0% found this document useful (0 votes)
23 views

Networking Assignment

The document outlines an assignment brief for a Higher National Diploma in Computing course focused on networking, specifically titled 'SYSCOM Distributions'. It includes details such as the assignment's issue and submission dates, learner information, and a structured content outline covering various networking concepts, principles, and implementations. The document emphasizes the importance of avoiding plagiarism and includes a student declaration of original work.

Uploaded by

Abdullah Azar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

Networking Assignment

The document outlines an assignment brief for a Higher National Diploma in Computing course focused on networking, specifically titled 'SYSCOM Distributions'. It includes details such as the assignment's issue and submission dates, learner information, and a structured content outline covering various networking concepts, principles, and implementations. The document emphasizes the importance of avoiding plagiarism and includes a student declaration of original work.

Uploaded by

Abdullah Azar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 76

lOMoARcPSD|52310946

Networking Assignment

Diploma in Software eng. (British College of Applied Studies)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by Abdullah Azar ([email protected])
lOMoARcPSD|52310946

Assignment Brief
Higher National Diploma in Computing
Course Title: Pearson BTEC Level 5 Higher National Diploma in Computing
Unit Number and Title: Unit 02: Networking
Assignment Title: SYSCOM Distributions
Name of the Learner: M.S.M. Niham
Ref. No. of the Pearson Regd. No:
Learner:
Assignment Number: 01, 02, 03 & 04 Batch No & Semester: 21 / 01
Issue Date: 28.01.2024 Submission Date: 10.03.2024
Resubmission Date: 18.03.2024 Date Received 1st submission
Unit Assessor: Mr. P.M. Mohamed Riza Academic Year 2023/2024
Assessor Summative Feedback:

Grade: Assessor Signature: Date:


Resubmission Feedback - Formative:

Grade: Assessor Signature: Date:

Page 1 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Internal Verifier’s Comments:

Signature of the IV: Date:


Student Agreement:
Student Signature:
I understand the feedback given to me and agree to carry
Date:
out the actions in future works as required and indicated.

Please note that grade decisions are provisional. They are only confirmed once internal and external
moderation has taken place and grade decisions have been agreed at the assessment board.

STUDENT ASSESSMENT SUBMISSION AND DECLARATION


Student Name: Assessor Name:

Issued Date: Submission Date: Submitted On:

Program:

Unit:

Assignment number and title:

Plagiarism
Plagiarism is a particular form of cheating. Plagiarism must be avoided at all costs and students who
break the rules, however innocently, may be penalized. It is your responsibility to ensure that you
understand correct referencing practices. As a university-level student, you are expected to use

Page 2 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

appropriate references throughout and keep carefully detailed notes of all your sources of materials
for material you have used in your work, including any material downloaded from the Internet. Please
consult the relevant unit lecturer or your course tutor if you need any further advice.

Student Declara琀椀on
Student Declaration

I certify that the assignment submission is entirely my own work and I fully understand the
consequences of plagiarism. I understand that making a false declaration is a form of malpractice.

Student Signature: M.S.M. Niham Date: 27-03-2024

ASSESSMENT TRACKING
ASSESSMENT RECORD AND FEEDBACK SHEET

HND in
Program: Student Name: Unit Grade:
Computing
Unit No. & Assessment
02: Networking Year: 2023/2024
Title: Date:
Unit
Assessor Mr. Mohamed
Completion IV Signature: [email protected]
Name: Riza
Date:

Learning Criteria Date Hand In Formative Resubmission


Activity No
Objectives Targeted Issued Date Feedback Date*

1. LO1 P1 28.01.2024 11.02.2024

LO2 P2
P3
P4
M1

Page 3 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

P5
LO2 P6
2. 18.02.2024
LO3 M2
M3

LO2
P7
3. LO3 P8 25.02.2024
M4
LO4

LO1
LO2 D1
4. 03.03.2024
LO3 D2
LO4

* Resubmissions must be approved by the Assessment Board

Unit 02: Networking

Assignment Brief
Student Name/ID Number M.S.M. Niham
1018371
Unit Number and Title Unit 02: Networking

Academic Year 2023/2024


Batch / Cohort & Semester Batch 21, Semester 1
Unit Tutor Mr. P.M. Mohamed Riza
Assignment Title SYSCOM Distributions

Page 4 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Title:
SYSCOM
NAME: M.S.M.
Distributions
NIHAM

Page 5 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Acknowledgment

Firstly, I would take this opportunity to thank my parents, my friends my colleagues and my
senior for helping and assisting throughout this assignment.

In addition, I am very grateful to my Lecturer at BCAS computer studies (pvt.) Ltd,


Kalmunai, Mr. Riza, for giving me the proper guidance and support needed to do this
assignment without any hassle.

Every lesson had different topics to teach us. I thank BCAS computer studies (Pvt) Ltd for
giving me a wonderful opportunity to do this assignment.

Content

Page 6 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

s
Unit 02: Networking..............................................................................................................................4
Acknowledgment...................................................................................................................................7
Activity 01...........................................................................................................................................13
1. Title.........................................................................................................................................13
1. Introduction To computer Networking................................................................................15
1.1 Local Area Network (LAN)...........................................................................................17

1.2 Metropolitan Area Network (MAN).............................................................................18

1.3 Personal Area Network (PAN)......................................................................................19

2. Network Standards................................................................................................................20
2.1 OSI Model......................................................................................................................21

2.2 TCP/IP Model................................................................................................................22

2.3 IEEE Standard...............................................................................................................23

3. Types Of Network Topologies...............................................................................................24


3.1 Bus Topology..................................................................................................................25

3.2 Star Topology.................................................................................................................25

3.3 Ring Topology................................................................................................................25

3.4 Mesh Topology...............................................................................................................25

3.5 Hybrid Topology............................................................................................................26

4. Suitable network Topology to SYSCOM Distributions Network Solution........................26


5. Common networking principles and protocols....................................................................27
5.1 Compare common networking principles and how protocols enable the effectiveness
of networked systems.................................................................................................................28

6. Operating Principle of Network devices..............................................................................29


6.1 Repeater..........................................................................................................................29

6.2 Hub.................................................................................................................................30

6.3 Switch..............................................................................................................................31

6.4 Bridges............................................................................................................................32

6.5 Router.............................................................................................................................33
Page 7 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

6.6 Gateway..........................................................................................................................33

7. Types Of Network Servers....................................................................................................34


7.1 Importance of server......................................................................................................34

7.2 Types of servers.............................................................................................................35

8. Access permission..................................................................................................................37
9. Interdependence of workstation hardware and network software....................................38
9.1 Network Software..........................................................................................................38

9.2 The functions of network software...............................................................................38

10. Here are few networks software used in network design...............................................39


10.1 Open filer........................................................................................................................39

10.2 Cisco Network Assistant................................................................................................40

11. How hardware and network software depend on each other.........................................40


12. Suitable network software to this scenario......................................................................41
13. Conclusion.........................................................................................................................42
14. Thank You..........................................................................................................................43
Activity 02...........................................................................................................................................44
Network Implementation Plan for SYSCOM Distributions.......................................................44
1. Introduction...........................................................................................................................44
2. Design of the Network...........................................................................................................44
2.1 Network Topology..........................................................................................................44

2.2 Network Addresses........................................................................................................44

2.3 Networking Hardware...................................................................................................45

2.4 Network Software..........................................................................................................45

2.5 Devices and Users...........................................................................................................45

2.6 Physical Location of Devices.........................................................................................45

3. Device Configuration and Security Considerations............................................................45


3.1 Switch Configuration.....................................................................................................45

3.2 Firewall...........................................................................................................................46

3.3 DNS and Proxy Servers.................................................................................................46

Page 8 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

3.4 Security...........................................................................................................................46

3.5 IP Addressing.................................................................................................................46

4. Network maintenance schedule............................................................................................47


4.1 Importance of network maintenance schedule............................................................47

4.2 Example of network maintenance tasks.......................................................................47

5. Test Plan.................................................................................................................................50
5.1 Test Procedures..............................................................................................................51

6. User Feedback and Analysis.................................................................................................51


7. Optimized Network Design...................................................................................................51
8. Range of Network Server Types...........................................................................................52
9. Recommended Server Selection and justification...............................................................52
10. Conclusion..........................................................................................................................52
Activity 03...........................................................................................................................................53
Technical Report: Virtual Network Implementation for SYSCOM Distributions...................53
1. Executive Summary...............................................................................................................53
2. Introduction...........................................................................................................................53
3. Implementation of Optimized Design...................................................................................54
1. Network Topology..........................................................................................................54

2. IP Addressing and Subnetting......................................................................................55

3. Device Configurations...................................................................................................59

4. Test Plan Implementation.....................................................................................................65


5. Analysis and Recommendations...........................................................................................68
5.1 Analysis of Test Results.................................................................................................68

5.2 Recommendations..........................................................................................................68

6. Conclusion..............................................................................................................................70
Activity 04...........................................................................................................................................71
Report: Evaluative Report on SYSCOM Distributions Network Design and Implementation
.........................................................................................................................................................71
1. Executive Summary...............................................................................................................71
2. Introduction...........................................................................................................................71
3. Evaluation of Network Topology and Protocols..................................................................71
3.1 Topology Selection.........................................................................................................71
Page 9 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

3.2 The Star Topology offers several advantages for SYSCOM Distributions:..............72

3.3 Protocol Selection...........................................................................................................72

3.4 Efficient Utilization of Networking System..................................................................73

4. Critical Reflection on the Implemented Network and Design............................................73


5. Critical Reflection on Enhancement Decisions....................................................................74
6. Conclusion..............................................................................................................................76
References......................................................................................................................................76

Figure 1 - Title.....................................................................................................................................13
Figure 2 - Introduction.........................................................................................................................14
Figure 3 - What is a network ?.............................................................................................................15
Figure 4 - Different Networks Types...................................................................................................16
Figure 5 - Common Types Of Networks.............................................................................................17
Figure 6 - LAN....................................................................................................................................18
Figure 7 - MAN...................................................................................................................................18
Figure 8 - PAN....................................................................................................................................19
Figure 9 - WAN...................................................................................................................................20
Figure 10 - Network Standarrds..........................................................................................................20
Figure 11 - OSI....................................................................................................................................21
Figure 12 - Types Of Network Topologies..........................................................................................24
Figure 13 - Bandwith Requirements....................................................................................................27
Figure 14 - Types Of Network Devices And Functins.........................................................................29
Figure 15 - Repeater............................................................................................................................30
Figure 16 - Hub...................................................................................................................................30
Figure 17 - Switch...............................................................................................................................32
Figure 18 – Bridge...............................................................................................................................33
Figure 19 - Router...............................................................................................................................33
Figure 20 - Gateway............................................................................................................................34
Figure 21 - Web Server.......................................................................................................................35
Figure 22 - File Server.........................................................................................................................36
Figure 23 - Database Server................................................................................................................36
Figure 24 - Access Permission.............................................................................................................37
Page 10 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Figure 25 - The Interdependence Of Workstation Hardware and Ssoftware........................................38


Figure 26 - Conclusion........................................................................................................................42
Figure 27 - Thank You........................................................................................................................43
Figure 28 - Logical Schedule Maintenance.........................................................................................48
Figure 29 - Physical Schedule Maintenance........................................................................................49
Figure 30 - Time Schedule..................................................................................................................50
Figure 31 - Test Plan...........................................................................................................................50
Figure 32 - Cisco Version....................................................................................................................54
Figure 33 - SYSCOM implementation plan.........................................................................................55
Figure 34 - Software Development......................................................................................................56
Figure 35 - IT Support.........................................................................................................................57
Figure 36 - Finance..............................................................................................................................58
Figure 37 – Administration..................................................................................................................59
Figure 38 - VLAN routing...................................................................................................................60
Figure 39 – Server (1).........................................................................................................................62
Figure 40 - Server (2)..........................................................................................................................63
Figure 41 - Server (3)..........................................................................................................................64
Figure 42 - Server (4)..........................................................................................................................65
Figure 43 – Ping..................................................................................................................................66
Figure 44 - Ping...................................................................................................................................67
Figure 45 - Testing Results..................................................................................................................67

Page 11 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Activity 01

1. Title

Figure 1 - Title

Good morning, everyone today I took about topic understanding Networks: a non-technical
overview. This is my title.

Page 12 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Figure 2 - Introduction

I’m here to delve into the essential concepts that form the navigating the world of networks.
In the next few minutes, we'll dive into how networks have become a crucial part of our daily
lives, linking devices and people worldwide. Get ready to explore the interconnected web that
shapes our modern world. Let's get started!

Page 13 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

1. Introduction To computer Networking

Figure 3 - What is a network ?

PC 1 PC 2

Here we have two PCs. PC1 on the left and PC2 on the right. As is, this isn’t a network.

However, if I connect them together with a cable.

Ethernet Cable

PC 1 PC 2

Page 14 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

We now have a network. Two PCs connected together actually makes a network. It’s a very
simple network. Now that these two nodes are connected, they can share resources and
essentially have a conversation with each other.

Figure 4 - Different Networks Types

This slide benefits and constraints of different network types. Wired networks offer reliability
and consistent performance but limit mobility and involve infrastructure costs. In contrast,
wireless networks provide mobility and flexibility but face challenges like interference and
security concerns. Hybrid networks combine these benefits, but their complex management
and potentially higher costs should be considered when choosing the right network type for
specific organizational needs.

(Anon., 2021)

Page 15 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Figure 5 - Common Types Of Networks

Network Types depend on how large they are and how much of an area they cover
geographically. Computer networks classified into they are
 Local Area Network (LAN)

 Metropolitan Area Network (MAN)

 Personal Area Network (PAN)

 Wide Area Network (WAN)

1.1 Local Area Network (LAN)


A local area network is a group of devices such as computers, servers, switches, and printers
which are located in the same building, such as in an office or in a home. in other words, in
close proximity to each other. The most common type of LAN is an Ethernet LAN, where
two or more computers are connected to Ethernet cables using a switch or Hub.

Page 16 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Figure 6 - LAN

The advantages of LAN are it has high data transmission rates and inexpensive transmission
media. LAN is flexible and growth oriented allows file locking and it also can be extended.

The disadvantages in LAN are, LAN requires more technical and regulatory skills to
maintain and run. LAN software needs a memory area in each of the mainframe used on the
network

1.2 Metropolitan Area Network (MAN)


This a larger network than a LAN. It’s a network that spans over several buildings in a city
or town. A metropolitan area network can be created by interconnecting two LANs. MANs
are typically connected using a high-speed connection such as fiber optic cables. It’s a high-
speed network that gives the ability for sharing data and resources within a city. Based on
managing, more speed than WAN, most important thing is easy to configure VPN salutation
and Conversion from LAN to MAN is easy.

Figure 7 - MAN

The advantages of MAN Sending Local emails, High speed than WAN and Conversion
from LAN to MAN is easy.

Page 17 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

The disadvantage in MAN is, Vulnerable to hackers, more wires are required to setup and
Difficult to maintain.

1.3 Personal Area Network (PAN)


A network for personal devices within an individual's workspace, usually within a range of
a few meters, connects personal devices like smartphones, laptops, and wearable
technology. But they can also connect buy using a wired connection such as a USB cable.
PANs are generally used for transferring small files such as music, photos, calendar
appointments, and etc.

Figure 8 - PAN

The advantages of PAN Reliable, Secure, and easy to use, no wires are required and Easy
connection to many nodes.

The disadvantage in PAN is, Slow transfer of data, The Range is less and PAN can cause
interference with radio signals.

Wide Area Network (WAN)


A WAN is largest type of network. WAN includes multiple LANs, CANs, and MANs. It’s a
network that spans over a large geographical area such as a country continent or even the
entire globe. An example for a wide area network is the internet.

Page 18 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Figure 9 - WAN

The advantages of WAN are it centralized IT infrastructure, boosts privacy, increases


bandwidth and can access from anywhere.

Disadvantages of WAN are the high setup costs, less security, maintenance issues.

2. Network Standards

Figure 10 - Network Standarrds

2.1 OSI Model


OSI Model gives us a well-organized framework to comprehend network communication,
much like a layered cake. The OSI model describes how information from software in one
computer moves through a network to reach software in another computer and it does this
by breaking down this huge task of data communication into seven different layers. Giving

Page 19 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

control of the data being sent from one layer to another. And these layers are numbered
from one to seven starting from the bottom these layers are:

7. Application Layer

6. Presentation Layer

5. Session Layer

4. Transport Layer

3. Network Layer

2. Data Link Layer

1. Physical Layer

Figure 11 - OSI

1. Application layer: The top layer of the OSI model is the Application layer and this layer
deals with applications. The purpose of this layer is to manage communications between
applications. It supports application protocols such as email, HTTP, and FTP. At this
layer data still resembles something that people can actually read.
2. Presentation layer: The presentation layer is where data is first converted into a form
that can be sent over a network data is compressed or decompressed and encrypted or
decrypted. This layer is sometimes referred to as the translation layer.
3. Session layer: The session layer controls the dialog during communications it establishes,
manages and terminates the connections between Local and Remote applications.
This layer is also known as a traffic cop because it direct network traffic.

4. Transport layer: The transport layer provides the transfer of data between and users. its
responsible for resending any packets that do not receive an acknowledgement from the
destination ensuring that the data packets were received by the destination. This layer can
guarantee that the packets are revived.
5. Network layer: The network layer responsible for routing the data based on its logical Ip
address it fragments and reassemble the packets and it instructs data on how to find its
ultimate destination.
6. Data link layer: The data link layer is responsible for sending data to the physical layer.
Page 20 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Data packets are encoded and decoded into bits. It handles flow control and frame
synchronization. And it’s also divided into two sub-layer the media access control layer
and the logical link control layer.
7. Physical layer: The bottom of the OSI model is the physical layer and this layer defines
the network standards and physical characteristics of a network such as the connectors
media types cables voltages etc.… This layer defines the topology of a network.

• But remember, its structured approach can sometimes make it complex during real-world
implementations.

2.2 TCP/IP Model


TCP/IP, on the other hand, is the internet's foundation. It's user-friendly and widely used.
Here is the TCP/IP model Four Simple layer, Application, Transport, Internet and link.
However, it's less rigid compared to OSI, offering more flexibility.

4. Application Layer

3. Transport Layer

2. Internet Layer

1. Link Layer

2.3 IEEE Standard


Then we have the 802.x Standards. IEEE standards brings out the various networks
technology various accessible networks that will be useful to our daily life to show our
social media and various transmission of data through various resources. these are the fields
developed in that will be in usage IEEE so they will be mainly concentrating,
 Power and energy
 Biomedical and health care
 Information technology
 Telecommunication
 Transportation
Page 21 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

 Nanotechnology
 Information assurance

These are the fields they will be working on.

They're specific guidelines for various network technologies, ensuring compatibility.

But do note, their scope is often limited to particular niches within the networking world.

(Tai, n.d.)

3. Types Of Network Topologies

Figure 12 - Types Of Network Topologies

Network topology is the structure by computers and other peripherals are connected to form
a network. LAN and WAN are the most common types of topologies that is installed and
configured in the enterprise. There are two types of logical topology.

• Logical Topology

• Physical Topology

Page 22 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Types of Physical Network Topology

• Bus Topology

• Star Topology

• Ring Topology

• Mesh Topology

• Hybrid Topology

3.1 Bus Topology


In a bus network, all devices are connected to a single central cable called a bus, which is
prone to network-wide failure if the bus is disrupted.

• Advantages: Cost-effective, simple setup.

• Disadvantages: Limited cable length, Performance degrades as more devices are added, A
single point of failure can disrupt the entire network.

(Anon., n.d.)

3.2 Star Topology


In a star network, all devices are connected to a central controller.
• Advantages: Easy to install, excellent performance
• Disadvantages: failure in hub affects the overall Networks, higher costs.

3.3 Ring Topology


Each device is connected to exactly two other devices and forms a ring.

• Advantages: Easy to install, possibility of collision is less

• Disadvantages: Damage in one node affects overall Network, Troubleshooting is


difficult.

(Anon., n.d.)

Page 23 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

3.4 Mesh Topology


Each device is connected to every other device through a dedicated link.

• Advantages: breakdown one link does not affect communication, provides privacy and
security.

• Disadvantages: installation and configuration are hard; cost of maintenance is high.

3.5 Hybrid Topology


In a hybrid network, Combination of two or more topologies.

• Advantages: Flexible, size can be increased easily


• Disadvantages: Design in complex, Installation and maintenance cost is high, Fault
detection is difficult.
(Anon., 2023)

4. Suitable network Topology to SYSCOM Distributions Network Solution


The Star Topology, with its centralized structure and simplified communication paradigm,
is the most suitable network topology for SYSCOM Distributions. Network management
is significantly streamlined when every department is directly connected to a central
switch or hub, providing centralized control and troubleshooting simplicity. The Star
Topology allows for easy expansion as the business grows by facilitating the seamless
integration of new departments or devices without interfering with already-established
connections. Furthermore, by allowing for the localization of network problems inside a
department, its fault isolation feature helps to preserve network stability by averting
widespread outages.

I prefer SYSCOM Distributions Network Solution Company to Star Topology.

Page 24 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Figure 13 - Bandwith Requirements

Full-duplex lets devices send and receive simultaneously, reducing delays. Half-duplex
allows only one action at a time, potentially slowing communication link of bandwidth like a
highway's width. More width means faster traffic. Adequate bandwidth ensures swift data
transfer, while insufficient bandwidth can lead to congestion and slow performance.

(Anon., 2023)

5. Common networking principles and protocols.


First, let's compare IPv4 and IPv6, two fundamental internet protocols.

IPv6, the newer protocol, offers several advantages. It's a solution to the issue of IPv4 address
exhaustion, providing a vast address space to accommodate the growing number of devices
connected to the internet.

Enhanced security is another crucial benefit. IPv6 includes built-in security features, making
it more resistant to various types of attacks. IPv4, the older protocol, has a limited address
space, which has led to the exhaustion of available addresses. This limitation is a significant
constraint in today's highly connected world. Moving on to secure web communication, let's
discuss HTTPS. Lastly, let's dive into network protocols, which are essential for
communication within a network.
Page 25 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

(Goss, 2023)

5.1 Compare common networking principles and how protocols enable the
effectiveness of networked systems.
Networking principles refer to the fundamental concepts that underlie the design and
operation of networked systems. These include concepts such as layering, encapsulation, and
routing. Protocols are the specific rules and standards that govern the communication between
different devices in a network.
Layering is a key principle in networking that allows for the separation of different functions
within a network. This allows for the development and use of different protocols at different
layers of the network stack, and allows for the replacement or upgrading of individual
protocols without affecting the entire network.
Encapsulation is another important principle in networking. It refers to the process of
wrapping one protocol within another, and is used to ensure that data is properly formatted
and understood by the receiving device. This allows for different types of data to be
transmitted over the same network, and for devices that use different protocols to
communicate with one another.
Routing is the process of forwarding packets of data from one device to another across a
network. Routing protocols, such as the Routing Information Protocol (RIP) and the Open
Shortest Path First (OSPF) protocol, are used to determine the most efficient path for data to
travel across a network.
In summary, networking principles such as layering, encapsulation, and routing provide the
foundation for the design and operation of networked systems. Protocols, on the other hand,
are the specific rules and standards that govern the communication between different devices
in a network and are used to make these systems effective.

Page 26 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Figure 14 - Types Of Network Devices And Functins

6. Operating Principle of Network devices


Computer Network devices are the hardware units which are used to connect computers,
printers, fax machines and other devices to a computer network system. There are different
types of network devices.

6.1 Repeater
Repeater is a network device that transmits a received signal with more power to an extended
geographical or topological network boundary than what would be capable with the original
signal. When data is travelling through a transmission medium the strength of data loses due
to resistance of the transmission medium. The repeaters job is to amplify the signal and
sending it.

Page 27 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Figure 15 - Repeater

6.2 Hub
Physical layer device, used to connect multiple devices in a single Lan. A hub has many
ethernet ports, when a data packet arrives to any ethernet port the data is copied and sent to
all the other ports so that all devices connected to network can access the information stored
in packet. There are 3 types of hubs.

1.Active hub: These hubs have their own power supply so they can amplify, clean, boost and
relay the signal along the network. They are used to extend the maximum length between
nodes.

2.Passive hub: These hubs don’t have power supply so they will broadcast the signal without
amplifying the signals. They can’t increase the length in-between nodes.

3.Intelligent hub: It works like active hub and include remote management capabilities. It
enables network administrator to monitor the traffic passing through hub and to configure
each port of hub

Figure 16 - Hub

6.3 Switch
Switch is a network device which has multiple ports. switch connects devices to a network
and use packet switching to send, receive or forward data packets or data frames over
network. When data reaches a switch, it checks the receiving node’s address and route the

Page 28 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

data to the specific node in the network. Since data doesn’t flood the network the network
traffic is reduced by switches. There are different types of switches in network.

These are:

1. Unmanaged switch

These are the switches that are mostly used in home networks and small businesses.
These switches are plug and play type. They don’t need to be configured. They help to
connect two computers or a computer and a printer in one location.

2. Managed switch

These types of switches have highest level of security, precision control, and full
management of the network These are used in large networks and can be customized to
enhance the functionality of a network. These are costly but this is the best option for
growing networks because of the scalability of managed switch. They follow simple
network management protocol (SNMP).

3. LAN Switch

These are known as Ethernet switches and are used to reduce bottlenecks in the network

Page
by distributing a package of data only to its intended recipient. These are used to connect
points on LAN

4. Layer 2 Switch

Layer 2 switch works on the data link layer of OSI model. It uses MAC addresses of
devices to find the route to forward data packets. It uses hardware-based switching
techniques to connect and transmit data through LAN.

5. Layer 3 Switch

Layer 3 switch is also known as multilevel switch. This combines the functions of a
router and a switch. It acts as a switch to connect devices on the same subnet or
Virtual LAN at lightning speed and has IP routing built in to act as a router. It can
support routing protocols. Inspect incoming packets, and make routing decisions
based on the source and destination address.
Page 29 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Figure 17 - Switch

6.4 Bridges
Bridge is a device which divides a network into two or join two networks together which
use same protocols. The main function of bridge is to forward data based on the MAC
address of sender and receiver. This helps to reduce unnecessary network traffic. There
are two types of bridges

1. Transparent Bridges: Transparent bridge automatically maintains a routing


table and update it in response to maintain changing topology. Transparent bridge
is easy to use, install the bridge and no software changes are needed in hosts.

2. Source Routing Bridges: Source routing bridge decide the route between two
hosts. This bridge uses the MAC destination address of a frame to direct it by the
sourcing routing algorithm.

Figure 18 – Bridge

6.5 Router
Routers operate at Networking layer of OSI model. Router is a device designed to receive,
analyze and routes data packets between computer networks and devices based on their IP
addresses. Router connects LAN and Wan together. Routers are used to connect
hardware equipment with remote network locations. Routers always maintain routing
table
Page 30 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Figure 19 - Router

6.6 Gateway
Gateway is a passage to connect two networks which work on different networking
models. Gateway translates data from one network to the other. They can also be called as
protocol converters as they convert protocols. Vocal Tec gateway converts human speech
travelling on analog phone lines into LAN protocol data and vice versa.

Figure 20 - Gateway

(Andrea, n.d.)

(Anon., n.d.)

Page 31 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

7. Types Of Network Servers

7.1 Importance of server


Servers play a crucial role in modern business operations and are vital for the smooth
functioning of most organizations. Some of the key importance of servers include:

 Resource sharing: servers allow multiple users and devices to access and share
resources, such as files, printers, and applications, over a network. This improves
collaboration and productivity by enabling users to access the resources they need, when
they need them.
 Data management: servers provide centralized storage and management of large
amounts of data, allowing multiple users and applications to access and update the data as
needed. This improves the accessibility and reliability of data, and helps to ensure that it
is up-to-date and consistent across the organization.
 Security: servers can provide a variety of security features, such as firewalls, antivirus
software, and encryption, to protect the network and its resources from unauthorized
access and malicious attacks.

Page 32 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

7.2 Types of servers


 There are many types of servers that perform different functions. Many networks contain
one or more common server types

1. DNS servers
DNS servers are application servers that provide name to client computers by converting
names understood by users into machine readable IP addresses. DNS system is a widely
distributed database of names and other DNS servers. When a client needs the address of
a system, it sends a request to a DNS server. The DNS server responds with the necessary
IP address from its table of names.

2. Web Server
Web servers handle http requests from clients and deliver web content.

Page
Figure 21 - Web Server

3. File Servers
File servers store and distribute files. Multiple users can share and download files stored on
server. It is easy and more secure to store and backup data in file servers than attempting to
provide security and integrity for every file on every device in an organization. Users can use
their personal computer to look into their files stored in the server.

Page 33 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Figure 22 - File Server

4. Database Servers
Much of the data used by companies, users and other services are high and they are stored in
databases. Databases needs lot for storage and multiple clients need access to database
simultaneously at a given time. This is easy if the databases are stored in servers. The servers
which run database application and respond to numerous clients are database servers. The
most common database server applications are Oracle,

Microsoft SQL server, DB2 and Informix

Figure 23 - Database Server

(Andrea, n.d.)

(Anon., n.d.)

8. Access permission

Page 34 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Figure 24 - Access Permission

Access permissions play a crucial role in controlling who can access what within the
network. They're like the keys to different rooms in a building, ensuring that sensitive data
remains secure and only accessible to authorized users.

(Andrea, n.d.)

Page 35 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Figure 25 - The Interdependence Of Workstation Hardware and Ssoftware

9. Interdependence of workstation hardware and network software


Workstation hardware refers to the physical components of a computer or other electronic
device that is used by an individual user to access and work on network resources. Examples
of workstation hardware include desktops, laptops, and tablets.

9.1 Network Software


Network software is the backbone of any network. It helps to reduce network complexities,
and manage, monitor, and control network traffic. Network software has become an
important tool in facilitating continuous communication and allowing an uninterrupted
exchange of information. Network software is invisible to end users, it is simply used to
facilitate the access end users have to network resources in a seamless way.

9.2 The functions of network software


• User management allow administrators to add or remove users from the network.

• File management lets administrators decide the location of data storage and control user
access to data.
• Access enables user to enjoy uninterrupted access to network resources.

Page 36 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

• Network security systems assists administrators in looking after security and preventing
data breaches.

10. Here are few networks software used in network design.


10.1Open filer
Open filer is a Linux based open-source operating system that provides file-based network
attached storage (NAS) and block-based storage area network (SAN). It enables systems
administrators to create reliable, efficient and highly powerful NAS solutions managed via an
easy-to-use browser user interface. Open Filer supports file-based storage networking
protocols like NFS and CIFS, which ensures cross-platform compatibility with Windows,
Linux and even UNIX. It also helps iSCSI and fiber channel to be easily implemented in
virtualized environments like VMware and XenServer. With Open filer’s Web based
management system, systems administrators can easily create and manage storage systems
using protocols such as NFS 3, SMB/CIFS, WebDAV (Web based distributed authoring and
versioning), HTTP/1.1, FTP (file transfer protocol) and iSCSI. You can also configure
storage using RAID levels such as 0, 1, 5, 6 and 10. Open filer can even be integrated with
authentication mechanisms such as LDAP, active directory, Network Information Service
(NIS) and Hesiod for secure storage access.

Page
Features

• It supports authentication using pluggable authentication modules, configured


from the Web interface.
• Open filer supports both software and hardware RAID with monitoring and alert
facilities, volume snapshot and recovery.
• It supports active/passive high availability clustering, multipath I/O (MPIO) and
block level replication.
• It supports NIS, LDAP and Windows NT/active directory authentication, flexible
quota management and easy-to-use Web based admin GUI.

10.2 Cisco Network Assistant.


Cisco Network Assistant simplifies wired and wireless network management for networks up
to 80 devices with its intuitive GUI and a task-based menu. Cisco Network Assistant is free
Page 37 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

and is optimized to apply common services across Cisco switches, routers, wireless
controllers, and access points. Through a direct link to Cisco Active Advisor, you can view
important information pertaining to the products on your network, such as Warranty and
Contract Information, Advisories and End of Life notifications. Cisco Active Advisor will be
automatically populated with the devices managed through Cisco Network Assistant.

Features.

• Network discovery and convenient display in a topology map

• Configuration management of Cisco products fitting small and medium businesses

• Single-click Telnet or access to device manager

• Front panel view of devices, clusters and stacks


• Inventory reports and health monitoring

• Troubleshooting of common network issues

• Event notification of network errors and alarm thresholds

• Drag-and-drop Software upgrades saves time in maintaining your network

11. How hardware and network software depend on each other


Network software is the backbone of any network. It helps to reduce network complexities,
and manage, monitor, and control network traffic. Network software need higher processing
powers. Even the best network software is useless without proper hardware. Workstation
hardware has extreme specifications like high processing power. Big data storage capacity
and high-capacity fast rams to run these software’s. Network software and hardware cannot
be run separately. If we look separately software is just a set of codes and hardware are
devices made out of plastic and metal. Therefore, network software and hardware are
interdependent. They should be together to run applications. Hardware provides the
processing power to run the network software. The hardware and software should be
configured and compatible or the system won’t be usable. If the software requirements are
not met by the hardware, the hardware won’t be able to supply the required power the system
Page 38 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

will heat up, lag become slow and sometime crash.

12. Suitable network software to this scenario


In the scenario provided, it is recommended to use Linux as the operating system for the
servers in SYSCOM Distributions Network Solution. One of the main reasons for this is that
Linux is considered to be more secure than Windows, as it is less commonly used and
therefore less likely to be targeted by malicious actors. Additionally, Linux is open-source
software, which means that it is free to use and can be modified and customized to suit the
specific needs of the organization.
Another advantage of using Linux as the server operating system is that it is simpler to
maintain, requiring less upkeep and fewer man-hours compared to Windows. Additionally,
Linux servers are more stable and efficient than Windows servers, which can lead to a more
efficient and productive network environment.
Furthermore, Linux is a free, open-source OS that comes in many flavors which can be
beneficial for a company as it allows for flexibility in choosing the specific version that best
suits the organization's needs. On the other hand, Windows Server is owned by Microsoft
and the web hosting services license it from Redmond, which can lead to additional costs
that are passed onto the users.

Page 39 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

13. Conclusion

Figure 26 - Conclusion

This is my conclusion

Page 40 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

14. Thank You

Figure 27 - Thank You

Thank you all hope you enjoy my presentation.

Page 41 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Activity 02

Network Implementation Plan for SYSCOM Distributions


1. Introduction
SYSCOM Distributions, a leading software solution provider, recognizes the importance of
efficient communication and resource sharing among its four departments: Software
Development, IT Support, Finance, and Administration. This implementation plan serves as a
comprehensive guide for designing, deploying, and maintaining a robust network solution
tailored to meet the specific needs of SYSCOM Distributions.

2. Design of the Network


2.1 Network Topology
I am going to implement a star topology for SYSCOM Distributions' network, which
provides centralized control and efficient communication. To provide continuous data flow
and foster departmental collaboration, each department must link to a central core switch.
This design not only simplifies network administration and is scalable, but it also offers
reliability.
(Lammle, 2015)

2.2 Network Addresses


To ensure optimal network performance and accommodate the varying device counts in each
department, a meticulous subnetting scheme has been devised.
• Use a 26-bit IP address provided by the ISP, and subnet it accordingly for each
department.
• Example: 192.168.40.1/26 for Software Development, 192.168.40.65/26 IT
Department, 192.168.40.129/26 for finance, and 192.168.40.193/26 for the
Administration.

(Donahue, 2011)

2.3 Networking Hardware


• 1 Routers: To interconnect LANs and connect to the ISP.
Page 42 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

• 4 Switches: For LAN connectivity within each department.


• Cables: Ethernet, Fiber Optic, etc.
• DNS Server: For domain name resolution.
• Proxy Server: For web traffic management.
• Access point: For wireless connectivity
• Computer and printers: Connect these devices to the respective VLAN’s

(Spurgeon, 2000)

2.4 Network Software


• Operating Systems: Windows for workstations, Linux for servers.
• DNS Software: BIND for DNS services.
• Proxy Server Software: Squid for web traffic management.

(Sobell, 2015)

2.5 Devices and Users


• Each department will have desktop workstations, pc, and printers.

2.6 Physical Location of Devices


• Place routers and switches in a secure server room.
• Position WAPs strategically for wireless coverage.
• Distribute workstations and printers throughout respective departments.
• Distribute departmental switches within each department’s workspace.

(Rosenberg, 2017)

3. Device Configuration and Security Considerations


3.1 Switch Configuration
• Set VLANs on switches.
• Configure trunk ports for inter-VLAN communication.

(Lammle, 2007)

Page 43 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

3.2 Firewall
• Configure firewall rules to filter incoming and outgoing traffic.
• Set up a DMZ for external-facing services.
(Wenliang, 2018)

3.3 DNS and Proxy Servers


• Configure DNS server with forward and reverse lookup zones.
• Set up proxy server rules for web traffic filtering and caching.

(Albitz, 2006)

3.4 Security
• Implement strong password policies.
• Use encryption protocols (e.g., WPA2 for Wi-Fi).
• Regularly update and patch all devices and software.
(Charlie Kaufman, 2002)

3.5 IP Addressing
 Assign static IP addresses to servers and printers.
 Use DHCP for dynamic IP assignment to workstations.

(Lammle, 2011)

4. Network maintenance schedule


A network maintenance schedule is a plan that describes the routine actions and processes
that must be taken to maintain the functionality of a network. This can involve chores like
backups, security evaluations, performance tracking, and software and firmware updates. An
agenda for network maintenance makes it easier to make sure that all required chores are
completed on time and that any possible problems are quickly found and fixed. The timeline
might be useful in planning and budgeting for additional improvements, such as network
upgrades.

Page 44 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

(Neal Allen, 2013)

4.1 Importance of network maintenance schedule


The ability of a network maintenance schedule to proactively handle possible faults before
they worsen is what makes it so important. It is feasible to minimize downtime, enhance
network performance, and guarantee network security by routinely monitoring and
maintaining the network. Furthermore, by avoiding the need for pricey repairs or
replacements, a well-maintained network can contribute to cost savings. All things
considered, a network maintenance schedule is an essential part of keeping a dependable and
effective network infrastructure.

(Thomas A. Limoncelli, 2007)

4.2 Example of network maintenance tasks


1. Installing, Replacing, or Upgrading Hardware and Software.
2. Monitoring, tuning and optimizing the network.
3. Documenting the network and maintaining network documentation.
4. Securing the network from both internal and external threats.
5. lanning for network upgrades, expansions, or enhancements.
6. Scheduling backups and restoring services or the network from backups.
7. Ensuring compliance with legal regulations and corporate policies.
8. Troubleshooting problem reports.
9. Maintaining and updating device configurations.

(Burgess, 2004)

4.3 Network Maintenance Schedule for SYSCOM Distributions Network

Solution

Page 45 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Logical Schedule Maintenance


Checklist Daily Weekly Monthly Quarterly
y
Perform security audits on all network devices and
systems
Upgrading virus guard
Conduct penetration testing to identify
vulnerabilities
Check and update firewall rules and configurations
Perform software updates and patches on all
network devices and systems
Inspecting the security services (firewall, IDS,
IPS)
Perform backups of important data
Test and verify backups
Figure 28 - Logical Schedule Maintenance

Page 46 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Deleting temporary files


Testing the network flow
Pinging the computer to check the existence of a
network
Checking hard disk health
Review and update network security policies and
procedures.
Monitor network performance and address any
issues
Check network and system logs for any errors or
issues
Perform scheduled maintenance on all network
devices and systems
Physical Schedule Maintenance
Checklist Daily Weekly Monthly Quarterl
y
Check and replace any damaged or worn-out
cables
Check and replace any faulty power supplies or
fans
Cleaning the computer parts
Checking for malfunctions in the devices
Inspect and clean physical infrastructure (cabling,
racks, etc.)
Replacing the hardware if outdated

Check and clean dust from all components


Check and ensure proper airflow
Check and ensure proper function of all cooling
systems
Check and ensure proper function of all power
distribution units (PDUs)
Check and ensure proper function of all
uninterruptable power supply (UPS) systems

Figure 29 - Physical Schedule Maintenance

Time Schedule
Action Time-Line Description
All Updates 12 am Onwards This time ensures that the internet connection speed is
high, as the network traffic is low at midnight

Page 47 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Scanning After Employee This will ensure that no further threats are affected once

Leave employee usage of the devices is over, thereby ensuring


security.
Al Backups After Work Done It is good practice to back up data after the work is done
by employees to ensure that there is no loss of data
Pinging 6 am It is good practice to ping the computers before the work
starts in the company to check that all networks are
available and working successfully
Monitoring Daily Monitoring will help protect the system from unauthorized
activity
Figure 30 - Time Schedule

5. Test Plan
Test Action Test Data Expected Result
Ping test between devices within the Device IP
Successful ping response
same subnet addresses
Ping test between devices across Device IP Successful ping response via
different subnets addresses router
File transfer test within the same
Large files Successful file transfer
subnet
File transfer test across different Successful file transfer via
Large files
subnets router
External IP
Internet connectivity test Successful internet access
addresses
Security test (unauthorized access Various attack Access denied, logs
attempts) vectors generated
Figure 31 - Test Plan

5.1 Test Procedures


• Specify the goals and expected results for every test case, then define the test
scenarios and success criteria.
• Use the proper tools and processes to carry out test cases, recording pertinent metrics
and observations to assess the functionality and performance of the network.
• Record test findings and outcomes, together with any problems, inconsistencies, or
Page 48 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

potential improvement areas.


• Examine test results and observations to determine the underlying causes of problems,
then, if necessary, create optimization or remediation programs.
• To improve network performance, security, and dependability, make the required
modifications and adjustments in light of test results and user feedback.

(Gregg, 2014)

6. User Feedback and Analysis


• Conduct user surveys and interviews.
• Users' feedback on network performance, reliability, and ease of use.
• Identify common issues raised by users.
• Evaluate the impact of feedback on the network design.
• Optimize and improve the network based on user input.
(Kuniavsky, 2003)

7. Optimized Network Design


• Implement user-suggested improvements.
• Fine-tune firewall rules for better security.
• Ensure consistent bandwidth allocation for each department.

(Oppenheimer, 2011)

8. Range of Network Server Types


• Domain Server: For centralized user authentication and access control.
• Web Server: To host the company's website.
• File Server: For centralized file storage and sharing.
• Database Server: To manage company data efficiently.
(Donahue, 2009)

9. Recommended Server Selection and justification

Page 49 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

1. Domain Server: Windows Active Directory for user management and security.

2. Web Server: Apache for hosting the company website (cost-effective).

3. File Server: NAS (Network-Attached Storage) for scalable file storage.

4. Database Server: MySQL for database management (cost-effective and performance-


oriented).

5. Mail Server: For handling internal and external email communication.

(Robbins, 1997)

10. Conclusion
The proposed network solution aims to provide SYSCOM Distributions with a robust,
scalable, and secure infrastructure to support operations and facilitate seamless
communication and resource sharing. By following the implementation plan outlined in this
report, SYSCOM can achieve efficiency and productivity across departments while ensuring
network reliability and security.

Activity 03

Technical Report: Virtual Network Implementation for


SYSCOM Distributions.

Date: [10.03.2024]
Prepared by: [M.S.M. Niham]

Page 50 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Organization: SYSCOM Distributions

1. Executive Summary
Following the guidelines, the optimized network design for SYSCOM Distributions was
successfully implemented, as this technical report demonstrates. With the help of test results,
configuration files, screenshots, and network monitoring data, the report provides convincing
proof of the implementation. It also presents an interpretation of the test plan outcomes and
suggests possible improvements to the networked system.

2. Introduction
This technical report documents the implementation of the optimized network design for
SYSCOM Distributions using the Cisco Packet Tracer network simulator. The design aims to
provide a robust, secure, and efficient network infrastructure to support seamless
communication and resource sharing across four departments: Software Development, IT
Support, Finance, and Administration.

3. Implementation of Optimized Design


The network was implemented in Cisco Packet Tracer 15.1, following the specifications
outlined in the design phase. This section provides evidence of the implemented design,
including topology diagrams, device configurations, and network monitoring.

Page 51 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Figure 32 - Cisco Version

1. Network Topology
The network topology is a hybrid of star and mesh configurations, with each department
subnet connected to a central core Cisco Catalyst 2960 switch, as shown in Figure 33.

Page 52 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Figure 33 - SYSCOM implementation plan

2. IP Addressing and Subnetting


The network uses a /26 subnet mask (255.255.255.192) provided by the ISP. It is subnetted
using VLSM into:

• Software Development: 192.168.40.1/26

Page 53 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Figure 34 - Software Development

• IT Support: 192.168.40.65/26

Page 54 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Figure 35 - IT Support

• Finance: 192.168.40.129/26

Figure 36 - Finance

• Administration: 192.168.40.193/26

Page 55 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Figure 37 – Administration

3. Device Configurations
3.1 Router configuration for inter-VLAN routing
Router Configuration for Inter-VLAN Routing: In this chapter, i describe the changes made
to the router to enable inter-VLAN routing, which permits devices in different VLANs to
communicate with one another. In order to ensure correct routing across VLANs, this entails
creating subinterfaces for each VLAN on the router's interface that is linked to the switch,
giving these subinterfaces IP addresses, and setting up routing protocols or static routes.

Page 56 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Figure 38 - VLAN routing

1. IP Address Assignment: We assign IP addresses to each subinterface corresponding to


the respective VLAN subnet. This enables the router to route traffic between VLANs.
2. Routing Configuration: We set up dynamic routing protocols like OSPF or static routes
on the router to ensure correct routing between VLANs, depending on the needs of the
network. This makes sure that data is correctly sent to devices that are in separate
VLANs.

3.2 Configurations of Switches


In order to guarantee appropriate VLAN membership, trunking, and port security settings, we
also configure switches.

1. VLAN Configuration: I set up the switches' VLANs and give each one a unique port.
This segmentation improves performance and security by enabling the logical division of
network traffic.
2. Trunking: Multiple VLANs' worth of traffic can be carried across trunk lines that
connect switches and routers. In order to allow traffic from several VLANs to transit the

Page 57 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

network, we establish trunk ports and enable trunking protocols like IEEE 802.1Q.
3. Port Security: To prevent unwanted access to the network and limit access to switch
ports, port security techniques like MAC address filtering can be used.

3.3 PC Configuration
I define the IP address, subnet mask, default gateway, and DNS server addresses for every PC
connected to the network. We may also set up any particular programs or software needed for
communication or network access. These settings include:

1. IP Address: Each PC was assigned a unique IP address within the corresponding


department's subnet. This IP address allows the PC to communicate on the network and
be identified uniquely.
2. Subnet Mask: The subnet mask defines the network portion and host portion of the IP
address. The appropriate subnet mask (e.g., 255.255.255.192 for a /26 subnet) was
configured on each PC to ensure correct subnet membership.
3. Default Gateway: The IP address of the default gateway (router interface) for the
respective VLAN/subnet was configured on each PC. This allows the PCs to send traffic
destined for other networks to the router for routing.
4. DNS Server Address: The IP address of the DNS (Domain Name System) server was
specified on the PCs. The DNS server resolves domain names to IP addresses, enabling
the PCs to access resources using easy-to-remember names.

3.4 Server Configurations:


If servers are part of the network infrastructure, we provide details on their configurations,
including operating system settings, network services, and security configurations.

This involves setting up IP addressing, configuring network interfaces, enabling network


services such as DNS, DHCP, and Active Directory, and implementing security measures
such as firewall rules and antivirus software.

Additionally, we may configure server roles and permissions, network file sharing, and
remote access protocols to ensure proper integration with the network environment.

Page 58 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Figure 39 – Server (1)

Page 59 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Figure 40 - Server (2)

Page 60 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Figure 41 - Server (3)

Figure 42 - Server (4)

4. Test Plan Implementation

Page 61 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Figure 43 – Ping

Page 62 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Figure 44 - Ping

The test plan from Activity 2 was executed, and results were documented:

Actual
Test Action Test Data Expected Result
Result
Ping devices in same
192.168.10.14 <->192.168.10.22 Successful pings Successful
VLAN
Ping devices across Successful pings via
192.168.10.14 <->192.168.10.85 Successful
VLANs router
500MB file 192.168.10.14 <-
File transfer in VLAN Successful transfer Successful
>192.168.10.22
File transfer across 500MB file 192.168.10.14 <- Successful transfer via
Successful
VLANs >192.168.10.85 router
Access 8.8.8.8 from Successful ping to
Internet connectivity Successful
192.168.10.94 internet
Simulated DDoS attack on Attack traffic dropped,
Security test Successful
firewall alerts raised
Figure 45 - Testing Results

Page 63 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

I have choose testing platform for cisco packet tracer. And selected topology hybrid
topology. I have connected four each department first one Software, It, Finance, and
Administration. Then each department has individual IP address and subnet mask. And each
department has separate switch, DNs server, proxy server, two pc and printer are connected
with one Switch & cloud between router. Main thing every pc, servers’ type, routers,
switches and hardware, software tools are must configuration. why I have config because
successful output you can see.

5. Analysis and Recommendations


5.1 Analysis of Test Results
The test results indicate that the core networking functionality is working as expected.
Devices in the same VLAN can communicate directly, while inter-VLAN communication is
routed properly. The network can handle large file transfers, and internet connectivity is
available to all departments. The security mechanisms were also effective in blocking the
simulated DDoS attack.

However, some areas of potential improvement were identified:

1. Network Performance: During the file transfer test across VLANs, higher latency
was observed compared to intra-VLAN transfers. This could impact performance for
bandwidth-intensive applications used across departments.
2. Scalability: The current design can accommodate the specified 60 hosts across four
departments. However, as the company grows, the network may need to be expanded
to support more users and devices.
3. Redundancy: The current design lacks redundancy for critical components like the
core switch and router. A failure in these devices could cause significant downtime
and disruption.

5.2 Recommendations

To address the identified areas for improvement, the following enhancements are
recommended:

Page 64 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

1. Implement Quality of Service (QoS)


• Configure QoS policies on the router and switches to prioritize critical traffic and
ensure consistent performance for bandwidth-intensive applications used across
departments.
• Use queuing techniques like Weighted Fair Queuing (WFQ) and traffic shaping to
manage network congestion and ensure fair bandwidth allocation.
2. Enhance Network Scalability
• Implement a hierarchical network design with a core layer, distribution layer, and
access layer to support future growth and segregate broadcast domains.
• Leverage Virtual Local Area Networks (VLANs) and Inter-VLAN routing to
segment the network and improve scalability.
3. Introduce Redundancy
• Deploy redundant core switches and routers in a fault-tolerant configuration, such
as a hot standby routing protocol (HSRP) or Virtual Router Redundancy Protocol
(VRRP).
• Implement redundant link connections between switches and routers using
technologies like EtherChannel or Multi-Chassis EtherChannel (MEC).
• Configure first-hop redundancy protocols like Hot Standby Router Protocol
(HSRP) or Virtual Router Redundancy Protocol (VRRP) to provide redundancy
for default gateways.
4. Enhance Security Measures
• Implement a dedicated firewall appliance or Adaptive Security Appliance (ASA)
to provide advanced security features like intrusion prevention, VPN support, and
content filtering.
• Deploy a Network Access Control (NAC) solution to enforce security policies and
ensure that only authorized devices can access the network.
• Implement a centralized authentication, authorization, and accounting (AAA)
server like Cisco Identity Services Engine (ISE) for unified access control and
policy enforcement.
5. Continuous Monitoring and Optimization
• Deploy a comprehensive network management system like Cisco Prime
Infrastructure or SolarWinds to monitor network performance, usage patterns, and
Page 65 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

potential issues proactively.


• Regularly review network configurations, security policies, and resource
utilization to identify optimization opportunities and address performance
bottlenecks.
• By implementing these recommendations, SYSCOM Distributions can enhance
the performance, scalability, redundancy, and security of its network
infrastructure, ensuring a reliable and efficient communication and resource
sharing environment while positioning the network for future growth and evolving
business requirements.

6. Conclusion
This technical report has documented the implementation of the optimized network
design for SYSCOM Distributions using the Cisco Packet Tracer network simulator. The
implementation process, including device configurations, security measures, and network
monitoring, has been detailed. The test plan designed in Activity 2 was executed, and the
results were documented and analyzed. Based on the analysis, recommendations for
potential enhancements to the networked system have been provided, addressing areas
such as performance optimization, scalability, redundancy, security, and continuous
monitoring.

(Anon., 2023)

Activity 04

Report: Evaluative Report on SYSCOM Distributions Network


Design and Implementation

Date: 10.03.2024
Prepared by: M.S.M. Niham
Organization: SYSCOM Distributions

Page 66 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

1. Executive Summary
This report evaluates the network topology and protocols chosen for SYSCOM
Distributions, a leading software solution provider, to fulfill their requirements of
dividing the network into four subnets, connecting departments for seamless
communication, and sharing resources efficiently. The report also provides a critical
reflection on the final implemented network design and decisions made to enhance the
solution.

2. Introduction
The report reviews the network topology and design implemented at SYSCOM
Distributions, aimed at enhancing communication, security, and resource sharing across
departments.

3. Evaluation of Network Topology and Protocols


3.1 Topology Selection
A careful consideration of the network topology and protocols that would enable effective
communication and resource sharing among the four departments Software Development, IT
Support, Finance, and Administration was made when designing the network infrastructure
for SYSCOM Distributions. The Star Topology, which connects each department as a
separate node via a central switch, was selected for this case. Because of its simplicity,
scalability, and manageability, this architecture was chosen.

3.2 The Star Topology offers several advantages for SYSCOM


Distributions:
1. Centralized Management: With a central switch serving as the hub of the network, it is
easier to manage and troubleshoot connectivity issues. This simplifies network
administration tasks, reducing the time and resources required for maintenance.

2. Scalability: As SYSCOM Distributions grows, additional departments or devices can be


easily added to the network by connecting them to the central switch. This scalability
ensures that the network can accommodate future expansion without significant
Page 67 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

reconfiguration.

3. Fault Isolation: In the event of a network failure or malfunction, the Star Topology
allows for easy isolation of the affected department while maintaining connectivity for the
rest of the network. This minimizes downtime and disruption to other departments'
operations.

3.3 Protocol Selection


For efficient communication within the network, the TCP/IP protocol suite was selected.
TCP/IP is the standard protocol for transmitting data over the internet and is widely used in
local area networks (LANs) due to its reliability and compatibility with various network
devices and operating systems.

1. TCP (Transmission Control Protocol): TCP provides reliable, connection-oriented


communication between devices on the network. It ensures that data packets are
delivered in the correct order and without errors, making it suitable for applications
that require accurate data transmission, such as file transfers and email.

2. IP (Internet Protocol): IP is responsible for addressing and routing data packets


across the network. It assigns unique IP addresses to devices and determines the most
efficient path for data transmission. IP ensures that data packets are delivered to the
correct destination, regardless of the network's size or complexity.

3.4 Efficient Utilization of Networking System


The chosen network topology and protocols demonstrate efficient utilization of the
networking system in several ways:

1. Resource Sharing: Employees may effortlessly access shared files, printers, and
software programs because to the Star Topology's smooth facilitation of resource
sharing between departments. TCP/IP protocols facilitate dependable and effective
data transfer, which boosts output and teamwork.

Page 68 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

2. Scalability: SYSCOM Distributions can adjust to evolving business requirements and


future expansion without sacrificing network performance or dependability thanks to
the scalability of the Star Topology. With little difficulty, more departments or
devices can be added to the network.

3. Fault Tolerance: The Star Topology's fault isolation features reduce the effects of
network outages or malfunctions, guaranteeing unbroken departmental production and
communication. Fault tolerance is further improved by TCP/IP protocols, which allow
for rapid network connectivity recovery and restoration.

4. Critical Reflection on the Implemented Network and Design


Although the chosen topology and protocols have worked well for SYSCOM Distributions'
networking requirements, there is still room for development and thoughtful consideration in
the following areas:

1. Security Considerations: Because of its centralized structure, the Star Topology may
provide security problems even though it is effective for sharing resources. It is
imperative to put strong security measures in place to protect sensitive data from
cyber threats, including intrusion detection systems, firewalls, and encryption
techniques.

2. Network Performance Optimization: Even with the Star Topology's scalability,


network performance optimization is still important, particularly as the business
expands. Network efficiency and throughput can be increased with the use of regular
performance monitoring and optimization techniques like traffic analysis, Quality of
Service (QoS) setups, and network segmentation.

3. Redundancy and High Availability: Redundancy and high availability techniques


should be used to improve network resilience and reduce downtime. In the event of
hardware or network failures, this can entail failover methods, backup power sources,
and redundant connectivity to guarantee uninterrupted operation.

Page 69 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

5. Critical Reflection on Enhancement Decisions


Decisions regarding network configuration, hardware, and software tools were based on
the need for a robust and secure networked system. However, the network should evolve
in response to changing technology and business needs. Regular evaluations and upgrades
may be necessary to ensure the network remains efficient and secure.

1. Flexibility and Adaptability: The requirement for these qualities in order to handle
future technological advancements and expansion served as a guide for design
choices. The network design may adapt to the needs of the business by using standard
protocols and a scalable topology, all without requiring significant reconfiguration or
overhaul. Because of its adaptability, SYSCOM Distributions is able to stay ahead of
the competition in the market and efficiently respond to new trends and requests.

2. User-Centric Approach: The network design and implementation process was


greatly influenced by user feedback. Through cross-departmental employee feedback,
the network solution was customized to match their unique requirements and
preferences, increasing user satisfaction and productivity. SYSCOM Distributions
may promote a positive work atmosphere and enable employees to reach their goals
by putting the user experience first.

3. Continuous Improvement: Setting up the network infrastructure is only the first step
in a continuing process of optimization and improvement. It is not the final result.
Frequent assessment, feedback gathering, and technological upgrades will guarantee
that the network stays robust, effective, and in line with the strategic goals of
SYSCOM Distributions. Through the adoption of a continuous improvement culture,
SYSCOM Distributions can effectively adjust to evolving business conditions, grasp
novel prospects, and stimulate industry innovation.

4. Cost considerations: Taking into account the expenses of setting up and maintaining
the network infrastructure was a crucial part of the design process. The Star Topology
has benefits in terms of fault tolerance and scalability, but it's important to consider

Page 70 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

the costs associated with purchasing, installing, and maintaining hardware. SYSCOM
Distributions can make sure that network infrastructure investments are in line with
financial limitations and maximize long-term value and return on investment by
carrying out a comprehensive cost-benefit analysis.

5. Environmental Sustainability: As businesses become more environmentally


concerned, network design and implementation are starting to take environmental
sustainability into account. SYSCOM Distributions can minimize energy usage and
lessen its carbon footprint by deploying energy-efficient networking devices, putting
power management measures into place, and optimizing network configurations.
Adopting sustainable practices also improves brand reputation with stakeholders,
partners, and customers in addition to helping the environment and demonstrating
corporate social responsibility.

6. Conclusion
The implemented network topology and protocols effectively meet SYSCOM
Distributions requirements for seamless communication and security. However, the
network should be viewed as an evolving entity, subject to continuous improvement and
adaptation to changing conditions. Regular evaluations and enhancements will be
essential to ensure its long-term efficiency and security.

This evaluative report underscores the importance of a flexible and proactive approach to
network design and management, aligning with SYSCOM Distributions commitment to
technological excellence and innovation.

References
Albitz, C. L. a. P., 2006. DNS and BIND. In: Sebastopol, CA: O'Reilly Media, Inc.

Andrea, H., n.d. Different Types of Servers type.

Andrea, H., n.d. Different Types of Servers type. p.


https://www.networkstraining.com/author/harris_a/.

Page 71 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Anon., 2021. constraints-of-different-ne/. [Online]


Available at: https://desklib.com/document/benefits-and-constraints-of-different-ne/

Anon., 2021. constraints-of-different-ne/. [Online]


Available at: https://desklib.com/document/benefits-and-constraints-of-different-ne/
[Accessed 16 10 2023].

Page 72 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Anon., 2023. Computer networking notes. [Online]


Available at: https://www.computernetworkingnotes.com/ccna-study-guide/download-
packet-tracer-for-windows-and-linux.html
[Accessed 22 september 2023].

Anon., 2023. network-topology. [Online]


Available at: https://www.geeksforgeeks.org/types-of-network-topology/

Anon., 2023. network-topology. [Online]


Available at: https://www.geeksforgeeks.org/types-of-network-topology/
[Accessed 05 11 2023].

Anon., n.d. [Online]


Available at: https://www.computerhope.com/jargon/b/bustopol.htm

Anon., n.d. [Online]


Available at: https://www.computerhope.com/jargon/r/ringtopo.htm

Anon., n.d. Computer networking notes. [Online].

Anon., n.d. Concept of Hardware and Software. p.


https://www.tutorialspoint.com/computer_concepts/computer_concepts_hardware_software_
concept.htm.

Anon., n.d. Fossbytes. [Online]


Available at: https://fossbytes.com/?s=networking+devices

Anon., n.d. Techspiried. [Online]


Available at: https://techspirited.com/page/2?s=types+of+server

Burgess, M., 2004. Principles of Network and System Administration. In: Chichester,
England: John Wiley & Sons, Ltd..

Charlie Kaufman, R. P. a. M. S., 2002. Network Security: Private Communication in a Public


World. In: Upper Saddle River, NJ: Prentice Hall.

Donahue, G. A., 2009. Network Warrior. In: Sebastopol, CA: O'Reilly Media.

Donahue, G. A., 2011. In: Network Warrior. Sebastopol, CA: O'Reilly Media, Inc..

Page 73 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Goss, M., 2023. common network protocols. Techtarget, p. 6.

Goss, M., 2023. common network protocols. Techtarget, p. 6.

Gregg, M., 2014. CASP CompTIA Advanced Security Practitioner Study Guide. In:
Indianapolis, IN: John Wiley & Sons, Inc..

Kuniavsky, M., 2003. Observing the User Experience: A Practitioner's Guide to User
Research. In: San Francisco: Morgan Kaufmann.

Lammle, T., 2007. CCNA: Cisco Certified Network Associate Study Guide. In: Indianapolis,
IN: Wiley.

Lammle, T., 2011. CCNA Routing and Switching Study Guide. In: San Francisco: Sybex.

Lammle, T., 2015. In: CCNA Routing and Switching Study Guide. Indianapolis, IN: Wiley.

Neal Allen, J. B. a. H. R., 2013. Network Maintenance and Troubleshooting Guide: Field
Tested Solutions for Everyday Problems. In: Boston: Addison-Wesley Professional.

Oppenheimer, P., 2011. Top-Down Network Design. In: Cincinnati, Ohio: Cisco Press.

Robbins, D. D. a. A., 1997. Sed & Awk. In: Sebastopol, CA: O'Reilly Media, Inc..

Rosenberg, P., 2017. Cable Installer's Pocket Guide. In: Burlington, MA: Jones & Bartlett
Learning.

Sobell, M. G., 2015. In: A Practical Guide to Linux Commands, Editors, and Shell
Programming. New Jersey, USA.: s.n.

Spurgeon, C. E., 2000. In: Ethernet: The Definitive Guide. Sebastopol, California, USA:
O'Reilly Media, Inc.

Tai, N. M., n.d. Discuss The Benefits and Constraints of Different Network Types and
Standards. Scribd, p. 31.

Tai, N. M., n.d. Discuss The Benefits and Constraints of Different Network Types and
Standards. scribd, p. 31.

Thomas A. Limoncelli, C. J. H. a. S. R. C., 2007. The Practice of System and Network


Administration. In: Boston: Addison-Wesley Professional.

Page 74 of 75

Downloaded by Abdullah Azar ([email protected])


lOMoARcPSD|52310946

Wenliang, D., 2018. Cisco ASA Configuration. In: Birmingham: Packt Publishing Ltd.

Page 75 of 75

Downloaded by Abdullah Azar ([email protected])

You might also like