
technologies or higher data loads. To guarantee correct operation,
the networking software needs to adjust to these hardware
modifications.
5. Compatibility:
For networks to function properly, hardware and software
components must be compatible with one another. The particular
hardware that is placed on the workstation must be supported by
the networking software.

M M Yahya Ahkam Networking Assignment 01 56 | P a g e


3.Network design and Blueprints

Designing the plan for alliance health


Floor Plans for the Matara Branches

Figure 22 Bluprint of Matara branch

M M Yahya Ahkam Networking Assignment 01 57 | P a g e


Floor Plans for the Colombo Branches

Figure 23 Blueprint of Colombo branch

M M Yahya Ahkam Networking Assignment 01 58 | P a g e


Those are the floor plan of the building and wire framed design for the alliance health
branches.

Implementing the Network

The networking design for Alliance Health was created using EdrawMax, a versatile all-in-
one design program highly regarded for its flexibility. EdrawMax empowers users to easily
generate a wide range of visually appealing designs, including floor plans, mind maps,
infographics, network diagrams, flowcharts, and organizational charts. Its extensive library of
templates and symbols enables users to quickly create graphics tailored to their specific
requirements, be it for educational, commercial, or social purposes. With support for
importing and exporting files in formats like Word, PDF, Visio, HTML, PPT, and JPEG,
EdrawMax offers adaptability and flexibility. This facilitates smooth collaboration and
sharing of graphics among team members, who can access cloud-stored files from any device
at any time.

M M Yahya Ahkam Networking Assignment 01 59 | P a g e


VLAN and IP Subnetting Scheme for Alliance Health

Figure 25 IP Allocation for Alliance Health Colombo

IP Allocation for Alliance Health Colombo

Figure 26 IP Allocation for Alliance Health Matara

Figure 24 Network system

M M Yahya Ahkam Networking Assignment 01 60 | P a g e


List of devices, network components and software used for Alliance Health
Hardware Components for Colombo
• Main Server
• Router – 1
• Switches – 10
• RJ45 Cables
• Wi – Fi
• PCs

Hardware Components for Matara

• Main Server
• Router – 1
• Switches – 5
• RJ45 Cables
• Wi – Fi
• PCs

Software Components
• Operating System (Windows/Linux)
• Protocols (TCP/IP)

Given Alliance Health's widespread geographical presence and intricate organizational


setup, I incorporated a diverse range of hardware and software components into the network
design. The organization comprises various departments such as Administration, Account &
Finance, Sales, Customer Service, HR, IT, Audit, Business, Reception, and Video
conferencing, necessitating seamless and secure communication among them.

To ensure reliable, fast, and secure communication, I deployed multiple switches, each
dedicated to a specific department. This strategy enhances connectivity and reliability,
ensuring that any issues affecting one department do not impact others. Additionally, a
central router connects all switches, facilitating efficient inter-departmental communication.

Moreover, a central Main Server is integrated into the network to manage storage and
support network applications, ensuring centralized data management and accessibility
across all departments.

End User/Admin User/Business


User Feedback Form
Date User

Does this System


1 Poor Average Fast
Response Fast
Does the new network
2 solution provide data Yes No
and resource sharing

M M Yahya Ahkam Networking Assignment 01 61 | P a g e


How fast is accessing to
3 Poor Average Fast
share Folder
Have you experienced
4 Yes No
any network down times
Is communication speed
5 easier with inter Poor Average Fast
department
How fast the download
6 and upload in the Poor Average Fast
network
Whether System
7 requirements are met Poor Average Fast
and satisfied
What is the overall
8 performance of the Poor Average Good
system
How do you rate the
9 connection speed in the Poor Average Fast
network

1 Any Good network system and very useful


0 improvement/suggestion

M M Yahya Ahkam Networking Assignment 01 62 | P a g e


M M Yahya Ahkam Networking Assignment 01 63 | P a g e
Configure Network services, devices and applications.
The network prototype was created by Cisco Packet Tracer based on the user requirements.

Figure 27 Cisco Packet Tracer Network Prototype 1

Figure 28 Cisco Packet Tracer Network Prototype 2

M M Yahya Ahkam Networking Assignment 01 64 | P a g e


VLAN configuration
VLANs should be configured in all switches in the following manner.

Figure 29 VLAN SWITCHPORT Configuration

M M Yahya Ahkam Networking Assignment 01 65 | P a g e


Figure 30 Router IP Address Configuration

M M Yahya Ahkam Networking Assignment 01 66 | P a g e


Figure 31 Router show run Configuration 1

M M Yahya Ahkam Networking Assignment 01 67 | P a g e


Figure 32 Router show run Configuration 2

M M Yahya Ahkam Networking Assignment 01 68 | P a g e


Figure 33 Router show run Configuration 3

M M Yahya Ahkam Networking Assignment 01 69 | P a g e


Figure 34 Router show run Configuration 4

STP (Spanning Tree Protocol)


Known as IEEE 802.1D, it was the first and slowest of the Spanning Tree protocols to be
standardized in 1996. With an average failover time of just thirty seconds, STP is far too
sluggish to be applied in any kind of industrial process.

RSTP (Rapid Spanning Tree Protocol)


Standardized as IEEE 802.1w in 1998, it was an evolutionary step forward for STP. It is
much faster, with failover times ranging from 500 ms to 12 seconds. The speed of failover for
industrial processes is still an issue.

MSTP (Multiple Spanning Tree Protocol)


Multiple instances of the Spanning Tree Protocol (MSTP) are permitted per Virtual LAN. It
was first specified as IEEE 802.1s and then included into IEEE 802.1Q 2003. This implies
that a single physical network can contain several virtual network groupings, each running a
separate instance of Spanning Tree Protocol.

M M Yahya Ahkam Networking Assignment 01 70 | P a g e


Active Directory Domain Services
In a network environment at the enterprise level, ADDS is crucial. The network environment
is safer once ADDS is implemented since only the administrator is able to make important
changes to the client PC. System administration is made more simpler with ADDS.

Design a maintenance schedule to support the networked


system.

Monthly Maintenance
1. Software Updates:
Update apps, operating systems, and network management software on a regular
basis. To guarantee system stability and security, apply patches and security updates.
2. Performance Monitoring:
To find any network bottlenecks, congestion, or unused resources, do performance
analysis and monitoring.
3. Backup Verification:
Verify the backups' accessibility and integrity for both data and configurations.
Make sure the backups are current.

Weekly Maintenance:
1. Hardware Check:
Verify the physical state of network hardware, such as servers, switches, and routers,
to make sure everything is in excellent operating order. As needed, clean and swap
out components.
2. Security Assessment:
Perform a thorough security evaluation that includes penetration testing and
vulnerability scanning. Take care of any flaws or vulnerabilities discovered.
3. Policy and Procedure Review:
Examine and revise the network's policies and guidelines. Make sure they comply
with the most recent standards for compliance and best practices.

M M Yahya Ahkam Networking Assignment 01 71 | P a g e


Yearly Maintenance:
1. Security Training: Educate staff members about potential dangers and best practices
for security by offering them classes on network security and security awareness.
2. Environmental Audit: Examine the physical conditions, such as humidity,
temperature, and physical security measures, of the area where networking
equipment is situated.
3. Examine and Upgrade Equipment: If network equipment is no longer meeting the
needs of the network or has reached the end of its useful life, it may be time to
upgrade it.
4. Policy Review and Update: Examine and update network policies and procedures in
light of incident lessons learned and evolving regulatory needs.

Install and configure Network services, devices, and applications (Ex: VLAN,
Wi-Fi, DNS, Proxy, Web, Etc.)
1. open windows server 2012 R2 and click install.

M M Yahya Ahkam Networking Assignment 01 72 | P a g e


2. select Windows server 2012 R2 Datacenter evaluation (server with GUI) and
click next.

3. accept terms and conditions and click Next.

4. select custom

M M Yahya Ahkam Networking Assignment 01 73 | P a g e


5. Select disk.

6. Windows server 2012 R2 will install.

M M Yahya Ahkam Networking Assignment 01 74 | P a g e


M M Yahya Ahkam Networking Assignment 01 75 | P a g e
4. Implement a networked system based on your prepared design with
valid evidence. Develop test cases and conduct verification (Ex:
Ping, extended ping, trace route, telnet, SSH, etc.) to test the above
Network.

Implementing the Server System to the Branch Server


To configure the services and application we will be installed the Microsoft windows server
2012 R2 and client based operating system will be Microsoft Windows 10.

Configuring the IP addresses on Client PC and Server.


Frist press the windows key + R to prompt “RUN” Dialog Box, then type “ncpa.cpl” and it
will prompt you for the network control center.

Right click on Ethernet>Properties>IPV4> Fill the Details and OK

M M Yahya Ahkam Networking Assignment 01 76 | P a g e


To check the IP configured use the command prompt.

M M Yahya Ahkam Networking Assignment 01 77 | P a g e


Creating the User Account in Active Directory database
Open Server Manager> Tools> Active Directory Users and Computers > Right click the
Users> New> Click User> In the Dialog Box fill the details Frist Name/Last Name/User
Login name/ Name/Password > Then click OK

M M Yahya Ahkam Networking Assignment 01 78 | P a g e


* Test HR User Will be created for this.

*Adding to organization unit

M M Yahya Ahkam Networking Assignment 01 79 | P a g e


● Configuring Server as a Domain Controller

Open Server Manager > Open “Manage” > Add Roles and Features > Select Role Base
Installation >Click Next and continue >Then Select Active Directory Domain Service Role
> Click Next and Install

Figure 27-DNS Server Selection for Install

Figure SEQ Figure \* ARABIC 28-Installing DNS server

M M Yahya Ahkam Networking Assignment 01 80 | P a g e


● DNS Server configuration

Figure 29-Notification bar DNS Server Configuration

Figure 30-Add New Forest in DNS

M M Yahya Ahkam Networking Assignment 01 81 | P a g e


Figure 31-Domain Controller Option

● Adding Net Bios

NetBIOS name is used for legacy domain controller to identify existing domain control.

Notification Bar > Configure >Add a New Forest > Name ABC.Com > Click Next >
Recover Password > Next > NetBIOS > Default > Next > Install.

M M Yahya Ahkam Networking Assignment 01 82 | P a g e


Figure 32-Net Bios Installation

Figure 33-Configuring NetBios Name

M M Yahya Ahkam Networking Assignment 01 83 | P a g e


Figure 34-Install Netbios and DNS

Figure 35-Restarting Computer after DNS Installed

M M Yahya Ahkam Networking Assignment 01 84 | P a g e


Adding Client PCs to the Domain

Login to Client PC> Right click “This PC”> Properties> Change Settings> Change> in the
domain box fill the “Domain Name” > Click OK>Auto Restart the computer.

*The first domain controller will be a DNS server with the default configuration

Figure 36-changing Domain Name

Figure 37-Changing Preferred DNS Server

M M Yahya Ahkam Networking Assignment 01 85 | P a g e


Figure 38-Changing the Domain Name

Figure 39-Welcome Box of changing to New Domain

M M Yahya Ahkam Networking Assignment 01 86 | P a g e


Figure 40-Restarting for Apply Changes

The Forward Lookup Zone

This is used to configure the host name into IP address. Without this cannot access to other
computers by the name.

Right click Domain Name> New Host> Dialog Box> Company Name> IP Address> Add
Host> OK> Done.

Figure 41-Configuring Forward Lookup Zone

M M Yahya Ahkam Networking Assignment 01 87 | P a g e


Figure 42-Adding New Zone - Forward Lookup Zone

Figure 43-Adding New Host - Forward Lookup Zone

M M Yahya Ahkam Networking Assignment 01 88 | P a g e


Figure 44-Adding IP Address - Forward Lookup Zone

Figure 45-Successfull completion - Forward Lookup Zone

M M Yahya Ahkam Networking Assignment 01 89 | P a g e


Figure 46-nslookup command prompt - Forward Lookup Zone

Reverse Lookup Zone

This will convert IP Address into Names.

DHCP Configuration
Dynamic Host Configuration is a network management protocol used for dynamically assign
IP in the network. This is how we configure to enclave film network a DHCP Server.

Login to Server > Server Manager> Manage> Add Roles and Features> Next> In the Dialog
Box click “DHCP Server Enable”> Click Next to the Installation> Install> Notification
Bar> DHCP Configuration Complete > Next >

There are two default groups are created as below,

- DHCP Administrators – They can manage the DHCP Servers


- DHCP Users – They can get the IP details from DHCP Servers.

Although Active Directory should provide the authorization for issue IP address from
DHCP Server.

>Commit > Authorizing DHCP Server > End

M M Yahya Ahkam Networking Assignment 01 90 | P a g e


Figure 47-Add Roles and Features - DHCP Configuration

Figure 48-Role Based or Feature Based Installations - DHCP Configuration

M M Yahya Ahkam Networking Assignment 01 91 | P a g e


Server configuration of DHCP server

Server Manager> Tools> DHCP> Server name> IPV4 and IPV6> Right click IPV4> Select
“New Scope”> Click Next> Name of Scope> IP Address range> Next> Least Duration(This
means once a clients gets an IP Address it will be valid within the least duration) > Next>
As next option DHCP scope need to be configured> Route Default gateway IP Address>
Next> Configure Domain Name and DNS server IP Address> Next> Activate the DHCP
Scope

Figure 49-DHCP Configuration

M M Yahya Ahkam Networking Assignment 01 92 | P a g e


Figure 50-Setting IP Address range - DHCP Configuration

Figure 51-Add Exclusions - DHCP Configuration

M M Yahya Ahkam Networking Assignment 01 93 | P a g e


Figure 52-Finishing DHCP Configuration

Web Server Configuration


At its core, a Web server serves static content to a Web browser by loading a file from a
disk and serving it across the network to a user’s Web browser. This entire exchange is
mediated by the browser and server talking to each other using HTTP.

Login Server Manager>Add Roles and Features> Click Next> Select Next again> Click the
Web Server Enable > Click Next> Click Next >Then Install

Then Web Server will be created in the Network.

M M Yahya Ahkam Networking Assignment 01 94 | P a g e


Figure 53-Web Server Configuration

Figure 54-Selecting Web Server Default Options - Web Server Configuration

M M Yahya Ahkam Networking Assignment 01 95 | P a g e


Figure 55-Installation - Web Server Configuration

M M Yahya Ahkam Networking Assignment 01 96 | P a g e


Develop test cases and conduct verification.

TEST NO 1 Ping within a VLAN

Executed By: Date : Time: 08:00 PM Test Type : Ping


Admin 30/04/2025

Test Description Expected Received Pass/Fail


Output Output
Pining from 192.168.10.130 Replies from Got Replies Pass
HR to Audit (PC9) to 192.168.10.209 192.168.10.209
192.168.10.209

M M Yahya Ahkam Networking Assignment 01 97 | P a g e


TEST NO 2 Ping Among the VLAN

Executed By: Date : Time: 08:00 Test Type :


Admin 30/04/2025 PM Ping

Test Description Expected Received Pass/Fail


Output Output
Pining to HR (PC9) to Continuous Got Replies Pass
192.168.10.1 192.168.10.2 Replies from 192.168.10.2
192.168.10.2

M M Yahya Ahkam Networking Assignment 01 98 | P a g e


TEST NO 3

Executed By: Date : Time: 08:00 PM Test Type : Ping


Admin 30/04/2025

Test Description Expected Received OutputPass/Fail


Output
Trace to HR (PC9) to Replies from Got Replies Pass
192.168.10.191 192.168.10.191 192.168.10.191 192.168.10.191

M M Yahya Ahkam Networking Assignment 01 99 | P a g e


TEST NO 4

Executed By: Date : Time: 08:00 PM Test Type : Ping


Admin 30/04/2025

Test Description Expected Received OutputPass/Fail


Output
Ping to Default HR (PC9) to Replies from Got Replies Pass
Gateway 192.168.10.161 192.168.10.161 192.168.10.161

M M Yahya Ahkam Networking Assignment 01 100 |


Page
Recommend potential future enhancements for Alliance Health
Suggesting potential future upgrades for Alliance Health's network involves looking at
advancements in technology and ensuring the network remains competitive. Based on the
current infrastructure provided by Syntax Solution, here are some enhancements to consider:
1. Elevating Network Performance: Focus on incorporating modern, top-tier
components to achieve optimal network performance. This means replacing outdated
hardware like routers and servers with more advanced alternatives. By staying current with
equipment and implementing regular updates, Alliance Health can boost network efficiency.
Developing a well-structured upgrade plan will also help in maintaining a reliable network
infrastructure.
2. Enhancing Network Security: With sensitive data in areas like Finance and Legal,
prioritizing network security is crucial. Implement robust security measures to prevent
unauthorized access and safeguard valuable information. This includes deploying strong
security protocols such as firewalls to manage network traffic effectively. Exploring
advanced security technologies like Facial Recognition and Biometric Locks can further
strengthen physical security within Syntax Solutions' network.
3. Upgrading Network Cabling: Cabling forms the backbone of any network, carrying
data across systems efficiently. While current coaxial cables serve this purpose, considering
upgrades to newer technologies is essential. I recommend transitioning to Fiber Optic
connections for improved data transfer rates and network reliability. Fiber Optic cables offer
significantly higher bandwidth and faster speeds compared to coaxial cables, ensuring
smoother data communication across the network to support Alliance Health's evolving needs
and future growth.

M M Yahya Ahkam Networking Assignment 01 101 |


Page
CONCLUSION
In summary, the author has developed crucial expertise and knowledge essential for building
effective computer networks. Through experience, they have learned valuable lessons from
both unsuccessful and prosperous network deployments. This report acts as a thorough
manual for recognizing user requirements and crafting network systems accordingly. It not
only aids in the author's professional growth but also offers valuable guidance for aspiring
network professionals. Encompassing a range of networking aspects, the report becomes a
valuable asset for individuals starting a career in this domain. Ultimately, readers can extract
key insights and move closer to becoming proficient network industry professionals through
this detailed and informative report.

M M Yahya Ahkam Networking Assignment 01 102 |


Page
References
BasuMallick, C. (2022). spiceworks. Retrieved 10 22, 2023, from
https://www.spiceworks.com/tech/networking/articles/what-is-wide-area-network/
Finlay, D. (2016). science direct. Retrieved 10 22, 2022, from
https://www.sciencedirect.com/topics/engineering/personal-area-network
Gillis, A. S. (n.d.). TechTarget. Retrieved 10 22, 2023, from
https://www.techtarget.com/searchnetworking/definition/network-topology
Griffin, L. (n.d.). study. Retrieved 10 22, 2023, from
https://study.com/academy/lesson/organizations-that-create-networking-
standards.html#:~:text=A%20networking%20standard%20is%20a,quality%2C
%20safety%2C%20and%20efficiency.
Ingalls, S. (2021). ServerWatch. Retrieved 10 24, 2023, from
https://www.serverwatch.com/servers/network-server/
Kinza Yasar, A. S. (n.d.). Techtarget. Retrieved October 21, 2023, from
https://www.techtarget.com/searchnetworking/definition/network
Schrader, D. (2019). netwrix. Retrieved 10 24, 2023, from
https://blog.netwrix.com/2019/01/08/network-devices-explained/
VishwashVishwakarma. (n.d.). GeeksforGeeks. Retrieved 10 22, 2023, from
https://www.geeksforgeeks.org/man-full-form-in-computer-networking/
Williams, L. (n.d.). Guru99. Retrieved 10 22, 2023, from https://www.guru99.com/types-of-
computer-network.html

M M Yahya Ahkam Networking Assignment 01 103 |


Page

You might also like