lOMoARcPSD|15156560
LAN Design Implementation for Syntax Solutions
business (Blue Mountain College)
StuDocu is not sponsored or endorsed by any college or university
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)
INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Programme title
BTEC Higher National Diploma in Computing
Assessor
Internal
Verifier
Unit 02:
Networking
Unit(s)
LAN Design & Implementation for SYNTAX SOLUTIONS
Assignment title
Student’s name
List which assessment
criteria the Assessor has
awarded.
Pass
Merit
Distinction
INTERNAL VERIFIER CHECKLIST
Do the assessment criteria awarded match
those shown in the assignment brief?
Is the Pass/Merit/Distinction grade awarded
justified by the assessor’s comments on the
student work?
Has the work been assessed
accurately?
Y/N
Y/N
Y/N
Is the feedback to the student:
Give details:
• Constructive?
• Linked to relevant assessment
criteria?
• Identifying opportunities for
improved performance?
• Agreeing actions?
Y/N
Y/N
Y/N
Y/N
Does the assessment decision need
amending?
Y/N
Assessor signature
Date
Internal Verifier signature
Date
Programme Leader signature (if
required)
Date
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Confirm action completed
Remedial action taken
Give details:
Assessor signature
Date
Date
Internal
Verifier
signature
Date
Programme Leader
signature (if
required)
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID
Unit Title
Unit 02:
Assignment Number
1
Networking
Assessor
Submission Date
Date
Received 1st
submission
Re-submission Date
Date Received 2nd
submission
Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction
Descripts
P1
P2
M1
2
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
LO2 Explain networking devices and
operations.
Pass, Merit & Distinction
Descripts
P3
P4
M2
D1
M3
D2
LO3 Design efficient networked systems.
Pass, Merit & Distinction
Descripts
P5
P6
LO4 Implement and diagnose networked systems.
Pass, Merit & Distinction
Descripts
Grade:
P7
Assessor Signature:
P8
M4
D3
Date:
Resubmission Feedback:
Grade:
Assessor Signature:
Date:
Internal Verifier’s Comments:
Signature & Date:
*
Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.
Assignment Feedback
3
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Formative Feedback: Assessor to Student
Action Plan
Summative feedback
Feedback: Student to Assessor
Assessor
signature
Date
Student
signature
Date
4
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Pearson Higher Nationals in
Computing
Unit 02: Networking
Assignment 01
General Guidelines
5
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
1. A Cover page or title page – You should
always attach a title page to your
assignment. Use previous page as your cover sheet and make sure all the details are
accurately filled.
2.
Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
Word Processing Rules
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No,
and Page Number on each page. This is useful if individual sheets become detached for any
reason.
5. Use word processing application spell check and grammar check function to help editing
your assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body
except for the before mentioned compulsory information will result in rejection of your
work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness,
you may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
6
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
9. Non-submission of work without valid
reasons will lead to an automatic RE
FERRAL. You will then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation
and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course
7
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present
it as my own without attributing the sources in the correct form. I further understand what it
means to copy another’s work.
1. I know that plagiarism is a punishable offence because it constitutes theft.
2. I understand the plagiarism and copying policy of Pearson UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my
own, and where I have made use of another’s work, I will attribute the source in the correct
way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Pearson, UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.
Student’s Signature:
(Provide E-mail ID)
Date:
(Provide Submission Date)
8
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Higher National Diploma in
Computing
Assignment Brief
Student Name /ID Number
Unit Number and Title
Unit 2: Networking
Academic Year
2021/22
Unit Tutor
Assignment Title
LAN Design & Implementation for SYNTAX SOLUTIONS
Issue Date
Submission Date
IV Name & Date
Submission format
The submission should be in the form of an individual report written in a concise, formal business
style using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using
Harvard referencing system. Please also provide an end list of references using the Harvard
referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures,
although you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:
LO1 Examine networking principles and their protocols.
LO2 Explain networking devices and operations.
LO3 Design efficient networked systems.
LO4 Implement and diagnose networked systems.
Assignment Brief and Guidance:
9
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Introduction
In the context of a communication network in SYNTAX SOLUTIONS, and also the term
topology refers to that way in which the end points, or stations, attached to the network are
interconnected or it is the arrangements of systems in a computer network. SYNTAX
SOLUTIONS has a Head Office (HO) and 02 Branches. Both the HO and the Branch (BR)
is connected to a single Service Provider. The connection between the service provider and
the client is terminated as a Serial Interface. Communication should be happening between
the HO and the BRs.
It can be either physical or logical. The physical topology refers that, a way in which a
network is laid out physically and it will include the devices, installation and location.
Logical topology refers that how a data transfers in a network as opposed to its design in the
organization.
10
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Task 01
1. An overview of the report
The use of technology in business for SYNTAX SOLUTIONS eminent movie company can
be a complex issue that requires a tremendous technical expertise and should be left to
qualified professionals. In some cases, network and computer systems administrators may
advocate the use of multiple operating systems. This is known as virtualization, which has a
number of advantages, such as the ability to conserve energy or consolidate servers. Despite
the advantages of running multiple operating systems, there are some disadvantages as well.
The branch network of SYNTAX SOLUTIONS has grown without proper planning.

Advantages and disadvantages of using different networks system and topologies
The three basic types of networks include LAN, MAN and WAN.
Networking principles, protocols and devices, including benefits and constraints of
networked solutions

Local Area Network
A network is said to be Local Area Network (LAN) if it is confined relatively to a small
area. It is generally limited to a building or a geographical area, expanding not more than a
mile apart to other computers.
Figure 1
http://www.computer-networking-success.com/images/computer-lan-network.jpg
11
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560

Metropolitan Area Network
Metropolitan Area Network (MAN) covers larger geographic areas, such as cities. Often
used by local libraries and government agencies often to connect to citizens and private
industries
Figure 2 :
https://www.perle.com/images/man.jpg

Wide Area Network
Wide Area Networks (WANs) connect larger geographic areas .In this type of network
dedicated transoceanic cabling or satellite uplinks may be used.
Figure 3
http://netprivateer.com/images/lanwan.gif
12
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Advantages

Speed
Sharing and transferring files within Networks are very rapid. Thus saving time, while
maintaining the integrity of the file

Cost
Individually licensed copies of many popular software programs can be costly.
Networkable versions are available at considerable savings. Shared programs, on a network
allows for easier upgrading of the program on one single file server, instead of upgrading
individual workstations.

Security
Sensitive files and programs on a network are passwords protected (established for specific
directories to restrict access to authorized users) or designated as "copy inhibit," so that you
do not have to worry about illegal copying of programs.

Centralized Software Management
Software can be loaded on one computer (the file server) eliminating that need to spend
time and energy installing updates and tracking files on independent computers throughout
the building.

Resource Sharing
Resources such as, printers, fax machines and modems can be shared.
Disadvantages
 Server faults stop applications being available
 Network faults can cause loss of data
 Network fault could lead to loss of resources
 User work dependent upon network
 System open to hackers
Cost
While it can be cost-effective to have multiple operating systems in the long run, in the
short-term it can be cost-prohibitive to establish a system based on more than one operating
system.
13
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Compatibility
Compatibility is another potential issue that you are likely to run into when attempting to set
up multiple operating systems. In some cases, the drivers you may need may not be
available.
Software and Support
Another potential issue that is closely related to the compatibility issue is that of the
potential difficulty in supporting and maintaining a system with multiple operating systems.
The complexity of configuring support software can make it difficult for system
administrators to integrate multiple operating systems.
Opinions
Outside of the technical difficulties of having multiple operating systems, another potential
downfall of more than one operating system is sometimes seen in the attempt to have
interagency cooperation.
The impact of network topology, communication and bandwidth requirements,
effectiveness of networking systems
Network systems types and topologies available
In the network type there are three types of computer networks are local area
networks, metropolitan area networks and wide area networks.
The type of network topologies
1. Local area network.
2. Wide area network.
3. Metropolitan network.
Local area network Topologies
The local area network (LAN) is a computer network use in a small geographical area such as
a home, school, computer laboratory, office building or group of buildings. The (LAN) is
14
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
composed of inter-connected workstations
and personal computers which are each capable of accessing and
sharing data and devices, such as printers, scanners and data storage devices, anywhere on the
(LAN).
Wide area network Topologies
The wide area network (WAN) is a network that exists over a large-scale geographical area.
A WAN connects different smaller networks, including local area networks (LAN) and
metro area networks (MAN). This ensures that computers and users in one location can
communicate with computers and users in other locations.
15
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Metropolitan network Topologies
The metropolitan area network (MAN) is similar to a local area network (LAN) but spans
an entire city or SYNTAX SOLUTIONS. The metropolitan area network (MAN) are
formed by connecting multiple local area network (LAN). The metropolitan area network
(MAN) are larger than local area network (LAN) but smaller than wide area networks
(WAN). The working mechanism of a metropolitan area network (MAN) is similar to an
Internet Service Provider (ISP), but a metropolitan area network (MAN) is not owned by a
single organization.
16
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
The distributed Queue Dual Bus (DQDB) is the MAN standard specified by the Institute of
Electrical and Electronics Engineers (IEEE) as IEEE 802.6. Using this standard, a
etropolitan area network (MAN) extends up to 30-40 km, or 20-25 miles.
Types of topologies and suggest a suitable network topology
The Communication networks, a topology is a usually description of the arrangement of a
network, including its nodes and connecting lines. There are two ways of defining network
the physical topology and the logical or signal topology. The physical topology of a network
17
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
is
the
actual
geometric
layout
of
workstations. There are several common physical topologies, as
described below and as shown in the illustration
Types of Physical Network Topologies

Bus Topology.

Star Topology.

Ring Topology.

Mesh Topology.

Tree Topology.

Hybrid Topology.
Bus Topology
The Bus topology is a specific kind of network topology in which all of the various devices
in the network are connected to a single cable or line. The Bus Topology general the term
refers to how various devices are set up in a network.
Advantages of Bus Topology
1. Bus topology costs very less.
2. It is easy to set-up and extend bus network.
3. Cable length required for this topology is the least compared to other networks.
4. Linear Bus network is mostly used in small networks. Good for LAN.
Disadvantages of Bus Topology
1. Proper termination is required to dump signals. Use of terminators is must.
2. Maintenance costs can get higher with time.
18
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
3.
It is not suitable for networks with
heavy traffic.
4. It is difficult to detect and troubleshoot fault at individual station.
Star Topology
The Star topology is a network topology where each individual piece of a network is
attached to a central node called a hub or switch. The attachment of these network pieces to
the central component is visually represented in a form similar to a star. It’s called as a star
topology.
The Star topologies are active or passive networks, depending on the following:

If the central node performs processes, such as data amplification or regeneration

If the network actively controls data transit

If the network requires electrical power sources.
The Star topologies also may be implemented with Ethernet/cabled structures, wireless
routers and/or other components. In many cases, the central hub is the server, and the
additional nodes are clients.
Advantages of Star Topology
1. Centralized management. It helps in monitoring the network
19
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
2. Easy to connect new nodes or
devices. In star topology new nodes can be added easily without
affecting rest of the network. Similarly components can also be removed easily
3. Failure of one node or link doesn’t affect the rest of network. At the same time it’s
easy to detect the failure and troubleshoot it.
Disadvantages of star Topology
1. The use of hub, a router or a switch as central device increases the overall cost of the
network.
2. Performance and as well number of nodes which can be added in such topology is
depended on capacity of central device.
3. Too much dependency on central device has its own drawbacks. If it fails whole
network goes down.
Ring Topology
The Ring topology refers to a specific kind of network setup in which devices are connected
in a ring and pass information to from each other according to their adjacent proximity in
the ring structure. This type of topology is highly efficient and handles heavier loads better
than bus topology.
A ring topology may also be called an active topology because messages are passed to each
device in the ring.
Advantages of Ring Topology

Each computer has equal access to resources.

There is no need for network server to control the connectivity between workstations.
20
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560

Additional components do not affect
the performance of network.

Even when the load on the network increases, its performance is better than that
of Bus topology.
Disadvantages of Ring Topology

Network is highly dependent on the wire which connects different components.

If one workstation or port goes down, the entire network gets affected.

MAU’s and network cards are expensive as compared to Ethernet cards and hubs.
Mesh Topology
The Mesh networking is a type of network topology in which a device (node) transmits its
own data as well as serves as a relay for other nodes. Routers are used to provide the best
and most efficient data path for effective communication. In the event of a hardware failure,
many routes are available to continue the network communication process.
Advantages of Mesh Topology

Expansion and modification in topology can be done without disrupting other nodes.

Data can be transmitted from different devices simultaneously. This topology can
withstand high traffic.

Even if one of the components fails there is always an alternative present. So data
transfer doesn’t get affected.
Disadvantages of Mesh Topology

Set-up and maintenance of this topology is very difficult. Even administration of the
network is tough.
21
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560

There
are
high
chances
of
redundancy in many of the network connections.

Overall cost of this network is way too high as compared to other network topologies.
Tree Topology
The tree topology is a type of network topology that includes at least three specific levels in
a topology hierarchy. Tree topologies are valued for their scalability and accessibility for
troubleshooting.
Advantages of Tree Topology

If one segment is damaged, other segments are not affected.

Error detection and correction is easy.

Each segment is provided with dedicated point-to-point wiring to the central hub.

Expansion of Network is possible and easy.

Here, we divide the whole network into segments (star networks), which can be easily
managed and maintained.
Disadvantages of Tree Topology

As more and more nodes and segments are added, the maintenance becomes difficult.

Scalability of the network depends on the type of cable used.

Because of its basic structure, tree topology, relies heavily on the main bus cable, if it
breaks whole network is crippled.
22
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Hybrid Topology
Before starting about Hybrid topology we saw that a network topology is a connection of
links and nodes communicating with each other for transfer of data. We also saw advantages
and disadvantages of Star, Bus, Ring, Mesh and Tree topologies. Let’s discuss what Hybrid
Network topology is and why it finds its application in Wide Area Networks. The Hybrid, as
the name suggests, is mixture of two different things.
Advantages of Hybrid Topology

Scalable: It’s easy to increase the size of network by adding new components, without
disturbing existing architecture.

Reliable: To other networks, fault detection and troubleshooting is easy in this type of
topology the part in which fault is detected can be isolated from the rest of network
and required corrective measures can be taken without affecting the functioning of
rest of the network.
Disadvantages of Hybrid Topology

Costly Hub: The hubs used to connect two distinct networks, are very expensive.
These hubs are different from usual hubs as they need to be intelligent enough to
work with different architectures and should be function even if a part of network is
down.
23
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Topologies and suggest a suitable network topology for Flexi Lease Finance
If we see the all the topologies there are some advantages and disadvantages but some
topologies have some good features if we see that features there is less down time
topologies in above mention topologies but we should select the most suitable topologies
from above mention topologies to this network if we see this there is so many nodes
connected with this network
24
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
The impact of current network technology, communication and standards
Client / server model has become one of the central ideas of network computing. The
majority of business applications written today use the client / server model. Similarly, the
main program of the Internet, TCP / IP. In marketing, the term has been used to distinguish
distributed computing by smaller dispersed computers from the computer monolith of
centralized mainframe computers.
Client / Server and Multi-tier Design between countries
Client / server system is not only for the database. Client / server design has a real and direct
benefit to software developers, without the size of your system. The objective of this paper
is to reveal the client / server to check the design considerations and technology, building
your own client / server systems.
Figure 4
http://www.csee.umbc.edu/portal/help/oracle8/server.815/a67781/c29dsta1.gif
Proposed Server Hosting in SYNTAX SOLUTIONS
About the Network
The branch network of SYNTAX SOLUTIONS has grown without proper planning. The
LAN cabling in both offices is Cat5e Ethernet. The office complex provides an Ethernet link
25
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
between the two buildings. The current
network is a flat network design with minimal redundancy. Few
project managers with laptops and the guests at Building B use a small wireless LAN
occasionally
a) Building A - general office and managers, including reception, accounts, and
administration. It consists of 12 PCs and 02 printers.
b) Building B - production suites and provides networking for the media development and
storage. It consists of 09 high-performance workstations, 05 office PCs, and 02 printers.
The Management expects to enhance the network based on following major criteria:
a) Separate the network into VLANs.
b) Data traffic expected to increase by 80%
c) Possibly consider connecting directly to the VividZone network; must be a fast and
reliable connection
d) High network availability with redundant links and technology
e) Wireless network access at Building B
f) QoS to support video applications
g) High network reliability with network monitoring and security
26
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
The operating principles of networking devices and server types and networking
software
The ability to provide flexible connectivity options while keeping closed user groups
(groups of users and resources isolated from non-group members) is vital in today's
SYNTAX SOLUTIONS networks. Network virtualization-giving multiple groups access to
the same physical network while keeping them logically separate to a degree that they have
no visibility into other groups-is a requirement that has challenged network managers with
in these proposed network design. Initially, virtual LANs (VLANs) and the Spanning Tree
Protocol offered a mechanism to divide the LAN into virtual networks to address the need
for separate workgroups within a common network.
Compelling Factors
Many factors promote the requirement to create closed user groups. The following are just a
few examples:
Varying levels of access privileges within an enterprise
Almost every enterprise needs solutions for granting different levels of access to customers,
vendors, and partners as well as employees on the SYNTAX SOLUTIONS LAN. A visiting
vendor, for instance, needs only to connect to the Internet while on SYNTAX SOLUTIONS,
and the organization needs to help ensure that the vendor cannot gain access to corporate
resources.
Regulatory compliance
Some businesses are required by laws or rules to separate segments of a larger organization.
For example, in a financial company, banking needs to remain separate from trading. Office
buildings commonly require the separation of different departments, such as human
resources and customer service in a corporate setting, or a police department and a fire
department in a municipal office building.
Network consolidation
In mergers and acquisitions, there is often a need to integrate the acquired company's
network expeditiously.
Outsourcing
27
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
As outsourcing and offshoring proliferate,
subcontractors must demonstrate absolute isolation of information
between clients. This is especially critical when a contractor services competing companies.
The architecture of an end-to-end network virtualization solution targeted to satisfy the
requirements listed above can be separated in the following three logical functional areas:

Access control

Path isolation

Services edge
Each area performs several functions and must interface with the other functional areas to
provide the end-to-end solution.
Connectivity Requirements
The use of static ACLs at the edge of the network is the quickest way to provide traffic
isolation, controlling and restricting communications between the various user groups. Most
customers are comfortable with the use of ACLs to enforce security policies.
At the same time, using ACLs is recommended only in very specific scenarios where the
network connectivity requirements are hub-and-spoke (multi-to-one).The main limitation of
the ACL approach is the lack of scalability. The complexity of each distributed ACL is
directly related to two main factors:

The number of user groups that need to be supported

Connectivity requirements between user groups
Introduction to Networking components
This section of the policy contains an itemized list of the network services that are permitted
for use within the organizations network. The role of a firewall and every security tools
involved in controlling and monitoring this policy will be made clear to users and
administrators, so that there is no gap between policy and practice.
Task 02
Implement a networked system
28
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Figure 5
Provide the IP address allocation table for the redesigned network.
Administration Department (Vlan 20) and Accounts department (Vlan 30) network
Permit in ACL
permit ip 192.168.10.0 0.0.0.255 192.168.50.0 0.0.0.255
permit ip 192.168.50.0 0.0.0.255 192.168.10.0 0.0.0.255
Account Department (VLAN 30) and Administration Department (Vlan 20) network
permit in ACL
permit ip 192.168.10.0 0.0.0.255 192.168.60.0 0.0.0.255
permit ip 192.168.60.0 0.0.0.255 192.168.10.0 0.0.0.255
Reception Department (VLAN 60) and Accounts department (Vlan 30) network
permit in ACL
permit ip 192.168.50.0 0.0.0.255 192.168.60.0 0.0.0.255
permit ip 192.168.60.0 0.0.0.255 192.168.50.0 0.0.0.255
Media Development Department (Vlan 50) and Reception (VLAN 40) network permit
in ACL
permit ip 192.168.10.0 0.0.0.255 192.168.70.0 0.0.0.255
permit ip 192.168.70.0 0.0.0.255 192.168.10.0 0.0.0.255
29
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Figure 6
access-list 120 permit icmp any 192.168.60.0 0.0.0.255 echo-reply
access-list 120 permit icmp any 192.168.70.0 0.0.0.255 echo-reply
this Sales and marketing department VlAN 20 is not permitted to access information in
other departments
30
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Figure 7
Install & configure network services and applications of your choice
Configuring QoS and DSCP marking
You can use the Network Services Table page to enable Quality of Service (QoS) features
such as Differentiated Service Code Point (DSCP) marking for the traffic in your network.
For detailed information about QoS, see the SteelHead Management Console User’s Guide.
Configuring flow export collectors
Flow export collectors (such as NetFlow and SteelFlow) provide the ability to collect IP
network traffic as traffic enters or exits an interface. By analyzing the data provided by a
flow export collector, a network administrator can determine things such as the source and
destination of traffic, class of service, and the causes of congestion.
Installing and configuring the TCP/IP protocol
To configure TCP/IP, you must be logged on as a member of the Administrators group on
the local computer.
Complete the following steps to install and configure the TCP/IP protocol.
31
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560


Open the Network utility
Right-click the connection to which you want to add a network
component, and then click Properties

If Internet Protocol (TCP/IP) is listed, skip to Step 6. If Internet Protocol (TCP/IP) is
not listed, click Install.

In the Select Network Component Type dialog box, click Protocol, and then click
Add

From the Network Protocol list, select TCP/IP Protocol and click OK

From the General tab (for local area connections) or the Networking tab (for all
other connections), select Internet

Protocol (TCP/IP), and then click Properties

Configure TCP/IP either automatically or manually

WarningContact your network administrator to find out if there is a DHCP server
installed on your network

Automatically – You can automatically configure TCP/IP services if you have a
DHCP server on your network. This automatic process ensures easy and accurate
installation of TCP/IP because your local computer is configured with the correct IP
address, subnet mask, and default gateway

To configure automatically, select Obtain an IP address automatically, and then click
OK

Manually – You must configure TCP/IP manually if you do not have a DHCP server
on your network, or if you are configuring a Windows server to be a DHCP server.

To configure manually, select Use the following IP address, specify the necessary
parameters, and then click OK. See your Microsoft Help for more information
Conduct a test and evaluate the design to meet the requirements and analyses user
feedback
The network traffic capacity of the organization
Different types of network traffic used by different departments/office in the company
32
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Heavy/
Heavy/
Heavy/
Heavy/
Light
Light
Light
Light
Fina
Heavy/
Heavy/
nce
Acc
Light
Heavy/
Light
Heavy/
Heavy/
Heavy/
Heavy/
Heavy/
ount Light
Adm Heavy/
Light
Heavy/
Light
Heavy/
Light
Heavy/
Light
Heavy/
Light
Heavy/
in
IT
Light
Heavy/
Light
Heavy/
Light
Heavy/
Light
Heavy/
Light
Heavy/
Light
Heavy/
Fron
Light
Heavy/
Light
Heavy/
Light
Heavy/
Light
Heavy/
Light
Heavy/
Light
Heavy/
t
Light
Light
Light
Light
Light
Light
offic
e
Table 1: Types of Network Traffic
Workload Mixes
Below three charts are containing the different workload mixes types with different time
phase and traffic levels.
Workload Mixes 1
Applications
Data Base Server
Email application
File Transfer
File Print server
Telnet protocol
Video
8.30a.m to 11.30p.m
Finance
Heavy
Light
Heavy
Heavy
Light
Light
Marketing
Light
Light
Heavy
Heavy
Light
Light
HR
Heavy
Light
Light
Heavy
Heavy
Heavy
IT
Heavy
Light
Light
Heavy
Light
Light
Legal
Heavy
Heavy
Heavy
Heavy
Light
Light
Heavy
Light
Light
Heavy
Heavy
Conferencing
service
Website
application
Table 2 : Workload Mixes 1
Workload Mixes 2
Applications
Data Base Server
Email
12.30p.m to 3.30p.m
Finance
Heavy
Heavy
Marketing
Light
Light
HR
Light
Heavy
IT
Heavy
Light
Legal
Light
Light
application
33
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Light
Heavy
Light
Heavy
Light
Heavy
Light
Heavy
Light
Light
Light
Light
Light
Light
Light
Heavy
File
Light
Transfer
File Print
Telnet
Video
Heavy
Light
Heavy
Heavy
Heavy
Light
Con.
Web
Heavy
Heavy
Table 3 : Workload Mixes 1
Suggest a maintenance schedule to support the networked system
To manage LAN infrastructures
Monitor and troubleshoot a LAN
The company Network management is the top-level maintenance and administration of
network systems. It is a service that helps network administrators to monitor and maintain
network with the help of tools, applications and devices.
Functions of network management is security, monitoring, control, allocation, deployment,
coordination and planning are executed and it is governed by large number of protocols.
Network management protocol
The network management protocol is a policy between the managing center and the
managing devices.
The Configuration Management
The objective of configuration management is to monitor daily operations of the network
and system configuration information so that the effects on network operation of various
versions of hardware and software elements can be tracked and controlled. Each and every
network device has variety of version information associated. It stores information in a
database for easy access. When a problem occurs, this database can be searched for clues
that may help solve the problem.
Application Layer
At a layer communication nodes are identified, service quality is identified and user
authentication and privacy are considered. Also it represents the interface linking both
networks, using the protocols HTTP, SMTP, or FTP.
Presentation Layer
34
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
It is also called as syntax layer; it converts
incoming and outgoing data to make a general interface to the
Application layer .It decodes, encodes and compresses data for the upper layer.
Session Layer
Session Layer includes the sessions between computers. This layer sets up, maintains and
terminates conversations, dialogs and exchanges between the applications at each ends.
Transport Layer
Transport Layer manages end-to-end control and error-checking. Also provides data flow
between computers in the network; it relieves the upper layers of the concern of getting and
sending the data. The data is cut in segments to achieve a steady flow no matter of the
differences in connection bandwidth between hosts. It ensures complete data transfer.
Network Layer
The Network Layer makes it possible to transport the data between networks. This layer
handles the routing of the data; network header is placed in front of the segment, telling the
sender's IP address and the destination IP address. Monitoring and Troubleshooting in LMS
allows you to monitor the health and performance of network devices, notifies the list of
active problems on the network and the changes occurring on the network, and helps you to
identify the problems from a single place.
Monitor dashboards
Provides Monitoring, Energy Wise and Identity dashboards to monitor the status and the
performance of network
Monitoring tools
Provides tools such as Fault Monitor, Event Monitor, Mini RMON and Topology Services
to view the information on network faults, events, links and ports in the network and
perform remote monitoring functions.
Diagnostic tools
Provides framework such as Embedded Event Manager (EEM) and Generic Online
Diagnostics (GOLD) for diagnostic operations across Cisco platforms running Cisco IOS
Software.
35
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Troubleshooting tools
Provides troubleshooting workflows, Netshow and VRF-lite to
troubleshoot the network connectivity, diagnose device problems, identify endhost
problems, and verify end-to-end connectivity of VRF configured devices.
Fault Settings
Helps you to set up the fault polling parameters, fault threshold settings, SNMP traps
forwarding and receiving, and allows you to view the fault device details.
Performance Settings
Helps you to manage pullers and templates, enable Auto monitoring functionality, and
manage IPSLA collectors and devices.
Threshold Settings
Helps you to manage Trend watch, set up fault and performance threshold settings
36
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Task 03
Wired Connection Design
First Design
After came to thought shape the assistance on instructional exercises.
1. Develop the announcement of prerequisites
2. Investigate options
3. Network structure
4. Select hardware and sellers
5. Prepare for usage
6. Implementation
7. Cut over
Wireless Connection Design
First Design:
37
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
On this structure, it has two access point to associate more users on the WLAN. The reason
I thought of two access point is Wireless association issues in some cases even at my home I
discover hard to interface remote it on the SYNTAX SOLUTIONS that everybody
associated remote, we get flag issues. After finishing our examine on various networks we
decided to implement a small network that should perform well. I won’t make the network
very big because when the network is big if a small error comes we should examine the
whole system to find the error and also this will cost a big amount. So we have decided to
implement a small network that can perform a big task with a less cost.
While topology implies the physical arrangement of the framework, designing insinuates the
wide structure of the standards PCs must pursue with the ultimate objective to give. The
specific strategies that must be sought after are called traditions; in this sense structures are
aggregations of traditions and may consolidate distinctive measures or subtle elements for
hardware and programming accessibility.
38
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Plans can be assigned either united or decentralized. The past is significant when various
customers require a comparable information; less help is required to revive the framework.
In any case, dispersed dealing with through decentralized frameworks is transforming into
the standard as it empowers work to be spread out, abusing the limits of the inescapable and
dynamically noteworthy PC.
The WLAN will address the issues of data focuses. The fourth is the development wiring
necessities. The WLAN permits smooth correspondence between different structures in
SYNTAX SOLUTIONS. The remote systems can inclusion the signs to the spots where
there are hard to game plan of wires. I will plan WLAN for five unique structures and one
outside zone. The structures incorporate the fundamental building, complex building,
lecture room, main building and the laboratory building, as appeared in Figure.
The plan of the SYNTAX SOLUTIONS
There are six floors in the main building, consisting of classrooms and offices. And, there
are eleven floors in the complex building, consisting of the library and activity class
rooms. What’s more, there are six floors in the dormitory, two floors in the main building
and eight floors in the laboratory building.
WLAN Topology
In this analysis I planned a basic topology for the WLAN, as shown in Figure.
39
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Figure. WLAN topology
In this figure, the core of the SYNTAX SOLUTIONS network is the system focus. The
switch is associated with the outer system and firewall. There are various types of servers
interface with the switch. I utilized one center change associated with the wired system and
the remote controller associated with the center switch. At that point I have a few PoE
changes associated with the center switch and passageway interface with the PoE switches.
PoE refers to Power over Ethernet and it is a technology that lets network cables carry
electrical power. It implies that just a single link is sufficient for the PoE change to give
system and power association in the meantime. At that point the APs will spread out the
remote flags with the goal that every one of the customers in the inclusion territory can get
to the WLAN.
40
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Channel Management
I prefer to use channels in the theory part t and
here I will expound which channel I will use for each working by utilizing the Hive
Manager NG instrument. What's more, I will likewise clarify why I select that channel.
Here I arranged channels for each building. For the fundamental building, each floor
utilizes 4 APs and all the APs deal with the 2.4GHz transfer speed, so I utilized the
channels 1, 6 and 11. As appeared in the below Figure, channels won't cover one another.
Additionally, I utilized diverse stages to manage the APs for each floor. It implies that I
utilized diverse channels for similar areas of the neighboring floors. I will likewise utilize
this technique for different structures.
Channel management for the main building
For the laboratory building, each floor uses 2 APs and all the APs work on the
2.4GHz bandwidth, so I selected channel 1 and channel 6. As shown in Figure, red
and green colors show that the channels will not overlapping each other.
41
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Channel Management for Laboratory Building
For the main building, one AP is required for each floor and I used different
channels in different floors. I used channel 1 for the first floor, as shown in Figure
16 and I use channel 6 for the second floor. So the channels will not overlapping
each other.
42
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Channel Management for SYNTAX SOLUTIONS
For the dormitory building, each floor uses 2 APs and all the APs work on the
2.4GHz bandwidth, so I decided to use channel 1 and channel 6. As shown in
Figure, red and green colors show that the channels will not overlap each other.
Channel Management for Dormitory
43
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
For the complex building, each floor uses 3 APs and all the APs work on 2.4GHz
bandwidth, so I decide to use channel 1, channel 6 and channel 11. As shown in
Figure 18, different colors clear reality that the channels will not overlapping each
other.
Channel Management for Complex Building
If there are channels that overlap each other, it will cause interference between
signals. Then there is slower throughput and packet loss at the same time. That’s
the reason why channel management is needed here.
Access point Management
In this part I will introduce how many APs are used for each building and where I
decided to place them. The 2.4GHz frequency is used for each APs, because there
are many walls or other objects in each building and I need better cover- age of the
WLAN.
What’s more, in the SYNTAX SOLUTIONS environment, I don't need to care
44
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
about some 2.4GHz household appliances interference the network. Floor planner
and HiveManager NG are used in this chapter for AP management.
For the main building, the main coverages of the networks are classrooms. In this
case, I used ceiling APs and planned 4 APs for each floor, as shown in Figure 19.
The model of the AP is TL-AP1750C-PoE from TP Link Company. It’s easy for
IT managers to manage the APs, if all the APs are of the same model. So, I used the
same model for all indoor places. This model of AP has a built-in directional
antenna and it can improve the signal quality of the coverage area, especially where
there is a need for penetration. Each AP can support 80 clients’ access in the
network at the same time. I decided to install the APs on the ceiling of the corridor,
near the window or the door of the classrooms.
AP Management for the Main Building
The building has three floors. I used 2 APs for each floor, as shown in Figure 20.
The model of the AP is TL-AP1750C-PoE. The main coverage areas are each
laboratory and corridors. I decided to install the APs on the ceiling of the corridor,
close to the laboratory. Some specific needs have to be determined according to the
network cabling situation.
45
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Routing Protocol
In this network design we used 3560 multilayer core switch for all
configuration and security implementation parts. It is a Layer 2 switch but it
does support basic static routing/default routing on SVI interfaces only but
we have to enable the IP Routing on the Switch. When enable ip routing ip
default-gateway command is ignored as this works only with L2 devices and
you need to have a default route (which points to core switch) to have ip
reach ability to 3560 switch. Since there is no difference in IP address, this is
appropriate for applications which use Voice over Internet Protocol
(VOIP),gaming applications, and Virtual Private Network(VPN)
Test Plan for SYNTAX SOLUTIONS Local Area Network solution
Introduction
This test plan for the WLAN solution builds for SYNTAX SOLUTIONS
network system. This solution is support for the IT department can control
46
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
the network users and unauthorized access. It can safe all network system
and data in the company. This document is the test plan for the SYNTAX
SOLUTIONS network system.
Objectives






To check the users computers
To check internal devices installed in LAN
Cable type and interface test
Verification command
Security feature test
to check network errors
Approach
General Test Strategy
Each hardware component and tested while making it. This test executes in
front of Network administrator. Used as some of the network monitoring
tools. The testing process has more manual process then automatic testing
done by Cisco Packet tracer. First we are going to evaluate the network
system. Most of this part done by Network administrator while configuring
each network component. After the configured of all components, the final
network system output will create and test the all network system.
Item pass/fail criteria
Pass criteria

Each of every devices check errors

Overall network system should work properly
Fail criteria

if any hardware failure

power problem
Suspension and resumption
If any error’s found while testing a component, the testing process for that
47
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
particular component resumes. It will check back again after resolved it.
While this happening, the test process going on.
Testing material





Power with A/C temperate
Multilayer switch
Manageable switches
Ethernet cables
All computers and servers
Software Material



Operating system(windows OS, Mac OS , Linux)
Network monitoring tool
Cisco Packet tracer 6
Test include
Derived from non-functional requirement

Free Ethernet ports
Derived from functional requirement
VLAN Test Plan Responsibilities
 Network administrator is the responsible who need to manage the
testing project. He need to choose relevant personal for testers.
Also his responsibility is to assign works to each testers. It’s also
his responsibility to submit the work on time and on budget
 All network system and components testers are the skilled
personals who really test the system. it’s their responsibility to
administrator the time and effort and do their work
48
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Risk
The only risk is testers don’t know anything about the network system. So
there might be some huge problem in the network. So it may take couple
of days to indicating in the project plan to complete.
Test Cases
Test case 01: Show VTP status of FAIR domain in a multilayer core switch
System Name : SYNTAX SOLUTIONS Local Area Network
Test Case
Test Designed By:
Test Case ID: Test Case 01
Test Priority: (Low/Medium/High) : High
Test Designed Date: 14th June 2021
Test Case Name: Show VTP details
Test Executed By:
Test Type: packet tracer simulator
Test Executed Date: 14th June 2021
Description: show multilayer switch VTP
detail show in the CLI
Executed Time: 10.00 a.m. – 10.08 a.m.
Conclusion : Success
Test Venue: Home
Step
1
Test Steps
Show
command
Test Data
Show vtp status
Expected
Result
CORE
switch vtp
details
Actual
Result
Status
(Pass/Fail)
VTP
information
Pass
Notes
Table – test case of show VTP information
49
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Figure VTP status of the CORE switch
Test case 02: Show VTP status of FAIR domain client in a admin switch
System Name : SYNTAX SOLUTIONS Local Area Network
Test Case
Test Designed By:
Test Case ID: Test Case 02
Test Priority: (Low/Medium/High) : High
Test Designed Date: 14th June 2021
Test Case Name: Show VTP details
Test Executed By:
Test Type: packet tracer simulator
Test Executed Date: 14th June 2021
Description: show admin department switch
VTP detail show in the CLI
Executed Time: 10.20 a.m. – 10.25 a.m.
Conclusion : Success
Test Venue: Home
Step
1
Test Steps
Show
command
Test Data
Show vtp status
Expected
Result
ADMIN
switch vtp
details
Actual
Result
Status
(Pass/Fail)
VTP
information
Pass
Notes
Table– test case of show VTP information
50
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Figure VTP status of the Admin Dept. switch
Test case 03: Show VTP status of FAIR domain client in a HR switch
System Name : SYNTAX SOLUTIONS Local Area Network
Test Case
Test Designed By: Dinesh Prasanga
Test Case ID: Test Case 03
Test Priority: (Low/Medium/High) : High
Test Designed Date: 14th June 2021
Test Case Name: Show VTP details
Test Executed By:
Test Type: packet tracer simulator
Test Executed Date: 14th June 2021
Description: show HR department switch
VTP detail show in the CLI
Executed Time: 12.50 p.m. – 13.10 p.m.
Conclusion : Success
Test Venue: Home
Step
1
Test Steps
Show
command
Test Data
Show vtp status
Expected
Result
HR switch
vtp details
Actual
Result
Status
(Pass/Fail)
VTP
information
Pass
Notes
Table– test case of show VTP information HR
51
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Test case 04: Show VTP status of FAIR domain client in a Accounts switch
System Name : SYNTAX SOLUTIONS Local Area Network
Test Case
Test Designed By:
Test Case ID: Test Case 04
Test Priority: (Low/Medium/High) : High
Test Designed Date: 14th June 2021
Test Case Name: Show VTP details
Test Executed By:
Test Type: packet tracer simulator
Test Executed Date: 14th June 2021
Description: show accounts department
switch VTP detail show in the CLI
Executed Time: 03.10 p.m. – 03.30 p.m.
Conclusion : Success
Test Venue: Home
Step
1
Test Steps
Show
command
Test Data
Show vtp status
Expected
Result
Accounts
switch vtp
details
Actual
Result
Status
(Pass/Fail)
VTP
information
Pass
Notes
Table – test case of show VTP information ACC
Figure VTP status of the Accounts Dept. switch
52
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Test case 05: Show VTP status of FAIR domain client in a campus switch
System Name : SYNTAX SOLUTIONS Local Area Network
Test Case
Test Designed By:
Test Case ID: Test Case 05
Test Priority: (Low/Medium/High) : High
Test Designed Date: 14th June 2021
Test Case Name: Show VTP details
Test Executed By:
Test Type: packet tracer simulator
Test Executed Date: 14th June 2021
Description: show MKT department switch
VTP detail show in the CLI
Executed Time: 03.50 p.m. – 04.10 p.m.
Conclusion : Success
Test Venue: Home
Step
1
Test Steps
Show
command
Test Data
Show vtp status
Expected
Result
Campus
switch vtp
details
Actual
Result
Status
(Pass/Fail)
VTP
information
Pass
Notes
Table – test case of show VTP information Marketing
Figure VTP status of the Campus Dept. switch
53
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Test case 06: Show VTP status of FAIR domain client in a IT switch
System Name : SYNTAX SOLUTIONS Local Area Network
Test Case
Test Designed By:
Test Case ID: Test Case 06
Test Priority: (Low/Medium/High) : High
Test Designed Date: 18th June 2021
Test Case Name: Show VTP details
Test Executed By:
Test Type: packet tracer simulator
Test Executed Date: 18th June 2021
Description: show IT department switch VTP
detail show in the CLI
Executed Time: 09.50 a.m. – 10.10 a.m.
Conclusion : Success
Test Venue: Home
Step
1
Test Steps
Show
command
Test Data
Show vtp status
Expected
Result
IT switch
vtp details
Actual
Result
Status
(Pass/Fail)
VTP
information
Pass
Notes
Table– test case of show VTP information IT
54
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Test case 07: Show VTP status of FAIR domain client in a Manager switch
System Name : SYNTAX SOLUTIONS Local Area Network
Test Case
Test Designed By:
Test Case ID: Test Case 07
Test Priority: (Low/Medium/High) : High
Test Designed Date: 18th June 2021
Test Case Name: Show VTP details
Test Executed By:
Test Type: packet tracer simulator
Test Executed Date: 18th June 2021
Description: show managers division switch
VTP detail show in the CLI
Executed Time: 11.5 a.m. – 12.30 p.m.
Conclusion : Success
Test Venue: Home
Step
1
Test Steps
Show
command
Test Data
Show vtp status
Expected
Result
Manager
switch vtp
details
Actual
Result
Status
(Pass/Fail)
VTP
information
Pass
Notes
Table 8.7 – test case of show VTP information Manager
Figure VTP status of the manager switch
55
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Test case 08: Show VLAN details in multilayer core switch
System Name : SYNTAX SOLUTIONS Local Area Network
Test Case
Test Designed By
Test Case ID: Test Case 08
Test Priority: (Low/Medium/High) : High
Test Designed Date: 18th June 2021
Test Case Name: Show VLAN details
Test Executed By:
Test Type: packet tracer simulator
Test Executed Date: 18th June 2021
Description: show VLAN detail in the CLI
Executed Time: 08.30 p.m. – 08.40 p.m.
Conclusion : Success
Test Venue: Home
Step
1
Test Steps
Show
command
Test Data
Show VLAN
Expected
Result
core switch
vlan details
Actual
Result
Status
(Pass/Fail)
VLAN
information
Pass
Notes
Table – test case of show VLAN information in core switch
56
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Test case 09: Show VLAN details in Admin switch
System Name : SYNTAX SOLUTIONS Local Area Network
Test Case
Test Designed By:
Test Case ID: Test Case 09
Test Priority: (Low/Medium/High) : High
Test Designed Date: 18th June 2021
Test Case Name: Show VLAN details
Test Executed By:
Test Type: packet tracer simulator
Test Executed Date: 18th June 2021
Description: show VLAN detail in the CLI
Executed Time: 09.15 p.m. – 09.20 p.m.
Conclusion : Success
Test Venue: Home
Step
1
Test Steps
Show
command
Test Data
Show VLAN
Expected
Result
Admin
switch vlan
details
Actual
Result
Status
(Pass/Fail)
VLAN
information
Pass
Notes
Task 4
57
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
CISCO 3560 Core Switch VLAN creates.
According to the Requirement we need to create VLAN in all switches but it is very difficult to
one by one create, so the I use VTP configuration for all switch core switch as a VTP server
others are VTP client. The HR department manageable switch miss configure the VTP after test
run that switch not working properly then troubleshoot the code again that switch will perfectly
work
Each hardware component and tested while making it. This test executes in front of Network
administrator. Used as some of the network monitoring tools. The testing process has more
manual process then automatic testing done by Cisco Packet tracer. First we are going to
evaluate the network system. Most of this part done by Network administrator while
configuring each network component. After the configured of all components, the final network
system output will create and test the all network system
OpManager
Introducing ManageEngine OpManager, an easy-to-use, and affordable network monitoring
solution. It monitors network devices such as routers, switches, firewalls, load balancers,
wireless LAN controllers, servers, VMs, printers, storage devices, and everything that has an IP
and is connected to the network. OpManager continuously monitors the network and provides
an in-depth visibility and control over it. In case of a fault, you can easily drill down to the root
cause and eliminate it before operations are affected
ICMP Ping
It is a network ping tool in OpManager which identifies whether the device is actually mapped
on the network or not.
When you receive a 'device down' alert, the first condition that you might want to assess is if
the device is reachable. From the device snapshot page in OpManager, do an instant ping and
check for response. You can troubleshoot further using the other network monitoring tools if a
ping to the device fails, or if the response time is very high.
58
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Traceroute
When you troubleshoot a device down alert using Ping and the device fails to respond, you can
use this network testing tool called Traceroute to determine if the device is not reachable
because of a failure in the path. Trace the route from OpManager to the destination device,
check the number of hops to the monitored device and spot the exact point of delay or outage.
Again, this serves as a first level troubleshooting and based on the response, you can switch to
other monitoring tools provided in OpManager to drill down a fault.
After referring to all networks I have explained above I came to a conclusion. I learnt many
things after observing the types of networks that have been used by different building networks.
In every organization there are good points as well as bad points. Some networks are small but
59
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
the maintenance is high. Some networks are very big but they are not maintaining the network
in a standard way so in the future they will have to face to different issues as they are not
maintaining it properly. Our team members have a planned to implement a LAN network or a
Wireless Network after studying many network environments, are goal is to make an error free
network to ABC(Pvt)Ltd with a less maintenance cost
60
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
References
[1]M. Rajalampi, The role of the intranet in enhancing communication and knowledge sharing
in a multinational company : Create ,store,retrieve, transfer,use and share information !,2011
[2]Multiprotocol Label Switching (MPLS).” [Online]. Available:
http://www.cisco.com/c/en/us/products/ios-nx-os-software/multiprotocol- label- switchingmpls/index.html
[3]M. N. O. Sadiku and M. Ilyas, Simulation of Local Area Networks. CRC Press, 1994
[4]S. Siraj, A. K. Gupta, and Badgujar-Rinku, Network Simulation Tools Survey,” Int. J. Adv.
Res. Comput. Commun. Eng. Vol. 1, Issue 4, June 2012, vol. 1, no. 4, pp. 201–210, 2012.
[5]M. Lacage and T. R. Henderson, “Yet another network simulator,” Proceeding from 2006
Work. ns-2 IP Netw. simulator WNS2 ’06, p. 12, 2006.
[6]G. Riley, The Georgia Tech network simulator,Proc. ACM SIGCOMM Work. Model.
methods tools Reprod. Netw. Res. (MoMeTools ’03 ), no. August, pp. 5–12, 2003
[7] M. H. Kabir, S. Islam, J. Hossain, and S. Hossain, Detail Comparison of Network
Simulators,” vol. 5, no. 10, pp. 203–218, 2014
[8] U. D. Black, IP Routing Protocols: RIP, OSPF, BGP, PNNI, and Cisco Routing Protocols.
Prentice Hall Professional, 2000
[9] J. Potemans, J. Theunis, B. Rodiers, P. Leys, and E. Van Lil, Simulation of a Campus
Backbone Network, a case-study, pp. 1-6
[10] SteelCentral Network Performance Management | Riverbed Modeler | Riverbed.” [Online].
Available: http://www.riverbed.com/products/performance- management-control/networkperformance- management/network-simulation.html
61
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Scenario
SYNTAX SOLUTIONS is a privately owned, well-known Software company located in Colombo. The
Management of SYNTAX SOLUTIONS has purchased a 3-story building in the heart of Matara. They
are planning to make it one of the state-of-the-art companies in Matara with the latest facilities.
It is expected to have nearly 150 employees in Matara branch.
Department
Number of Users
Customer Care
10
Sales and Marketing
20
Finance
25
Legal
5
HR
10
Developers
55
Network Team
5
Server Room
Servers +ISP connections
Following requirements are given by the Management.

A ll the depa rt ment s must be separated w ith unique subnet and shou ld not
commu nicate with each ot her unless there is a s pecial requirement .

19 2.168 .1 0.0/24 is given an d sh ou ld b e use d for all the de partm ent s exce pt the
server room . I Ps sh ou ld assign us ing DHCP .

ERP and CRM Systems ne ed to be imp le mente d in Mata ra branc h in loca l
servers.

Number of s er vers required for the Ser ver room ne ed to be decide d by the
Network de signe r and sh ou ld be assigne d w it h 10 .2 54.1 .0 /2 4 sub net. (U ses
static IPs )
62
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560

High level of redundancy is ex pecte d in n etwork desig n to e liminate single point
of failu re s and traffic bottle necks.

Sales and Marketing Tea m nee d to access Network re source s us ing W IFI
connec tivity.

Proper methods for network ing monitoring and troubleshooting nee d to be
esta blishe d.

A ll p ossible network security mecha nism s should be imp le mented.
Assu me you have be en app ointed as th e n ew network consultant of SYNTAX SOLU TIONS .
P repa re a n etwork arch itec tural de sign and imp lem ent it wit h your sug gestions an d
re com men dations to me et th e compa ny req uirem ent s.
(Note: Clear ly state your assumptions. You are allowed to design the networ k
accor ding to your assumptions, but main requirements should not be violated)
Activity 01

D isc uss t he benefits an d const ra int s of different n etwork system type s that can be
imp le mente d in the Matara b ranc h an d the main IEEE Ethe rn et sta ndards that can
be u sed in above LAN an d WLA N design .

D isc uss t he im portanc e an d im pact of network topologies an d n etwork protocol
suites wh ile comp arin g the main network topologies an d n etwork protocol suites
th at are used in n etwork desig n u sing exa mp le s. Recomme nd su itab le n etwork
topologies and n etwork protocol suites for above sce nario an d justif y your answe r
w ith va lid points.
Activity 02

Discu ss t he op erating princ ip le s of network dev ice s (Ex : Rou ter, Switc h, Etc .) and
63
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
se rve r typ es that can be u sed for above scena rio wh ile exp lorin g different se rve rs
that
are
ava ilab le
in
today ’s
market
with
th eir
spec ification s.
Recomme nd
se rve r/se r vers for the above sce nario and ju stif y you r selection with va lid point s.

Discu ss t he inte r-de pen denc e of workstation hard wa re w ith networkin g softwa re
and provide examp le s for n etworking soft ware that can be use d in above n etwork
desig n.
Activity 03

Pre pare a written network desig n plan to meet th e above mentione d user
req uirem ent s inc lu ding a b lue print drawn usin g a modelin g tool. (Ex : Microsoft Visio,
Ed raw Max ).
Supp ort you r answe r by prov id in g the VLA N and IP sub nettin g sc hem e for the above
scen ario an d the list of d evices, n etwork comp on ent s an d soft ware u sed to de sign
the n etwork for above sce nario and wh ile ju stif ying you r se lec tion s.

Test an d eva lu ate the proposed de sign to me et the re qu irements and ana lyse user
feed back by using a User feed back form.

Insta ll and configu re Network ser vices, dev ice s and app lications (E x: VLAN,DHCP,
DNS ,Proxy, Web , Etc.) accord in g to the proposed de sign to accomplish the u ser
req uirem ent s and desig n a detaile d Mainte nance sch edu le for above Network.
* Note: - Screen s hots of Confi guration scripts s hould be pres ented.
Activity 04

Imp le ment a networked syste m ba se d on your prep are d de sign w ith va lid ev id ence s
and re com men d potentia l fu ture enh ance ment s for th e networke d system wit h va lid
ju stification s to you r recomm endation s. Use c ritica l reflec tion to c ritically eva lu ate
the design , pla n, config uration , and te sting of you r net work while ju stif ying w it h
va lid conc lu sion s.
64
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560

Deve lop te st cases and conduc t verification (Ex: P in g , ex ten ded p in g , t race route ,
telnet, SSH, etc. ) to test th e above Network and ana lyse the test results aga inst the
exp ected re su lt s.
65
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
Grading Rubric
Grading Criteria
Achieved
Feedback
LO1 : Examine networking principles and their protocols.
P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Compare common networking principles and how protocols
enable the effectiveness of networked systems.
LO2 : Explain networking devices and operations
P3
Discuss the operating principles of networking devices and
server types.
P4
Discuss the inter-dependence of workstation hardware with
66
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
relevant networking software.
M2
Explore a range of server types and justify the selection of a
server, considering a given scenario regarding cost and
performance optimization.
LO 1 & LO2
D1 Critically evaluate the topology protocol selected for a given
scenario to demonstrate the efficient utilisation of a networking
system.
LO3 : Design efficient networked systems
P5
Design a networked system to meet a given specification.
P6
Test and evaluate the design to meet the requirements and
analyze user feedback.
M3
Install and configure network services and applications on your
choice.
D2
Design a maintenance schedule to support the networked
67
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)
lOMoARcPSD|15156560
system.
LO4 : Implement and diagnose networked systems
P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D3
Use critical reflection to evaluate own work and justify valid
conclusions.
68
Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)