Networking Assignment
Networking Assignment
Networking Assignment
Assignment Brief
Higher National Diploma in Computing
Course Title: Pearson BTEC Level 5 Higher National Diploma in Computing
Unit Number and Title: Unit 02: Networking
Assignment Title: SYSCOM Distributions
Name of the Learner: M.S.M. Niham
Ref. No. of the Pearson Regd. No:
Learner:
Assignment Number: 01, 02, 03 & 04 Batch No & Semester: 21 / 01
Issue Date: 28.01.2024 Submission Date: 10.03.2024
Resubmission Date: 18.03.2024 Date Received 1st submission
Unit Assessor: Mr. P.M. Mohamed Riza Academic Year 2023/2024
Assessor Summative Feedback:
Page 1 of 75
Please note that grade decisions are provisional. They are only confirmed once internal and external
moderation has taken place and grade decisions have been agreed at the assessment board.
Program:
Unit:
Plagiarism
Plagiarism is a particular form of cheating. Plagiarism must be avoided at all costs and students who
break the rules, however innocently, may be penalized. It is your responsibility to ensure that you
understand correct referencing practices. As a university-level student, you are expected to use
Page 2 of 75
appropriate references throughout and keep carefully detailed notes of all your sources of materials
for material you have used in your work, including any material downloaded from the Internet. Please
consult the relevant unit lecturer or your course tutor if you need any further advice.
Student Declara琀椀on
Student Declaration
I certify that the assignment submission is entirely my own work and I fully understand the
consequences of plagiarism. I understand that making a false declaration is a form of malpractice.
ASSESSMENT TRACKING
ASSESSMENT RECORD AND FEEDBACK SHEET
HND in
Program: Student Name: Unit Grade:
Computing
Unit No. & Assessment
02: Networking Year: 2023/2024
Title: Date:
Unit
Assessor Mr. Mohamed
Completion IV Signature: [email protected]
Name: Riza
Date:
LO2 P2
P3
P4
M1
Page 3 of 75
P5
LO2 P6
2. 18.02.2024
LO3 M2
M3
LO2
P7
3. LO3 P8 25.02.2024
M4
LO4
LO1
LO2 D1
4. 03.03.2024
LO3 D2
LO4
Assignment Brief
Student Name/ID Number M.S.M. Niham
1018371
Unit Number and Title Unit 02: Networking
Page 4 of 75
Title:
SYSCOM
NAME: M.S.M.
Distributions
NIHAM
Page 5 of 75
Acknowledgment
Firstly, I would take this opportunity to thank my parents, my friends my colleagues and my
senior for helping and assisting throughout this assignment.
Every lesson had different topics to teach us. I thank BCAS computer studies (Pvt) Ltd for
giving me a wonderful opportunity to do this assignment.
Content
Page 6 of 75
s
Unit 02: Networking..............................................................................................................................4
Acknowledgment...................................................................................................................................7
Activity 01...........................................................................................................................................13
1. Title.........................................................................................................................................13
1. Introduction To computer Networking................................................................................15
1.1 Local Area Network (LAN)...........................................................................................17
2. Network Standards................................................................................................................20
2.1 OSI Model......................................................................................................................21
6.2 Hub.................................................................................................................................30
6.3 Switch..............................................................................................................................31
6.4 Bridges............................................................................................................................32
6.5 Router.............................................................................................................................33
Page 7 of 75
6.6 Gateway..........................................................................................................................33
8. Access permission..................................................................................................................37
9. Interdependence of workstation hardware and network software....................................38
9.1 Network Software..........................................................................................................38
3.2 Firewall...........................................................................................................................46
Page 8 of 75
3.4 Security...........................................................................................................................46
3.5 IP Addressing.................................................................................................................46
5. Test Plan.................................................................................................................................50
5.1 Test Procedures..............................................................................................................51
3. Device Configurations...................................................................................................59
5.2 Recommendations..........................................................................................................68
6. Conclusion..............................................................................................................................70
Activity 04...........................................................................................................................................71
Report: Evaluative Report on SYSCOM Distributions Network Design and Implementation
.........................................................................................................................................................71
1. Executive Summary...............................................................................................................71
2. Introduction...........................................................................................................................71
3. Evaluation of Network Topology and Protocols..................................................................71
3.1 Topology Selection.........................................................................................................71
Page 9 of 75
3.2 The Star Topology offers several advantages for SYSCOM Distributions:..............72
Figure 1 - Title.....................................................................................................................................13
Figure 2 - Introduction.........................................................................................................................14
Figure 3 - What is a network ?.............................................................................................................15
Figure 4 - Different Networks Types...................................................................................................16
Figure 5 - Common Types Of Networks.............................................................................................17
Figure 6 - LAN....................................................................................................................................18
Figure 7 - MAN...................................................................................................................................18
Figure 8 - PAN....................................................................................................................................19
Figure 9 - WAN...................................................................................................................................20
Figure 10 - Network Standarrds..........................................................................................................20
Figure 11 - OSI....................................................................................................................................21
Figure 12 - Types Of Network Topologies..........................................................................................24
Figure 13 - Bandwith Requirements....................................................................................................27
Figure 14 - Types Of Network Devices And Functins.........................................................................29
Figure 15 - Repeater............................................................................................................................30
Figure 16 - Hub...................................................................................................................................30
Figure 17 - Switch...............................................................................................................................32
Figure 18 – Bridge...............................................................................................................................33
Figure 19 - Router...............................................................................................................................33
Figure 20 - Gateway............................................................................................................................34
Figure 21 - Web Server.......................................................................................................................35
Figure 22 - File Server.........................................................................................................................36
Figure 23 - Database Server................................................................................................................36
Figure 24 - Access Permission.............................................................................................................37
Page 10 of 75
Page 11 of 75
Activity 01
1. Title
Figure 1 - Title
Good morning, everyone today I took about topic understanding Networks: a non-technical
overview. This is my title.
Page 12 of 75
Figure 2 - Introduction
I’m here to delve into the essential concepts that form the navigating the world of networks.
In the next few minutes, we'll dive into how networks have become a crucial part of our daily
lives, linking devices and people worldwide. Get ready to explore the interconnected web that
shapes our modern world. Let's get started!
Page 13 of 75
PC 1 PC 2
Here we have two PCs. PC1 on the left and PC2 on the right. As is, this isn’t a network.
Ethernet Cable
PC 1 PC 2
Page 14 of 75
We now have a network. Two PCs connected together actually makes a network. It’s a very
simple network. Now that these two nodes are connected, they can share resources and
essentially have a conversation with each other.
This slide benefits and constraints of different network types. Wired networks offer reliability
and consistent performance but limit mobility and involve infrastructure costs. In contrast,
wireless networks provide mobility and flexibility but face challenges like interference and
security concerns. Hybrid networks combine these benefits, but their complex management
and potentially higher costs should be considered when choosing the right network type for
specific organizational needs.
(Anon., 2021)
Page 15 of 75
Network Types depend on how large they are and how much of an area they cover
geographically. Computer networks classified into they are
Local Area Network (LAN)
Page 16 of 75
Figure 6 - LAN
The advantages of LAN are it has high data transmission rates and inexpensive transmission
media. LAN is flexible and growth oriented allows file locking and it also can be extended.
The disadvantages in LAN are, LAN requires more technical and regulatory skills to
maintain and run. LAN software needs a memory area in each of the mainframe used on the
network
Figure 7 - MAN
The advantages of MAN Sending Local emails, High speed than WAN and Conversion
from LAN to MAN is easy.
Page 17 of 75
The disadvantage in MAN is, Vulnerable to hackers, more wires are required to setup and
Difficult to maintain.
Figure 8 - PAN
The advantages of PAN Reliable, Secure, and easy to use, no wires are required and Easy
connection to many nodes.
The disadvantage in PAN is, Slow transfer of data, The Range is less and PAN can cause
interference with radio signals.
Page 18 of 75
Figure 9 - WAN
Disadvantages of WAN are the high setup costs, less security, maintenance issues.
2. Network Standards
Page 19 of 75
control of the data being sent from one layer to another. And these layers are numbered
from one to seven starting from the bottom these layers are:
7. Application Layer
6. Presentation Layer
5. Session Layer
4. Transport Layer
3. Network Layer
1. Physical Layer
Figure 11 - OSI
1. Application layer: The top layer of the OSI model is the Application layer and this layer
deals with applications. The purpose of this layer is to manage communications between
applications. It supports application protocols such as email, HTTP, and FTP. At this
layer data still resembles something that people can actually read.
2. Presentation layer: The presentation layer is where data is first converted into a form
that can be sent over a network data is compressed or decompressed and encrypted or
decrypted. This layer is sometimes referred to as the translation layer.
3. Session layer: The session layer controls the dialog during communications it establishes,
manages and terminates the connections between Local and Remote applications.
This layer is also known as a traffic cop because it direct network traffic.
4. Transport layer: The transport layer provides the transfer of data between and users. its
responsible for resending any packets that do not receive an acknowledgement from the
destination ensuring that the data packets were received by the destination. This layer can
guarantee that the packets are revived.
5. Network layer: The network layer responsible for routing the data based on its logical Ip
address it fragments and reassemble the packets and it instructs data on how to find its
ultimate destination.
6. Data link layer: The data link layer is responsible for sending data to the physical layer.
Page 20 of 75
Data packets are encoded and decoded into bits. It handles flow control and frame
synchronization. And it’s also divided into two sub-layer the media access control layer
and the logical link control layer.
7. Physical layer: The bottom of the OSI model is the physical layer and this layer defines
the network standards and physical characteristics of a network such as the connectors
media types cables voltages etc.… This layer defines the topology of a network.
• But remember, its structured approach can sometimes make it complex during real-world
implementations.
4. Application Layer
3. Transport Layer
2. Internet Layer
1. Link Layer
Nanotechnology
Information assurance
But do note, their scope is often limited to particular niches within the networking world.
(Tai, n.d.)
Network topology is the structure by computers and other peripherals are connected to form
a network. LAN and WAN are the most common types of topologies that is installed and
configured in the enterprise. There are two types of logical topology.
• Logical Topology
• Physical Topology
Page 22 of 75
• Bus Topology
• Star Topology
• Ring Topology
• Mesh Topology
• Hybrid Topology
• Disadvantages: Limited cable length, Performance degrades as more devices are added, A
single point of failure can disrupt the entire network.
(Anon., n.d.)
(Anon., n.d.)
Page 23 of 75
• Advantages: breakdown one link does not affect communication, provides privacy and
security.
Page 24 of 75
Full-duplex lets devices send and receive simultaneously, reducing delays. Half-duplex
allows only one action at a time, potentially slowing communication link of bandwidth like a
highway's width. More width means faster traffic. Adequate bandwidth ensures swift data
transfer, while insufficient bandwidth can lead to congestion and slow performance.
(Anon., 2023)
IPv6, the newer protocol, offers several advantages. It's a solution to the issue of IPv4 address
exhaustion, providing a vast address space to accommodate the growing number of devices
connected to the internet.
Enhanced security is another crucial benefit. IPv6 includes built-in security features, making
it more resistant to various types of attacks. IPv4, the older protocol, has a limited address
space, which has led to the exhaustion of available addresses. This limitation is a significant
constraint in today's highly connected world. Moving on to secure web communication, let's
discuss HTTPS. Lastly, let's dive into network protocols, which are essential for
communication within a network.
Page 25 of 75
(Goss, 2023)
5.1 Compare common networking principles and how protocols enable the
effectiveness of networked systems.
Networking principles refer to the fundamental concepts that underlie the design and
operation of networked systems. These include concepts such as layering, encapsulation, and
routing. Protocols are the specific rules and standards that govern the communication between
different devices in a network.
Layering is a key principle in networking that allows for the separation of different functions
within a network. This allows for the development and use of different protocols at different
layers of the network stack, and allows for the replacement or upgrading of individual
protocols without affecting the entire network.
Encapsulation is another important principle in networking. It refers to the process of
wrapping one protocol within another, and is used to ensure that data is properly formatted
and understood by the receiving device. This allows for different types of data to be
transmitted over the same network, and for devices that use different protocols to
communicate with one another.
Routing is the process of forwarding packets of data from one device to another across a
network. Routing protocols, such as the Routing Information Protocol (RIP) and the Open
Shortest Path First (OSPF) protocol, are used to determine the most efficient path for data to
travel across a network.
In summary, networking principles such as layering, encapsulation, and routing provide the
foundation for the design and operation of networked systems. Protocols, on the other hand,
are the specific rules and standards that govern the communication between different devices
in a network and are used to make these systems effective.
Page 26 of 75
6.1 Repeater
Repeater is a network device that transmits a received signal with more power to an extended
geographical or topological network boundary than what would be capable with the original
signal. When data is travelling through a transmission medium the strength of data loses due
to resistance of the transmission medium. The repeaters job is to amplify the signal and
sending it.
Page 27 of 75
Figure 15 - Repeater
6.2 Hub
Physical layer device, used to connect multiple devices in a single Lan. A hub has many
ethernet ports, when a data packet arrives to any ethernet port the data is copied and sent to
all the other ports so that all devices connected to network can access the information stored
in packet. There are 3 types of hubs.
1.Active hub: These hubs have their own power supply so they can amplify, clean, boost and
relay the signal along the network. They are used to extend the maximum length between
nodes.
2.Passive hub: These hubs don’t have power supply so they will broadcast the signal without
amplifying the signals. They can’t increase the length in-between nodes.
3.Intelligent hub: It works like active hub and include remote management capabilities. It
enables network administrator to monitor the traffic passing through hub and to configure
each port of hub
Figure 16 - Hub
6.3 Switch
Switch is a network device which has multiple ports. switch connects devices to a network
and use packet switching to send, receive or forward data packets or data frames over
network. When data reaches a switch, it checks the receiving node’s address and route the
Page 28 of 75
data to the specific node in the network. Since data doesn’t flood the network the network
traffic is reduced by switches. There are different types of switches in network.
These are:
1. Unmanaged switch
These are the switches that are mostly used in home networks and small businesses.
These switches are plug and play type. They don’t need to be configured. They help to
connect two computers or a computer and a printer in one location.
2. Managed switch
These types of switches have highest level of security, precision control, and full
management of the network These are used in large networks and can be customized to
enhance the functionality of a network. These are costly but this is the best option for
growing networks because of the scalability of managed switch. They follow simple
network management protocol (SNMP).
3. LAN Switch
These are known as Ethernet switches and are used to reduce bottlenecks in the network
Page
by distributing a package of data only to its intended recipient. These are used to connect
points on LAN
4. Layer 2 Switch
Layer 2 switch works on the data link layer of OSI model. It uses MAC addresses of
devices to find the route to forward data packets. It uses hardware-based switching
techniques to connect and transmit data through LAN.
5. Layer 3 Switch
Layer 3 switch is also known as multilevel switch. This combines the functions of a
router and a switch. It acts as a switch to connect devices on the same subnet or
Virtual LAN at lightning speed and has IP routing built in to act as a router. It can
support routing protocols. Inspect incoming packets, and make routing decisions
based on the source and destination address.
Page 29 of 75
Figure 17 - Switch
6.4 Bridges
Bridge is a device which divides a network into two or join two networks together which
use same protocols. The main function of bridge is to forward data based on the MAC
address of sender and receiver. This helps to reduce unnecessary network traffic. There
are two types of bridges
2. Source Routing Bridges: Source routing bridge decide the route between two
hosts. This bridge uses the MAC destination address of a frame to direct it by the
sourcing routing algorithm.
Figure 18 – Bridge
6.5 Router
Routers operate at Networking layer of OSI model. Router is a device designed to receive,
analyze and routes data packets between computer networks and devices based on their IP
addresses. Router connects LAN and Wan together. Routers are used to connect
hardware equipment with remote network locations. Routers always maintain routing
table
Page 30 of 75
Figure 19 - Router
6.6 Gateway
Gateway is a passage to connect two networks which work on different networking
models. Gateway translates data from one network to the other. They can also be called as
protocol converters as they convert protocols. Vocal Tec gateway converts human speech
travelling on analog phone lines into LAN protocol data and vice versa.
Figure 20 - Gateway
(Andrea, n.d.)
(Anon., n.d.)
Page 31 of 75
Resource sharing: servers allow multiple users and devices to access and share
resources, such as files, printers, and applications, over a network. This improves
collaboration and productivity by enabling users to access the resources they need, when
they need them.
Data management: servers provide centralized storage and management of large
amounts of data, allowing multiple users and applications to access and update the data as
needed. This improves the accessibility and reliability of data, and helps to ensure that it
is up-to-date and consistent across the organization.
Security: servers can provide a variety of security features, such as firewalls, antivirus
software, and encryption, to protect the network and its resources from unauthorized
access and malicious attacks.
Page 32 of 75
1. DNS servers
DNS servers are application servers that provide name to client computers by converting
names understood by users into machine readable IP addresses. DNS system is a widely
distributed database of names and other DNS servers. When a client needs the address of
a system, it sends a request to a DNS server. The DNS server responds with the necessary
IP address from its table of names.
2. Web Server
Web servers handle http requests from clients and deliver web content.
Page
Figure 21 - Web Server
3. File Servers
File servers store and distribute files. Multiple users can share and download files stored on
server. It is easy and more secure to store and backup data in file servers than attempting to
provide security and integrity for every file on every device in an organization. Users can use
their personal computer to look into their files stored in the server.
Page 33 of 75
4. Database Servers
Much of the data used by companies, users and other services are high and they are stored in
databases. Databases needs lot for storage and multiple clients need access to database
simultaneously at a given time. This is easy if the databases are stored in servers. The servers
which run database application and respond to numerous clients are database servers. The
most common database server applications are Oracle,
(Andrea, n.d.)
(Anon., n.d.)
8. Access permission
Page 34 of 75
Access permissions play a crucial role in controlling who can access what within the
network. They're like the keys to different rooms in a building, ensuring that sensitive data
remains secure and only accessible to authorized users.
(Andrea, n.d.)
Page 35 of 75
• File management lets administrators decide the location of data storage and control user
access to data.
• Access enables user to enjoy uninterrupted access to network resources.
Page 36 of 75
• Network security systems assists administrators in looking after security and preventing
data breaches.
Page
Features
and is optimized to apply common services across Cisco switches, routers, wireless
controllers, and access points. Through a direct link to Cisco Active Advisor, you can view
important information pertaining to the products on your network, such as Warranty and
Contract Information, Advisories and End of Life notifications. Cisco Active Advisor will be
automatically populated with the devices managed through Cisco Network Assistant.
Features.
Page 39 of 75
13. Conclusion
Figure 26 - Conclusion
This is my conclusion
Page 40 of 75
Page 41 of 75
Activity 02
(Donahue, 2011)
(Spurgeon, 2000)
(Sobell, 2015)
(Rosenberg, 2017)
(Lammle, 2007)
Page 43 of 75
3.2 Firewall
• Configure firewall rules to filter incoming and outgoing traffic.
• Set up a DMZ for external-facing services.
(Wenliang, 2018)
(Albitz, 2006)
3.4 Security
• Implement strong password policies.
• Use encryption protocols (e.g., WPA2 for Wi-Fi).
• Regularly update and patch all devices and software.
(Charlie Kaufman, 2002)
3.5 IP Addressing
Assign static IP addresses to servers and printers.
Use DHCP for dynamic IP assignment to workstations.
(Lammle, 2011)
Page 44 of 75
(Burgess, 2004)
Solution
Page 45 of 75
Page 46 of 75
Time Schedule
Action Time-Line Description
All Updates 12 am Onwards This time ensures that the internet connection speed is
high, as the network traffic is low at midnight
Page 47 of 75
Scanning After Employee This will ensure that no further threats are affected once
5. Test Plan
Test Action Test Data Expected Result
Ping test between devices within the Device IP
Successful ping response
same subnet addresses
Ping test between devices across Device IP Successful ping response via
different subnets addresses router
File transfer test within the same
Large files Successful file transfer
subnet
File transfer test across different Successful file transfer via
Large files
subnets router
External IP
Internet connectivity test Successful internet access
addresses
Security test (unauthorized access Various attack Access denied, logs
attempts) vectors generated
Figure 31 - Test Plan
(Gregg, 2014)
(Oppenheimer, 2011)
Page 49 of 75
1. Domain Server: Windows Active Directory for user management and security.
(Robbins, 1997)
10. Conclusion
The proposed network solution aims to provide SYSCOM Distributions with a robust,
scalable, and secure infrastructure to support operations and facilitate seamless
communication and resource sharing. By following the implementation plan outlined in this
report, SYSCOM can achieve efficiency and productivity across departments while ensuring
network reliability and security.
Activity 03
Date: [10.03.2024]
Prepared by: [M.S.M. Niham]
Page 50 of 75
1. Executive Summary
Following the guidelines, the optimized network design for SYSCOM Distributions was
successfully implemented, as this technical report demonstrates. With the help of test results,
configuration files, screenshots, and network monitoring data, the report provides convincing
proof of the implementation. It also presents an interpretation of the test plan outcomes and
suggests possible improvements to the networked system.
2. Introduction
This technical report documents the implementation of the optimized network design for
SYSCOM Distributions using the Cisco Packet Tracer network simulator. The design aims to
provide a robust, secure, and efficient network infrastructure to support seamless
communication and resource sharing across four departments: Software Development, IT
Support, Finance, and Administration.
Page 51 of 75
1. Network Topology
The network topology is a hybrid of star and mesh configurations, with each department
subnet connected to a central core Cisco Catalyst 2960 switch, as shown in Figure 33.
Page 52 of 75
Page 53 of 75
• IT Support: 192.168.40.65/26
Page 54 of 75
Figure 35 - IT Support
• Finance: 192.168.40.129/26
Figure 36 - Finance
• Administration: 192.168.40.193/26
Page 55 of 75
Figure 37 – Administration
3. Device Configurations
3.1 Router configuration for inter-VLAN routing
Router Configuration for Inter-VLAN Routing: In this chapter, i describe the changes made
to the router to enable inter-VLAN routing, which permits devices in different VLANs to
communicate with one another. In order to ensure correct routing across VLANs, this entails
creating subinterfaces for each VLAN on the router's interface that is linked to the switch,
giving these subinterfaces IP addresses, and setting up routing protocols or static routes.
Page 56 of 75
1. VLAN Configuration: I set up the switches' VLANs and give each one a unique port.
This segmentation improves performance and security by enabling the logical division of
network traffic.
2. Trunking: Multiple VLANs' worth of traffic can be carried across trunk lines that
connect switches and routers. In order to allow traffic from several VLANs to transit the
Page 57 of 75
network, we establish trunk ports and enable trunking protocols like IEEE 802.1Q.
3. Port Security: To prevent unwanted access to the network and limit access to switch
ports, port security techniques like MAC address filtering can be used.
3.3 PC Configuration
I define the IP address, subnet mask, default gateway, and DNS server addresses for every PC
connected to the network. We may also set up any particular programs or software needed for
communication or network access. These settings include:
Additionally, we may configure server roles and permissions, network file sharing, and
remote access protocols to ensure proper integration with the network environment.
Page 58 of 75
Page 59 of 75
Page 60 of 75
Page 61 of 75
Figure 43 – Ping
Page 62 of 75
Figure 44 - Ping
The test plan from Activity 2 was executed, and results were documented:
Actual
Test Action Test Data Expected Result
Result
Ping devices in same
192.168.10.14 <->192.168.10.22 Successful pings Successful
VLAN
Ping devices across Successful pings via
192.168.10.14 <->192.168.10.85 Successful
VLANs router
500MB file 192.168.10.14 <-
File transfer in VLAN Successful transfer Successful
>192.168.10.22
File transfer across 500MB file 192.168.10.14 <- Successful transfer via
Successful
VLANs >192.168.10.85 router
Access 8.8.8.8 from Successful ping to
Internet connectivity Successful
192.168.10.94 internet
Simulated DDoS attack on Attack traffic dropped,
Security test Successful
firewall alerts raised
Figure 45 - Testing Results
Page 63 of 75
I have choose testing platform for cisco packet tracer. And selected topology hybrid
topology. I have connected four each department first one Software, It, Finance, and
Administration. Then each department has individual IP address and subnet mask. And each
department has separate switch, DNs server, proxy server, two pc and printer are connected
with one Switch & cloud between router. Main thing every pc, servers’ type, routers,
switches and hardware, software tools are must configuration. why I have config because
successful output you can see.
1. Network Performance: During the file transfer test across VLANs, higher latency
was observed compared to intra-VLAN transfers. This could impact performance for
bandwidth-intensive applications used across departments.
2. Scalability: The current design can accommodate the specified 60 hosts across four
departments. However, as the company grows, the network may need to be expanded
to support more users and devices.
3. Redundancy: The current design lacks redundancy for critical components like the
core switch and router. A failure in these devices could cause significant downtime
and disruption.
5.2 Recommendations
To address the identified areas for improvement, the following enhancements are
recommended:
Page 64 of 75
6. Conclusion
This technical report has documented the implementation of the optimized network
design for SYSCOM Distributions using the Cisco Packet Tracer network simulator. The
implementation process, including device configurations, security measures, and network
monitoring, has been detailed. The test plan designed in Activity 2 was executed, and the
results were documented and analyzed. Based on the analysis, recommendations for
potential enhancements to the networked system have been provided, addressing areas
such as performance optimization, scalability, redundancy, security, and continuous
monitoring.
(Anon., 2023)
Activity 04
Date: 10.03.2024
Prepared by: M.S.M. Niham
Organization: SYSCOM Distributions
Page 66 of 75
1. Executive Summary
This report evaluates the network topology and protocols chosen for SYSCOM
Distributions, a leading software solution provider, to fulfill their requirements of
dividing the network into four subnets, connecting departments for seamless
communication, and sharing resources efficiently. The report also provides a critical
reflection on the final implemented network design and decisions made to enhance the
solution.
2. Introduction
The report reviews the network topology and design implemented at SYSCOM
Distributions, aimed at enhancing communication, security, and resource sharing across
departments.
reconfiguration.
3. Fault Isolation: In the event of a network failure or malfunction, the Star Topology
allows for easy isolation of the affected department while maintaining connectivity for the
rest of the network. This minimizes downtime and disruption to other departments'
operations.
1. Resource Sharing: Employees may effortlessly access shared files, printers, and
software programs because to the Star Topology's smooth facilitation of resource
sharing between departments. TCP/IP protocols facilitate dependable and effective
data transfer, which boosts output and teamwork.
Page 68 of 75
3. Fault Tolerance: The Star Topology's fault isolation features reduce the effects of
network outages or malfunctions, guaranteeing unbroken departmental production and
communication. Fault tolerance is further improved by TCP/IP protocols, which allow
for rapid network connectivity recovery and restoration.
1. Security Considerations: Because of its centralized structure, the Star Topology may
provide security problems even though it is effective for sharing resources. It is
imperative to put strong security measures in place to protect sensitive data from
cyber threats, including intrusion detection systems, firewalls, and encryption
techniques.
Page 69 of 75
1. Flexibility and Adaptability: The requirement for these qualities in order to handle
future technological advancements and expansion served as a guide for design
choices. The network design may adapt to the needs of the business by using standard
protocols and a scalable topology, all without requiring significant reconfiguration or
overhaul. Because of its adaptability, SYSCOM Distributions is able to stay ahead of
the competition in the market and efficiently respond to new trends and requests.
3. Continuous Improvement: Setting up the network infrastructure is only the first step
in a continuing process of optimization and improvement. It is not the final result.
Frequent assessment, feedback gathering, and technological upgrades will guarantee
that the network stays robust, effective, and in line with the strategic goals of
SYSCOM Distributions. Through the adoption of a continuous improvement culture,
SYSCOM Distributions can effectively adjust to evolving business conditions, grasp
novel prospects, and stimulate industry innovation.
4. Cost considerations: Taking into account the expenses of setting up and maintaining
the network infrastructure was a crucial part of the design process. The Star Topology
has benefits in terms of fault tolerance and scalability, but it's important to consider
Page 70 of 75
the costs associated with purchasing, installing, and maintaining hardware. SYSCOM
Distributions can make sure that network infrastructure investments are in line with
financial limitations and maximize long-term value and return on investment by
carrying out a comprehensive cost-benefit analysis.
6. Conclusion
The implemented network topology and protocols effectively meet SYSCOM
Distributions requirements for seamless communication and security. However, the
network should be viewed as an evolving entity, subject to continuous improvement and
adaptation to changing conditions. Regular evaluations and enhancements will be
essential to ensure its long-term efficiency and security.
This evaluative report underscores the importance of a flexible and proactive approach to
network design and management, aligning with SYSCOM Distributions commitment to
technological excellence and innovation.
References
Albitz, C. L. a. P., 2006. DNS and BIND. In: Sebastopol, CA: O'Reilly Media, Inc.
Page 71 of 75
Page 72 of 75
Burgess, M., 2004. Principles of Network and System Administration. In: Chichester,
England: John Wiley & Sons, Ltd..
Donahue, G. A., 2009. Network Warrior. In: Sebastopol, CA: O'Reilly Media.
Donahue, G. A., 2011. In: Network Warrior. Sebastopol, CA: O'Reilly Media, Inc..
Page 73 of 75
Gregg, M., 2014. CASP CompTIA Advanced Security Practitioner Study Guide. In:
Indianapolis, IN: John Wiley & Sons, Inc..
Kuniavsky, M., 2003. Observing the User Experience: A Practitioner's Guide to User
Research. In: San Francisco: Morgan Kaufmann.
Lammle, T., 2007. CCNA: Cisco Certified Network Associate Study Guide. In: Indianapolis,
IN: Wiley.
Lammle, T., 2011. CCNA Routing and Switching Study Guide. In: San Francisco: Sybex.
Lammle, T., 2015. In: CCNA Routing and Switching Study Guide. Indianapolis, IN: Wiley.
Neal Allen, J. B. a. H. R., 2013. Network Maintenance and Troubleshooting Guide: Field
Tested Solutions for Everyday Problems. In: Boston: Addison-Wesley Professional.
Oppenheimer, P., 2011. Top-Down Network Design. In: Cincinnati, Ohio: Cisco Press.
Robbins, D. D. a. A., 1997. Sed & Awk. In: Sebastopol, CA: O'Reilly Media, Inc..
Rosenberg, P., 2017. Cable Installer's Pocket Guide. In: Burlington, MA: Jones & Bartlett
Learning.
Sobell, M. G., 2015. In: A Practical Guide to Linux Commands, Editors, and Shell
Programming. New Jersey, USA.: s.n.
Spurgeon, C. E., 2000. In: Ethernet: The Definitive Guide. Sebastopol, California, USA:
O'Reilly Media, Inc.
Tai, N. M., n.d. Discuss The Benefits and Constraints of Different Network Types and
Standards. Scribd, p. 31.
Tai, N. M., n.d. Discuss The Benefits and Constraints of Different Network Types and
Standards. scribd, p. 31.
Page 74 of 75
Wenliang, D., 2018. Cisco ASA Configuration. In: Birmingham: Packt Publishing Ltd.
Page 75 of 75