ASSIGNMENT 2- DESIGN AND IMPLEMENT A NETWORK INFRASTRUCTURE UNIT 2 NETWORKING JANUARY 22, 2021 Table of Contents Table of figures ....................................................................................................................................... 1 Introduction ............................................................................................................................................ 2 Test and evaluate the design ................................................................................................................. 2 Test and evaluate the networked system ............................................................................................. 3 Document and analyse test results ....................................................................................................... 9 Recommend potential enhancements for the networked system. ................................................... 17 Design a maintenance schedule to support the networked system .................................................. 19 Use critical reflection to evaluate own work and justify valid conclusions. ...................................... 21 Bibliography.......................................................................................................................................... 23 Table of figures Figure 1 Second floor .............................................................................................................................. 3 Figure 2 First floor ................................................................................................................................... 3 Figure 3 DHCP address ............................................................................................................................ 4 Figure 4 Laptop are connected wireless ................................................................................................. 4 Figure 5 Wireless password .................................................................................................................... 5 Figure 6 Laptop is connected to the network ......................................................................................... 5 Figure 7 Command Prompt ..................................................................................................................... 6 Figure 8 Command ping on Command Prompt ...................................................................................... 6 Figure 9 Command tracert on Command Prompt .................................................................................. 7 Figure 10 Command netstat in Command Prompt ................................................................................. 8 Figure 11 Messages are sent successfully............................................................................................... 8 Figure 12 Virtual Machine is running ...................................................................................................... 9 Figure 13 The Domain was created ...................................................................................................... 10 Figure 14 DNS is created ....................................................................................................................... 10 Figure 15 IP address of PC's DNS .......................................................................................................... 11 Figure 16 Contents of DHCP .................................................................................................................. 11 Figure 17 Start and end IP addresses.................................................................................................... 12 Figure 18 IP address for the other computer ....................................................................................... 12 Figure 19 First Machine authentication ................................................................................................ 13 Figure 20 Server's IP address ................................................................................................................ 13 Figure 21 The two machines are connected ......................................................................................... 14 Figure 22 Command Prompt ................................................................................................................. 14 Figure 23 Command ping ...................................................................................................................... 15 Figure 24 IIS installed on server ............................................................................................................ 15 Figure 25 Domain Controller................................................................................................................. 16 Figure 26 DHSP, DNS, IIS are installed .................................................................................................. 16 Introduction Macron Investments Ltd. have their office in a 2-storey building which is completely occupied by the investment company. The company requires a server-client network infrastructure that is centrally managed. They want 60 desktop PCs installed and Wi-Fi connectivity configured. The company is planning to expand its employee base to 60member staff across the three floors of the 2-storey building. 55 of the employees will have fixed workstations and 5 of them will use hot desks with Wi-Fi enabled laptop devices. Each floor of the building will have 2 networked printers with scanning features, switchers, server. The connection to external networks will be made with the help of a router and a server, and this increases the security of this network. Test and evaluate the design In my design I used the tree topology to combine the features of the bus and star topologies. The nodes are grouped into several star topologies, which in turn are connected to a central cable. The tree topology has the disadvantage of limiting the maximum length of a segment. In addition, if there are problems with the main connection, all computers in that segment are affected. The advantage of the tree topology is that the individual segments have direct links. As the company is quite large and growing, I preferred to use two IP addresses (198.162.1.1; 192.168.1.1), in this way there will be no problems in the future, all the computers have DHCP configuration and each floor has wireless device connection via a secured Wi-Fi authentication. PCs are connected to switches using FastEthernet ports that means 100Mbps numbering from Fa0/0 to Fa0/24, but switch and router are connected using GigagitEthernet ports which means 1000 Mbps, numbering Gig0/0 to Gig 0/2 Test and evaluate the networked system Figure 1 Second floor Here we have the design for second floor with the router and server which is connecting our network with externals networks. Figure 2 First floor This picture shows the design of first floor and the green arrows prove that ports are working fine. Figure 3 DHCP address This picture demonstrate that the PCs are using a DHCP address, configurated automatically. Figure 4 Laptop are connected wireless Laptops are connected to a wireless access point which required a password for authentication, as we can see in following picture. The passwords are different on each floor. Figure 5 Wireless password Wireless password for first floor. Figure 6 Laptop is connected to the network Figure 7 Command Prompt Here we can see that servers communicate each other. Figure 8 Command ping on Command Prompt In this picture we can see that server communicate with one of the PC and we cand see that we sent 4 packets and we received all 4 back. But all the network functions are good, every device communicate with each other. Figure 9 Command tracert on Command Prompt We can use another command named traceroute to check the connectivity and this command is giving us the exact path that packet took to get from source to the destination and is showing the list of address that it used. The command ping is just telling us that is no connectivity and is not telling us what the problem is, but traceroute is telling us where is wrong, what router is down or is not working. Figure 10 Command netstat in Command Prompt In Cisco Packet Tracer the usage of netstat command is limited but using the parameter -r we can get details about router, interfaces and active links. Figure 11 Messages are sent successfully Successfully sent messages. Messages are not always sent from the first attempt, sometimes on the second attempt, after the green arrows flash once, the messages are transmitted successfully. Document and analyse test results Using Virtual Machine (VirtualBox), we created a LAN network which include one server and one workshop. Figure 12 Virtual Machine is running The Virtual Machine is running, PC is configured. Figure 13 The Domain was created The Domain of our PC was created with Active Directory. Figure 14 DNS is created DNS created within DNS manager and DNS scope. Figure 15 IP address of PC's DNS IP address of my DNS server Figure 16 Contents of DHCP Figure 17 Start and end IP addresses DHCP Manager, IP address starts with 192.168.0.103 and ends with 192.168.0.199. Figure 18 IP address for the other computer IP address for the other computer which is due to expire on 19th January 2021. Figure 19 First Machine authentication The first Machine ask authentication. Figure 20 Server's IP address IP address from the server. Figure 21 The two machines are connected Macron1 shows that the two machines are connected. This PC is part of the Domain which is successfully connected to the server and it can communicate with the server. Figure 22 Command Prompt Command Prompt Figure 23 Command ping This is a test table to check that both PCs are connected. Figure 24 IIS installed on server This picture is a proof that IIS is installed on the server. Figure 25 Domain Controller This picture is on this PC to show that the Domain Controller is working. Figure 26 DHSP, DNS, IIS are installed This picture shows that DHCP, DNS, IIS are installed on server. Recommend potential enhancements for the networked system. When is creating a network system often our network can start to run slow, we take the blame of the network itself and usually the components are the last thing considered, but there are various ways that can improve network performance. In the past the idea of a network for the people was a work group LAN, it either worked or it did not and most of the times we blame a crashed server or a disconnected co-axial cable. In the present there are more complex enterprises networks with more potential sources of failure or degradation and different traffic types competing for poor resources. There are several ways to improve network performance starting with the need to replace or upgrade the infrastructure, but you also need to understand the network. According to Withers, S., (10th February 2005), “without having an understanding of what's actually happening on your network, you are likely to fail at any attempt to address performance issues”. This means there is not the certain that the network is the problem, but IT loose time to prove is not. It is also recommended to use the backup to reset the system in the event of any loss event data or damage to critical files needed to run operating system (contacting a virus or even accidental deletion of some files), you will quickly restart the OS, however the applications you had installed and the documents personal and this should be done daily or periodically. It is advisable to always update the system to have the latest versions of the programs used, which will guarantee a better and error-free operation and to discover if there is a problem. Online security is a reality of the modern world that must not be ignored, and an antivirus will protect your computer from viruses, phishing attempts, malware, ransomware and computer dangers. An antivirus program has the role of scanning, detecting and removing computer viruses and other harmful programs. Withers, S., (10th February 2005) says, "the first thing to do is make sure the network really is the problem", can be use some tools as for example Compuware's Vantage suite, useful to isolate problems, like this there is the possibility to identify problems (slow client, excessive latency on a WAN link, poor wright SQL on the back end server. To develop an application, we need to use a LAN deployed over a one with the problem about excessive number of data base calls with the consequence of disappointed results. This analysis can reveal a slowly one link, for example. By collecting the right information is possible to identify and to deal with problems before they impact on users. The tendence can be that to add bandwidth to resolve the problems. Withers, S., (10th February 2005) says, "you've got to have facts -- applicationbased facts". Can happened that can be something that improve performance in one environment but could hinder performance in another. There is free chip, expensive tools that single or combined help us understand what is happening and why (Multi Router Traffic Grapher). Network analysers show the aggregate traffic, without information we need, and it is important to understand that the application is strong and then check the infrastructure and its aspects. This kind of monitoring can come with alerting and if the monitor is tuned to avoid false positives the right persons will be alerted in automatic when and unusual event happened, but if we speak about radio frequency to have a good wireless LAN performance, monitor is vital because “the RF environment is not static”, says Withers, S., (10th February 2005). Network can be increase with the implementation of VPN that have as advantage by using it that we can access remote the information for any place, and this increase the productivity. Configuration of VPN server must be use in network system because VPN use powerful encryption protocols made to protect online data while we browse in the web and give the security to internet traffic. If we use firewall the unnecessary network traffic will be filtered, and this will provide security to network system which blocks incoming and outgoing traffic and in the same time firewall block the malicious programs or websites and let pass the true and real programs through network. In conclusion, firewalls are important to protect computers (files, data, programs), from e-mails, websites malicious programs. But as there is no perfect security, a firewall is not enough to secure the network, but it is an important component that helps secure external access. It is important to monitor the traffic, the pattern of the traffic to find if there is a problem. By using server technology in a network, we provide a service to a client, servers have more processing power, memory, storage then the client computer and provide remote accessibility, centralised backup, facility, reliability and security. Servers support numerous applications, multiple user’s access, in a single server we can find a lot of virtual machines and the performance will not be compromised. Is better to use a server to improve network system. If instead of hub we will use router, switch, it will move packet faster than the hub because everything switch and router does are in hardware and sends the data to actual destination and they are more secure than the hub that can be maintain. Switches and routers can be used in LAN, MAN, WAN, but hubs can be used only in LAN and is better to use routers and switches. With the help of Internet Protocol addresses identify a network, allows bigger network to be divided into smaller network, each with its own sets of IP addresses; identify how many computers with unique IP addresses can be in the network. So, by splitting our network into subnets is possible control the flow of traffic using by example route maps enabling to identify threats, close the entry points and target your response easily, improve network performance and speed, reduce network congestion, boost network security, control network growth, easy administration and this provide security to the system. According to worldwideservices.net, “downtime refers to periods when a system cannot complete its primary function”. This mean that can be a hardware failure and to minimise the impact of hardware failure we can make regularly test server backup, check our facilities, monitor our devices, regularly update devices. In this way this can help to increase the network security. Design a maintenance schedule to support the networked system According to networklessons.com, “network maintenance basically means you have to do what it takes in order to keep a network up and running and it includes a number of tasks”. To increase computer network functions, we need a network maintenance plan. In the latest years we have advancements in technology with a range of new software packages gadgets and connections platforms and this need advanced network capabilities, to benefit of these advancements, we need to provide routine support and maintenance to our network. A solid network monitoring and maintenance plan will ensure that all the important aspects of the network are monitored for potential falls in key areas of the network: antivirus system, systems log, hard drives, thus will reduce downtime incidents. By proactive maintenance plan we can increase reliability and will result in satisfaction and security, and customers and clients will find our network reliable, trustworthy to deal with, which is very important in a competitive environment. By using a network maintenance plan, we will save money because when the entire system is down maybe very costly for a business: lose countless business hours, paying a very high one-time service free and fixing a damaged system cost more than a scheduled maintained plan. Another solution is optimised connectivity because data run constantly whenever users access resources in other computers, depends on network layout and number of active computers and the time takes to retrieve data can be different and a good, maintained network ensure an optimised connectivity and clients, customers will easier access data in less time. If we think about security, poorly maintained networks will make networks more vulnerable to viruses and Trojan attack, remote hacking because network is connected to the internet. A good network monitored and maintenance plan will be enhanced security. If in one of the systems in the network will be a data lose, a damage, can be a huge lose and can even lock operations in the entire network, and if we do not have any network solutions repairing the damage is a challenge. By network monitored and maintenance plan we will provide a backup storage that virtually will give us the possibility to restoring and repairing any system in the network. Scheduling regular hardware and software updates is part of a successful network maintenance plan for performance and security defences. Pre-emptive network repairs refer to using auto generating reports before problems turn essential. If small troubles go ignored for long time can be very expensive to fix it, but a network maintenance provider will be able to recognise if there is a simple fix and if not, we will receive suggestions on the most cost-effective solution, for example. According to worldwideservices.net, “an essential part of maintaining your network is making sure that all of your tools are compliant with your company’s policies and legal regulations”. This means that is critical to protect the customers, but we need to have as priority compliance. There are a couple of different approaches for maintaining a network “there are two main philosophies behind maintaining your organization’s network — with only one fitting a true preventative-plan definition”, worldwideservices.net suggested: interrupt driven (network testing on troubleshooting occurs after the detection of the problem); structured system updates and activities are done every day and minimise service disruptions by discover anomalies before they run across the systems. According to SolarWinds, “troubleshooting VM performance issues can be an important step in making sure your VMs run smoothly and efficiently. Common VM problems include VM sprawl, data and memory capacity restrictions, data transmission bottlenecks, and inefficient CPU performance”. Use critical reflection to evaluate own work and justify valid conclusions. We have set up the Active Domain, which is storing information about users and objects, is like a database and is using Lightweight Directory Access Protocol, which is an internet protocol that is used to access an Active Directory and according to extrahop.com, “LDAP stores this data by way of records which contain a set of attributes”. I did configure a Domain Controller (DC) which is a server that responds to authentication requests (authentication, permission verification and so on), which controls each source, I can give the IP address. Virtual machines have the advantage that what runs inside cannot affect the host system, apart from the file size, because the Virtual Machine will share the RAM with the host machine and it is stored in files. The network is configured in the "bridge" system, that means we allocated IP addresses. We can share and store information, we can create shared files. Virtual Machine, by default do not have access to files on other virtual machine or on the host, and if we want to provide that access, we must set up shared folders in our virtual machine app. To help the guest operating system inside the virtual machine and understand what is up, virtual machine presents the shared folders as network files shares, so the guest operating system accesses a folder on our PC like accessing a shared folder on a network. We have even permanent folders that are shared until we remove them. In other words, we can access remote files and for virtual machines the network between host and guest is virtual since they will be on same real machine. The scope of DHCP is set just to shut the IP addresses which are used wireless. When I created my Virtual Machine one of the problems was to connect the two virtual machines for unit 2 and even if I followed the instruction the computers did not ping each other. I tried to turn off Windows firewall (firewall can create a disturb of connection when need to ping the computers). Both networks been set up on VirtualBox to bridged, so ping from server to PC may not work due to server firewall settings, the PC was connected to the Domain. In order to get around the firewall on the PC, I enable “file and printer echo request” on the inbound rules within Windows Defender, like this I allow ping in both directions, providing the PC is on the Domain, both devices are on and the network settings within VirtualBox I set to “bridged adaptor” and this fix the issue. After I fix this problem, the two machines were not running in same time, so I choose to change, to decrease the base memory and its started to run, but its take a few second to load and start. Another problem was when I try to connect the client to the server’s domain, it let me enter the login information in that moment but after I entered, it goes back to saying it cannot find the Domain. I create a user for the client to use when connecting to the domain and I fixed the problem. Bibliography LDAP Protocol: Definition & How It Works | Protocol Support Library | ExtraHop, (Accessed 22nd January 2021) Network Maintenance (networklessons.com), (Accessed 19th January 2021) Virtual Machine (VM) Troubleshooting | SolarWinds, (Accessed 21st January 2021) What Is Network Maintenance? | Network Maintenance Plans & Tips (worldwideservices.net), (Accessed 19th January 2021) What is Network Downtime? | Unplanned & Planned Downtime (worldwideservices.net), (Accessed 19th January 2021) Withers, S., (10th February 2005), 10 ways to improve network performance | ZDNet, (Accessed 18th January 2021)