lOMoARcPSD|15156560 LAN Design Implementation for Syntax Solutions business (Blue Mountain College) StuDocu is not sponsored or endorsed by any college or university Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Higher Nationals Internal verification of assessment decisions – BTEC (RQF) INTERNAL VERIFICATION – ASSESSMENT DECISIONS Programme title BTEC Higher National Diploma in Computing Assessor Internal Verifier Unit 02: Networking Unit(s) LAN Design & Implementation for SYNTAX SOLUTIONS Assignment title Student’s name List which assessment criteria the Assessor has awarded. Pass Merit Distinction INTERNAL VERIFIER CHECKLIST Do the assessment criteria awarded match those shown in the assignment brief? Is the Pass/Merit/Distinction grade awarded justified by the assessor’s comments on the student work? Has the work been assessed accurately? Y/N Y/N Y/N Is the feedback to the student: Give details: • Constructive? • Linked to relevant assessment criteria? • Identifying opportunities for improved performance? • Agreeing actions? Y/N Y/N Y/N Y/N Does the assessment decision need amending? Y/N Assessor signature Date Internal Verifier signature Date Programme Leader signature (if required) Date Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Confirm action completed Remedial action taken Give details: Assessor signature Date Date Internal Verifier signature Date Programme Leader signature (if required) Higher Nationals - Summative Assignment Feedback Form Student Name/ID Unit Title Unit 02: Assignment Number 1 Networking Assessor Submission Date Date Received 1st submission Re-submission Date Date Received 2nd submission Assessor Feedback: LO1 Examine networking principles and their protocols. Pass, Merit & Distinction Descripts P1 P2 M1 2 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 LO2 Explain networking devices and operations. Pass, Merit & Distinction Descripts P3 P4 M2 D1 M3 D2 LO3 Design efficient networked systems. Pass, Merit & Distinction Descripts P5 P6 LO4 Implement and diagnose networked systems. Pass, Merit & Distinction Descripts Grade: P7 Assessor Signature: P8 M4 D3 Date: Resubmission Feedback: Grade: Assessor Signature: Date: Internal Verifier’s Comments: Signature & Date: * Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades decisions have been agreed at the assessment board. Assignment Feedback 3 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Formative Feedback: Assessor to Student Action Plan Summative feedback Feedback: Student to Assessor Assessor signature Date Student signature Date 4 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Pearson Higher Nationals in Computing Unit 02: Networking Assignment 01 General Guidelines 5 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 1. A Cover page or title page – You should always attach a title page to your assignment. Use previous page as your cover sheet and make sure all the details are accurately filled. 2. Attach this brief as the first section of your assignment. 3. All the assignments should be prepared using a word processing software. 4. All the assignments should be printed on A4 sized papers. Use single side printing. 5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page. Word Processing Rules 1. The font size should be 12 point, and should be in the style of Time New Roman. 2. Use 1.5 line spacing. Left justify all paragraphs. 3. Ensure that all the headings are consistent in terms of the font size and font style. 4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and Page Number on each page. This is useful if individual sheets become detached for any reason. 5. Use word processing application spell check and grammar check function to help editing your assignment. Important Points: 1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the before mentioned compulsory information will result in rejection of your work. 2. Avoid using page borders in your assignment body. 3. Carefully check the hand in date and the instructions given in the assignment. Late submissions will not be accepted. 4. Ensure that you give yourself enough time to complete the assignment by the due date. 5. Excuses of any nature will not be accepted for failure to hand in the work on time. 6. You must take responsibility for managing your own time effectively. 7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may apply (in writing) for an extension. 8. Failure to achieve at least PASS criteria will result in a REFERRAL grade . 6 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will then be asked to complete an alternative assignment. 10. If you use other people’s work or ideas in your assignment, reference them properly using HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and a reference list. 11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be reduced to A REFERRAL or at worst you could be expelled from the course 7 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Student Declaration I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own without attributing the sources in the correct form. I further understand what it means to copy another’s work. 1. I know that plagiarism is a punishable offence because it constitutes theft. 2. I understand the plagiarism and copying policy of Pearson UK. 3. I know what the consequences will be if I plagiarise or copy another’s work in any of the assignments for this program. 4. I declare therefore that all work presented by me for every aspect of my program, will be my own, and where I have made use of another’s work, I will attribute the source in the correct way. 5. I acknowledge that the attachment of this document signed or not, constitutes a binding agreement between myself and Pearson, UK. 6. I understand that my assignment will not be considered as submitted if this document is not attached to the assignment. Student’s Signature: (Provide E-mail ID) Date: (Provide Submission Date) 8 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Higher National Diploma in Computing Assignment Brief Student Name /ID Number Unit Number and Title Unit 2: Networking Academic Year 2021/22 Unit Tutor Assignment Title LAN Design & Implementation for SYNTAX SOLUTIONS Issue Date Submission Date IV Name & Date Submission format The submission should be in the form of an individual report written in a concise, formal business style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as appropriate, and all work must be supported with research and referenced using Harvard referencing system. Please also provide an end list of references using the Harvard referencing system. The recommended word count is 3,000–3,500 words for the report excluding annexures, although you will not be penalised for exceeding the total word limit. Unit Learning Outcomes: LO1 Examine networking principles and their protocols. LO2 Explain networking devices and operations. LO3 Design efficient networked systems. LO4 Implement and diagnose networked systems. Assignment Brief and Guidance: 9 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Introduction In the context of a communication network in SYNTAX SOLUTIONS, and also the term topology refers to that way in which the end points, or stations, attached to the network are interconnected or it is the arrangements of systems in a computer network. SYNTAX SOLUTIONS has a Head Office (HO) and 02 Branches. Both the HO and the Branch (BR) is connected to a single Service Provider. The connection between the service provider and the client is terminated as a Serial Interface. Communication should be happening between the HO and the BRs. It can be either physical or logical. The physical topology refers that, a way in which a network is laid out physically and it will include the devices, installation and location. Logical topology refers that how a data transfers in a network as opposed to its design in the organization. 10 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Task 01 1. An overview of the report The use of technology in business for SYNTAX SOLUTIONS eminent movie company can be a complex issue that requires a tremendous technical expertise and should be left to qualified professionals. In some cases, network and computer systems administrators may advocate the use of multiple operating systems. This is known as virtualization, which has a number of advantages, such as the ability to conserve energy or consolidate servers. Despite the advantages of running multiple operating systems, there are some disadvantages as well. The branch network of SYNTAX SOLUTIONS has grown without proper planning. Advantages and disadvantages of using different networks system and topologies The three basic types of networks include LAN, MAN and WAN. Networking principles, protocols and devices, including benefits and constraints of networked solutions Local Area Network A network is said to be Local Area Network (LAN) if it is confined relatively to a small area. It is generally limited to a building or a geographical area, expanding not more than a mile apart to other computers. Figure 1 http://www.computer-networking-success.com/images/computer-lan-network.jpg 11 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Metropolitan Area Network Metropolitan Area Network (MAN) covers larger geographic areas, such as cities. Often used by local libraries and government agencies often to connect to citizens and private industries Figure 2 : https://www.perle.com/images/man.jpg Wide Area Network Wide Area Networks (WANs) connect larger geographic areas .In this type of network dedicated transoceanic cabling or satellite uplinks may be used. Figure 3 http://netprivateer.com/images/lanwan.gif 12 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Advantages Speed Sharing and transferring files within Networks are very rapid. Thus saving time, while maintaining the integrity of the file Cost Individually licensed copies of many popular software programs can be costly. Networkable versions are available at considerable savings. Shared programs, on a network allows for easier upgrading of the program on one single file server, instead of upgrading individual workstations. Security Sensitive files and programs on a network are passwords protected (established for specific directories to restrict access to authorized users) or designated as "copy inhibit," so that you do not have to worry about illegal copying of programs. Centralized Software Management Software can be loaded on one computer (the file server) eliminating that need to spend time and energy installing updates and tracking files on independent computers throughout the building. Resource Sharing Resources such as, printers, fax machines and modems can be shared. Disadvantages Server faults stop applications being available Network faults can cause loss of data Network fault could lead to loss of resources User work dependent upon network System open to hackers Cost While it can be cost-effective to have multiple operating systems in the long run, in the short-term it can be cost-prohibitive to establish a system based on more than one operating system. 13 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Compatibility Compatibility is another potential issue that you are likely to run into when attempting to set up multiple operating systems. In some cases, the drivers you may need may not be available. Software and Support Another potential issue that is closely related to the compatibility issue is that of the potential difficulty in supporting and maintaining a system with multiple operating systems. The complexity of configuring support software can make it difficult for system administrators to integrate multiple operating systems. Opinions Outside of the technical difficulties of having multiple operating systems, another potential downfall of more than one operating system is sometimes seen in the attempt to have interagency cooperation. The impact of network topology, communication and bandwidth requirements, effectiveness of networking systems Network systems types and topologies available In the network type there are three types of computer networks are local area networks, metropolitan area networks and wide area networks. The type of network topologies 1. Local area network. 2. Wide area network. 3. Metropolitan network. Local area network Topologies The local area network (LAN) is a computer network use in a small geographical area such as a home, school, computer laboratory, office building or group of buildings. The (LAN) is 14 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 composed of inter-connected workstations and personal computers which are each capable of accessing and sharing data and devices, such as printers, scanners and data storage devices, anywhere on the (LAN). Wide area network Topologies The wide area network (WAN) is a network that exists over a large-scale geographical area. A WAN connects different smaller networks, including local area networks (LAN) and metro area networks (MAN). This ensures that computers and users in one location can communicate with computers and users in other locations. 15 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Metropolitan network Topologies The metropolitan area network (MAN) is similar to a local area network (LAN) but spans an entire city or SYNTAX SOLUTIONS. The metropolitan area network (MAN) are formed by connecting multiple local area network (LAN). The metropolitan area network (MAN) are larger than local area network (LAN) but smaller than wide area networks (WAN). The working mechanism of a metropolitan area network (MAN) is similar to an Internet Service Provider (ISP), but a metropolitan area network (MAN) is not owned by a single organization. 16 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 The distributed Queue Dual Bus (DQDB) is the MAN standard specified by the Institute of Electrical and Electronics Engineers (IEEE) as IEEE 802.6. Using this standard, a etropolitan area network (MAN) extends up to 30-40 km, or 20-25 miles. Types of topologies and suggest a suitable network topology The Communication networks, a topology is a usually description of the arrangement of a network, including its nodes and connecting lines. There are two ways of defining network the physical topology and the logical or signal topology. The physical topology of a network 17 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 is the actual geometric layout of workstations. There are several common physical topologies, as described below and as shown in the illustration Types of Physical Network Topologies Bus Topology. Star Topology. Ring Topology. Mesh Topology. Tree Topology. Hybrid Topology. Bus Topology The Bus topology is a specific kind of network topology in which all of the various devices in the network are connected to a single cable or line. The Bus Topology general the term refers to how various devices are set up in a network. Advantages of Bus Topology 1. Bus topology costs very less. 2. It is easy to set-up and extend bus network. 3. Cable length required for this topology is the least compared to other networks. 4. Linear Bus network is mostly used in small networks. Good for LAN. Disadvantages of Bus Topology 1. Proper termination is required to dump signals. Use of terminators is must. 2. Maintenance costs can get higher with time. 18 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 3. It is not suitable for networks with heavy traffic. 4. It is difficult to detect and troubleshoot fault at individual station. Star Topology The Star topology is a network topology where each individual piece of a network is attached to a central node called a hub or switch. The attachment of these network pieces to the central component is visually represented in a form similar to a star. It’s called as a star topology. The Star topologies are active or passive networks, depending on the following: If the central node performs processes, such as data amplification or regeneration If the network actively controls data transit If the network requires electrical power sources. The Star topologies also may be implemented with Ethernet/cabled structures, wireless routers and/or other components. In many cases, the central hub is the server, and the additional nodes are clients. Advantages of Star Topology 1. Centralized management. It helps in monitoring the network 19 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 2. Easy to connect new nodes or devices. In star topology new nodes can be added easily without affecting rest of the network. Similarly components can also be removed easily 3. Failure of one node or link doesn’t affect the rest of network. At the same time it’s easy to detect the failure and troubleshoot it. Disadvantages of star Topology 1. The use of hub, a router or a switch as central device increases the overall cost of the network. 2. Performance and as well number of nodes which can be added in such topology is depended on capacity of central device. 3. Too much dependency on central device has its own drawbacks. If it fails whole network goes down. Ring Topology The Ring topology refers to a specific kind of network setup in which devices are connected in a ring and pass information to from each other according to their adjacent proximity in the ring structure. This type of topology is highly efficient and handles heavier loads better than bus topology. A ring topology may also be called an active topology because messages are passed to each device in the ring. Advantages of Ring Topology Each computer has equal access to resources. There is no need for network server to control the connectivity between workstations. 20 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Additional components do not affect the performance of network. Even when the load on the network increases, its performance is better than that of Bus topology. Disadvantages of Ring Topology Network is highly dependent on the wire which connects different components. If one workstation or port goes down, the entire network gets affected. MAU’s and network cards are expensive as compared to Ethernet cards and hubs. Mesh Topology The Mesh networking is a type of network topology in which a device (node) transmits its own data as well as serves as a relay for other nodes. Routers are used to provide the best and most efficient data path for effective communication. In the event of a hardware failure, many routes are available to continue the network communication process. Advantages of Mesh Topology Expansion and modification in topology can be done without disrupting other nodes. Data can be transmitted from different devices simultaneously. This topology can withstand high traffic. Even if one of the components fails there is always an alternative present. So data transfer doesn’t get affected. Disadvantages of Mesh Topology Set-up and maintenance of this topology is very difficult. Even administration of the network is tough. 21 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 There are high chances of redundancy in many of the network connections. Overall cost of this network is way too high as compared to other network topologies. Tree Topology The tree topology is a type of network topology that includes at least three specific levels in a topology hierarchy. Tree topologies are valued for their scalability and accessibility for troubleshooting. Advantages of Tree Topology If one segment is damaged, other segments are not affected. Error detection and correction is easy. Each segment is provided with dedicated point-to-point wiring to the central hub. Expansion of Network is possible and easy. Here, we divide the whole network into segments (star networks), which can be easily managed and maintained. Disadvantages of Tree Topology As more and more nodes and segments are added, the maintenance becomes difficult. Scalability of the network depends on the type of cable used. Because of its basic structure, tree topology, relies heavily on the main bus cable, if it breaks whole network is crippled. 22 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Hybrid Topology Before starting about Hybrid topology we saw that a network topology is a connection of links and nodes communicating with each other for transfer of data. We also saw advantages and disadvantages of Star, Bus, Ring, Mesh and Tree topologies. Let’s discuss what Hybrid Network topology is and why it finds its application in Wide Area Networks. The Hybrid, as the name suggests, is mixture of two different things. Advantages of Hybrid Topology Scalable: It’s easy to increase the size of network by adding new components, without disturbing existing architecture. Reliable: To other networks, fault detection and troubleshooting is easy in this type of topology the part in which fault is detected can be isolated from the rest of network and required corrective measures can be taken without affecting the functioning of rest of the network. Disadvantages of Hybrid Topology Costly Hub: The hubs used to connect two distinct networks, are very expensive. These hubs are different from usual hubs as they need to be intelligent enough to work with different architectures and should be function even if a part of network is down. 23 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Topologies and suggest a suitable network topology for Flexi Lease Finance If we see the all the topologies there are some advantages and disadvantages but some topologies have some good features if we see that features there is less down time topologies in above mention topologies but we should select the most suitable topologies from above mention topologies to this network if we see this there is so many nodes connected with this network 24 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 The impact of current network technology, communication and standards Client / server model has become one of the central ideas of network computing. The majority of business applications written today use the client / server model. Similarly, the main program of the Internet, TCP / IP. In marketing, the term has been used to distinguish distributed computing by smaller dispersed computers from the computer monolith of centralized mainframe computers. Client / Server and Multi-tier Design between countries Client / server system is not only for the database. Client / server design has a real and direct benefit to software developers, without the size of your system. The objective of this paper is to reveal the client / server to check the design considerations and technology, building your own client / server systems. Figure 4 http://www.csee.umbc.edu/portal/help/oracle8/server.815/a67781/c29dsta1.gif Proposed Server Hosting in SYNTAX SOLUTIONS About the Network The branch network of SYNTAX SOLUTIONS has grown without proper planning. The LAN cabling in both offices is Cat5e Ethernet. The office complex provides an Ethernet link 25 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 between the two buildings. The current network is a flat network design with minimal redundancy. Few project managers with laptops and the guests at Building B use a small wireless LAN occasionally a) Building A - general office and managers, including reception, accounts, and administration. It consists of 12 PCs and 02 printers. b) Building B - production suites and provides networking for the media development and storage. It consists of 09 high-performance workstations, 05 office PCs, and 02 printers. The Management expects to enhance the network based on following major criteria: a) Separate the network into VLANs. b) Data traffic expected to increase by 80% c) Possibly consider connecting directly to the VividZone network; must be a fast and reliable connection d) High network availability with redundant links and technology e) Wireless network access at Building B f) QoS to support video applications g) High network reliability with network monitoring and security 26 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 The operating principles of networking devices and server types and networking software The ability to provide flexible connectivity options while keeping closed user groups (groups of users and resources isolated from non-group members) is vital in today's SYNTAX SOLUTIONS networks. Network virtualization-giving multiple groups access to the same physical network while keeping them logically separate to a degree that they have no visibility into other groups-is a requirement that has challenged network managers with in these proposed network design. Initially, virtual LANs (VLANs) and the Spanning Tree Protocol offered a mechanism to divide the LAN into virtual networks to address the need for separate workgroups within a common network. Compelling Factors Many factors promote the requirement to create closed user groups. The following are just a few examples: Varying levels of access privileges within an enterprise Almost every enterprise needs solutions for granting different levels of access to customers, vendors, and partners as well as employees on the SYNTAX SOLUTIONS LAN. A visiting vendor, for instance, needs only to connect to the Internet while on SYNTAX SOLUTIONS, and the organization needs to help ensure that the vendor cannot gain access to corporate resources. Regulatory compliance Some businesses are required by laws or rules to separate segments of a larger organization. For example, in a financial company, banking needs to remain separate from trading. Office buildings commonly require the separation of different departments, such as human resources and customer service in a corporate setting, or a police department and a fire department in a municipal office building. Network consolidation In mergers and acquisitions, there is often a need to integrate the acquired company's network expeditiously. Outsourcing 27 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 As outsourcing and offshoring proliferate, subcontractors must demonstrate absolute isolation of information between clients. This is especially critical when a contractor services competing companies. The architecture of an end-to-end network virtualization solution targeted to satisfy the requirements listed above can be separated in the following three logical functional areas: Access control Path isolation Services edge Each area performs several functions and must interface with the other functional areas to provide the end-to-end solution. Connectivity Requirements The use of static ACLs at the edge of the network is the quickest way to provide traffic isolation, controlling and restricting communications between the various user groups. Most customers are comfortable with the use of ACLs to enforce security policies. At the same time, using ACLs is recommended only in very specific scenarios where the network connectivity requirements are hub-and-spoke (multi-to-one).The main limitation of the ACL approach is the lack of scalability. The complexity of each distributed ACL is directly related to two main factors: The number of user groups that need to be supported Connectivity requirements between user groups Introduction to Networking components This section of the policy contains an itemized list of the network services that are permitted for use within the organizations network. The role of a firewall and every security tools involved in controlling and monitoring this policy will be made clear to users and administrators, so that there is no gap between policy and practice. Task 02 Implement a networked system 28 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Figure 5 Provide the IP address allocation table for the redesigned network. Administration Department (Vlan 20) and Accounts department (Vlan 30) network Permit in ACL permit ip 192.168.10.0 0.0.0.255 192.168.50.0 0.0.0.255 permit ip 192.168.50.0 0.0.0.255 192.168.10.0 0.0.0.255 Account Department (VLAN 30) and Administration Department (Vlan 20) network permit in ACL permit ip 192.168.10.0 0.0.0.255 192.168.60.0 0.0.0.255 permit ip 192.168.60.0 0.0.0.255 192.168.10.0 0.0.0.255 Reception Department (VLAN 60) and Accounts department (Vlan 30) network permit in ACL permit ip 192.168.50.0 0.0.0.255 192.168.60.0 0.0.0.255 permit ip 192.168.60.0 0.0.0.255 192.168.50.0 0.0.0.255 Media Development Department (Vlan 50) and Reception (VLAN 40) network permit in ACL permit ip 192.168.10.0 0.0.0.255 192.168.70.0 0.0.0.255 permit ip 192.168.70.0 0.0.0.255 192.168.10.0 0.0.0.255 29 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Figure 6 access-list 120 permit icmp any 192.168.60.0 0.0.0.255 echo-reply access-list 120 permit icmp any 192.168.70.0 0.0.0.255 echo-reply this Sales and marketing department VlAN 20 is not permitted to access information in other departments 30 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Figure 7 Install & configure network services and applications of your choice Configuring QoS and DSCP marking You can use the Network Services Table page to enable Quality of Service (QoS) features such as Differentiated Service Code Point (DSCP) marking for the traffic in your network. For detailed information about QoS, see the SteelHead Management Console User’s Guide. Configuring flow export collectors Flow export collectors (such as NetFlow and SteelFlow) provide the ability to collect IP network traffic as traffic enters or exits an interface. By analyzing the data provided by a flow export collector, a network administrator can determine things such as the source and destination of traffic, class of service, and the causes of congestion. Installing and configuring the TCP/IP protocol To configure TCP/IP, you must be logged on as a member of the Administrators group on the local computer. Complete the following steps to install and configure the TCP/IP protocol. 31 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Open the Network utility Right-click the connection to which you want to add a network component, and then click Properties If Internet Protocol (TCP/IP) is listed, skip to Step 6. If Internet Protocol (TCP/IP) is not listed, click Install. In the Select Network Component Type dialog box, click Protocol, and then click Add From the Network Protocol list, select TCP/IP Protocol and click OK From the General tab (for local area connections) or the Networking tab (for all other connections), select Internet Protocol (TCP/IP), and then click Properties Configure TCP/IP either automatically or manually WarningContact your network administrator to find out if there is a DHCP server installed on your network Automatically – You can automatically configure TCP/IP services if you have a DHCP server on your network. This automatic process ensures easy and accurate installation of TCP/IP because your local computer is configured with the correct IP address, subnet mask, and default gateway To configure automatically, select Obtain an IP address automatically, and then click OK Manually – You must configure TCP/IP manually if you do not have a DHCP server on your network, or if you are configuring a Windows server to be a DHCP server. To configure manually, select Use the following IP address, specify the necessary parameters, and then click OK. See your Microsoft Help for more information Conduct a test and evaluate the design to meet the requirements and analyses user feedback The network traffic capacity of the organization Different types of network traffic used by different departments/office in the company 32 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Heavy/ Heavy/ Heavy/ Heavy/ Light Light Light Light Fina Heavy/ Heavy/ nce Acc Light Heavy/ Light Heavy/ Heavy/ Heavy/ Heavy/ Heavy/ ount Light Adm Heavy/ Light Heavy/ Light Heavy/ Light Heavy/ Light Heavy/ Light Heavy/ in IT Light Heavy/ Light Heavy/ Light Heavy/ Light Heavy/ Light Heavy/ Light Heavy/ Fron Light Heavy/ Light Heavy/ Light Heavy/ Light Heavy/ Light Heavy/ Light Heavy/ t Light Light Light Light Light Light offic e Table 1: Types of Network Traffic Workload Mixes Below three charts are containing the different workload mixes types with different time phase and traffic levels. Workload Mixes 1 Applications Data Base Server Email application File Transfer File Print server Telnet protocol Video 8.30a.m to 11.30p.m Finance Heavy Light Heavy Heavy Light Light Marketing Light Light Heavy Heavy Light Light HR Heavy Light Light Heavy Heavy Heavy IT Heavy Light Light Heavy Light Light Legal Heavy Heavy Heavy Heavy Light Light Heavy Light Light Heavy Heavy Conferencing service Website application Table 2 : Workload Mixes 1 Workload Mixes 2 Applications Data Base Server Email 12.30p.m to 3.30p.m Finance Heavy Heavy Marketing Light Light HR Light Heavy IT Heavy Light Legal Light Light application 33 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Light Heavy Light Heavy Light Heavy Light Heavy Light Light Light Light Light Light Light Heavy File Light Transfer File Print Telnet Video Heavy Light Heavy Heavy Heavy Light Con. Web Heavy Heavy Table 3 : Workload Mixes 1 Suggest a maintenance schedule to support the networked system To manage LAN infrastructures Monitor and troubleshoot a LAN The company Network management is the top-level maintenance and administration of network systems. It is a service that helps network administrators to monitor and maintain network with the help of tools, applications and devices. Functions of network management is security, monitoring, control, allocation, deployment, coordination and planning are executed and it is governed by large number of protocols. Network management protocol The network management protocol is a policy between the managing center and the managing devices. The Configuration Management The objective of configuration management is to monitor daily operations of the network and system configuration information so that the effects on network operation of various versions of hardware and software elements can be tracked and controlled. Each and every network device has variety of version information associated. It stores information in a database for easy access. When a problem occurs, this database can be searched for clues that may help solve the problem. Application Layer At a layer communication nodes are identified, service quality is identified and user authentication and privacy are considered. Also it represents the interface linking both networks, using the protocols HTTP, SMTP, or FTP. Presentation Layer 34 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 It is also called as syntax layer; it converts incoming and outgoing data to make a general interface to the Application layer .It decodes, encodes and compresses data for the upper layer. Session Layer Session Layer includes the sessions between computers. This layer sets up, maintains and terminates conversations, dialogs and exchanges between the applications at each ends. Transport Layer Transport Layer manages end-to-end control and error-checking. Also provides data flow between computers in the network; it relieves the upper layers of the concern of getting and sending the data. The data is cut in segments to achieve a steady flow no matter of the differences in connection bandwidth between hosts. It ensures complete data transfer. Network Layer The Network Layer makes it possible to transport the data between networks. This layer handles the routing of the data; network header is placed in front of the segment, telling the sender's IP address and the destination IP address. Monitoring and Troubleshooting in LMS allows you to monitor the health and performance of network devices, notifies the list of active problems on the network and the changes occurring on the network, and helps you to identify the problems from a single place. Monitor dashboards Provides Monitoring, Energy Wise and Identity dashboards to monitor the status and the performance of network Monitoring tools Provides tools such as Fault Monitor, Event Monitor, Mini RMON and Topology Services to view the information on network faults, events, links and ports in the network and perform remote monitoring functions. Diagnostic tools Provides framework such as Embedded Event Manager (EEM) and Generic Online Diagnostics (GOLD) for diagnostic operations across Cisco platforms running Cisco IOS Software. 35 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Troubleshooting tools Provides troubleshooting workflows, Netshow and VRF-lite to troubleshoot the network connectivity, diagnose device problems, identify endhost problems, and verify end-to-end connectivity of VRF configured devices. Fault Settings Helps you to set up the fault polling parameters, fault threshold settings, SNMP traps forwarding and receiving, and allows you to view the fault device details. Performance Settings Helps you to manage pullers and templates, enable Auto monitoring functionality, and manage IPSLA collectors and devices. Threshold Settings Helps you to manage Trend watch, set up fault and performance threshold settings 36 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Task 03 Wired Connection Design First Design After came to thought shape the assistance on instructional exercises. 1. Develop the announcement of prerequisites 2. Investigate options 3. Network structure 4. Select hardware and sellers 5. Prepare for usage 6. Implementation 7. Cut over Wireless Connection Design First Design: 37 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 On this structure, it has two access point to associate more users on the WLAN. The reason I thought of two access point is Wireless association issues in some cases even at my home I discover hard to interface remote it on the SYNTAX SOLUTIONS that everybody associated remote, we get flag issues. After finishing our examine on various networks we decided to implement a small network that should perform well. I won’t make the network very big because when the network is big if a small error comes we should examine the whole system to find the error and also this will cost a big amount. So we have decided to implement a small network that can perform a big task with a less cost. While topology implies the physical arrangement of the framework, designing insinuates the wide structure of the standards PCs must pursue with the ultimate objective to give. The specific strategies that must be sought after are called traditions; in this sense structures are aggregations of traditions and may consolidate distinctive measures or subtle elements for hardware and programming accessibility. 38 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Plans can be assigned either united or decentralized. The past is significant when various customers require a comparable information; less help is required to revive the framework. In any case, dispersed dealing with through decentralized frameworks is transforming into the standard as it empowers work to be spread out, abusing the limits of the inescapable and dynamically noteworthy PC. The WLAN will address the issues of data focuses. The fourth is the development wiring necessities. The WLAN permits smooth correspondence between different structures in SYNTAX SOLUTIONS. The remote systems can inclusion the signs to the spots where there are hard to game plan of wires. I will plan WLAN for five unique structures and one outside zone. The structures incorporate the fundamental building, complex building, lecture room, main building and the laboratory building, as appeared in Figure. The plan of the SYNTAX SOLUTIONS There are six floors in the main building, consisting of classrooms and offices. And, there are eleven floors in the complex building, consisting of the library and activity class rooms. What’s more, there are six floors in the dormitory, two floors in the main building and eight floors in the laboratory building. WLAN Topology In this analysis I planned a basic topology for the WLAN, as shown in Figure. 39 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Figure. WLAN topology In this figure, the core of the SYNTAX SOLUTIONS network is the system focus. The switch is associated with the outer system and firewall. There are various types of servers interface with the switch. I utilized one center change associated with the wired system and the remote controller associated with the center switch. At that point I have a few PoE changes associated with the center switch and passageway interface with the PoE switches. PoE refers to Power over Ethernet and it is a technology that lets network cables carry electrical power. It implies that just a single link is sufficient for the PoE change to give system and power association in the meantime. At that point the APs will spread out the remote flags with the goal that every one of the customers in the inclusion territory can get to the WLAN. 40 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Channel Management I prefer to use channels in the theory part t and here I will expound which channel I will use for each working by utilizing the Hive Manager NG instrument. What's more, I will likewise clarify why I select that channel. Here I arranged channels for each building. For the fundamental building, each floor utilizes 4 APs and all the APs deal with the 2.4GHz transfer speed, so I utilized the channels 1, 6 and 11. As appeared in the below Figure, channels won't cover one another. Additionally, I utilized diverse stages to manage the APs for each floor. It implies that I utilized diverse channels for similar areas of the neighboring floors. I will likewise utilize this technique for different structures. Channel management for the main building For the laboratory building, each floor uses 2 APs and all the APs work on the 2.4GHz bandwidth, so I selected channel 1 and channel 6. As shown in Figure, red and green colors show that the channels will not overlapping each other. 41 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Channel Management for Laboratory Building For the main building, one AP is required for each floor and I used different channels in different floors. I used channel 1 for the first floor, as shown in Figure 16 and I use channel 6 for the second floor. So the channels will not overlapping each other. 42 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Channel Management for SYNTAX SOLUTIONS For the dormitory building, each floor uses 2 APs and all the APs work on the 2.4GHz bandwidth, so I decided to use channel 1 and channel 6. As shown in Figure, red and green colors show that the channels will not overlap each other. Channel Management for Dormitory 43 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 For the complex building, each floor uses 3 APs and all the APs work on 2.4GHz bandwidth, so I decide to use channel 1, channel 6 and channel 11. As shown in Figure 18, different colors clear reality that the channels will not overlapping each other. Channel Management for Complex Building If there are channels that overlap each other, it will cause interference between signals. Then there is slower throughput and packet loss at the same time. That’s the reason why channel management is needed here. Access point Management In this part I will introduce how many APs are used for each building and where I decided to place them. The 2.4GHz frequency is used for each APs, because there are many walls or other objects in each building and I need better cover- age of the WLAN. What’s more, in the SYNTAX SOLUTIONS environment, I don't need to care 44 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 about some 2.4GHz household appliances interference the network. Floor planner and HiveManager NG are used in this chapter for AP management. For the main building, the main coverages of the networks are classrooms. In this case, I used ceiling APs and planned 4 APs for each floor, as shown in Figure 19. The model of the AP is TL-AP1750C-PoE from TP Link Company. It’s easy for IT managers to manage the APs, if all the APs are of the same model. So, I used the same model for all indoor places. This model of AP has a built-in directional antenna and it can improve the signal quality of the coverage area, especially where there is a need for penetration. Each AP can support 80 clients’ access in the network at the same time. I decided to install the APs on the ceiling of the corridor, near the window or the door of the classrooms. AP Management for the Main Building The building has three floors. I used 2 APs for each floor, as shown in Figure 20. The model of the AP is TL-AP1750C-PoE. The main coverage areas are each laboratory and corridors. I decided to install the APs on the ceiling of the corridor, close to the laboratory. Some specific needs have to be determined according to the network cabling situation. 45 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Routing Protocol In this network design we used 3560 multilayer core switch for all configuration and security implementation parts. It is a Layer 2 switch but it does support basic static routing/default routing on SVI interfaces only but we have to enable the IP Routing on the Switch. When enable ip routing ip default-gateway command is ignored as this works only with L2 devices and you need to have a default route (which points to core switch) to have ip reach ability to 3560 switch. Since there is no difference in IP address, this is appropriate for applications which use Voice over Internet Protocol (VOIP),gaming applications, and Virtual Private Network(VPN) Test Plan for SYNTAX SOLUTIONS Local Area Network solution Introduction This test plan for the WLAN solution builds for SYNTAX SOLUTIONS network system. This solution is support for the IT department can control 46 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 the network users and unauthorized access. It can safe all network system and data in the company. This document is the test plan for the SYNTAX SOLUTIONS network system. Objectives To check the users computers To check internal devices installed in LAN Cable type and interface test Verification command Security feature test to check network errors Approach General Test Strategy Each hardware component and tested while making it. This test executes in front of Network administrator. Used as some of the network monitoring tools. The testing process has more manual process then automatic testing done by Cisco Packet tracer. First we are going to evaluate the network system. Most of this part done by Network administrator while configuring each network component. After the configured of all components, the final network system output will create and test the all network system. Item pass/fail criteria Pass criteria Each of every devices check errors Overall network system should work properly Fail criteria if any hardware failure power problem Suspension and resumption If any error’s found while testing a component, the testing process for that 47 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 particular component resumes. It will check back again after resolved it. While this happening, the test process going on. Testing material Power with A/C temperate Multilayer switch Manageable switches Ethernet cables All computers and servers Software Material Operating system(windows OS, Mac OS , Linux) Network monitoring tool Cisco Packet tracer 6 Test include Derived from non-functional requirement Free Ethernet ports Derived from functional requirement VLAN Test Plan Responsibilities Network administrator is the responsible who need to manage the testing project. He need to choose relevant personal for testers. Also his responsibility is to assign works to each testers. It’s also his responsibility to submit the work on time and on budget All network system and components testers are the skilled personals who really test the system. it’s their responsibility to administrator the time and effort and do their work 48 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Risk The only risk is testers don’t know anything about the network system. So there might be some huge problem in the network. So it may take couple of days to indicating in the project plan to complete. Test Cases Test case 01: Show VTP status of FAIR domain in a multilayer core switch System Name : SYNTAX SOLUTIONS Local Area Network Test Case Test Designed By: Test Case ID: Test Case 01 Test Priority: (Low/Medium/High) : High Test Designed Date: 14th June 2021 Test Case Name: Show VTP details Test Executed By: Test Type: packet tracer simulator Test Executed Date: 14th June 2021 Description: show multilayer switch VTP detail show in the CLI Executed Time: 10.00 a.m. – 10.08 a.m. Conclusion : Success Test Venue: Home Step 1 Test Steps Show command Test Data Show vtp status Expected Result CORE switch vtp details Actual Result Status (Pass/Fail) VTP information Pass Notes Table – test case of show VTP information 49 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Figure VTP status of the CORE switch Test case 02: Show VTP status of FAIR domain client in a admin switch System Name : SYNTAX SOLUTIONS Local Area Network Test Case Test Designed By: Test Case ID: Test Case 02 Test Priority: (Low/Medium/High) : High Test Designed Date: 14th June 2021 Test Case Name: Show VTP details Test Executed By: Test Type: packet tracer simulator Test Executed Date: 14th June 2021 Description: show admin department switch VTP detail show in the CLI Executed Time: 10.20 a.m. – 10.25 a.m. Conclusion : Success Test Venue: Home Step 1 Test Steps Show command Test Data Show vtp status Expected Result ADMIN switch vtp details Actual Result Status (Pass/Fail) VTP information Pass Notes Table– test case of show VTP information 50 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Figure VTP status of the Admin Dept. switch Test case 03: Show VTP status of FAIR domain client in a HR switch System Name : SYNTAX SOLUTIONS Local Area Network Test Case Test Designed By: Dinesh Prasanga Test Case ID: Test Case 03 Test Priority: (Low/Medium/High) : High Test Designed Date: 14th June 2021 Test Case Name: Show VTP details Test Executed By: Test Type: packet tracer simulator Test Executed Date: 14th June 2021 Description: show HR department switch VTP detail show in the CLI Executed Time: 12.50 p.m. – 13.10 p.m. Conclusion : Success Test Venue: Home Step 1 Test Steps Show command Test Data Show vtp status Expected Result HR switch vtp details Actual Result Status (Pass/Fail) VTP information Pass Notes Table– test case of show VTP information HR 51 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Test case 04: Show VTP status of FAIR domain client in a Accounts switch System Name : SYNTAX SOLUTIONS Local Area Network Test Case Test Designed By: Test Case ID: Test Case 04 Test Priority: (Low/Medium/High) : High Test Designed Date: 14th June 2021 Test Case Name: Show VTP details Test Executed By: Test Type: packet tracer simulator Test Executed Date: 14th June 2021 Description: show accounts department switch VTP detail show in the CLI Executed Time: 03.10 p.m. – 03.30 p.m. Conclusion : Success Test Venue: Home Step 1 Test Steps Show command Test Data Show vtp status Expected Result Accounts switch vtp details Actual Result Status (Pass/Fail) VTP information Pass Notes Table – test case of show VTP information ACC Figure VTP status of the Accounts Dept. switch 52 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Test case 05: Show VTP status of FAIR domain client in a campus switch System Name : SYNTAX SOLUTIONS Local Area Network Test Case Test Designed By: Test Case ID: Test Case 05 Test Priority: (Low/Medium/High) : High Test Designed Date: 14th June 2021 Test Case Name: Show VTP details Test Executed By: Test Type: packet tracer simulator Test Executed Date: 14th June 2021 Description: show MKT department switch VTP detail show in the CLI Executed Time: 03.50 p.m. – 04.10 p.m. Conclusion : Success Test Venue: Home Step 1 Test Steps Show command Test Data Show vtp status Expected Result Campus switch vtp details Actual Result Status (Pass/Fail) VTP information Pass Notes Table – test case of show VTP information Marketing Figure VTP status of the Campus Dept. switch 53 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Test case 06: Show VTP status of FAIR domain client in a IT switch System Name : SYNTAX SOLUTIONS Local Area Network Test Case Test Designed By: Test Case ID: Test Case 06 Test Priority: (Low/Medium/High) : High Test Designed Date: 18th June 2021 Test Case Name: Show VTP details Test Executed By: Test Type: packet tracer simulator Test Executed Date: 18th June 2021 Description: show IT department switch VTP detail show in the CLI Executed Time: 09.50 a.m. – 10.10 a.m. Conclusion : Success Test Venue: Home Step 1 Test Steps Show command Test Data Show vtp status Expected Result IT switch vtp details Actual Result Status (Pass/Fail) VTP information Pass Notes Table– test case of show VTP information IT 54 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Test case 07: Show VTP status of FAIR domain client in a Manager switch System Name : SYNTAX SOLUTIONS Local Area Network Test Case Test Designed By: Test Case ID: Test Case 07 Test Priority: (Low/Medium/High) : High Test Designed Date: 18th June 2021 Test Case Name: Show VTP details Test Executed By: Test Type: packet tracer simulator Test Executed Date: 18th June 2021 Description: show managers division switch VTP detail show in the CLI Executed Time: 11.5 a.m. – 12.30 p.m. Conclusion : Success Test Venue: Home Step 1 Test Steps Show command Test Data Show vtp status Expected Result Manager switch vtp details Actual Result Status (Pass/Fail) VTP information Pass Notes Table 8.7 – test case of show VTP information Manager Figure VTP status of the manager switch 55 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Test case 08: Show VLAN details in multilayer core switch System Name : SYNTAX SOLUTIONS Local Area Network Test Case Test Designed By Test Case ID: Test Case 08 Test Priority: (Low/Medium/High) : High Test Designed Date: 18th June 2021 Test Case Name: Show VLAN details Test Executed By: Test Type: packet tracer simulator Test Executed Date: 18th June 2021 Description: show VLAN detail in the CLI Executed Time: 08.30 p.m. – 08.40 p.m. Conclusion : Success Test Venue: Home Step 1 Test Steps Show command Test Data Show VLAN Expected Result core switch vlan details Actual Result Status (Pass/Fail) VLAN information Pass Notes Table – test case of show VLAN information in core switch 56 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Test case 09: Show VLAN details in Admin switch System Name : SYNTAX SOLUTIONS Local Area Network Test Case Test Designed By: Test Case ID: Test Case 09 Test Priority: (Low/Medium/High) : High Test Designed Date: 18th June 2021 Test Case Name: Show VLAN details Test Executed By: Test Type: packet tracer simulator Test Executed Date: 18th June 2021 Description: show VLAN detail in the CLI Executed Time: 09.15 p.m. – 09.20 p.m. Conclusion : Success Test Venue: Home Step 1 Test Steps Show command Test Data Show VLAN Expected Result Admin switch vlan details Actual Result Status (Pass/Fail) VLAN information Pass Notes Task 4 57 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 CISCO 3560 Core Switch VLAN creates. According to the Requirement we need to create VLAN in all switches but it is very difficult to one by one create, so the I use VTP configuration for all switch core switch as a VTP server others are VTP client. The HR department manageable switch miss configure the VTP after test run that switch not working properly then troubleshoot the code again that switch will perfectly work Each hardware component and tested while making it. This test executes in front of Network administrator. Used as some of the network monitoring tools. The testing process has more manual process then automatic testing done by Cisco Packet tracer. First we are going to evaluate the network system. Most of this part done by Network administrator while configuring each network component. After the configured of all components, the final network system output will create and test the all network system OpManager Introducing ManageEngine OpManager, an easy-to-use, and affordable network monitoring solution. It monitors network devices such as routers, switches, firewalls, load balancers, wireless LAN controllers, servers, VMs, printers, storage devices, and everything that has an IP and is connected to the network. OpManager continuously monitors the network and provides an in-depth visibility and control over it. In case of a fault, you can easily drill down to the root cause and eliminate it before operations are affected ICMP Ping It is a network ping tool in OpManager which identifies whether the device is actually mapped on the network or not. When you receive a 'device down' alert, the first condition that you might want to assess is if the device is reachable. From the device snapshot page in OpManager, do an instant ping and check for response. You can troubleshoot further using the other network monitoring tools if a ping to the device fails, or if the response time is very high. 58 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Traceroute When you troubleshoot a device down alert using Ping and the device fails to respond, you can use this network testing tool called Traceroute to determine if the device is not reachable because of a failure in the path. Trace the route from OpManager to the destination device, check the number of hops to the monitored device and spot the exact point of delay or outage. Again, this serves as a first level troubleshooting and based on the response, you can switch to other monitoring tools provided in OpManager to drill down a fault. After referring to all networks I have explained above I came to a conclusion. I learnt many things after observing the types of networks that have been used by different building networks. In every organization there are good points as well as bad points. Some networks are small but 59 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 the maintenance is high. Some networks are very big but they are not maintaining the network in a standard way so in the future they will have to face to different issues as they are not maintaining it properly. Our team members have a planned to implement a LAN network or a Wireless Network after studying many network environments, are goal is to make an error free network to ABC(Pvt)Ltd with a less maintenance cost 60 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 References [1]M. Rajalampi, The role of the intranet in enhancing communication and knowledge sharing in a multinational company : Create ,store,retrieve, transfer,use and share information !,2011 [2]Multiprotocol Label Switching (MPLS).” [Online]. Available: http://www.cisco.com/c/en/us/products/ios-nx-os-software/multiprotocol- label- switchingmpls/index.html [3]M. N. O. Sadiku and M. Ilyas, Simulation of Local Area Networks. CRC Press, 1994 [4]S. Siraj, A. K. Gupta, and Badgujar-Rinku, Network Simulation Tools Survey,” Int. J. Adv. Res. Comput. Commun. Eng. Vol. 1, Issue 4, June 2012, vol. 1, no. 4, pp. 201–210, 2012. [5]M. Lacage and T. R. Henderson, “Yet another network simulator,” Proceeding from 2006 Work. ns-2 IP Netw. simulator WNS2 ’06, p. 12, 2006. [6]G. Riley, The Georgia Tech network simulator,Proc. ACM SIGCOMM Work. Model. methods tools Reprod. Netw. Res. (MoMeTools ’03 ), no. August, pp. 5–12, 2003 [7] M. H. Kabir, S. Islam, J. Hossain, and S. Hossain, Detail Comparison of Network Simulators,” vol. 5, no. 10, pp. 203–218, 2014 [8] U. D. Black, IP Routing Protocols: RIP, OSPF, BGP, PNNI, and Cisco Routing Protocols. Prentice Hall Professional, 2000 [9] J. Potemans, J. Theunis, B. Rodiers, P. Leys, and E. Van Lil, Simulation of a Campus Backbone Network, a case-study, pp. 1-6 [10] SteelCentral Network Performance Management | Riverbed Modeler | Riverbed.” [Online]. Available: http://www.riverbed.com/products/performance- management-control/networkperformance- management/network-simulation.html 61 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Scenario SYNTAX SOLUTIONS is a privately owned, well-known Software company located in Colombo. The Management of SYNTAX SOLUTIONS has purchased a 3-story building in the heart of Matara. They are planning to make it one of the state-of-the-art companies in Matara with the latest facilities. It is expected to have nearly 150 employees in Matara branch. Department Number of Users Customer Care 10 Sales and Marketing 20 Finance 25 Legal 5 HR 10 Developers 55 Network Team 5 Server Room Servers +ISP connections Following requirements are given by the Management. A ll the depa rt ment s must be separated w ith unique subnet and shou ld not commu nicate with each ot her unless there is a s pecial requirement . 19 2.168 .1 0.0/24 is given an d sh ou ld b e use d for all the de partm ent s exce pt the server room . I Ps sh ou ld assign us ing DHCP . ERP and CRM Systems ne ed to be imp le mente d in Mata ra branc h in loca l servers. Number of s er vers required for the Ser ver room ne ed to be decide d by the Network de signe r and sh ou ld be assigne d w it h 10 .2 54.1 .0 /2 4 sub net. (U ses static IPs ) 62 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 High level of redundancy is ex pecte d in n etwork desig n to e liminate single point of failu re s and traffic bottle necks. Sales and Marketing Tea m nee d to access Network re source s us ing W IFI connec tivity. Proper methods for network ing monitoring and troubleshooting nee d to be esta blishe d. A ll p ossible network security mecha nism s should be imp le mented. Assu me you have be en app ointed as th e n ew network consultant of SYNTAX SOLU TIONS . P repa re a n etwork arch itec tural de sign and imp lem ent it wit h your sug gestions an d re com men dations to me et th e compa ny req uirem ent s. (Note: Clear ly state your assumptions. You are allowed to design the networ k accor ding to your assumptions, but main requirements should not be violated) Activity 01 D isc uss t he benefits an d const ra int s of different n etwork system type s that can be imp le mente d in the Matara b ranc h an d the main IEEE Ethe rn et sta ndards that can be u sed in above LAN an d WLA N design . D isc uss t he im portanc e an d im pact of network topologies an d n etwork protocol suites wh ile comp arin g the main network topologies an d n etwork protocol suites th at are used in n etwork desig n u sing exa mp le s. Recomme nd su itab le n etwork topologies and n etwork protocol suites for above sce nario an d justif y your answe r w ith va lid points. Activity 02 Discu ss t he op erating princ ip le s of network dev ice s (Ex : Rou ter, Switc h, Etc .) and 63 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 se rve r typ es that can be u sed for above scena rio wh ile exp lorin g different se rve rs that are ava ilab le in today ’s market with th eir spec ification s. Recomme nd se rve r/se r vers for the above sce nario and ju stif y you r selection with va lid point s. Discu ss t he inte r-de pen denc e of workstation hard wa re w ith networkin g softwa re and provide examp le s for n etworking soft ware that can be use d in above n etwork desig n. Activity 03 Pre pare a written network desig n plan to meet th e above mentione d user req uirem ent s inc lu ding a b lue print drawn usin g a modelin g tool. (Ex : Microsoft Visio, Ed raw Max ). Supp ort you r answe r by prov id in g the VLA N and IP sub nettin g sc hem e for the above scen ario an d the list of d evices, n etwork comp on ent s an d soft ware u sed to de sign the n etwork for above sce nario and wh ile ju stif ying you r se lec tion s. Test an d eva lu ate the proposed de sign to me et the re qu irements and ana lyse user feed back by using a User feed back form. Insta ll and configu re Network ser vices, dev ice s and app lications (E x: VLAN,DHCP, DNS ,Proxy, Web , Etc.) accord in g to the proposed de sign to accomplish the u ser req uirem ent s and desig n a detaile d Mainte nance sch edu le for above Network. * Note: - Screen s hots of Confi guration scripts s hould be pres ented. Activity 04 Imp le ment a networked syste m ba se d on your prep are d de sign w ith va lid ev id ence s and re com men d potentia l fu ture enh ance ment s for th e networke d system wit h va lid ju stification s to you r recomm endation s. Use c ritica l reflec tion to c ritically eva lu ate the design , pla n, config uration , and te sting of you r net work while ju stif ying w it h va lid conc lu sion s. 64 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Deve lop te st cases and conduc t verification (Ex: P in g , ex ten ded p in g , t race route , telnet, SSH, etc. ) to test th e above Network and ana lyse the test results aga inst the exp ected re su lt s. 65 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 Grading Rubric Grading Criteria Achieved Feedback LO1 : Examine networking principles and their protocols. P1 Discuss the benefits and constraints of different network types and standards. P2 Explain the impact of network topology, communication and bandwidth requirements. M1 Compare common networking principles and how protocols enable the effectiveness of networked systems. LO2 : Explain networking devices and operations P3 Discuss the operating principles of networking devices and server types. P4 Discuss the inter-dependence of workstation hardware with 66 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 relevant networking software. M2 Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimization. LO 1 & LO2 D1 Critically evaluate the topology protocol selected for a given scenario to demonstrate the efficient utilisation of a networking system. LO3 : Design efficient networked systems P5 Design a networked system to meet a given specification. P6 Test and evaluate the design to meet the requirements and analyze user feedback. M3 Install and configure network services and applications on your choice. D2 Design a maintenance schedule to support the networked 67 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com) lOMoARcPSD|15156560 system. LO4 : Implement and diagnose networked systems P7 Implement a networked system based on a prepared design. P8 Document and analyze test results against expected results. M4 Recommend potential enhancements for the networked systems. D3 Use critical reflection to evaluate own work and justify valid conclusions. 68 Downloaded by Shohaib Nexuz (shohaibn4@gmail.com)