Uploaded by Godrick Naveen

KANA 013536 P.V. Godrick Naveen(Networking Batch 64)

advertisement
LAN DESIGN & IMPLEMENTATION
FOR VIDCO-19
Godrick Naveen KAN/A 013536 Batch 64
Higher Nationals
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 1
Internal verification of assessment decisions – BTEC (RQF)
INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Programme title
HND in Computing
Assessor
Mr. Geeth
Unit 02:
Internal
Verifier
Networking
Unit(s)
Assignment title
LAN Design & Implementation
VIDCO-19
P.V.Godrick Naveen
Student’s name
List
which
assessment Pass
criteria the Assessor has
awarded.
for
Merit
Distinction
INTERNAL VERIFIER CHECKLIST
Do the assessment criteria awarded match
those shown in the assignment brief?
Is the Pass/Merit/Distinction grade
awarded justified by the assessor’s
comments on the student work?
Has the work been assessed
accurately?
Y/N
Y/N
Y/N
Is the feedback to the student:
Give details:
• Constructive?
• Linked to relevant assessment criteria?
• Identifying opportunities for improved
performance?
Y/N
Y/N
• Agreeing actions?
Y/N
Y/N
Does the assessment decision need
amending?
Y/N
Assessor signature
Date
Internal Verifier signature
Date
Programme Leader signature (if required)
Date
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 2
Confirm action completed
Remedial action taken
Give details:
Assessor signature
Internal
Verifier
signature
Date
Date
Programme Leader
signature (if required)
Date
Student Name/ID
KAN/A-013536
Unit Title
Unit 02:
Assignment Number
1
Networking
Assessor
Submission Date
Date Received 1st
submission
Re-submission Date
Date Received 2nd
submission
Higher Nationals - Summative Assignment Feedback Form
Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction P1
P2
M1
Descripts
LO2 Explain networking devices and operations.
Pass, Merit & Distinction P3
Descripts
P4
M2
D1
LO3 Design efficient networked systems.
Pass, Merit & Distinction P5
Descripts
P6
M3
D2
M4
D3
LO4 Implement and diagnose networked systems.
Pass, Merit & Distinction P7
Descripts
P8
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 3
Grade:
Assessor Signature:
Date:
Resubmission Feedback:
Grade:
Assessor Signature:
Internal Verifier’s Comments:
Date:
Signature & Date:
Assignment Feedback
Formative Feedback: Assessor to Student
Action Plan
Summative feedback
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 4
Feedback: Student to Assessor
Thank you for guiding me throughout this
Assignment helping out to fix the errors ,you
have been a great support!
Assessor signature
Date
Student signature
Date
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 5
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work
and to present it as my own without attributing the sources in the correct form. I
further understand what it means to copy another’s work.
1. I know that plagiarism is a punishable offence because it
constitutes theft.
2. I understand the plagiarism and copying policy of Edexcel UK.
3. I know what the consequences will be if I plagiarize or copy
another’s work in any of the assignments for this program.
4. I declare therefore that all work presented by me for every
aspect of my program, will be my own, and where I have made
use of another’s work, I will attribute the source in the correct
way.
5. I acknowledge that the attachment of this document signed or
not, constitutes a binding agreement between myself and
Pearson, UK.
6. I understand that my assignment will not be considered as
submitted if this document is not attached to the assignment.
Kana013536@esoft.academy
Student’s Signature:
(Provide E-mail ID)
Date:
(Provide Submission Date)
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 6
Higher National Diploma in Computing
Assignment Brief
Student Name /ID Number
KAN/A-013536
Unit Number and Title
Unit 2: Networking
Academic Year
2020/21
Unit Tutor
Mr.Geeth
Assignment Title
LAN Design & Implementation for VIDCO-19 -19
Issue Date
4/11/2020
Submission Date
IV Name & Date
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 7
Table of Contents
Task 01
Higher Nationals - Summative Assignment Feedback Form ........................................ 3
1.1 Network models / System types ............................................................................. 10
1.2 IEEE standards for LAN and WLAN Network ..................................................... 17
1.3 Network protocols and Protocol suites .................................................................. 18
1.4 Network Topology ................................................................................................. 23
1.5 The most suitable Network topology for the company .......................................... 31
Task 02
2.1 Operating Principles of Network devices .............................................................. 32
2.2 The devices which we can use to enhance security of VIDCO-19 Kandy Branch.
...................................................................................................................................... 35
2.3 Importance of networking software ....................................................................... 38
2.4 The importance of Servers in computer networks Servers .................................... 40
I recommend the PowerEdge T140 Tower Server and the HP Z620 as the work station
for VIDCO-19 considering the company needs high performance devices due to its
being a software company and have a large number of employees, so the employees
would have an efficient workflow without any problematic situations such as lags
which causes delays and effects the ongoing workflow. ............................................. 50
2.5 Importance of having compatible devices and related software ............................ 50
in network design. ........................................................................................................ 50
Task 03
3.1 VLAN and IP subnetting ....................................................................................... 52
3.2................................................................................................................................. 54
3.3 Network design ...................................................................................................... 54
3.4 Feedbacks for the design test ................................................................................. 55
3.5 Configuring Network services and Applications ................................................... 57
3.6 Maintenance schedule for VIDCO-19’s Network system ..................................... 79
Task 04 ........................................................................................................................ 80
4.1 Network configuration ........................................................................................... 80
4.2 VIDCO-19 Test cases for the Network design ...................................................... 83
4.3 Why network monitoring is important in VIDCO-19 Kandy branch? .................. 85
4.4 Network monitoring Tools ..................................................................................... 87
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 8
4.5 Troubleshooting ..................................................................................................... 91
4.6 Future enhancements for the networked system .................................................... 93
4.7 Conclusion ............................................................................................................ 94
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 9
Case summary
I have been appointed as the network consultant of VIDCO-19(a well-known private
software company) located in colombo, so my task is to put together a network
architectural design and implement it with my proposals and recommendations to meet the
company’s specifications, as the management are planning to extend their branch to kandy
as it is a 3 story building and it is expected to have around 150 employees.
Task 01
1.1 Network models / System types
Lets begin with a definition , A network involves of two or more computers that are
linked in order to share resources (such as printers), exchange files, or allow electronic
communications.
Local Area Network
A Local Area Network (LAN) is a network that is limited to a relatively small area. It
is generally limited to a geographic area such as a laboratory, school, or building. A
LAN comprises cables, access points(Wi-Fi), switches, routers, and other components
that enable devices to connect to internal servers, web servers, and other LANs via wide
area networks (WAN). The rise of virtualization has also boosted the development of
virtual LANs,which enable network setting up a secure and reliable local area network
benefits not only employees, but also the customers and business partners.
LANs connect workstations and personal computers. Each node (individual computer)
in a LAN has its own CPU with which it executes programs, but it also is able to access
data and devices anywhere on the LAN. This means that many users can share devices,
such as printers, as well as data. Users can also use the LAN to communicate with each
other.
Here are some Benefits of using LAN (Local Area Network)
•
Cost
Compared to a wide area network (WAN) , a LAN connection is relatively inexpensive
to set up and maintain. A wide area network (WAN) requires substantial investment,
whether it be private ownership or not. The local nature of a LAN also makes
troubleshooting quick and cost-effective.
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 10
•
Ease of Setup
To set up a LAN, all you need is internet service and a server, or central hub. This hub
can be a main computer or a router. From there, you can connect devices using Ethernet
cables or wirelessly via Wi-Fi transmission. There is no limit to the number of users
you can add to a LAN, and multiple LANs can be joined across multiple office locations
to create a larger virtual LAN.
•
Versatility
A LAN is very flexible. As employees get shuffled between teams and departments and
new hires come on board, a LAN ensures that every user and every machine stays
connected. You can add or remove devices, move printers and computers to different
areas of the building, and modify user information for existing devices with minimum
hassle. This versatility is essential in today's fast-paced business world.
•
Speed
Speaking of fast-paced, modern LAN speeds can easily reach or exceed 1 Gbps, several
times faster than the average WAN. From sharing files to uploading and downloading
to high-definition streaming, applications and videoconferencing, a LAN provides all
users with the speed needed to conduct even the most data-intensive tasks.
•
Productivity
Operating a LAN can make your business more productive in several ways:
Faster, more personalized service to customers via email, web forms or chat.On-site
and remote access to all business applications and business data.
Easy meeting scheduling and videoconferencing.
Real-time insight into business performance to help with decision-making.
•
Security
A LAN can be easily monitored by a small information technology team. If you use a
router, you will have a built-in firewall. All devices must provide a valid username and
password, which can be encrypted, to access the network. Automated backups to the
server or to the cloud can be scheduled to further safeguard your information for
disaster recovery or when traveling.
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 11
WLAN (Wireless Local Area Network)
A WLAN is a network that allows devices to connect and communicate wirelessly.
Unlike a traditional wired LAN, in which devices communicate over Ethernet cables,
devices on a WLAN communicate via Wi-Fi.
A WLAN may look different than a traditional LAN, it functions the same way. New
devices are typically added and configured using DHCP. They can communicate with
other devices on the network the same way they would on a wired network. The primary
difference is how the data is transmitted. In a LAN, data is transmitted over physical
cables in a series of Ethernet packets containing
LANs and WLANs can be linked together using a “Bridge” that connects the two
networks. Wireless routers that include Ethernet ports can automatically combine wired
and wireless devices into the same network.
Benefits of using WLAN in the company
•
devices can connect wirelessly, eliminating the need for cables.
(This allows the business to create local networks without wiring the building with
Ethernet.)
•
It also provides a way for small devices, such as smartphones and tablets, to
connect to the network.
•
WLANs are not limited by the number of physical ports on the router and
therefore can support dozens or even hundreds of devices.
•
The range of a WLAN can easily be extended by adding one or more repeaters.
•
A WLAN can be easily upgraded by replacing routers with newer version, a
much easier and cheaper solution than upgrading old Ethernet cables.
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 12
Client-server
A client-server network involves multiple clients, or workstations, connecting to at least
one central server. Most data and applications are installed on the server. When clients
need access to these resources, they access them from the server. Servers often have
private user directories as well as multiple public directories. Client-server networks
tend to have faster access speeds because of the large number of clients they are
designed to support. The clients are allowed to function as workstations without sharing
any resources. It is easier to upgrade software applications and files because they are
held on one single computer. System-wide services can be provided through the server
software. Security is enhanced on a client server network because the security is
handled by the server.
So in that case Peer-to-peer (P2P) networks are typically less secure than a client-server
network because security is handled by the individual computers, not on the network as a
whole.
Below is a comparison between Client-server and Peer-to-peer network
Client-server Network
Peer-to-peer
In client server network clients and In peer to peer network, clients and
servers are differentiated, specific server servers are not differentiated.
and clients are present.
Focuses on information sharing.
Focuses on connectivity.
Centralized server is used to store data.
Each peer has its own data
Server responds the service which is Each and every node can do both request
requested by the client.
and respond for the services.
Costlier than peer to peer.
Less costlier
More stable than peer to peer.
Less stable if number of peer increases.
Used for both small and large networks.
Generally suited for small networks with
fewer than 10 computers.
Benefits of Implementing Client-server Network in the kandy branch
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 13
•
A single server hosting all the required data in a single place facilitates easy
protection of data and management of user authorization and authentication.
•
Resources such as network segments, servers, and computers can be added to a
client-server network without any significant interruptions.
•
Data can be accessed efficiently without requiring clients and the server to be
in close proximity.
•
All nodes in the client-server system are independent, requesting data only from
the server, which facilitates easy upgrades, replacements, and relocation of the
nodes.
Cloud Network
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 14
Cloud networking, or cloud-based networking, gives users access to networking resources
through a centralized third-party provider operating inter-connected servers. This involves
connecting to a Wide Area Network (WAN) or other internet-based technology, and helps
to distribute content quickly and securely. In cloud-based networking, the entire network
is in the cloud. This includes network management resources and physical hardware.
So in this case by using a cloud network the organization can deliver content more
rapidly, reliably, and securely, without having to bear the costs and difficulties of
building and operating its own network.
Cloud networking allows users to build networks using cloud-based services. A reliable
cloud network provides centralized management, control and visibility, for example,
managing devices in different physical locations using the internet. It can be used for
connectivity, security, management and control.
Using cloud architecture in thousands of different locations globally, cloud networking
allows organizations to deliver content faster and monitor their devices and operations
in real-time. It also helps to keep them alongside of any network security issues,
including monitoring high volumes of traffic.
Benefits of Implementing Cloud Network in the kandy branch
•
Versatility
With the increasing availability of online content networking for better content
distribution. It can be used for web contents, ecommerce, , or network operators
looking to extend their network reach.
•
Speed
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 15
Using a cloud network guarantees the faster delivery of content thanks to the use
of thousands of servers across the world. This means that content has less physical
distance to travel between servers, giving the final end users faster access.
•
Reliability
Cloud security solutions available as part of cloud networking ensure that users are
protected from the latest web security threats. There is also less risk of server
downtime thanks to server load balancing.
•
Cost-saving
By using a cloud network the company can save money on building and operating
their own networks, as well as avoiding the potential technical issues that come
with these.
Virtualized Network
Network Virtualization (NV) refers to abstracting network resources that were
traditionally delivered in hardware to software. NV can combine multiple physical
networks to one virtual, software-based network, or it can divide one physical network
into separate, independent virtual networks.
Network virtualization software allows network administrators to move virtual machines
across different domains without reconfiguring the network. The software creates a
network overlay that can run separate virtual network layers on top of the same physical
network.
services like switching and routing, network virtualization typically incorporates
virtualized services including firewalling and server load-balancing. The technology
solves a lot of the networking challenges in today’s data centers, helping the organization’s
centrally program and provision the network, on-demand, without having to physically
touch the underlying infrastructure. With this approach, organizations can simplify how
they roll out, scale and adjust workloads and resources to meet evolving computing needs.
the ability to simulate a hardware platform, such as a server, storage device or network
resource, in software. All of the functionality is separated from the hardware and simulated
as a “virtual instance,” with the ability to operate just like the traditional hardware solution
would.
In addition, a single hardware platform can be used to support multiple virtual devices or
machines, which are easy to spin up or down as needed. As a result, a virtualized solution
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 16
is typically much more portable, scalable and cost-effective than a traditional hardwarebased solution.
1.2 IEEE standards for LAN and WLAN Network
What is IEEE (Institute of Electrical and Electronics Engineers) standards?
IEEE 802 is a collection of networking standards that cover the physical and data-link
layer specifications for technologies such as Ethernet and wireless. Essentially, the IEEE
802 standards help make sure internet services and technologies follow a set of
recommended practices so the network devices can all work together smoothly.
Without these standards, equipment suppliers could manufacture network hardware that
would only connect to certain computers. It would be much more difficult to connect
to systems not using the same set of networking equipment. Standardizing protocols
help ensure that multiple types of devices can connect to multiple network types. It also
helps make sure network management isn't the challenge it could be if it wasn't in place.
Given below are the IEEE standards which can be used in above LAN and
WLAN design in the company.
IEEE 802
Description
IEEE 802.1
Higher Layer LAN Protocols Working Group /Bridging
IEEE 802.2
Logical Link Control (LLC). This sublayer is responsible
for the data transmission between computers or devices on a
network
IEEE 802.3
For Ethernet networks
IEEE 802.4
Token Bus is for the token passing LANs
IEEE 802.5
For Token Ring networks / MAC sublayer
IEEE 802.6
DQDB (Distributed Queue Dual Bus) is a MAN(Metropolitan
Area Network) protocol.
IEEE 802.7
for Broadband Local Area Networks (LAN) using
Cable Medium
IEEE 802.8
Use of Fiber optics on networks, including
Fiber Distributed Data Interface(FDDI) and
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 17
Ethernet over Fiber-optic cable.
IEEE 802.9
For Integrated voice and data access
IEEE 802.10
For an Interoperable data link layer security protocol
and associated security services
IEEE 802.11
Wireless LAN
1.3 Network protocols and Protocol suites
What is a Network Protocol and how does it work ?
A network protocol is an established set of rules that determine how data is transmitted
between different devices in the same network. Essentially, it allows connected devices to
communicate with each other, regardless of any differences in their internal processes,
structure or design. Network protocols are the reason you can easily communicate with
people all over the world, and to play a critical role in modern digital communications.
Neither Local Area Networks (LAN) nor wide area networks (WAN) could function the
way they do today without the use of network protocols.
Network Protocol suite
A Network protocol suite is a collection of protocols that are designed to work together.
TCP/IP (Transmission Control Protocol/Internet Protocol)
The protocol suite is named after two of the most common protocols TCP (transmission
Control Protocol) and IP (internet Protocol).
In addition, TCP/IP divides the different communications tasks into layers. Each layer has
a different function. Data goes through four individual layers before it is received on the
other end (as explained in the following diagram). TCP/IP then goes through these layers
in reverse order to reassemble the data and to present it to the recipient.
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 18
1. Data Link Layer
The Data link layer is what handles the physical parts of sending and receiving data
Using the Ethernet cable,wireless network, Network Interface Card (NIC),device driver in
the computer and so on.
2. Network Layer
The Network Layer (also called the internet layer) controls the movement of packets
around the network
3. Transport Layer
The Transport Layer is what provides a consistent data connection between the two
devices. It divides the data in packets, acknowledges the packets that it has received from
the other device and make sures that the other device acknowledges the packets it receives.
4. Application Layer
The Application Layer is the group of network that involve communication. This is what
the user typically interacts with such as email and messaging, Because the lower layers
handles the details of communication, the application doesn’t need to concern them-selves
with this.
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 19
AppleTalk Protocol Suite
AppleTalk is a branded suite of networking protocols established by Apple Inc. for their
Macintosh computers . Linked AppleTalk equipped systems automatically assigned
addresses, updated the distributed namespace, and configured any required internetworking routing. It was a plug-n-play system. AppleTalk involved a number of features
that enabled Local Area Networks(LAN) to be connected with no previous setup or the
need for a centralized router or server of any type.
This network system interconnects personal computer workstations, computers acting as
file servers and print servers, printers, and shared modems enabling them to exchange
information through various of types of communications hardware and software.
And the Main dis-advantage is that is it can be used only on Apple Devices. Now that it is
discontinued TCP/IP is used in every Apple device for better communication.
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 20
IPX/SPX (Internetwork Packet Exchange/Sequenced Packet Exchange)
IPX/SPX was created as a Transmission Control Protocol/Internet Protocol (TCP/IP)
alternative developed by Novell . These protocols share similarities but have minor
dissimilarities.
IPX/SPX is well-suited with local area networks (LAN) or private networks and
different communication protocol functions.
IPX is the network layer and SPX is the transport layer of the IPX/SPX network
protocol. The Transport layer protocol or SPX protocol is used to establish and maintain
a connection between devices. Together, they can be used to transfer data and create a
network connection between systems.
The Dis-advantages of using this particular Protocol is that ,
With IPX applications and the usage of the internet, the costs are higher if implementing
VPNs (Virtual Private Network).
And it does have slow performance in Large Area Networks.
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 21
The Recommended Protocol Suite for VIDCO-19 is TCP/IP due to the following
reasons ,
It is an industry standard model that can be successfully installed in practical
networking problems as it is designed for Wide Area Networks (WAN). It allows crossplatform communications among various networks. For it is scalable, This allows
networks to be linked without disrupting the existing services. It assigns an IP address
to each computer on the network, therefore making each device to be recognizable over
the network. And It is compatible with every operating systems, so it can communicate
with any other system. TCP/IP can be used to provide remote login over the network,
for interactive file transfer, to convey email, to distribute webpages over the network
and to remotely access a server host's file system.
Independence from specific physical network hardware. This enables TCP/IP to add
many different kinds of networks. TCP/IP can be run over an Ethernet, a DSL
connection, a dial-up line, an optical network, and virtually any other kind of physical
transmission medium,so this would be much easier for the company to handle the
network with any complications.
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 22
1.4 Network Topology
What is a Network Topology ?
A Network Topology is the arrangement with which computer systems or network
devices are connected to each other. Topologies may define both physical and logical
feature of the network. Both logical and physical topologies could be same or unlike in
a same network.
Logical Topology
A logical topology is a model in networking that defines the architecture of the
communication mechanism for all nodes in a network. Using network equipments such
as routers and switches, the logical topology of a network can be effectively maintained
and reconfigured. The Logical Topology defines how the data should transfer.
Two of the common Logical Topologies are ,
1. Logical Bus topology
Ethernet uses the logical bus topology to transfer data with a linear manner. Under a
bus topology a node broadcasts the data to the entire network. All other nodes on the
network receive the data and check if the data is intended for them.
2. Logical Ring topology
In this topology the data transfers in a circular manner, only one node can be allowed
to transfer the data in a network at a given time. This mechanism is achieved by token
(the node having token only can transmit the data in a network) and therefore the crash
can be avoided in a network.
Physical Topology
Physical topology states to the interconnected structure of a local area network (LAN).
The method is used to connect the physical devices on the network with the cables, and
the type of cabling used, all establish the physical topology.
Given below is the difference between Physical and Logical Topology
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 23
Physical Topology
Logical Topology
Depicts physical layout of the Depicts logistics of network
network.
concerned with transmission of
data.
The layout can be modified based There is no interference and
on needs.
manipulation involved here.
It can be arranged in star, ring, It exists in bus and ring topologies.
mesh and bus topologies.
Has
Major impact on cost,
scalability
and
bandwidth
capacity of network based on
selection and availability of
devices.
Has major impact on speed and
delivery of data packets. It also
handles flow control and ordered
delivery of data packets.
It is actual route concerned with It is a high level representation of
transmission.
data flow.
Physical
network.
connection
of
the Data path followed of the network.
Types of Physical Topologies include ,
▪
Bus Topology
In a Bus topology, all the computers are connected through a single cable, which acts
as the backbone of the network. Only one host can transmit data at a time , only when
the bus is free. Bus topology is very less expensive as one continuous cable is used.
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 24
Advantages of Bus topology
•
It is easy to connect or dis-connect devices in this network without affecting any
other device.
•
Easy to extend by joining the two cables together.
•
It works very efficiently when there is a small network.
•
It is the easiest network topology for connecting peripherals or computers in a
linear manner.
Disadvantages of Bus Topology
•
The Bus topology is very slow as compared to other topologies.
•
Additional devices slows down the network.
•
If a main cable is damaged, whole network fails.
•
Bus topology is not great for large networks.
•
Troubleshooting of separate device’s issues is very hard.
▪
Mesh Topology
Mesh topology is a type of network topology in which each computer is connected to
every other computer in the network.It is the most fault tolerant network topology as it
has multiple connections. This topology setup allows for most transmissions to be
distributed even if one of the connections goes down. It is a topology commonly used
for wireless networks.
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 25
Advantages of a Mesh topology
•
•
•
A fault is analyzed easily
There is no traffic problem as there are dedicated point to point links for each
computer.
Provides high privacy and security.
Disadvantages of Mesh topology
•
A lot of cabling is required. Therefore, the costs incurred in setup and
maintenance are high.
•
There are high chances of redundancy in many of the network connections.
•
Installation is a difficult and complicated procedure because of the structure and
connecting all nodes to each other.
▪
Star Topology
In Star topology, all the components of network are connected to the central device
called “hub” which may be a hub, a router or a switch. All the data on the star topology
passes through the central device before reaching the intended target.
The Hub acts as an intersection to connect different nodes present in the Star Network,
and at the same time it manages and controls the network.
Advantages of Star Topology
•
Easy to connect new nodes or devices. In star topology new nodes can be
connected easily without affecting rest of the network. Also, components can
also be removed easily.
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 26
•
It provides very high speed of data transfer.
•
Due to Hub device network control and management is much easier.
•
Easy to discover problems because cable failure only affect a single user.
Disadvantages of Star Topology
•
Entire performance of the network depends on the single device hub.
•
If the hub device goes down, the whole network will be down.
•
Requires more wires compared to the ring and bus topology.
•
The use of hub, a router or a switch as central device increases the whole cost
of the network.
•
Cabling cost is high.
▪
Ring Topology
Ring topology is a network configuration where the connected devices create a circular
path for the data to travel. Each host machine gets connected to two others, creating
points on a circle that allows for communication to occur. Data packets travel from
device to the next up until they reach their intended destination.
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 27
Advantages of Ring Topology
•
Flow of data is in circular manner which reduces the chance of packet crash.
•
Ring topology delivers good communication over a long distance.
•
The maintenance of ring network is much easier compared to the bus network.
•
There is no need of network server to maintain the flow of data.
•
Ring network is less costly compared to the other topologies.
Disadvantage of Ring Topology
•
A single damage in the cable can cause disruption in the entire network.
•
It is slower in performance as compared to the bus topology.
•
Adding and removal of any node during a network is challenging and may cause
problem in network activity.
•
•
Difficult to troubleshoot network issues.
Not Scalable.
▪
Tree Topology
Tree topology is the combination of star and bus topology. A tree topology is a structure
type where computers, terminals, servers, and peripherals get connected in a shape of
branches on a tree. In a tree topology, nodes of the underlying bus network topology
are switched with a complete star topology. This topology is generally used on larger
networks. In a tree topology, there can be only one connection among any two
connected nodes. Because any two nodes can have only one mutual connection, tree
topologies form a natural parent and child hierarchy.
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 28
Advantages of Tree Topology
•
It delivers high scalability, as nodes can add more nodes in the hierarchical
chain.
•
It provides easy maintenance and fault identification.
•
Each segment is delivered with dedicated point-to-point wiring to the central
hub.
•
If one segment is damaged, other segments are not affected.
Disadvantages of Tree Topology
•
Because of its basic structure, tree topology, relies heavily on the main bus
cable, if it breaks whole network is down.
•
As more and more nodes and segments are connected, the maintenance becomes
difficult.
•
Scalability of the network depends on the type of cable used.
▪
Hybrid Topology
A hybrid topology is a type of network topology that uses two or more different network
topologies. These topologies can include a combination of bus topology, mesh
topology, ring topology, star topology, and tree topology.
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 29
Advantages of Hybrid topology
•
Reliable
It has far better fault tolerance. The section where fault is found could probably be
singled out from the rest of network and necessary restorative steps could be taken,
without impacting the functioning of rest of the network.
•
Flexible
One of the key advantages of this topology is it’s flexibility. The topology is
formed, so that it can be implemented for a variety of separate network
environment. Hybrid Network can be created in line with the demands of the
corporation and by maximizing the existing resources.
•
Effective
The most important advantage of this topology is that the weakness of the different
topologies connected are disregarded and only the strengths are taken into concern.
For instance, ring topology has good data reliability and star topology has high
tolerance capability, so these two function quite well in hybrid star-ring topology.
•
Scalable
Hybrid networks are built in a manner which enables for easy combination of new
hardware components like additional concentration points. It’s quite simple to
extend the size of network with the addition of new elements, without interrupting
the existing architecture.
Disadvantages of Hybrid topology
•
Expensive
The network hubs required for hybrid topology networking are expensive to purchase
and maintain. The cost of this topology is higher in comparison to the other topologies.
The hubs used to connect two distinct networks are expensive. These hubs are not the
same as usual hubs since they have to be smart enough to work with different types
architectures and should be able to function even when a portion of network is down.
As hybrid architectures are usually larger in scale, they may require a lot of cables,
advanced network devices, etc.
•
Complexity
Due to the fact that different topologies connect in a hybrid topology, handling the
topology gets complicated. It is not easy to design this type of architecture and it’s a
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 30
difficult job for designers. Configuration and installation procedure needs to be very
well-organized.
1.5 The most suitable Network topology for the company is the Hybrid topology
because it is the most versatile topology out of the others and the most effective due to
its characteristics mentioned above.
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 31
Task 02
2.1 Operating Principles of Network devices
Switch
Switches generally have a more intelligent role than hubs. A switch is a multiport device
that improves network efficiency. The switch maintains limited routing information
about nodes in the internal network, and it allows connections to systems like hubs or
routers. Components of LANs are usually connected using switches. Generally,
switches can read the hardware addresses of incoming packets to transmit them to the
suitable destination. Switches also increase network security because the virtual circuits
are more difficult to observe with network monitors. There are two types of switches,
managed or unmanaged. The managed type of switch is much easier to set up
Router
A router is hardware device designed to receive, analyze and move incoming packets
to another network. A router is a key network security device. You cannot set up a
network without one. A router is a device that links different networks together. The
router will use the best way to communicate among networks and devices. The router
can be configured to which the computer priority needs.
Wireless (Wi-Fi) routers
Wireless routers provide Wi-Fi access to smartphones, laptops, and other devices with
Wi-Fi network capabilities. Also, they may deliver standard Ethernet routing for a small
number of wired network devices.
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 32
Network Bridge
A network bridge may be a device that divides a network into segments. Each segment
represents a separate collision domain, therefore the number of collisions on the
network is reduced. Each collision domain has its own separate bandwidth, so a bridge
also increases the network performance. It checks incoming traffic and decide whether
to forward it or filter it. Each incoming Ethernet frame is inspected for destination MAC
address.
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 33
Hub
Hubs connect numerous computer networking devices together. A hub also acts as a
repeater in that it amplifies signals that weakens after traveling long distances over
connecting cables. A hub is the simplest in the family of network connecting devices
because it connects LAN components with identical protocols. A hub can be used with
both digital and analog data, provided its settings have been configured to prepare for
the formatting of the incoming data. For example, if the incoming data is in digital
format, the hub must pass it on as packets; however, if the incoming data is analog, then
the hub passes it on in signal form.
Hubs do not execute packet filtering or addressing functions, they just send data packets
to all connected devices.
Gateway
Gateways provide translation between networking technologies such as Open System
Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP).
Because of this, gateways connect two or more separate networks, each with its own
routing algorithms, protocols, topology, domain name service, and network
administration procedures and policies.
Gateways performs all of the tasks of routers and more. In fact, a router with added
translation functionality is a gateway. The function that does the translation between
different network technologies is called a protocol converter.
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 34
2.2 The devices which we can use to enhance security of VIDCO-19 Kandy Branch.
Firewall
A firewall device is one of the first step of defense in a network because it separates
one network from another. Firewalls can be individual systems or they can be involved
in other infrastructure devices, such as routers or servers. It can be found on both
hardware and software firewall solutions, some firewalls are available as appliances
that serve as the main device separating two networks.
The unwanted and undesirable network traffic from entering the organization’s systems
is blocked by the Firewall.
There are two commonly used types of firewall policies which can be used in VIDCO19 the two types are ,
•
Whitelisting
Only the specifically listed as acceptable are accepted and the other connections are
denied by the Firewall.
•
Blacklisting
Only the specifically listed as unacceptable are unaccepted and all the other connections
are allowed by the Firewall.
Intrusion Prevention System (IPS)
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 35
An intrusion prevention system (IPS) is a technique of network security that works to
identify and avoid recognized threats. Intrusion prevention systems constantly monitor
the network, searching for possible malicious events and taking information about
them. The IPS reports these events to system administrators and takes blocking action,
such as closing access points and configuring firewalls to avoid future attacks. IPS
solutions can also be used to identify issues with corporate security policies and
network guests from violating the rules these policies contain.
Intrusion detection system (IDS)
An intrusion detection system (IDS) is a device or software application that monitors a
network or systems for malicious activity or policy violations. Any intrusion activity or
violation is usually reported either to an administrator or collected centrally using a
security information and event management (SIEM) system. A SIEM system combines
outputs from multiple sources and uses alarm filtering techniques to distinguish
malicious activity from false alarms.
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 36
Proxy Server
A Proxy server is basically a separate hub that allows another server to connect.
Usually, the connection is to the Internet. In this occasion, the server would request
information, and send that request through the proxy server. The proxy would
ultimately send the request to the Internet connection.
They can also limit access to certain types of information online so this could be used
to hopefully avoid access to potentially harmful sites.
Using a proxy server, speeds up Internet access by caching specific files. This reduces
bandwidth consumption, which is an important benefit for the company.
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 37
2.3 Importance of networking software
What is a Networking Software ?
Networking software is a foundational element for any network. It helps administrators
install, manage, and monitor a network. Traditional networks are made up of
specialized hardware, such as routers and switches, that bundle the networking software
into the solution. Software defined networking (SDN) separates that software from the
hardware, making it easier to transform and adjust the network to quickly meet
changing network demands. The separation of functions from hardware, such as
firewalls or load balancing, is called network functions virtualization (NFV).
The functions are ,
•
Assists to set up and install computer networks
•
Enables users to have access to network resources in a smooth manner
•
Allows administrations to add or remove users from the network
•
Assists to define locations of data storage and allows users to access that data
•
Assists administrators and security system to protect the network from data
intruders, unauthorized access and attacks on a network
•
Enables network virtualizations
Networking softwares which can be used in a network design.
Cisco Internetwork Operating System (IOS)
The Cisco IOS (Internetwork Operating System) is a proprietary operating system that
delivers routing, switching, and internetworking features. It controls and manages the
hardware on which it runs. Technically, it provides an interface between a user and the
hardware, allowing the user to execute commands to configure and manage the Cisco
device. the IOS was developed for Cisco routers, but a few years later Cisco decided to
use the IOS to its other platforms, including the Catalyst switches. Currently, the IOS
runs on most Cisco routers as well as a growing number of Cisco Catalyst switches
such as Catalyst 2960 and 3560 series switches.
Functions of the IOS are ,
•
To transfer network protocols and functions
•
To connect between different data link layer technologies
•
To connect high speed traffic between devices
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 38
•
To secure network resources
•
To control unauthorized access
•
To provide scalability for ease of network growth
•
To keep the network stable and reliable
IBM AIX
IBM AIX is an enterprise class UNIX operating system (OS) for the POWER processor
architecture found in IBM Power Systems. It has a infrastructure that is secure, highly
available and able to adjust quickly to varying business needs. AIX delivers these
capabilities and more, with the performance, reliability and security that the company
critical data demands.
The functions of IBM AIR are ,
•
AIX Live Update: OS fixes without reboot downtime
•
Power Systems Dynamic Flash Cache: Transparent SSD caching
•
Dynamic System Optimizer (DSO): Tune software in real time
•
Active Memory Expansion: Improve use of physical memory
•
Binary Compatibility Guarantee: No need to recompile
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 39
2.4 The importance of Servers in computer networks Servers
What is a server ?
A server is a software or hardware device that receives and responds to requests made
over a network. The device that makes the request, and receives a response from the
server, is called a client. On the Internet, the term "server" commonly refers to the
computer system that receives requests for a web files and sends those files to the client.
Servers not only help the business with data storage, but they will also improve
efficiency and productivity. As employees can access data and information from any
workstation it means they can work from home, while travelling or from a different
office.
The benefits of using a server in the network,
A server gives the network a lot of reliability
For instance, if having four working PCs on an interlinked network connection. If one
PC fails (on basis of any motherboard, hard disk or power supply faults) on the
interlinked network, the entire system goes down until the problems are treated
successfully with proper solutions.
A server, on the other hand is an effective solution to such a serious issue. Server
hardware maintains unnecessary hardware to overcome these issues at moment’s
notice. In such cases, the failure of one device does not guarantee the failure of the
entire server system. Therefore, it can continue to serve the business with satisfaction
even after the failure of a slight little linked device unlike the interlinked PCs.
Reliability which is wanted is got.
A server provides the business with network security
By creating well-known group and individual accounts, individual right can be assigned
to users based on the nature and amount of data they can access on basis of their
requirements. This can bring down unauthorized data access to a great extent and can
provide the network with additional security that the company had wanted for in the
past.
For instance, If the company have a sales team and a HR team, both would not be able
to access data of one another even if the entire data is present on a single server.
A server provides the business with an effortless remote accessibility
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 40
A Windows 2008 server would give the option to have 2 remote users on its network at
the same time by default. And it also give the opportunity to add as many remote users
the company wants in the near future through Remote Desktop licensing or a 3rd party
software. Therefore, geographical obstacles stop to be a problem anymore. The staff
will be able to work remotely and access files on the server whenever they want
wherever they are. They would also be able to access their individual company emails
from any web browser on their respective devices whenever they want from anywhere
in the world.
A server provides the business with a centralized back up facility
Data losses take place generally in workplaces for several reasons ranging from
machine failures to carelessness. These things create huge problems especially when
the workplace functions in lack of a server.
A server can be considered a blessing in this aspect because it supports a lot in
smoothing up the data backup process. The company will be able to back up all the data
including the mails to a centralized storage on the server and reduce all the stresses
associated with data losses thereby, improving the workplace productivity at the same
time.
A server system supports in proper virus management
A server system can help a lot in appropriate virus management. The system
administrator will be able to deploy the anti-virus software from a single PC to each
workstation PC connected on the network, by running a network wide scan as a whole
(including the devices connected on the WiFi network) and remove all sorts of viruses
if any. So it will be able to see very well that this convenience is basically unmatched.
The compact server system, the entire virus management process can be done from a
single PC itself. Always that the expenses experienced in creating a server based
network is not just a cost, It’s an investment,an invest having high ROI(Return on
Investment)especially when the business is small, scheme is concerned. It’s definitely
going to benefit in the long run.
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 41
Types of servers
•
Application Server
Also known as a type of middleware, it occupies a substantial amount of computing
region between database servers and the end user, and is commonly used to connect the
two.
•
Mail Server
It transfers and stores emails over corporate networks through LANs, WANs and across
the Internet.
•
Proxy Server
It acts as a mediator between a client program and an external server to filter requests,
improves performance and share connections.
•
Web Server
A web server is a server that runs on websites. It is also called a computer program.
The main task of web servers is to store, process, and deliver. A web server program
uses HTTP (Hypertext Transfer Protocol), which serves files for users that create web
pages. Dedicated computers and applications are also known as web servers.
•
File Server
A file server is a network that supports to transfer stored files. The file server stores and
manages all the files in a computer and sends a copy of the file to the other computer
on the request of the users. It shares the storage of computer files such as documents,
sound files, photographs, images, databases, etc. These types of servers is used mainly
on the local network.
•
Database server
A database server is a computer system that provides other computers with services
related to accessing and retrieving data from a database. Access to the database server
may happen via a "front end" running locally a user's machine or "back end" running
on the database server itself, accessed by remote shell. After the information in the
database is retrieved, it is outputted to the user requesting the data.
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 42
The most Common Severs and Workstations which are used today,
PowerEdge T140 Tower Server
Specifications
Processor
▪
Intel® Celeron G4930 3.2GHz, 2M cache, 2C/2T, no turbo (54W)
Operating System
▪
Canonical® Ubuntu® Server LTS
▪
Citrix® Hypervisor ®
▪
Microsoft® Windows Server® with Hyper-V
▪
Red Hat® Enterprise Linux
▪
SUSE® Linux Enterprise Server
▪
VMware® ESXi®
Memory
▪
DIMM Speed up to 2666MT/s
▪
Memory Type UDIMM
▪
Memory Module Slots 4
▪
Maximum RAM UDIMM 64G
Storage Controllers
Internal Controllers
▪
PERC H330, H730p, HBA330
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 43
External Controllers (non-RAID)
▪
12 Gbps SAS HBA
▪
Software RAID
▪
S140
▪
Internal BOOT
▪
Boot Optimized Storage Subsystem (BOSS):
▪
2 x M.2 240GB (RAID 1 or No RAID)
▪
1 x M.2 240GB (No RAID only)
Security
▪
Cryptographically signed firmware
▪
Silicon Root of Trust
▪
Secure Boot
▪
Secure Erase
▪
System Lockdown (requires OpenManage Enterprise)
▪
TPM 1.2/2.0, TCM 2.0 optional
Ports
▪
Front panel: 1x USB 3.0, 1x iDRAC micro USB 2.0 management port
▪
Back panel: 2x USB 3.0, 4x USB 2.0, VGA, serial connector
▪
Internal USB: 1x internal USB 3.0
Storage
▪
Up to 4 x 3.5" SAS/SATA (HDD), max 16TB
Dell PowerEdge R610
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 44
Processor
▪
Intel® Xeon® processor 5500 and 5600 series
▪
Six-core Intel® Xeon®
▪
Dual-core Intel® Pentium®
▪
Quad-core Intel® Xeon®
Operating System
▪
Microsoft® Windows Server® 2012
▪
Microsoft Windows® Small Business Server 2011
▪
Microsoft Windows Small Business Server 2008
▪
Microsoft Windows Server 2008 SP2, x86/x64 (x64 includes Hyper-V®)
▪
Microsoft Windows Server 2008 R2 SP1, x64 (includes Hyper-V v2)
▪
Microsoft Windows HPC Server 2008 R2
▪
Novell® SUSE® Linux Enterprise Server
▪
Red Hat® Enterprise Linux®
Memory
▪
Up to 192GB
▪
Up to 1333MT/s DDR3
▪
12 DIMM slots: 1GB/2GB/4GB/8GB/16GB
Storage Controllers
Internal Controllers
▪
PERC H200 (6Gb/s)
▪
PERC H700 (6Gb/s) (nonvolatile battery-backed cache:
▪
512MB, 1GB)
▪
SAS 6/iR
▪
PERC 6/i (battery-backed
▪
cache: 256MB)
External Controllers
▪
PERC H800 (6Gb/s) (non-volatile
▪
battery-backed cache: 512MB, 1G)
▪
PERC 6/E (battery-backed cache:
▪
256MB, 512MB)
▪
External HBAs (non-RAID):
▪
6Gb/s SAS HBA
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 45
•
SAS 5/E HBA
•
LSI2032 PCIe SCSI HBA
Storage
▪
Hot-plug Hard Drive Options:
▪
2.5” SAS SSD, SATA SSD, SAS (10K, 15K), nearline SAS (7.2K), SATA
(7.2K)
▪
Max Up to 12TB
HPE ProLiant DL380 Gen10
Processor
▪
Intel® Xeon® Scalable 8100 series
▪
Intel® Xeon® Scalable 6100 series
▪
Intel® Xeon® Scalable 5100 series
▪
Intel® Xeon® Scalable 4100 series
▪
Intel® Xeon® Scalable 3100 series
Operating System
▪
Canonical Ubuntu
▪
Citrix XenServer
▪
Microsoft Windows Server
▪
Oracle Solaris
▪
Red Hat Enterprise Linux
▪
SuSE Linux Enterprise Server
Memory
▪
12 DDR4
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 46
▪
Up to 2666 MT/s
Storage Controllers
Software RAID
▪
HPE Smart Array S100i SR Gen10 SW RAID
Essential RAID Controller
▪
HPE Smart Array E208i-a SR Gen10 Controller
▪
HPE Smart Array E208i-p SR Gen10 Controller
▪
HPE Smart Array E208e-p SR Gen10 Controller
Performance RAID Controller
▪
HPE Smart Array P408i-a SR Gen10 Controller
▪
HPE Smart Array P408i-p SR Gen10 Controller
▪
HPE Smart Array P408e-p SR Gen10 Controller
▪
HPE Smart Array P816i-a SR Gen10 Controller
Storage
▪
Up to 190TB
Security
▪
UEFI Secure Boot and Secure Start support
▪
Immutable Silicon Root of Trust
▪
FIPS 140-2 validation (iLO 5 certification in progress)
▪
Common Criteria certification (iLO 5 certification in progress)
▪
Configurable for PCI DSS compliance
▪
Advanced Encryption Standard (AES) and Triple Data Encryption Standard
(3DES) on browser
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 47
Workstations
Dell Precision 7920
Processor
▪
Intel® Xeon® processor Scalable Operating System CPUs with up to 28 cores
per processor
Operating System
▪
Windows 10 Pro for Workstations (up to 4 Cores)
▪
Windows 10 Pro for Workstations (4 Cores Plus)
Memory
▪
Up to 1.5TB 2666MHz DDR4 ECC memory with dual CPUs, up to 3TB
Graphics
▪
NVIDIA Quadro P4000
Storage
▪
Up to 8 x 1TB drives
▪
2.5” SATA SSD
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 48
HP Z620
Processor
▪
Intel Xeon E5-2643 (3.3GHz, 10MB cache, 4 cores)
Operating system
▪
Windows 10 Pro
Memory
▪
96GB 1600MHz DDR3
Storage
▪
1TB SATA 7200RPM 6Gb/s 3.5" HDD
Graphics
▪
NVIDIA Quadro K2000
Expansion slots
▪
2 PCIe Gen3 x16
Storage controller
▪
Integrated SATA 6.0Gb/s
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 49
I recommend the PowerEdge T140 Tower Server and the HP Z620 as the work station
for VIDCO-19 considering the company needs high performance devices due to its
being a software company and have a large number of employees, so the employees
would have an efficient workflow without any problematic situations such as lags
which causes delays and effects the ongoing workflow.
2.5 Importance of having compatible devices and related software
in network design.
The company network is part of the basic infrastructure of any business. It is also an
important component, for it enables teamwork and provides access to the Internet. It
also allows for all members of staff (including management) to share a company’s
hardware, printers, servers, and services, and accordingly communicate and exchange
data with one another.
A variety of devices are required to build a network. The router connects the company’s
local network (LAN/WLAN) to the wide area network (WAN), the Internet, and the
outside world. Switches, hubs, cables, wireless technology, and power supplies connect
computers, VoIP phones, printers, and servers to the router and to each other.
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 50
The above stated network devices make up the network infrastructure. To keep these
devices up and running as smoothly as possible, a few basic conditions are required.
The company must decide how data is exchanged between these devices and invest in
specific network device management. When met, these conditions make
troubleshooting more effective than ever. By spending less time identifying problems,
the company not only keep interruption to a minimum, but also save money and avoid
losses in transactions.
Networking software is a initial element for any network. It helps administrators install,
manage, and monitor a network. Traditional networks are made up of specialized
hardware, such as routers and switches, that bundle the networking software into the
solution. Software defined networking (SDN) separates that software from the
hardware, making it easier to transform and adapt the network to quickly meet changing
network demands. The separation of functions from hardware, such as firewalls or load
balancing, is called network functions virtualization (NFV).
Network software is not the same as software applications. The former exposes the
inner-workings of the network to administrators, while software applications enable
end users to perform specific tasks. Network software is “invisible” to end users it is
simply used to simplify the access those users have to network resources, in a seamless
way.
The basic functionality includes both user management and file management. User
management enables administrators to add or remove users from the network. File
management allows administrators to define the location of data storage and user access
to that data.
Network software allows multiple devices, such as desktops, laptops, mobile phones,
tablets, and other systems to connect to one another, as well as other networks. The
internet is a major example of a globally connected system of servers and computers
that depend on on networking software to certify accessibility by end users.
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 51
Task 03
3.1 VLAN and IP subnetting
VLAN (virtual LAN)
A VLAN (virtual LAN) is a subnetwork which can group together collections of
devices on separate physical local area networks (LANs). A LAN is a group of
computers and devices that share a communications line or wireless connection to a
server within the same environmental area.
VLANs make it easy for network administrators to partition a single switched network
to match the functional and security requirements of their systems without having to
run new cables or make major changes in the existing network infrastructure. VLANs
are often set up by larger businesses to re-partition devices for better traffic
management.
IP subnetting
Subnetting is the preparation of dividing a network into two or more smaller networks.
It increases routing efficiency, enhances the security of the network and reduces the
size of the broadcast domain.
The VLAN and IP subnetting scheme for above scenario
Department
No of VLAN Subnet mask
IP range
Users
Developers
55
100
255.255.255.192
192.168.10.1–
192.168.10.62
Finance
25
200
255.255.255.224
192.168.10.65–
192.168.10.95
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 52
Sales
and 25
300
255.255.255.224
Marketing
HR
192.168.10.97192.168.10.126
10
400
255.255.255.240
192.168.10.129192.168.10.142
Customer Care
10
500
255.255.255.240
192.168.10.145192.168.10.158
Legal
5
600
255.255.255.248
192.168.10.161192.168.10.166
Network Team
5
700
255.255.255.248
192.168.10.169192.168.10.174
Server Room
2
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 53
3.2
Cisco packet tracer
Packet Tracer is a cross-platform visual simulation tool designed by Cisco Systems that
allows users to create network topologies and imitate modern computer networks. The
software allows users to simulate the configuration of Cisco routers and switches using
a simulated command line interface. Packet Tracer makes use of a drag and drop user
interface, allowing users to add and remove simulated network devices as they see fit.
Putty
PuTTY is an open-source application making use of network protocols like Telnet and
rlogin in Windows and UNIX platforms in combination with an xterm terminal
emulator. Over a network, PuTTY makes use of all the above protocols to enable a
remote session on a computer. It is a popular tool for text-based communication and is
also a popular utility for connecting Linux servers from Microsoft operating systembased computers.
3.3 Network design
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 54
3.4 Feedbacks for the design test
Name
Position
Thomas
Network Engineer
Poor
Good
1.Does the network system fulfill the
Excellent
✔
requirements?
2.The security of this network?
✔
3. User friendliness
✔
4. The performance of this network?
✔
5.Access speed
✔
6. Server responses
Opinion
✔
Improve the security system in the
network
Date
08/12/2020
Signature
thomas1@gmail.com
Name
Matt
Position
Network Engineer
Poor
1.Does the network system fulfill the
Good
Excellent
✔
requirements?
2.The security of this network?
✔
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 55
3. User friendliness
4. The performance of this network?
✔
✔
5.Access speed
✔
6. Server responses
✔
Opinion
Improve the performance and security in
the network
Date
10/12/2020
Signature
matt41@gmail.com
Name
Suresh
Position
Network Engineer
Poor
1.Does the network system fulfill the
Good
Excellent
✔
requirements?
2.The security of this network?
✔
3. User friendliness
✔
4. The performance of this network?
✔
5.Access speed
✔
6. Server responses
Opinion
✔
Improve the server response time in the
network
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 56
Date
14/12/2020
Signature
sureshdk@gmail.com
3.5 Configuring Network services and Applications
Installing Windows server
1
2
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 57
3
4
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 58
5
Configuration of Active Directory, DHCP and DNS
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 59
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 60
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 61
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 62
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 63
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 64
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 65
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 66
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 67
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 68
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 69
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 70
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 71
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 72
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 73
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 74
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 75
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 76
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 77
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 78
3.6 Maintenance schedule for VIDCO-19’s Network system
Tasks
Daily
Weekly Monthly Annually
Scanning for threats and errors
Data backup check
✔
✔
Network Cables and Switches check
✔
System Update check
✔
Hardware devices check
✔
Troubleshooting
✔
System Password update
✔
Internet connection Check
✔
Software check
Update Network diagram
✔
✔
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 79
Task 04
4.1 Network configuration
Vlan configuration
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 80
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 81
DHCP configuration
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 82
4.2 VIDCO-19 Test cases for the Network design
Test case 1
DHCP Check successful
Test case 2
Pinging from Sales and Marketing to Developers department successful
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 83
Test case 3
User access verification successful
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 84
4.3 Why network monitoring is important in VIDCO-19 Kandy branch?
Network monitoring is unquestionably compulsory for the company without any doubt.
The entire purpose of it is to monitor the computer network’s usage and performance,
and to check for slow or failing systems. The system will then notify the network
administrator of any performance problems or errors with some kind of an alarm or an
email. This system will save a lot of money and reduce numerous problems. It is the
best probable way to safeguard that the company is functioning properly.
The below given factors are considered as well,
Troubleshooting
An advantage of network monitoring is its troubleshooting facilities. We can save a lot
of time trying to identify what is wrong. With network monitoring we can quickly tell
which device it is that’s giving we the problem. Our support team will be able to pick
up on a problem and fix it before the users are even aware of it. Because our monitoring
is endless, it can help us to find out certain movements in the performance of our
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 85
network. When problems occur occasionally or at peak times they can be hard to
diagnose, but a network monitor will help us better to understand what is going on.
Save Time and Money
Network monitoring will save us both lots of time and lots of money. Without it, a lot
of time would have to be spent inspecting, which would result in more hours having to
be worked. This will not only cost more money but it will decrease efficiency. When
we can quickly point out and fix network issues we are increasing our profits. When
everything is running smoother, this gives us more time to run our company. When we
understand how all of our devices are being used, we are able to recognize what needs
additional disk space so it lets us to increase the capacity quickly and effectively.
Security
One of the most important parts of network monitoring is keeping our information
secure. It will keep track of everything and alert the network administrator of any issues
before they become real major problems. A few of the things that a network monitor
can tell that is if something stops responding, our sever fails, or our disk space is running
low. Network monitoring is possibly the most active way to deal with problems so that
we can stay ahead of them, especially since our company will be monitored 24/7.
Planing for any Changes
With network monitoring, we can track if a device is running close to its limit and needs
to be changed. It gives us the ability to plan in advance and easily make any necessary
changes. All of the reports that we will have showing our activity and what type of
health our system is in will become convenient as great tools for our company. They
will allow us to easily prove to others what is happening and show why one of our
devices needs to be fixed or replaced.
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 86
4.4 Network monitoring Tools
What is Network Monitoring?
The term network monitoring is common throughout the IT industry. Network
monitoring is a serious IT process where all networking components like routers,
switches, firewalls, servers are monitored for fault and performance and evaluated
continuously to maintain and optimize their availability. One important aspect of
network monitoring is that it should be practical. Finding performance issues and
blockages practically helps in identifying issues at the early stage. Efficient active
monitoring can prevent network interruptions or failures.
Significant benefits of network monitoring are as follows,
•
Clear visibility into the network
Through network monitoring, administrators can get a clear picture of all the connected
devices in the network, see how data is moving between them, and quickly identify and
diagnose issues that can weaken performance and lead to interruptions.
•
Better use of IT resources
The hardware and software tools in network monitoring systems reduce manual work
for IT teams. That means valuable IT staff have more time to offer to critical projects
for the company.
•
Early awareness into future set-up needs
Network monitoring systems can deliver reports on how network components have
performed over a particular period. By analyzing these reports, network administrators
can get ahead when the company may need to consider upgrading or implementing new
IT set-ups.
•
The capability to identify security threats faster
Network monitoring helps organizations understand what "normal" performance looks
like for their networks. So, when unfamiliar activity occurs, such as an unexplained
increase in network traffic levels, it's easier for administrators to identify the issue
quickly and to determine whether it may be a security threat.
The Network Monitoring which could be installed and configured is,
Solarwinds Network Performance Monitor
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 87
SolarWinds Network Performance Monitor is easy to setup and can be ready in no time.
The tool automatically discovers network devices and installs within an hour. Its simple
approach to manage an entire network makes it one of the easiest to use and most
spontaneous user interfaces.
The product is highly customizable and the interface is easy to manage and change very
quickly. We are able to customize the web-based performance dashboards, charts, and
views. We are able to design a tailored topology for our entire network infrastructure.
We can also create customized dependency-aware intelligent alerts and much more.
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 88
Solarwinds NPM has an Extensive Feature list that make it One of the Best Choices for
Network Monitoring, including,
•
Automatically Network Discovery and Scanning for Wired and Wifi Computers
and Devices
•
Quickly Pinpoint Issues with Network Performance with NetPath™ Critical
Path visualization feature
•
Easy to Use Performance Dashboard to Analyze Critical Data points and paths
across your network
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 89
•
Robust Alerting System with options for Simple/Complex Triggers
•
Monitor CISCO ASA networks with their New Network Insight™ for CISCO
ASA.
•
Monitor ACL’s, VPN, Interface and Monitor on Cisco ASA
•
Monitor Firewall rules through Firewall Rules Browser
•
Step by step Analysis of Critical Network Paths and Components
•
Automatically Discover Networks and Map them along with Topology Views
•
Manage, Monitor and Analyze Wifi Networks within the Dashboard
•
Generate HeatMaps of Wifi Networks to pin-point Wifi Dead Spots
•
Monitors Hardware Health of all Servers, Firewalls, Routers, Switches,
Desktops, laptops and more.
•
Real-Time Network and Netflow Monitoring for Critical Network Components
and Devices
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 90
4.5 Troubleshooting
Steps for following situations
Everything is working normally but suddenly the connection goes
away, and then comes back, and then goes away again on client
computer.
▪
Step 1: Restart the modem and router
Just like the computer can freeze up and need a reboot, the modem and router can do
the same. If either device is no longer doing its work, restarting may be all that’s needed
to get it up and running again.
Unplug the modem and router and leave them disconnected from the power for at least
15 seconds. Then plug them back in, modem first, then router. If they don’t start
powering up immediately, look for a Power button. Most devices need about 2 minutes
to fully power on. If the devices aren’t working once this is complete, move on to Step
2. Be sure not to RESET the modem ,This will clear all important Internet connection
settings from the modem and will then need a reconfiguration.
▪
Step 2: Check the lights
The modem and router may have indicator lights that tell whether they’re working. If
so, analysis these. If they say they’re working, but the devices still don’t have internet,
move to Step 3.
▪
Step 3: Forget and rejoin the wireless network
The phone or tablet remembers information about the wireless network so that it can
quickly reconnect. But if something goes wrong with the network, the devices may be
remembering some corrupt information. Look for an option on the device to forget the
wireless network. Doing this, then rejoining. If that doesn’t fix the issue, move to Step
4.
▪
Step 4: Call the ISP(Internet Service Provider)
If the above steps don’t resolve the problem (and especially if the modem and router
display that something’s not working), it’s time to call the specific Internet Service
Provider (ISP). Sometimes it’s a simple fix on their end where they send a reset
command to the modem. Other times there’s a more widespread outage affecting
multiple customers. Calling in is the best way to get an idea when this will be fixed.
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 91
Network cable plugged in, but getting no connection.
▪
Step 1: Install the latest drivers
This issue can appear if the network adapter doesn’t have the necessary drivers installed
▪
Step 2: Replacing the Ethernet cable
If this issue still occurs, we might have to replace the Ethernet cable. Before purchasing
a new cable, we should test the same cable on a different PC to see if it works. If the
problem occurs on two or more different devices, be sure to replace the cable.
▪
Step 3: Restart / reset the router
In some cases, this error can appear if the router configuration is not correct, and in
order to fix this problem it is advised to restart the router. To do that, just turn the router
off and turn it back on and check if the problem appears again. If the issue still
continues, we might have to reset the router. To see how to properly reset the router we
must be sure to check the router’s instruction manual.
▪
Step 4: Run the network troubleshooter
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 92
4.6 Future enhancements for the networked system
• Updating software and firmware
Advancements in technology and the software that runs on it do not always keep pace
with each other. We may have new programs running on old machines, or old programs
running on new one either way, it is questionable that they’ll work well together.
•
Configuration of VPN (Virtual Private Network) server
VPN server must be used in the network system because VPN use powerful encryption
protocols to protect online data while we browse the web . The network can be increased
with the implementation of VPN. The great advantage of using VPN is that the
information can be accessed remotely from any place which can increase the
productivity.
•
Provide a separate guest network
The company can deploy a separate network for guests to access so they can connect to
the web while the business resources are kept separate.
•
Implement load balancing
Its advanced traffic management functionality can help business requests more
efficiently to the correct resources for each end user.
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 93
4.7 Conclusion
In conclusion, a network is two or more computers connected together using a
telecommunication system for the purpose of communicating and sharing resources.
Without having a network, VIDCO-19 would not be able to share resources and
increase productivity more efficiently. The WAN network allowed VIDCO-19 to use
the internet over large ranges. This provided the company to have meetings overseas
and sharing data over the network. As you can see, Networks have many benefits to the
end user. Weather the Network is Wired or Wireless, Networks are an important part
of technology. In this case design, planning, Configuration and testing of the network
are the key factors which are considered when it comes to building a network. The
company’s requirements must be met to run a successful network such as managing the
employees’ traffic and separating the network according to the departments comes
under planning. The next factor to consider will be the network design, the design
causes a big impact on the system for it is a major factor to be considered. Next will be
configuring the network design in-order to make the network work as per meeting the
requirements of VIDCO-19, each and every module must be checked properly for an
error free network, so that the devices may operate efficiently. And after that the
network must be tested before implementing, in order to test the network, it is required
to go through every module looking for any faults which may cause a problem. After
every step is completed successfully the network will be implemented in VIDCO-19 as
shown above
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 94
References
http://standards.ieee.org/
Douglas E. Comer. Internetworking with TCP/IP – Principles, Protocols and
Architecture.
https://blog.netwrix.com/2019/01/08/network-devices-explained/
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 95
Acknowledgement
The success and final outcome of this assignment required a lot of guidance and
assistance from Mr. Geeth and I am extremely fortunate to have got this all along the
completion of my assignment work. Whatever I have done is only due to such guidance
and assistance and I would not forget to thank him. I respect and thank all my colleagues
at the ESoft metro campus, for providing me all support and guidance which made me
complete the assignment on time . I am extremely grateful to be a part of this amazing
team. Thanking you,
P.V. Godrick Naveen
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 96
Grading Rubric
Grading Criteria
Achieved Feedback
LO1 : Examine networking principles and their protocols.
P1
Discuss the benefits and constraints of
different network types and standards.
P2
Explain the impact of network
topology,
communication
and
bandwidth requirements.
M1
Compare
common
networking
principles and how protocols enable
the effectiveness of networked
systems.
LO2 : Explain networking devices and operations
P3
Discuss the operating principles of
networking devices and server types.
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 97
P4
Discuss the inter-dependence
of workstation hardware with
relevant networking software.
M2
Explore a range of server types
and justify the selection of a
server, considering a given
scenario regarding cost and
performance optimization.
LO 1 & LO2
D1
Considering a given scenario,
identify the topology protocol
selected for the efficient
utilisation of a networking
system.
LO3 : Design efficient networked systems
P5
Design a networked system to
meet a given specification.
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 98
P6
Test and evaluate the design to
meet the requirements and
analyze user feedback.
M3
Install and configure network
services and applications on your
choice.
D2
Design a maintenance schedule to
support the networked system.
LO4 : Implement and diagnose networked systems
P7
Implement a networked system
based on a prepared design.
P8
Document and analyze test
results against expected results.
M4
Recommend potential
enhancements for the networked
systems.
D3
Use critical reflection to evaluate
own work and justify valid
conclusions.
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 99
Godrick Naveen - HND in Computing |Networking Assignment 01
Page | 100
Download