Network
Network
Yes No
√
INTERNAL VERIFIER CHECKLIST Y/N
*If ‘No’ is recorded the Internal Verifier must recommend actions detailing the issues to be addressed. The Assessor
and the Internal Verifier must then confirm that the action has been undertaken and that the Assignment Brief is
authorised for use before being issued to learners.
1
Networking
General Comments (if appropriate)
Assessor signature
Date
Higher Nationals
1.1 Internal verification of assessment decisions – BTEC (RQF)
INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Assessor
Oshada Lokuhetty Internal Verifier
Unit 02: Networking
Unit(s)
Student’s name
Pass Merit Distinction
2
Networking
Is the Pass/Merit/Distinction grade awarded
justified by the assessor’s comments on the Y/N
student work?
Has the work been assessed
Y/N
accurately?
Is the feedback to the student:
Give details:
• Constructive? Y/N
• Linked to relevant assessment criteria? Y/N
• Identifying opportunities for Y/N
improved performance?
• Agreeing actions? Y/N
Does the assessment decision need
Y/N
amending?
Internal Verifier
Date
signature
Programme Leader
Date
signature (if required)
3
Networking
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID
Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction P1 P M
Descripts 2 1
Resubmission Feedback:
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.
4
Networking
Chapter 2 Assignment Feedback
Formative Feedback: Assessor to Student
Action Plan
Summative feedback
My lecturer for the Networking unit lecturing style is perfect. He used a variety of interesting
techniques to lecture us and supported us in completing our assignment on time. He not only
encouraged us to do our best, but he also guided us to do our best.
Assessor Date
signature
Student Date
signature
5
Networking
Pearson Higher Nationals in
Computing
Unit 02: Networking
Assignment 01
6
Networking
General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment.
Use previous page as your cover sheet and make sure all the details are accurately
filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject,
Assignment No, and Page Number on each page. This is useful if individual sheets
become detached for any reason.
5. Use word processing application spell check and grammar check function to help
editing your assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in
the body except for the before mentioned compulsory information will result in
rejection of your work.
2. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
3. Ensure that you give yourself enough time to complete the assignment by the due date.
4. Excuses of any nature will not be accepted for failure to hand in the work on time.
5. You must take responsibility for managing your own time effectively.
6. If you are unable to hand in your assignment on time and have valid reasons such as
illness, you January apply (in writing) for an extension.
7. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
8. Non-submission of work without valid reasons will lead to an automatic RE FERRAL.
You will then be asked to complete an alternative assignment.
9. If you use other people’s work or ideas in your assignment, reference them properly
using HARVARD referencing system to avoid plagiarism. You have to provide both
in-text citation and a reference list.
10. If you are proven to be guilty of plagiarism or any academic misconduct, your grade
could be reduced to A REFERRAL or at worst you could be expelled from the
course
7
Networking
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to
present it as my own without attributing the sources in the correct form. I further
understand what it means to copy another’s work.
8
Networking
Chapter 3 Higher National Diploma in Computing
Issue Date
Submission Date
Submission format
9
Networking
Scenario
Alliance Health is a technology-enabled solutions company that optimizes the revenue cycle
of the US healthcare industry where its global delivery center is located in Colombo. The
company is planning to expand their business operations with their latest branch at Matara and
wants it to be one of the state-of-the-art companies in Matara with the latest facilities.
Assume you have been appointed as the new network analyst of Alliance Health to plan,
design and restructure the existing network. Prepare a network architectural design and
implement it with your suggestions and recommendations to meet the company requirements.
The floor plan of the head office in Colombo is as follows:
Floor 1:
Reception area
Sales & Marketing Department (10 employees)
Customer Services Area – with Wi-Fi facilities
Floor 2:
Administration Department (30 Employees)
HR Department (20 employees)
Accounting & Finance Department (15 employees)
Audit Department (5 employees)
Business Development Department (5 employees)
Floor 3
Video conferencing room
IT Department (60 employees)
The Server Room
Floor 2:
Administration Department (10 Employees)
HR Department (7 employees)
Accounting & Finance Department (8 employees)
IT Department (50 employees)
10
Networking
Following requirements are given by the Management.
All the departments must be separated with unique subnet.
The conferencing room of the head office and Customer Services Areas of each
branch are to be equipped with Wi-Fi connections.
Connectivity between two branches (Head Office and Matara) would allow the intra
branch connectivity between departments. (Use of VPN is not compulsory)
The necessary IP address classes and ranges must be decided by the network
designer and should be used for all the departments except the server room.
Number of servers required for the Server room need to be decided by the Network
designer and should be assigned with 10.254.10.0/24 subnet. (Uses static IPs)
Sales and Marketing Team also needs to access Network resources using WIFI
connectivity.
(Note: Clearly state your assumptions. You are allowed to design the network according to
your assumptions, but main requirements should not be violated)
Activity 01
Discuss the benefits and constraints of different network system types that can be
implemented in the Matara branch and the main IEEE Ethernet standards that can be
used in above LAN and WLAN design.
Discuss the importance and impact of network topologies and assess the main network
protocol suites that are used in network design using examples. Recommend suitable
network topology and network protocols for above scenario and evaluate with valid
points how the recommended topology demonstrates the efficient utilization of the
networking system of Matara branch.
Activity 02
Discuss the operating principles of network devices (Ex: Router, Switch, Etc.) and
server types that can be used for above scenario while exploring different servers that
are available in today’s market with their specifications. Recommend server/servers for
the above scenario and justify your selection with valid points.
Activity 03
Prepare a written network design plan to meet the above-mentioned user requirements
including a blueprint drawn using a modeling tool (Ex: Microsoft Visio, EdrawMax)
11
Networking
.Test and evaluate the proposed design by analyzing user feedback with the aim of
optimizing your design and improving efficiency.
(Support your answer by providing the VLAN and IP subnetting scheme for the above
scenario and the list of devices, network components and software used to design the network
for above scenario and while justifying your selections.)
Install and configure Network services, devices and applications (Ex: VLAN,WiFi,
DNS,Proxy, Web, Etc.) according to the proposed design to accomplish the user
requirements and design a detailed Maintenance schedule for above Network.
Activity 04
Implement a networked system based on your prepared design with valid evidences.
Develop test cases and conduct verification (Ex: Ping, extended ping, trace route, telnet,
SSH, etc.) to test the above Network and analyse the test results against the expected
results. Recommend potential future enhancements for the networked system with valid
justifications and critically reflect on the implemented network, including the plan,
design, configurations, tests and the decisions made to enhance the system.
12
Networking
Task 04
4.1 Implement and configure all network devices* according to the
requirements
given in the scenario.
4.2 Develop test cases and Test the above Network to verify * whether the
design
objectives are met.
4.3 Discuss Why network monitoring is important in VIDCO- 19 Kandy
branch?
Explain with valid points.
4.4 Install and configure Network monitoring ng tool/tools* of your
choice
and analyze results.
4.5 Provide troubleshooting steps for following situations;
a. Everything is working normally but suddenly the connection
goes away, and then comes back, and then goes away again
on client
computer. (i. e., flapping)
b. Network cable plugged in, but getting no connection.
4.6 Recommend potential future enhancements for the networked system
and
justify your recommendations.
4.7 Write a conclusion for your report by Critically evaluating design,
planning,
Configuration and testing of your network.
Network 13 | P a g e
Acknowledgement
First of all, I thank God for all the opportunities, trials and strength that have been showered on
me to finish writing the assignment. I experienced so much during this process and this
assignment also helped me in doing a lot of research and I came to know about so many new
things. Not only from the academic aspect but also from the aspect of professionally. First and
foremost, I would like to sincerely thank my lecturer for the guidance, positive encouragement
and a warm spirit to finish this assignment. It has been a great pleasure and honor to have him as
my lecturer. Secondly, my deepest gratitude goes to all of my family members. It would not be
possible to write this assignment without support from them. I offer my special thanks to all my
friends. May God shower the above-cited personalities with success and honor in their life.
Yours sincerely,
Network 14 | P a g e
Table of Content
Chapter 1 ....................................................................................................................................... 19
1.1 Network System Types & Standards ............................................................................. 19
1.1.1 Brief introduction about computer network systems .............................................. 19
1.1.2 Peer-to-Peer............................................................................................................. 19
1.1.3 Client-Server ........................................................................................................... 20
1.1.4 Comparison of peer-to-peer and client-server models (Point, n.d.) ....................... 21
1.1.5 Standardization ....................................................................................................... 22
1.1.6 IEEE – Institute of Electrical and Electronic Engineers ......................................... 23
1.1.7 IEEE 802 Standards ................................................................................................ 23
1.1.8 Usage of IEEE Standards ........................................................................................ 23
1.2 Network Topologies ....................................................................................................... 23
1.2.1 Physical Topology .................................................................................................. 24
1.2.2 Advantages & Disadvantages of Physical Network Topologies ............................ 25
1.2.3 Logical Topology .................................................................................................... 26
1.2.4 Usage of Network Topologies ................................................................................ 27
1.3 Network Models ............................................................................................................. 28
1.3.1 Why network models? ............................................................................................ 28
1.3.2 ISO OSI Model ....................................................................................................... 29
1.3.3 Layers of OSI Model .............................................................................................. 29
1.3.4 TCP/IP Model ......................................................................................................... 31
1.3.5 Comparison between OSI Model and TCP/IP Model............................................. 31
1.3.6 TCP/IP Model for Protocols ................................................................................... 32
1.4 Network Protocols .......................................................................................................... 33
Chapter 2 ....................................................................................................................................... 37
2.1 Network Devices & Server Types .................................................................................. 37
2.1.1 Hub.......................................................................................................................... 38
2.1.2 Router...................................................................................................................... 39
2.1.3 Switch ..................................................................................................................... 39
2.1.4 Advantages and Disadvantages of Hubs, Routers and Switches ............................ 40
2.1.5 Difference between Hub, Switch and Router ......................................................... 41
2.1.6 Usage of Network Devices for ALLIANCE HEALTH .......................................... 41
2.1.7 Network Security .................................................................................................... 41
Network 15 | P a g e
2.1.8 Server ...................................................................................................................... 43
2.2 Networking Software ..................................................................................................... 49
2.2.1 Networking Software .............................................................................................. 50
2.2.2 Compatibility .......................................................................................................... 50
Chapter 3 ....................................................................................................................................... 51
3.1 Design of Networked System......................................................................................... 51
3.1.1 VLAN ..................................................................................................................... 51
3.1.2 IP Subnetting ........................................................................................................... 52
3.1.3 Wireshark ................................................................................................................ 53
3.1.4 FileZilla ................................................................................................................... 53
3.1.5 PuTTy ..................................................................................................................... 53
3.1.6 Networked Diagram for Matara Branch ................................................................. 54
3.2 User Feedbacks about Networked System ..................................................................... 54
3.3 Installing and Configuring the Network Services and Applications .............................. 57
3.3.1 Windows Server ...................................................................................................... 57
3.3.2 DHCP Server .......................................................................................................... 59
3.3.3 Active Directory...................................................................................................... 61
3.4 Network Maintenance .................................................................................................... 64
3.4.1 Network Maintenance Schedule ............................................................................. 64
Chapter 4 ....................................................................................................................................... 68
4.1 Implement the Networked System based on Prepared Design ...................................... 68
4.2 Design Test Case Table .................................................................................................. 69
4.3 Potential Future Enhancement ....................................................................................... 70
4.3.1 Upgrading the cables in the system ........................................................................ 70
4.3.2 Improving the Quality of the Network.................................................................... 70
4.3.3 Enhancing the Security of the Network .................................................................. 71
4.3.4 Scalability ............................................................................................................... 71
Author Conclusion ........................................................................................................................ 72
References ..................................................................................................................................... 74
Network 16 | P a g e
List of figure
Figure 1.1.1 Peer-to-Peer Network ............................................................................................... 19
Figure 1.1.2 A Client-Server Network .......................................................................................... 20
Figure 1.2.1 Types of Physical Network Topologies (Wikipedia, 2024) ..................................... 25
Figure 1.2.2 Virtual LAN Network ............................................................................................... 27
Figure 1.3.1 Use of Network models ............................................................................................ 28
Figure 1.3.2 The TCP/IP model compared with the OSI model (Admin, 2013) .......................... 32
Figure 1.4.1 Example IPv4 Address ............................................................................................. 36
Figure 1.4.2 Example IPv6 Address (Anon., n.d.) ........................................................................ 36
Figure 2.1.1 A Hub........................................................................................................................ 38
Figure 2.1.2 A Router.................................................................................................................... 39
Figure 2.1.3 A Switch. .................................................................................................................. 40
Figure 2.1.4 Firewall ..................................................................................................................... 42
Figure 2.1.5 Proxy Server ............................................................................................................. 43
Figure 2.1.6 PowerEdge R830 Server ........................................................................................... 44
Figure 2.1.7 Specifications of PowerEdge R830 (Anon., n.d.) ..................................................... 45
Figure 2.1.8 PowerEdge R240 Rack Server.................................................................................. 45
Figure 2.1.9 PowerEdge R240 Specifications (Solutions, 2020) .................................................. 45
Figure 2.1.10 PowerEdge R7515 Server ....................................................................................... 46
Figure 2.1.11 PowerEdge R7515 Specifications (Technologies, n.d.) ......................................... 46
Figure 2.1.12 Fusion Server Pro 1288H V5 Rack Server ............................................................. 47
Figure 2.1.13 Fusion Server Pro 1288H V5 Rack Server (Alibaba, n.d.) ..................................... 47
Figure 2.1.14 System requirements of MySQL and Oracle databases. ........................................ 49
Figure 3.1.1 Design of Networked System of Matara branch ALLIANCE HEALTH................. 54
Figure 3.3.1 Windows Server 2012............................................................................................... 57
Network 17 | P a g e
List of table
Table 1.1-1 Comparison of Peer-to-Peer & Client-Server Network System Types ..................... 21
Table 1.2-1 Advantages & Disadvantages of Physical Network Topologies ............................... 25
Table 1.3-1 TCP/IP Layer Functions (Campus, n.d.) ................................................................... 31
Table 1.3-2 Comparison between OSI and TCP/IP Models ......................................................... 32
Table 1.4-1 Advantages and disadvantages of FTP ...................................................................... 33
Table 1.4-2 Advantages and disadvantages of SMTP .................................................................. 34
Table 1.4-3 Advantages and disadvantages of HTTP ................................................................... 34
Table 1.4-4 Difference between TCP & UDP .............................................................................. 35
Table 1.4-5 Difference between IPv4 & IPv6 ............................................................................... 37
Table 2.1-1 Advantages and Disadvantages of Hubs, Router and Switches. ............................... 40
Table 2.1-2 Difference between Hub, Switch and Router. ........................................................... 41
Table 3.1-1 IP Subnetting Scheme for Matara branch - ALLIANCE HEALTH.......................... 52
Table 3.4-1 Network Maintenance Schedule ................................................................................ 65
Table 4.2-1 Testcase table of Matara branch of ALLIANCE HEALTH ...................................... 69
Network 18 | P a g e
Chapter 4
4.1.2 Peer-to-Peer
Peer-to-Peer networks are more commonly implemented where less than about ten computers are
involved and where strict security is not necessary. All the computers have the same status,
hence the term ‘Peer’, and they communicate with each other on an equal footing (Campus,
2023). Peer-to-Peer is a simple type of network model where computers can communicate with
one another and share what is on or attached to their computer with other users (Alpern &
Shimonski, 2024).
Characteristics of Peer-to-Peer
01. Small number of nodes (more often less than ten) are connected and all of them store data
using individual security and share those data and information such as documents, images,
music, videos and printers etc.… with other connected nodes.
02. All the connected computers in this type of network share resources, so resource sharing
capacity increases when the number of connected computers is are increased.
Network 19 | P a g e
03. Each connected computer in this network manages itself. So, the network is quite easy to
set up and maintain when compared with the client-server network.
04. Major disadvantage in a peer-to-peer network is less security, because all the connected
computers act as servers as well as clients.
05. Modern operating systems like Windows and Mac use peer-to-peer to networking system.
(T4Tutorial, 2023)
4.1.3 Client-Server
Client-Server networks are more suitable for larger networks. A central computer called ‘Server’,
act as the storage location for files and applications shared on the network. This server is higher
than average performance computer. The server also controls the network access of the other
computers which are referred to as the ‘Client’ computers. Furthermore, the client-server
paradigm is a distributed application structure that divides tasks or labor between servers, who
supply a resource or service, and clients, who request that service. The server computer accepts
the request and responds the clients with desired information by sending requested data packets
when a client computer send data requests over communication medium. Email, the World Wide
Web, and other client-server models are examples.
Network 20 | P a g e
Characteristics of Client-Server
01. In client-server network system, the client sends a request to the server computer and the
server accepts the requests and returns the data packets requested to the client. But not like
peer-to-peer model, client do not share any of its assets with one another; only the server
does.
02. The server uses a system-based priority to responds the requests coming from client
computers because the server can only accommodate a limited number of client requests at
a time.
03. Both the client and the server follow a common communication protocol which available in
the application layer, so they can interact with each other easily. (Meador, 2024)
Network 21 | P a g e
Server A server may get overloaded A server is not bottlenecked
when many customers make since the services are dispersed
simultaneous service requests. among numerous servers using
a peer-to-peer network.
4.1.5 Standardization
What is Standardization?
Networking standards define the rules for date communication required for the operation of
networking technologies and processes. Standers help to create and maintain open markets and
allow different vendors to compete on the basis of the quality of their products while being
compatible with existing market products.
Network 22 | P a g e
Internet Engineering Task Force (TETF)
World Wide Web Consortium (W3C)
Network 23 | P a g e
Network topology or network layout is the logical paths where data travels in a computer
network.
Physical Topology.
Logical Topology
01. Bus Topology - This one of the simplest forms of networking where all the connected
devices share single communication line or cable. A failure of a one connected device does
not affect the other devices but failure of the shared communication line (Back bone) can
make all other connected nodes stop functioning. (Campus, 2023)
02. Mesh Topology - Here , a host is connected to one or multiple hosts. Mesh Topology
comes in two types called Full Mesh where all hosts have a point-to-point connection to
every other host in the network and Partial Mesh where not all hosts have a point-to-point
connection to every other host. (Campus, 2023)
03. Star Topology – The centralized hub act as a single point of failure like the back bone
(shared communication line) Bus Topology. Every communication between hosts, takes
place only through the hub. (Campus, 2023)
04. Ring Topology - Each device connected to this network have two neighbors to
communicate. All data travels in a ring , and a failure of that ring will bring the whole
network down.
Network 24 | P a g e
Figure 4.2.1 Types of Physical Network Topologies (Wikipedia, 2023)
Network 25 | P a g e
4.2.3 Logical Topology
The term ‘ Logical Topology ’ is called to the logical paths where data travels in a computer
network. (Campus, 2023)
Ethernet
Ethernet is a widely-deployed LAN technology hat was standardized in IEEE 802.3 in
1980. A network like Ethernet which share media files has a high probability of data
collision.
Ethernet use Carrier Sense Multi Access/Collision Detection (CSMA/CD) technology to
detect collisions.
An Ethernet connector is a Network Interface Card equipped with 48-bits MAC address.
Traditional Ethernet uses 10BASE-T specification. It provides transmission speed of up
to 10 Mbps and uses Coaxial cable or CAT-5 Twisted pair cable with RJ45 connector.
Ethernet follows Star Topology with segment length up to 100 meters. All devices are
connected to a Hub/Switch in a Star fashion.
There are some versions of Ethernet based on the transfer speed.
I. Standard Ethernet – 10 Mbps (IEEE 802.3)
II. Fast Ethernet – 100 Mbps (IEEE 803.2)
III. Giga-Ethernet – 1000 Mbps (IEEE 802.3ab & 802.3ah)
Reference - (Campus, 2023)
Virtual LANs
VLAN is a solution to divide a single broadcast domain into multiple broadcast domains. Host
in one VLAN cannot speak to a host in another. By default, hosts are placed into the same
VLAN. VLAN is a Layer-2 technology which works closely on Ethernet. To route packets
between two different VLANs, a layer-3 device such as router is required.
Network 26 | P a g e
Figure 4.2.2 Virtual LAN Network
There is no a topology that can select as the perfect one. So, deciding the best structure for your
company depends on the networks needs and scale. Because ALLIANCE HEALTH Matara
branch has several departments, I have chosen the Start Topology for each department.
Network 27 | P a g e
when considering with other topologies because it is simple to understand and
troubleshoot.
High Performance Level – When comparing with other topologies, the performance of
this network is superior because data packets are sent to target node directly and avoid
unwanted traffic in the network.
But we need to connect all the departments with each other. Bus Topology is ideal for it.
o Bus Topology is easy to expand by joining two cables together.
And I use the Ring Topology for server room because these advantages it has.
o Control network between each workstation.
o A network server is not needed.
o Data can be transferred at high speed between workstations.
o Additional workstation can be added at future if needed, without affecting the
network performance.
Network 28 | P a g e
There’re two main network models are discussed in computer networking. They are,
1. ISO OSI Model
2. TCP/IP Model
The OSI model is a seven-layer architecture. It defines seven layers or levels in a complete
communication system. They are,
01. Physical Layer
02. Datalink Layer
03. Network Layer
04. Transport Layer
05. Session Layer
06. Presentation Layer
07. Application Layer
Network 29 | P a g e
01. Physical Layer
The physical layer coordinates the function required to transmit a bit stream over a physical
medium. The physical layer is responsible for transmitting individual bits from one node to
the next. (Campus, 2023)
Network 30 | P a g e
07. Application Layer
Function of application layer is to present data to users by enabling direct interaction between
user and software application. In other words, the application layer is responsible for
providing services to the user. (Campus, 2023)
Network 31 | P a g e
Figure 4.3.2 The TCP/IP model compared with the OSI model (Admin, 2013)
Define after the advent of the internet Define before the advent of the internet.
TCP/IP protocol is the ideal solution for the ALLIANCE HEALTH because, it is the Open
protocol standards, freely available and implemented independently of any hardware or operating
system unique to the device. Since it is so widely supported, TCP / IP is perfect to unite
Network 32 | P a g e
different components of hardware and software, TCP / IP can be accessed through an
Ethernet, a DSL link, a dial-up line, an optical network and virtually every other physical
transmission medium Standardized high-level protocols for reliable user services which are
commonly accessible. There for I recommend TCP/IP protocol for the ALLIANCE HEALTH
Matara Branch.
Advantages Disadvantages
FTP lacks security, data, username and
Enable sharing large files and multiple
password transferred in plain texts making
directories at the same time.
them vulnerable to malicious actors.
Resume file sharing, if it was interrupted. FTP lacks encryption capabilities.
Can recover lost data and schedule file
transfers.
Network 33 | P a g e
Table 4.4-2 Advantages and disadvantages of SMTP
Advantages Disadvantages
Back and forth conversations between
servers can delay sending message, and also
Ease in installation.
increases the chance of the message not
being delivered
Connects to any system without any Sometimes firewall can block the ports used
restrictions. with SMTP.
It does not need any development from your
side.
Advantages Disadvantages
Memory usage and CPU usage are lesser HTTP lacks encrypting capabilities making it
because lower concurrent connections. less secure.
Errors can be reported without closing the Requires more power to establish
connection. connections and transfer data.
Owning to lesser TCP connections, network
congestions is reduced.
Network 34 | P a g e
One of the most used protocol, TCP created a connection between source and destination
nodes before transmitting data and keeps it live until the communication is active. TCP breaks
large data into smaller packets and ensure that the data integrity is intact once it is
reassembled at the destination node. (Campus, 2023)
With minimal overhead, without flow control or acknowledgement of received data, UDP
provides a connection between two processes at both ends of transmission. The minimal error
control is provided by ignoring received packets that fails the checksum test. (Campus, 2023)
IP – Internet Protocol
01. IPv4
02. IPv6
Network 35 | P a g e
The IPv4 addresses are 32 bits in length and are typically communicated in a format called
dotted decimal. 32 binary bits are broken into octets and then converted into decimals. Ex:
x.x.x.x where x can be an any value between 0-255 (000000002-111111112).
This is an advanced version of IPv4 addresses. IPv6 was introduced due to the shortage of IP
addresses. IPv6 is a 128 bits hexadecimal address.
Network 36 | P a g e
Table 4.4-5 Difference between IPv4 & IPv6
IPv4 IPv6
32 bits IP address 128 bits IP address
Binary bits are separated by a dot (.) Binary bits separated by a colon (:)
Provides 12 fields in the header Provides 8 fields in the header
Numeric Addressing Alphanumeric addressing
Support broadcast Does not support broadcast
Use for the designated network from host Not Used
portion.
Chapter 5
Let’s explore at some of those devices I used to build the ALLIANCE HEALTH Matara branch
network design.
Network 37 | P a g e
5.1.1 Hub
What is a Hub?
Hub is an electronic device used in LANs to link group of computers/devices. A Hub
interconnects two or more workstations into a LAN. When a workstation to a hub, the hub
immediately resends the data frames to all connecting links. (Campus, 2023)
Passive Hubs do not amplify the electronic signals of incoming packets before broadcasting
them out to the network. Also called as Concentrator. (Campus, 2023)
Active Hubs are do amplification like a Repeater. Some people use the term Multi-Port
Repeater to named Active hubs. (Campus, 2023)
Network 38 | P a g e
Intelligent Hubs are an advanced version of Active hubs which are more important for
businesses. An intelligent hub is typically stackable and include remote management
capabilities via SNMP and VLAN (Virtual LAN) support. (Campus, 2023)
5.1.2 Router
What is a router?
Routers are electronic devices used to ensure that messages are send to their intended
destinations. Router forwards data packets along the network. It is located at gateways and
connected to two networks. When data arrives from one of the segments, the router decides,
according to its routing table, to which segment to forward that arrived data. (Campus, 2023)
5.1.3 Switch
Network 39 | P a g e
Figure 5.1.3 A Switch.
What is a Switch?
A Switch, sometimes also referred to as Switching Hubs, Bridging Hubs or MAC Bridges is a
hardware device that centralize communication among multiple connected devices within one
LAN and it divides a LAN so that each node/host has its own segment. Switch filters traffic
based on MAC address and the received data will only be forwarded to the host with
destination MAC address. Switches can send and receive information at the same time (full
duplex) while Hub transfer data in half-duplex mode means one direction at a time. (Campus,
2023)
Network 40 | P a g e
Used for connect the multiple It will broadcast to all the ports.
devices.
Filtering data. Connect two similar devices only.
Switch Secure. Looping when redundancy wire is
Port Information. created.
As the network consultant of ALLIANCE HEALTH, I have selected Switches and routers to use
as the network devices for network design of Matara branch. Routers are used to connect two
department LANs with each other at gateways as needed. Switches are used to build LANs in
each department. In addition, Switches exactly know the intended destination of a data frame.
So, a 10/100 Mbps Switch can allocate its full bandwidth to each of its ports unlike a hub.
Network 41 | P a g e
Network security devices scan network traffic to identify and block attacks by correlating
network activity signatures with databases of known attack techniques. Following are the
Network Security Devices which are used for the security of network of Matara branch of
SYNTAX SOLLUTION.
01. Firewall
The general purpose of a Firewall is to keep uninvited guests from browsing your network. A
firewall can be a hardware device or a software application and generally placed at the perimeter
of the network to act as the gatekeeper for all incoming and outgoing traffic. The firewall can
disallow some traffic or all traffic depending on the firewall policy of organization.
Whitelisting – The firewall denies all connections except those specially listed as
acceptable.
Blacklisting – The firewall allows all connections except those specially listed as
unacceptable.
Network 42 | P a g e
02. Proxy Server
Proxy Server act as an intermediary between the client and the server. When using a proxy
server, instead of directly requests information from the server, the client requests information
from proxy server, then the proxy server evaluates the request and perform the required
network transaction. While serving to control the complexity of the client requests, the proxy
server provides some additional benefits such as load balancing, privacy and security.
(Wikipedia, n.d.)
IPS monitors the network activities to find out malicious activities and then attempt to block or
stop them. Following are the detection methods of IPS.
01. Signature based detection.
02. Statistical anomaly-based detection
03. Stateful protocol analyze detection.
5.1.8 Server
A server is a computer designed to process requests and deliver data to other computers/clients
over a local network or the internet. The most typical use of the word ‘Server’ references the
very large, high-powered machines although any computer running a special software can
function as a server. In other words, servers are designed with more potent components than
individual workstations.
Network 43 | P a g e
Common Types of Servers
Servers are also classified according to their intended function. The following are only a few
examples of the server types.
Application Server – Occupy a large chunk of computing territory between database
server and user, and often connect both.
Mail Server – Facilitates the sending, receiving and storing the email messages.
FTP Server – Support the moving of files through files transfer protocol tools.
Web Server – Show pages and run apps in connecting web browsers.
At the hardware level, servers usually consist of a rack mount chassis which consist of a power
supply, a system board, one or more CPUs, memory, storage and a network interface.
Server Physical Types:
Rack Server
Tower Server
Blade Server
Network 44 | P a g e
Figure 5.1.7 Specifications of PowerEdge R830 (Anon., n.d.)
Network 45 | P a g e
03. PowerEdge R7515 Rack Server
Network 46 | P a g e
Figure 5.1.12 Fusion Server Pro 1288H V5 Rack Server
The Huawei Fusion Server Pro 1288H V5 is a 1U, 2-socket rack server. It is ideal for high density
deployment to process workloads generated by cloud computing virtualization, High
Performance Computing (HPC), and Big Data processing. It delivers superior performance and
excellent scalability while improving space utilization in data centers, driving down the
overall expenditure.
Figure 5.1.13 Fusion Server Pro 1288H V5 Rack Server (Alibaba, n.d.)
Network 47 | P a g e
Servers Selection Requirements
Unlike a workstation, which is dedicated to a single customer, multiple customers depend on a
server. Therefor reliability and uptime are high priority. When I invest effort in making a server
reliable, I look for features that will make repair time shorter, provide a better working
environment and use special care in the configuration process.
So, when choosing servers for Matara branch of ALLIANCE HEALTH, I have to pay my
attention for the following things.
Match the primary needs
Affordable
Choose best of bread
Buy the right operating system
Build in expansion and redundancy
Support and maintenance
As network consultant of ALLIANCE HEALTH, I decided to use three server computers for
Matara branch. ALLIANCE HEALTH is an IT company and it has lots of project files there.
So, I configure a Database Server with MySQL and Oracle Databases for Matara Branch. I
choose the Dell PowerEdge R830 Rack Server for as the Database Server because it fulfills the
system requirements of MySQL and Oracle databases.
Network 48 | P a g e
Figure 5.1.14 System requirements of MySQL and Oracle databases.
And also, I want to implement the DNS Server, DHCP Server and the Proxy and the Mail
Servers. For these, I choose Dell PowerEdge R7515 Rack Server because this server computer
has a powerful hardware. Therefore, it can manage all these services. Furthermore, I choose Dell
PowerEdge R240 Rack Server as the web server because it has lots of traffic and more load. So,
it should be a separated server computer.
Network 49 | P a g e
Enables virtualization of network
Network software allows multiple devices, such as desktops, laptops, mobile phones, tablets
and other system to connect with one another, as well as with other networks.
(Campus, 2023)
Server OS
Server needs the server operating system to operate it. We need servers for the network of
ALLIANCE HEALTH Matara branch because we want to implement the DHCP, Mail Server
and Web Server in the company. There are many Servers Operating Systems in the world but I
have decided to use Microsoft Server 2019 for Matara Branch of SYSTAX SOLUTION.
Active Directory
This is the technology used by Microsoft to control computers and other devices within a
network. It is a primary feature of Windows Server OS. Active Directory helps network
administrators within a network to build and manage domains, users, and objects. For example,
an admin can build a group of users and give them special privileges on access to certain server
folders. Active Directory provides a way to organize a large number of users into logical
groups and subgroups as a network expands, while at the same time providing access control at
each level.
5.2.2 Compatibility
Compatibility is the ability to operate together on two systems without needing to be altered to
do so. Compatible software applications use the same data formats. Compatibility may refer to
the interoperability of any two products: hardware and software, same or different types of
products, or different versions of the same product. In the networking, following things should
be compatible.
Network 50 | P a g e
Operating Systems: The program for compatibility with various operating systems such
as Windows, Unix, Mac OS etc.
Software: The software designed to be compatible with other apps. MS Word application
for example should be compatible with other applications such as MS Outlook, MS
Excel, and VBA etc.
Without these compatibilities, lots of errors can be come. Few of them are,
Without minimum requirements for server OS, you install the OS for server it can be
crash.
And also, you install some servers without there are requirements it will be not work or
crash.
Your servers and clients are in deferent OS they are cannot doing some work properly.
Your routers, switches and other main networking devices are in deferent models, you are
face to big trouble in configure that.
Chapter 6
6.1.1 VLAN
It is the virtualization of computers for networking. We use network virtualization with VLANs
on switches to allow the connection of multiple broadcast domains (LAN segments) on a single
switch. With VLANs we are splitting switch into multiple switches. We are doing this with the
Network 51 | P a g e
use of software but only on specialized hardware devices that are virtualization enabled. In the
Matara branch of ALLIANCE HEALTH which has seven branches, I implement seven V LAN
for them.
6.1.2 IP Subnetting
Network 52 | P a g e
I have already discussed about different network devices I have used in the network design of
Matara branch under Network Devices part above. So now I am going to discuss about
networking software that I have to use to design the network.
6.1.3 Wireshark
Wireshark is very famous Network Analyzer, an important tool for any qualified network
administrator. Following are some characteristics of Wireshark. (Wireshark, n.d.)
Intercepts traffic and transforms the binary traffic to a readable format for users.
6.1.4 FileZilla
It is an Open-Source tool that allows users to transfer files to remote computer from a local
computer. Followings are some features of FileZilla.
It can create and store a list of FTP servers and associated connection data and FileZilla
similar to a file manager, allowing a user to modify files and folders and providing a
drag-and-drop capability between local and remote directories.
6.1.5 PuTTy
Network 53 | P a g e
PuTTy is a Terminal Emulator for Windows and Linux. It provides a text user interface to
remote computers running any of its supported protocols, including SSH and Telnet.
As the Network Consultant and the designer of the networked system of Matara branch, I have
created a customer feedback form to get the feedbacks of this networked system. Users have
left their feedbacks by representing their department. Following are the screenshots of their
responses.
Network 54 | P a g e
Network 55 | P a g e
After analyzing the customer feedbacks, I think that the designed system is perfect as an
overall. But I have discussed with the users who has left some negative feedbacks for some
questions of the forum and got more details from them and did my best to make the networked
system a reliable, efficient one as much as I can.
Network 56 | P a g e
6.3 Installing and Configuring the Network Services and Applications
1. After boot the server .iso image file take the defaults on the Language screen, and click
Next.
Network 57 | P a g e
2. Then Click Install now on the install screen.
3. Then read License Agreement, Turn on Checkbox “I accept the license terms,” and then
click Next.
5. Select the disk you will be installing on. If you do not want to change drive options
(optional), Click Next.
6. It will then start copying files. This will take a while (could be 20 mins or so depending
on hardware performance).It will reboot a couple times (automatically).
Network 58 | P a g e
7. Enter a new password for this computer. It must meet complexity requirements. Re-
enter the password in the second password box, and then click Finish.
DHCP (Dynamic Host Configuration Protocol) is a protocol used to provide quick, automatic,
and central management for the distribution of IP addresses within a network. DHCP is also
Network 59 | P a g e
used to configure the proper subnet mask, default gateway, and DNS server information on the
device.
Network 60 | P a g e
3. From the Roles lists, check the DHCP Server role → click Add Features on the popup
window.
4. Click Install. And finish the installation.
I have already mentioned and discussed about the Active Directory. It runs on Windows Server
and allows administrators to control network resource access and permissions. So, following is
how to configure the Active Directory.
Network 61 | P a g e
3. Then Select a server from the server pool”. In Server Pool, ensure that the local
computer is selected and click next.
4. After then Select Active Directory Domain Services from Roles.
5. After these steps click Add Features and then click next.
6. Read the information in Active Directory Domain Services page and click next.
7. Confirmation page, click Install to install the roles, role services, or features on the
server.
Network 62 | P a g e
8. When the installation is completed, click on Notifications in Server Manager, and click
on the link Promote this server to a domain controller.
9. When the Active Directory Domain Services Configuration Wizard opens, select Add
a new forest and enter Root domain name. Then click Next.
10. Then verify NetBIOS domain name. Click Next.
11. Given Specify locations for AD DS Database folder, Log Files folder, and SYSVOL
folder.
12. The wizard will validate the prerequisites before installing AD DS. When all checks
are passed successfully, click Install.
13. When the installation is completed, click Close to finish the wizard.
14. Active Directory Domain Services have been successfully installed. Your machine will
be rebooted automatically.
Network 63 | P a g e
6.4 Network Maintenance
Network maintenance means you have to do what it takes in order to keep a network up and
running and it includes a number of tasks.
Troubleshooting network problems.
Hardware and software installation/configuration.
Monitoring and improving network performance.
Planning for future network growth.
Creating network documentation and keeping it up-to-date.
Ensuring compliance with company policies.
Ensuring compliance with legal regulations.
Securing the network against all kind of threats.
Completing all the above tasks surely make a good maintenance on any network and it helps to
keep the network in order for up and running. (Lessons, n.d.)
Network 64 | P a g e
Identifying the issues or making modifications on time and performing in a routine
maintenance in the network will be more productive to the business. Matara Branch technical
teams will be in-charge of the network maintenance for the company. Following snapshots
show the network maintenance schedule which was designed to cover every aspect of the
network in an efficient and effective manner.
Taking Backups
Ensuring the backup is Weekly 8.00 PM 04.09.2024 Network
running as pre-scheduled. Admin
Checking backup disks. Weekly 8.00 PM 04.09.2024 Network
Admin
Disks clean up. Weekly 8.00 PM 04.09.2024 Network
Admin
Check backup logs for Weekly 8.00 PM 04.09.2024 Network
errors. Admin
Software Update
Network 65 | P a g e
Anti-Virus Update Daily 10.00 PM 05.09.2024 Technical
Team
Check for any important Weekly 10.00 PM 05.09.2024 Technical
updates Team
Identifying useless Monthly 10.00 PM 05.09.2024 Technical
updates. Team
Event Logs and Services
Check System, Application Monthly 8.30 AM 06.09.2024 System
and security logs. Analyst
Troubleshoot any found Monthly 8.30 AM 06.09.2024 Network
error events and warnings Admin
Checking for security logs. Monthly 8.30 AM 06.09.2024 System
Analyst
Network Performance
Monitor excess traffic Daily 12.30 AM 06.09.2024 Network
utilization. Engineer
Network utilization rate. Weekly 1.00 AM 06.09.2024 Network
Engineer
Check the Up-time of Monthly 8.30 AM 08.09.2024 Network
servers, switchers and Engineer
router.
Check and monitor server Weekly 2.30 AM 08.09.2024 Network
performance through the Engineer
allocated software
Disk Management
Analyzing disk Monthly 6.00 PM 08.09.2024 System
performance and usage. Admin
Checking the capacity of Monthly 6.00 PM 08.09.2024 System
the disks. Admin
Network 66 | P a g e
Check for Disk Monthly 7.00 PM 08.09.2024 System
Defragments Admin
Clear unnecessary files. Monthly 7.00 PM 08.09.2024 System
Admin
Security
Check for network Weekly 7.30 PM 09.09.2024 Network
security policies. Admin
Check for password Weekly 8.30 PM 09.09.2024 Network
policies. Admin
Perform security checks on Monthly 8.30 PM 09.09.2024 Network
applications and files if Admin
required.
Checking the network and Monthly 9.30 PM 09.09.2024 Network
the server security level. Admin
Enable and Check firewall Monthly 9.30 PM 09.09.2024 Network
& router logs. Admin
Troubleshoot findings if
required.
Network 67 | P a g e
Chapter 7
The above design is the Cisco design, which I have implemented while taking consideration of
the prepared written plan above. For the two routers I have used 1841 routers. In addition, for
the four switches I have used 2960-24TT switches. When considering the redesign, the
designer has used a serial cable to connect the two routers and I have implemented it in the
Cisco design. In addition, to connect the routers and switches, I have used fast Ethernet cables.
Just as the connectivity of routers and switches, the designer has used Ethernet cables to
connect switches with the end devices.
Network 68 | P a g e
7.2 Design Test Case Table
Test Results Against Expected Results
Network 69 | P a g e
07 Check IP Configure Configure Pass
configuration d
in PC
Currently, the network is running through coaxial cable within the building premises. In coaxial
cables, it will generate more heat. The company can enhance their network by modifying the
cables to Fiber Optic. These cables have the great capability of transmitting data in higher
bandwidths than the coaxial cables. In fiber optics, laser technology is being used to transmit
data from one destination to another. However, coaxial cables generate more heat, but in fiber
optics, it is ecofriendly and does not generate much heat. Based on the cost fiber optics are
quite expensive than coaxial cables.
When it comes to improving the quality of the network, this will enhance the state of the
network. That means by using branded and qualitative hardware components; it will help to
improve the quality of the network. The current using network hardware components in Matara
branch can be upgraded into higher performance devices that will make the network more
productive. Based on this, the company can replace their old routers with more powerful one;
Network 70 | P a g e
this will help to enhance the efficiency of the network. Maintenance is also a prominent process
that is mainly required for a network. A proper scheduled maintenance will help the network to
be free from issues.
7.3.4 Scalability
ALLIANCE HEALTH is an emerging IT company in Sri Lanka. Therefore, the growth of the
company will establish more branches with more employees. Based on this, there should be
more sub-network should be implemented which could cost the organization very high. In order
to overcome this situation, the company can implement Virtual Local Area Networks, which
will influence the business positively, where it can connect the branches virtually. When it
comes to scaling the network, Virtual Local Area Networks are more beneficial. The company
already has several Virtual Local Area Networks and they can build on that and enhance the
company by creating different Virtual LANs in different branches.
The above aspects are the main points when considering the fact about enhancing the company
further more. As a network engineer of the company, I think a designer can always think out
from the box and implement more efficient and effective methods to the network design.
Network 71 | P a g e
Author Conclusion
This assignment mainly includes the network solutions that are designed for Matara branch of
ALLIANCE HEALTH, by providing a reliable and efficient communication process based on
the identified requirements. As the Network Engineer of the company, I was required to design
and implement a network solution for the company.
In the first activity, I have briefly discussed the benefits and constraints of the different types of
network system and topologies, and I have justified a suitable network topology for Matara
branch. In addition, I have prepared a report on network related technologies and standards that
can be implemented to the solution and have discussed how they would affect the solution. In
that same activity, I have explained the roles of different protocols that would be employed to
the network solution of Matara branch, and I have briefly discussed how they enable the effective
utilization for the solution.
In the second activity, I have designed the comprehensive network solution for Matara branch
and I have explained how the design meets the requirements of the company. In addition, I have
discussed the role of software and hardware components that would be used in the solution and
how the components been utilized to create the network. In the same task, I have briefly explained
the types of servers that will be used in the solution, I have analyzed the different types of servers
in the market, and I have made the best selection.
As the second activity runs down deep, I have obtained the feedback from the users of the network
in Matara branch. Based on that I have briefly analyzed the feedback results and summarized
them by providing graphs.
In the third activity, I have put screenshots, and shown the test cases for the activities. In addition,
I have stated the enhancements that can be implemented to the network system of Matara branch.
The provided network solution of Matara branch can be considered a complete network solution
if the maintenance, backups, monitoring and other activities perform efficiently and effectively.
Network 72 | P a g e
Gantt chart
Network 73 | P a g e
References
Admin, F. B., 2024. Fiber Bit. [Online]
Available at: https://fiberbit.com.tw/tcpip-model-vs-osi-model/
[Accessed 04 January 2024].
Alibaba, n.d. Alibaba. [Online]
Available at: https://www.alibaba.com/product-detail/huawei-server-FusionServer-Pro-1288H-
V5_62324417163.html
[Accessed 04 January 2024].
Alpern, N. J. & Shimonski, R. J., 2010. Science Direct. [Online]
Available at: www.sciencedirect.com
[Accessed 04 January 2024].
Anon., n.d. Networks Training. [Online]
Available at: https://www.networkstraining.com/how-to-configure-ipv6-address-on-cisco-
routers/
[Accessed 05 January 2024].
Anon., n.d. Router-Switch. [Online]
Available at: https://www.router-switch.com/dell-poweredge-r830-2u-e5-4610-v4-2-4g-2-
300gb-2-5-10k-2-h330-dvdrw-750w-2.html
[Accessed 04 January 2024].
Campus, E. M., n.d. HND in Computing - Networking. s.l.:ESOFT Metro Campus.
Lessons, N., n.d. Network Lessons. [Online]
Available at: https://networklessons.com/cisco/ccie-routing-switching-written/network-
maintenance
[Accessed 06 January 2024].
Meador, D., 2020. Tutorials Point. [Online]
Available at: https://www.tutorialspoint.com/Client-Server-Computing
[Accessed 04 January 2024].
Point, J. T., n.d. Javatpoint. [Online]
Available at: www.javatpoint.com
[Accessed 04 January 2024].
Solutions, R., 2020. Rack Solutions. [Online]
Available at: https://www.racksolutions.com/news/blog/dell-poweredge-r240-specs-and-rack-
compatibility/
[Accessed 05 January 2024].
T4Tutorial, n.d. t4Tutorial. [Online]
Available at: https://t4tutorials.com/peer-to-peer-network-characteristics-advantages-
disadvantages/
[Accessed 04 January 2024].
Technologies, D., n.d. Dell. [Online]
Available at: https://i.dell.com/sites/csdocuments/Product_Docs/en/poweredge-r7515-spec-
sheet.pdf
[Accessed 05 January 2024].
Network 74 | P a g e
Wikipedia, 2024. Wikipedia. [Online]
Available at: https://en.wikipedia.org/wiki/IEEE_802
[Accessed 04 January 2024].
Wikipedia, n.d. Wikipedia. [Online]
Available at: https://en.wikipedia.org/wiki/Proxy_server
[Accessed 05 January 2024].
Wireshark, n.d. Wireshark. [Online]
Available at:
https://www.wireshark.org/docs/wsug_html_chunked/ChapterIntroduction.html#ChIntroFeatur
es
[Accessed 06 January 2024].
Network 75 | P a g e
Grading Rubric
P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Compare common networking principles and how protocols
enable the effectiveness of networked systems.
P3
Discuss the operating principles of networking devices and
server types.
Network 76 | P a g e
P4
Discuss the inter-dependence of workstation hardware with
relevant networking software.
M2
Explore a range of server types and justify the selection of a
server, considering a given scenario regarding cost and
performance optimization.
LO 1 & LO2
D1
Considering a given scenario, identify the topology protocol
selected for the efficient utilisation of a networking system.
P5
Design a networked system to meet a given specification.
P6
Test and evaluate the design to meet the requirements and
analyze user feedback.
M3
Network 77 | P a g e
Install and configure network services and applications on your
choice.
D2
Design a maintenance schedule to support the networked
system.
LO4 : Implement and diagnose networked systems
P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D3
Critically reflect on the implemented network, including
the design and decisions made to enhance the system.
Network 78 | P a g e