Uploaded by Rangika De silva

E128616-1650889252519-137966-1151-1619622564463-Unit 02 Networking Reworded 2021

advertisement
Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)
INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Programme title
BTEC Higher National Diploma in Computing
Mr Dishan randika
Assessor
Unit(s)
Assignment title
Student’s name
Unit 02:
Internal Verifier
Networking
LAN Design & Implementation for SYNTAX SOLUTIONS
Rangika pathmal de silva
Pass
List which assessment criteria
the Assessor has awarded.
Merit
Distinction
INTERNAL VERIFIER CHECKLIST
Do the assessment criteria awarded match
those shown in the assignment brief?
Y/N
Is the Pass/Merit/Distinction grade awarded
justified by the assessor’s comments on the
student work?
Y/N
Has the work been assessed
accurately?
Y/N
Is the feedback to the student:
Give details:
• Constructive?
• Linked to relevant assessment criteria?
• Identifying opportunities for
improved performance?
• Agreeing actions?
Y/N
Y/N
Y/N
Does the assessment decision need
amending?
Y/N
Y/N
Assessor signature
Date
Internal Verifier signature
Date
Programme Leader signature (if required)
Date
Confirm action completed
Remedial action taken
Give details:
Assessor signature
Date
Internal Verifier
signature
Date
Programme Leader
signature (if required)
Date
1
A rangika de silva
assignment 2 network
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID
Rangika de silva /
Unit Title
Unit 02:
Assignment Number
1
Networking
Assessor
Submission Date
Date Received
1st submission
Re-submission Date
Date Received 2nd
submission
Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction P1
P2
Descripts
M1
LO2 Explain networking devices and operations.
Pass, Merit & Distinction
Descripts
P3
P4
M2
D1
P6
M3
D2
M4
D3
LO3 Design efficient networked systems.
Pass, Merit & Distinction
Descripts
P5
LO4 Implement and diagnose networked systems.
Pass, Merit & Distinction
Descripts
Grade:
P7
P8
Assessor Signature:
Date:
Resubmission Feedback:
Grade:
Assessor Signature:
Date:
Internal Verifier’s Comments:
Signature & Date:
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.
2
A rangika de silva
assignment 2 network
Assignment Feedback
Formative Feedback: Assessor to Student
Action Plan
Summative feedback
Feedback: Student to Assessor
Assessor
signature
Date
Rangikapathmal135@gmail.com
Student
signature
2022/04/25
Date
3
A rangika de silva
assignment 2 network
Pearson Higher Nationals in
Computing
Unit 02: Networking
Assignment 01
4
A rangika de silva
assignment 2 network
General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment. Use previous
page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
Word Processing Rules
1.
2.
3.
4.
The font size should be 12 point, and should be in the style of Time New Roman.
Use 1.5 line spacing. Left justify all paragraphs.
Ensure that all the headings are consistent in terms of the font size and font style.
Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory
information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the
before mentioned compulsory information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will then
be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and
a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course
5
A rangika de silva
assignment 2 network
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct form. I further understand what it means to copy
another’s work.
1. I know that plagiarism is a punishable offence because it constitutes theft.
2. I understand the plagiarism and copying policy of Pearson UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my own,
and where I have made use of another’s work, I will attribute the source in the correct way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Pearson, UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.
Rangikapathmal135@gmail.com
Student’s Signature:
(Provide E-mail ID)
2022/04/25
Date:
(Provide Submission Date)
6
A rangika de silva
assignment 2 network
Higher National Diploma in Computing
Assignment Brief
Student Name /ID Number
Rangika de silva
Unit Number and Title
Unit 2: Networking
Academic Year
2021/22
Unit Tutor
Assignment Title
LAN Design & Implementation for SYNTAX SOLUTIONS
Issue Date
Submission Date
IV Name & Date
Submission format
The submission should be in the form of an individual report written in a concise, formal business style
using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using Harvard
referencing system. Please also provide an end list of references using the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures,
although you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:
LO1 Examine networking principles and their protocols.
LO2 Explain networking devices and operations.
LO3 Design efficient networked systems.
LO4 Implement and diagnose networked systems.
Assignment Brief and Guidance:
7
A rangika de silva
assignment 2 network
Scenario
SYNTAX SOLUTIONS is a privately owned, well-known Software company located in Colombo. The
Management of SYNTAX SOLUTIONS has purchased a 3-story building in the heart of Matara. They
are planning to make it one of the state-of-the-art companies in Matara with the latest facilities.
It is expected to have nearly 150 employees in Matara branch.
Department
Number of Users
Customer Care
10
Sales and Marketing
20
Finance
25
Legal
5
HR
10
Developers
55
Network Team
5
Server Room
Servers +ISP connections
Foll ow i ng r equir ements ar e g iv en by the Manag ement.
•
All the departments must be separ ated with uni que subnet and sho uld no t
communicate with each o ther unless ther e is a speci al r equir ement .
•
19 2.16 8.10. 0/24 is giv en and sho uld be use d fo r all the departments except the
server room . IPs sho uld assign usi ng DHCP .
•
ERP and CRM Sy stems need to be im plem ented in M atara branch in local serv ers.
•
N umber of s erv ers requir ed for the S erver r oom need to be decided by the
Netwo rk designer and sho uld be assigned with 10.25 4.1. 0/24 subnet. (Uses static
8
A rangika de silva
assignment 2 network
I Ps )
•
Hig h l ev el of r edundancy is expected in netwo rk design to eliminate si ngle po int
o f failures and traffic bottle necks.
•
S al es and Mar keti ng Team need to access Netwo rk reso urces usi ng WI FI
co nnectiv ity .
•
Pr oper methods fo r netw or ki ng monitoring and tr oubl eshooting need to be
established.
•
All possible netw or k sec ur ity mechanism s sho uld be im plemented.
Assume yo u have been appo inted as the new netwo rk co nsultant o f SYNT AX S OLUTI ONS .
P repare a netwo rk architectural design and im plement it with yo ur suggestio ns and
recommendatio ns to meet the com pany requirements.
(No te: Cl ea rl y state you r a ssump tion s. You a re allow ed to d esign th e n etwo rk a cco rding
to you r a ssump tion s, bu t main requi remen ts sho uld n ot b e viol ated)
Ac tiv ity 01
•
D iscuss the benefits and co nstraints o f different netwo rk system types that can be
im plemented in the Matara branch and the m ain IEEE Ethernet standards that can
be used in above L AN and WLAN design .
•
D iscuss the im po rtance and impact o f netwo rk to po lo gies and netwo rk proto co l
suites while com paring the main network to po lo gies and netwo rk proto co l suites
that are used in netwo rk design using exam ples . Recomm end suitable netwo rk
topolo gies and network proto co l suites fo r above scenario and justify yo ur answer
with v alid po ints.
9
A rangika de silva
assignment 2 network
Ac tiv ity 02
•
D iscuss the o perating principles o f network dev ices (Ex: Ro uter, Switch, Etc.) and
server ty pes that can be used fo r abov e scenario while explo ring different servers
that
are
available
in
to day’s m arket
with
their specificatio ns . R ecommend
server/ servers fo r the abov e scenario and justify your selectio n with v alid po ints .
•
D iscuss the inter -dependence o f wo rkstatio n hardware with networking so ftware and
prov ide exam ples fo r netwo rking so ftware that can be used in abov e netwo rk design.
Ac tiv ity 03
•
Prepare a written network design plan to meet the above mentioned user
requirements including a blueprint drawn using a modeling tool. (Ex: Microsoft
Visio, EdrawMax).
Support your answer by providing the VLAN and IP subnetting scheme for the
above scenario and the list of devices, network components and software used
to design the network for above scenario and while justifying your selections.
•
Test and evaluate the proposed design to meet the requirements and analyse
user feedback by using a User feedback form.
•
Install and co nfigure Netwo rk services , devices and applications (Ex: VL AN,D HCP ,
D NS,Pro xy , Web, Etc.) acco rding to the pro posed design to accom plish the user
requirements and design a detailed M aintenance schedule for abov e Netwo rk.
*N ote: - Scr een s hots of C onfig ur ati on scri pts shoul d be pr esented.
Ac tiv ity 04
10
A rangika de silva
assignment 2 network
•
Im plement a networked system based o n yo ur prepared design with v alid evidence s
and recommend po tential future enhancements fo r the networked system with valid
justificatio ns to yo ur recommendatio ns. Use critical reflectio n to critically evaluat e
the design, plan, co nfiguration, and testing o f yo ur network while justifying with v alid
co nclusio ns.
•
D evelo p test cases and co nduct verificatio n (Ex: Ping, extended ping, trace ro ute,
telnet, SSH, etc.) to test the abov e Netwo rk and analyse the test results against the
expected results.
11
A rangika de silva
assignment 2 network
Table of Contents
Table of figures ..............................................................................Error! Bookmark not defined.
Table of tables ............................................................................................................................... 15
1
Introduction ........................................................................................................................... 16
2
Overview ............................................................................................................................... 17
3
Activity 01 ............................................................................................................................ 18
3.1
LAN................................................................................................................................ 18
3.1.1
Benefits ................................................................................................................... 18
3.1.2
Constraints .............................................................................................................. 19
3.2
MAN............................................................................................................................... 19
3.2.1
Benefits ................................................................................................................... 19
3.2.2
Constraints .............................................................................................................. 20
3.3
Mesh topology ................................................................................................................ 20
3.3.1
Benefits ................................................................................................................... 21
3.3.2
Constraints .............................................................................................................. 21
3.4
Tree topology ................................................................................................................. 22
3.4.1
Benefits ................................................................................................................... 22
3.4.2
Constrains ............................................................................................................... 22
3.5
Star topology .................................................................................................................. 22
3.5.1
Benefits ................................................................................................................... 22
3.5.2
Constraints .............................................................................................................. 22
3.6
Ring topology ................................................................................................................. 23
3.6.1
Benefits ................................................................................................................... 23
3.6.2
Constraints .............................................................................................................. 23
3.7
Bus topology .................................................................................................................. 24
12
A rangika de silva
assignment 2 network
4
3.7.1
Benefits ................................................................................................................... 24
3.7.2
Constraints .............................................................................................................. 24
3.8
Impact of network topologies ......................................................................................... 24
3.9
FTP ................................................................................................................................. 25
3.10
SMTP .......................................................................................................................... 25
3.11
TCP/IP ........................................................................................................................ 25
3.12
Impact of network protocols ....................................................................................... 25
Activity 2 .............................................................................................................................. 26
4.1
4.1.1
Switch ..................................................................................................................... 26
4.1.2
Hub.......................................................................................................................... 27
4.1.3
Router...................................................................................................................... 27
4.1.4
Bridge...................................................................................................................... 27
4.1.5
Gateway .................................................................................................................. 27
4.2
Server types .................................................................................................................... 28
4.2.1
Application server ................................................................................................... 28
4.2.2
Proxy server ............................................................................................................ 28
4.2.3
Web server .............................................................................................................. 28
4.2.4
Mail server .............................................................................................................. 28
4.2.5
FTP server ............................................................................................................... 28
4.3
5
Operating principles of network devices ........................................................................ 26
Workstation and networking .......................................................................................... 29
Activity 3 .............................................................................................................................. 30
5.1
Network diagram ............................................................................................................ 30
5.2
Table for allocating IP addresses ................................................................................... 32
5.3
Feedback analysis ........................................................................................................... 33
13
A rangika de silva
assignment 2 network
5.4
6
7
Network configuration ................................................................................................... 34
5.4.1
VTP creation ........................................................................................................... 34
5.4.2
VLAN ..................................................................................................................... 36
5.4.3
DHCP server ........................................................................................................... 41
5.4.4
Windows 7 client installation.................................................................................. 42
5.4.5
Windows server installation .................................................................................... 57
Activity 4 .............................................................................................................................. 87
6.1
Network (Cisco Packet Tracer) ...................................................................................... 89
6.2
Testing ............................................................................................................................ 89
6.3
Future suggestions .......................................................................................................... 91
Reference .............................................................................................................................. 93
Table of figures
Figure 4.2.5-1Network diagram .................................................................................................... 31
Figure 4.2.5-1Feedback form ........................................................................................................ 33
Figure 5.4.1-1VTP server configuration ........................................................................................ 34
Figure 5.4.1-2VTP client configuration ......................................................................................... 35
Figure 5.4.2-1VLAN configuration ................................................................................................. 36
Figure 5.4.2-2VLAN configuration ................................................................................................. 37
Figure 5.4.2-3VLAN configuration ................................................................................................. 38
Figure 5.4.2-4VLAN configuration ................................................................................................. 39
Figure 5.4.2-5VLAN configuration ................................................................................................. 40
Figure 5.4.3-1DHCP server configuration ..................................................................................... 41
Figure 5.4.3-2DHCP server services .............................................................................................. 42
Figure 5.4.4-1Windows 7 server installation ................................................................................ 43
Figure 5.4.4-2Windows 7 server installation ................................................................................ 43
Figure 5.4.4-3Windows 7 server installation ................................................................................ 44
Figure 5.4.4-4Windows 7 server installation ................................................................................ 44
Figure 5.4.4-5Windows 7 server installation ................................................................................ 45
Figure 5.4.4-6Windows 7 server installation ................................................................................ 45
Figure 5.4.4-7Windows 7 server installation ................................................................................ 46
Figure 19 windows 7 installation .................................................................................................. 47
Figure 20 windows 7 installation .................................................................................................. 48
Figure 21 windows 7 installation .................................................................................................. 49
14
A rangika de silva
assignment 2 network
Figure 22 windows 7 installation .................................................................................................. 50
Figure 23 windows 7 installation .................................................................................................. 51
Figure 24 windows 7 installation .................................................................................................. 52
Figure 25 windows 7 installation .................................................................................................. 53
Figure 26 windows 7 installation .................................................................................................. 54
Figure 27 windows 7 installation .................................................................................................. 55
Figure 28 windows 7 installation .................................................................................................. 56
Figure 29 windows 7 installation .................................................................................................. 57
Figure 30 windows server installation .......................................................................................... 58
Figure 31 windows server installation .......................................................................................... 58
Figure 32 windows server installation .......................................................................................... 59
Figure 33 windows server installation .......................................................................................... 60
Figure 34 windows server installation .......................................................................................... 61
Figure 35 windows server installation .......................................................................................... 62
Figure 36 windows server installation .......................................................................................... 63
Figure 37 windows server installation .......................................................................................... 64
Figure 38 windows server installation .......................................................................................... 65
Figure 39 windows server installation .......................................................................................... 66
Figure 40 windows server installation .......................................................................................... 67
Figure 41 windows server installation\......................................................................................... 68
Figure 42 windows server installation .......................................................................................... 69
Figure 43 windows server installation .......................................................................................... 70
Figure 44 windows server installation .......................................................................................... 71
Figure 45 windows server installation .......................................................................................... 72
Figure 46 windows server installation .......................................................................................... 73
Figure 47 windows server installation .......................................................................................... 74
Figure 48 windows server installation .......................................................................................... 75
Figure 49 windows server installation .......................................................................................... 76
Figure 50 windows server installation .......................................................................................... 77
Figure 51 windows server installation .......................................................................................... 78
Figure 52 windows server installation .......................................................................................... 79
Figure 53 windows server installation .......................................................................................... 80
Figure 54 windows server installation .......................................................................................... 81
Figure 55 windows server installation .......................................................................................... 82
Figure 56 windows server installation .......................................................................................... 83
Figure 57 windows server installation .......................................................................................... 86
Figure 58 windows server installation .......................................................................................... 87
Figure 5.4.5-1Network diagram packet tracer.............................................................................. 89
Table of tables
Table 5.2-1IP addresses ................................................................................................................ 32
15
A rangika de silva
assignment 2 network
Table 5.3-1Feedback results ......................................................................................................... 33
Table 6.2-1Test plan ..................................................................................................................... 90
Table 6.2-2Test case ..................................................................................................................... 90
Table 6.2-3Test case ..................................................................................................................... 90
Table 6.2-4Test case ..................................................................................................................... 91
Table 6.2-5Test case ..................................................................................................................... 91
Table 6.2-6Test case ..................................................................................................................... 91
1 Introduction
The term topology relates to the manner where the points of departure, or units, the setups of
computers in a computing device in the setting of a computer network in SYNTAX SOLUTIONS
are interconnected or connected to a network. SYNTAX SOLUTIONS has two branches and a
head office. A single Supplier connects both the HO as well as the Branch (BR). As a Serial
Interface, the interaction in between service provider and the client is ended. The HO as well as
the BRs should communicate with each other.
16
A rangika de silva
assignment 2 network
It could be physical or conceptual in nature. The physical topology of a network refers to how a
network is physically laid out, which includes the devices, installation, and placement. In contrast
to its architecture in the organization, logical topology relates to how data travels in a network.
2 Overview
The use of technology in business by SYNTAX SOLUTIONS, a recognized art firm, may be a
complicated issue that requires a wide range of technical expertise and should be left to qualified
professionals. In some cases, computer network systems managers may propose the use of
different operating systems. This method is known as virtualization, and it has a number of
advantages, including the ability to save power as well as consolidate servers. There are certain
advantages to running many computer systems, but there are also some disadvantages. The branch
network of SYNTAX SOLUTIONS has grown in an unexpected way.
17
A rangika de silva
assignment 2 network
3 Activity 01
3.1 LAN
A network that is assigned to a particular location is referred to as a "local area network." A lan is
a network consisting of two communicating workstations that is confined to a limited geographical
area, usually within another building. Wireless connections in the home or small commercial
networks are examples of LANs.
3.1.1 Benefits
•
Devices connected to a lan can easily communicate and transfer data.
•
Other peripheral devices, such as printers and photocopiers, can be attached.
•
All network users' information can be stored on the central/server computer's hard disk.
This technology allows users to access information from any computer on a network.
18
A rangika de silva
assignment 2 network
•
Security measures that are simple to deploy to safeguard LAN users from intruders and
attackers. Data will be easier to manage because it will be saved on the web server, and the
information will be more secure.
3.1.2 Constraints
•
Because special necessary software is essential to establish a server, the initial cost of
constructing a Local Area Network is typically considerable. Wired networks, switches,
hubs, routers, and cables are all expensive pieces of communication hardware.
•
Each LAN user's private info files are accessible to the LAN administrator, who can review
them. He also has accessibility to the internet and computer histories of the LAN user.
•
A LAN's service area is limited, such as for a single organization, a studio apartment, or
perhaps a group of nearby buildings.
•
A virus on one computer can rapidly propagate to all of the other LAN users.
3.2 MAN
In comparison to a local area network, a metropolitan area network allows users to connect to
computer resources inside a larger geographic area or region. A MAN has similar to a LAN, but
still, it covers an entire city or structure. The MAN Network is made up of many LANs that are
connected together. As a result, MANs are typically much Smaller than WANs (WAN). The MAN
infrastructure is extremely effective. It uses high-speed fiber optic lines to enable quick
communication. As it is a medium-sized network, a MAN is excellent for a wide range of network
users. Cities and towns are adopting MANs to establish large networks data connection speeds.
The primary goal of MAN seems to be to link two LANs together.
3.2.1 Benefits
•
It is less expensive to connect a MAN to a WAN. MAN enables you to extract the
maximum value from your data. Using MAN, all data can be easily centralized and
handled.
•
You can send local emails fast and for free using MAN.
•
Data speeds may easily reach 1000 Mbps thanks to MAN's utilization of fiber optics.
•
File and database transfers are rapid.
19
A rangika de silva
assignment 2 network
•
The installation of MANs allows users to share their internet connection. This allows
multiple users to share the same high-speed internet connection.
3.2.2 Constraints
•
When the size and number of LANs in such a network expands, administration becomes
increasingly challenging.
•
This seems to be due to issues with security plus extra configuration.
•
Because phone copper cables aren't suitable with it. Copper cables have an impact on MAN
speed. As a result, fiber optics come at a high price.
•
By contrast to a LAN, such network is more vulnerable to hacker attacks.
•
As a result, a data breach may occur. High-level security personnel are necessary in MAN.
•
The implementation of MAN involves the involvement of highly skilled professionals.
Among the technical staff are network managers and troubleshooters.
IEEE802 is a standard developed by the Institute of Electrical and Electronics Engineers. Develop
standards to facilitate the development of EE-related sectors, among other things. Standards for
Local- and Metropolitan-Area Networks (IEEE802LAN/MAN Committee) Designed to work well
in small geographic areas (e.g., campus) Firstmeeting: February1980(!) Goal: singleLANstandard,
speeds1-20MHz PHY, MA Cand "High-level Interface" elements are logically divided. There
were three LANMACs by the end of 1980: Token Bus, Token Ring, and CSMA/CD IEEE802
Requirements A single higher interface for Logical Link Control is provided by all 802
specifications (LLC) The AMAC protocol can be configured to work with a variety of physical
media.
IEEE 802.3 is the most common IEEE standard to utilize, as it permits and use of Ethernet
connections over a network. LAN technology is defined by IEEE 802.3, also abbreviated as the
Ethernet standard, which specifies the physical layer plus media access control (MAC) of both the
data service layer for wired Ethernet connections.
3.3 Mesh topology
The mesh topology IS network design wherein well almost every laptop on the network is
simultaneously linked to every computer on the network. It uses a point-to-point link to connect
20
A rangika de silva
assignment 2 network
all network devices. This has a greater level of availability, which means that data can still reach
its target even when a single wired network screws up.
Mesh topology can be divided into two categories.
•
Partial mesh topology
The large number of the computers in this topology are linked in a manner similar to that
of a full topology. In most cases, just 2 or 3 devices have been linked.
•
Full mesh topology
In this topology, each node or device is connected directly to the others.
3.3.1 Benefits
•
The network could've been enlarged without having any issues for current users.
•
Larger functionality is required in contrast to certain other LAN topologies.
•
Implementation is challenging.
•
Since each node does have its own related to the main, there have been no traffic issues.
•
Because it has lots of links, when one has blocked, both these routes for data transmission
should be used.
•
Peer-to-peer (P2P) connections simplify the fault isolation method.
•
By connecting all the systems to the a single central node, you can avoid network failure.
3.3.2 Constraints
•
Installation is complicated because every node is linked to every other node.
•
Dedicated lines help to reduce traffic congestion.
•
Mesh topologies seem to be exceptionally long.
•
Each system has its own collection of data protection characteristics.
•
It is much more costly since more wires are being used. There is a deficiency in system
utilization.
•
Extra area is needed for dedicated links.
•
It is expensive to install considering the amount of cabling and the relationship between
the input.
• The user will want a lot of space to run the cables.
21
A rangika de silva
assignment 2 network
3.4 Tree topology
The root node connects to all nodes, forming a hierarchy, in what appears to be a tree topology.
It's also known as hierarchical topology. This topology is known as a Star Bus topology because
it combines numerous star topologies into a single bus. The tree topology, which is comparable to
the bus and star topologies, is a common word network topology.
3.4.1 Benefits
•
A single node's failure has no effect on the rest of the network.
•
The process of expanding a node seems to be simple and quick.
•
Error detection is just a straightforward procedure.
•
It's easy to handle and keep track of.
3.4.2 Constrains
•
It's a complicated topology with a great deal of cables.
•
When many nodes are deployed, it becomes difficult to maintain.
• If the hub or ability to focus fails, the attached nodes are disabled.
3.5 Star topology
A star topology is a network topology whereby each single piece of a network has been connected
to a common node. A star represents the connection between such network nodes and the core
component. Star topology is also known as a star network. Star topologies can be created using
Ethernet/cabled frameworks, wireless routers, and/or those certain components. The server is
frequently the central hub, with the extra nodes acting as clients.
3.5.1 Benefits
•
It is simple to diagnose, configure, and modify.
•
Only nodes which have ended in failure are impacted. Other nodes still are up and running.
•
Fast performance is feasible with a small number of nodes and restricted network traffic.
•
In a Star topology, adding, erasing, and able to transfer devices is simple.
3.5.2 Constraints
•
If the hub or ability to focus fails, the attached nodes become disabled.
22
A rangika de silva
assignment 2 network
•
The cost of establishing a star topology seems to be high.
•
Heavy network traffic can significantly slow down buses.
•
The capacity of the hub determines performance.
• A faulty cable or even a lack of available termination could have brought the network
down.
3.6 Ring topology
Ring topology is a network configuration wherein elements connected within a ring could indeed
pass information to or from each other based on their closeness within the ring system. This
architecture is less expensive than bus topology and therefore can manage heavier loads. A ring
topology also is known as the active topology because messages are sent to each device in the ring.
Various ring topology arrangements undertake differ based about which individual devices have
been combined to form a network.
3.6.1 Benefits
•
It is easy to setup.
•
To add or remove a machine from a ring topology, only two links must be moved.
•
Troubleshooting is more difficult in a ring topology.
•
A regular computer failure could indeed bring the entire network to a halt.
•
Allows equal access to all computers on the network.
•
Error detection and acknowledgement are completed faster.
3.6.2 Constraints
•
There is only one lane of traffic.
•
An individual ring failing could jeopardize the entire network.
•
In recent years, high-speed LANs have agreed to create this topology less common.
•
Topology signals in the ring are constantly cycling, consuming unnecessary power.
•
The ring network seems to be notoriously difficult to troubleshoot.
• The addition or removal of machines may cause network activity to be disrupted.
23
A rangika de silva
assignment 2 network
3.7 Bus topology
A bus topology is a network topology in which all of the network's devices are connected
individually to a central or line. In overall, the term refers to the arrangement of countless network
devices. A bus topology could be assumed of as an aisle linking all of the devices or network nodes
across which a message is intended to be transmitted in way to attain the node to which it is
intended to be transmitted. The cable in such a bus topology frequently has two end terminations
which attenuate the message and inhibit it from trying to migrate from one end of the call to
another.
3.7.1 Benefits
•
Since the cable is less costly than in other topologies, it really is frequently used to set up
small networks.
•
LAN networks are very well despite the fact that they are inexpensive and simple to set up.
•
It is commonly used when the network installation has become small, basic, or transitory.
•
It exemplifies a passive topology. As an outcome, computers on the bus only listen for data
being sent but are not responsible for moving files from one computer to another.
3.7.2 Constraints
•
If somehow the common connection fails, the entire network will be brought to a halt.
•
Collisions inside the network occur when network traffic becomes high.
•
When network traffic is high or there are too many nodes, the network's performance time
drops dramatically.
•
The length of a cable is always restricted.
3.8 Impact of network topologies
When we look at all of the topologies, we can see that there are some benefits and drawbacks, but
some topologies have some beneficial features, and when we look at those qualities, we can see
that there is less downtime. topologies in the above-mentioned topologies, however we must
choose the most appropriate topologies. If we compare the above-mentioned topologies to this
network, we can observe that it has a large number of nodes connected to it.
24
A rangika de silva
assignment 2 network
3.9 FTP
FTP (File Transfer Protocol) is a network usual procedure for transmitting information from a
client to either a server or between servers. A client or administrator must have a username,
password, plus host address in order to upload a document to a website.
3.10 SMTP
The Simple Mail Transfer Protocol (SMTP) acts as a medium for transferring e-mail. SMTP is
always used in conjunction with the POP3 service.
3.11 TCP/IP
The TCP/IP stack consists of the Transmission Control Protocol as well as the Internet Protocol.
It's basically two separate protocols. TCP/IP is linked to FTP, SMTP, and HTTP.
3.12 Impact of network protocols
Linked devices can communicate with one another thanks to network protocols. Protocols are
critical because they are the means by which users from diverse departments communicate both
internally and outside. A protocol provides a suite of communication protocols that are commonly
used on the internet and other computer networks. From packetizing to address and routing to
receiving, this suite contains end-to-end data processing algorithms. The star topology seems to be
the most preferred since each network equipment, along with a switch or router, is actually attached
to the center node. The Internet Protocol (IP) and also the Transmission Control Protocol seem to
be two protocols that make up the Internet. IP is used for broadcasting and transferring information
over the Web, whereas TCP allows two hosts to establish a link and exchange data streams while
ensuring data and packet delivery in the very same order as they were sent.
25
A rangika de silva
assignment 2 network
4 Activity 2
4.1 Operating principles of network devices
The ability to provide numerous connectivity options while maintaining closed user groups is
crucial in today’s modern SYNTAX SOLUTIONS networks. Within certain proposed network
architectures, network virtualisation, which allows different groups to access the same network
infrastructure yet keeping them conceptually isolated to the point where they have zero visibility
into other groups, has become a challenge for network managers. Virtual LANs (VLANs) and also
the Spanning Tree Protocol were the first to give a way to partition a LAN into virtual networks
to fulfil the requirement for separate workgroups inside a single network.
4.1.1 Switch
A switch in a network is a device that directs data from one or more input ports to a particular
output port which will send it to its intended destination. A network switch in an Ethernet-based
local area network identifies where each incoming signal framing should be sent by focusing on
the physical address of the device. Switches keep tables that correspond to each MAC address and
the port in which it was received. A frame gets flooded to all ports in the switching domain if it is
26
A rangika de silva
assignment 2 network
to be redirected to a MAC address that really is unidentified to the switch infrastructure. Frames
for broadcast and multicast are likewise saturated.
4.1.2 Hub
A network hub is just a unit that distributes information to all linked computers as well as Wired
devices. From the other side, a switch is more advanced than a hub about how this might segregate
data flows to different devices. Tiny, simple local area networks benefit from network hubs
(LANs). Hubs are incapable of performing complex network activities such as routing. Network
hubs are sometimes referred to as "dumb switches" since they perform by random transferring
packets across all ports.
4.1.3 Router
Routers are networking devices which operate at the OSI architecture's layer three, or network
layer. Accepting, analysing, and sending information between connected networks is their job. The
router examines the destination address, reviews its routing tables, and then sends a packet down
that route whenever a data packet is received.
4.1.4 Bridge
A network bridge is a device that divides a network into sections. Because each segment shows a
different collision region, the number of collisions on that network is kept to a minimum. A bridge
improves network performance by ensuring so each collision domain has its own bandwidth. The
Data link layer of the OSI model is where a bridge operates (Layer 2). It looks at incoming traffic
to see if this could be forwarded or censored. Each arriving Ethernet frame's destination MAC
address is examined. The frame gets forwarded to a separate network segment if the bridge
determines that the destination host is on a various network segment.
4.1.5 Gateway
A gateway is a network node that acts as a bridge between two networks which employ different
transmission protocols. The network gateway seems to be the most common type of gateway, so
it operates at the tier 3 network layer of the OSI model. In contrast, depending on the functionality,
a gateway can operate at any of the OSI model's seven layers. The gateway acts as that of the
27
A rangika de silva
assignment 2 network
network's entry point because all traffic passing across networks needs pass through it. The only
form of traffic that does not pass via the gateway is traffic between LAN nodes.
4.2 Server types
4.2.1 Application server
An application server is just a platform middleware server that is commonly used nowadays. It's
system software which stands between both the operating system and external resources (such as
database management systems, communication, and Online services) on but one hand, and users'
apps on the other.
4.2.2 Proxy server
A proxy server, also known as a proxy router, is a server or router that acts as a conduit here
between server and the client. It was among the methods for setting up a firewall, and it assists in
keeping intruders out from a private local network. A proxy server operates on behalf of users, as
the word proxy implies "to act on behalf of another."
4.2.3 Web server
A web server is indeed a computer application that oversees website hosting. It's a computer
program that requisitions and distributes web pages as needed. The fundamental aim of the web
database to store, process, and deliver online pages to users. This communication is carried
through the Hypertext Transfer Protocol.
4.2.4 Mail server
A mail server, also known like a mail transfer agency, as well as MTA; mail transport agent; mail
router; or online mailer, is just a software application that receives email from both local and
remote senders and forwards it to the intended recipient.
4.2.5 FTP server
An FTP server's main purpose of allowing visitors to uploading and also downloading files. The
FTP server appears to be a machine with an FTP address that receives File transfer
protocol connections. FTP (File Transfer Protocol) is an internet protocol for sending and
receiving data between servers (senders) and clients (receivers) (receiver). This FTP system is a
28
A rangika de silva
assignment 2 network
computerized system that makes documents available using the FTP protocol, which is a typical
method of transmitting data between computers remotely.
4.3 Workstation and networking
A workstation is a computer that is built for scientific and technical tasks and can only be used by
one person at a time. It usually has a functional local area network that operates a multi-user
operating system.
The network interface card is simply a piece of machinery that connects computers to form a
network, most commonly a local area network. Computers on a network constantly communicate
by transmitting packets of data using the protocol that has been defined. This network interface
card acts as a translator, allowing data to be sent and received between devices on the same local
network.
workstations are high-performance computer system featuring advanced graphical, large memory,
and strong central processing units that is primarily designed for single users. Workstations are
more capable over personal computers (PCs), although they lack the sophistication of servers.
Network software is a category of features that enable machines to exchange data and users to
share computer applications. As a result, workstation computer and network software are linked,
with the network software ensuring that the workstation hardware is secure.
Ex: One of the most important concepts in network computing is the client/server model. The
client/server architecture is used in the wide range of business applications today. TCP / IP, the
Internet's primary program, is similar. The term has been used in marketing to differentiate
distributed computing by smaller scattered computers from the computer monolith of centralized
mainframe computers.
29
A rangika de silva
assignment 2 network
5 Activity 3
5.1 Network diagram
When creating a network diagram, 2 factors must be taken into account: design and
implementation. To create a good, functional network, we must first analyse network requirements
and then choose the best solutions to suit consumer expectations. There are a few steps to take.
Step 1
In terms of reliability, power, plus network ports, meet the needs of the business. Meet with Films
co-workers from each department to learn about their apps and potential expansion needs.
Step 2
Plan and design this cable distribution system. Cabling is a vital aspect of network design since it
gives the Enclave film company with a physical communication path.
Step 3
Examine the current state of the network's performance. Use protocol analysers as well as network
management software to analyse the results at various times throughout the business day, such as
at the start of shifts as well as during periods that usually result in higher traffic, including such
deadlines, heavy workloads, and perhaps moving difficult engineering data across the network.
30
A rangika de silva
assignment 2 network
Step 4
Collect information from data logical and physical diagrams that support the Enclave Film
Company's current state architecture. Identify wireless access routers, switch, LAN uplink
bandwidth, network infrastructure, and current standards. Because additional building A and B are
present, collect recent data for the IP address architecture for the LAN, includes virtual LAN
information as well as connectivity requirements.
Step 5
Develop an IP address architecture that satisfies future growth requirements and choose a routing
system for the network that supports fast convergence while remaining simple to manage.
Figure 4.2.5-1Network diagram
31
A rangika de silva
assignment 2 network
5.2 Table for allocating IP addresses
You are nonetheless setting a standard that would be difficult to update when you declare certain
IP addresses would be on whichever network, but you are also restricting the number of your
network. Because IP networks/subnets are limited in size, this is the case. A Category C network
(for example, 192.168.1.0/24) can support up to 254 computers. That may be sufficient for your
network now, although it may not be sufficient next year. Of course, the best moment to size such
IP networks comes when they're being designed. Your design can only be as excellent as the data
you have at your disposal. Assume that each network will contain 125 computers and will not
expand beyond 254 machines.
Department
Number
of users
VLAN
ID
Network ID
Broadcasting
ID
Gateway
Subnet mask
Customer
Care
10
10
192.168.10.144
192.168.10.159
192.168.10.145
255.255.255.240
Sales and
Marketing
20
20
192.168.10.96
192.168.1.127
192.168.10.97
255.255.255.224
Finance
25
30
192.168.10.64
192.168.1.95
192.168.10.65
255.255.255.224
Legal
5
40
192.168.10.160
198.168.10.167
192.168.10.161
255.255.255.248
HR
10
50
192.168.10.128
192.168.10.143
192.168.10.129
255.255.255.240
Developers
55
60
192.168.10.0
192.168.10.63
192.168.10.1
.255.255.255.192
Network
Team
5
70
192.168.10.168
192.168.10.175
192.168.10.169
255.255.255.248
Server
Room
5
100
10.254.1.0
10.254.1.255
10.254.1.1
255.255.255.0
Table 5.2-1IP addresses
32
A rangika de silva
assignment 2 network
5.3 Feedback analysis
Figure 4.2.5-1Feedback form
Question No
01
02
03
04
05
Positive response
85%
88%
99%
75%
93%
Negative response
15%
12%
1%
25%
7%
Status
√
√
√
√
√
Table 5.3-1Feedback results
As per the feedback I've gotten, consumers are really pleased with the system's user-friendliness.
They were pleased with the results. The system's security is moderate; however, a firewall seems
required to improve the system's security. A firewall, to be precise. A firewall protects the system
from unauthorized access. As a result, a firewall will indeed be linked in the not-too-distant future.
33
A rangika de silva
assignment 2 network
5.4 Network configuration
5.4.1 VTP creation
Figure 5.4.1-1VTP server configuration
34
A rangika de silva
assignment 2 network
Figure 5.4.1-2VTP client configuration
35
A rangika de silva
assignment 2 network
5.4.2 VLAN
Figure 5.4.2-1VLAN configuration
36
A rangika de silva
assignment 2 network
Figure 5.4.2-2VLAN configuration
37
A rangika de silva
assignment 2 network
Figure 5.4.2-3VLAN configuration
38
A rangika de silva
assignment 2 network
Figure 5.4.2-4VLAN configuration
39
A rangika de silva
assignment 2 network
Figure 5.4.2-5VLAN configuration
40
A rangika de silva
assignment 2 network
5.4.3 DHCP server
Figure 5.4.3-1DHCP server configuration
41
A rangika de silva
assignment 2 network
Figure 5.4.3-2DHCP server services
5.4.4 Windows 7 client installation
42
A rangika de silva
assignment 2 network
Figure 5.4.4-1Windows 7 server installation
Figure 5.4.4-2Windows 7 server installation
43
A rangika de silva
assignment 2 network
Figure 5.4.4-3Windows 7 server installation
Figure 5.4.4-4Windows 7 server installation
44
A rangika de silva
assignment 2 network
Figure 5.4.4-5Windows 7 server installation
Figure 5.4.4-6Windows 7 server installation
45
A rangika de silva
assignment 2 network
Figure 5.4.4-7Windows 7 server installation
46
A rangika de silva
assignment 2 network
Figure 8 windows 7 installation
47
A rangika de silva
assignment 2 network
Figure 9 windows 7 installation
48
A rangika de silva
assignment 2 network
Figure 10 windows 7 installation
49
A rangika de silva
assignment 2 network
Figure 11 windows 7 installation
50
A rangika de silva
assignment 2 network
Figure 12 windows 7 installation
51
A rangika de silva
assignment 2 network
Figure 13 windows 7 installation
52
A rangika de silva
assignment 2 network
Figure 14 windows 7 installation
53
A rangika de silva
assignment 2 network
Figure 15 windows 7 installation
54
A rangika de silva
assignment 2 network
Figure 16 windows 7 installation
55
A rangika de silva
assignment 2 network
Figure 17 windows 7 installation
56
A rangika de silva
assignment 2 network
Figure 18 windows 7 installation
5.4.5 Windows server installation
57
A rangika de silva
assignment 2 network
Figure 19 windows server installation
Figure 20 windows server installation
58
A rangika de silva
assignment 2 network
Figure 21 windows server installation
59
A rangika de silva
assignment 2 network
Figure 22 windows server installation
60
A rangika de silva
assignment 2 network
Figure 23 windows server installation
61
A rangika de silva
assignment 2 network
Figure 24 windows server installation
62
A rangika de silva
assignment 2 network
Figure 25 windows server installation
63
A rangika de silva
assignment 2 network
Figure 26 windows server installation
64
A rangika de silva
assignment 2 network
Figure 27 windows server installation
65
A rangika de silva
assignment 2 network
Figure 28 windows server installation
66
A rangika de silva
assignment 2 network
Figure 29 windows server installation
67
A rangika de silva
assignment 2 network
Figure 30 windows server installation\
68
A rangika de silva
assignment 2 network
Figure 31 windows server installation
69
A rangika de silva
assignment 2 network
Figure 32 windows server installation
70
A rangika de silva
assignment 2 network
Figure 33 windows server installation
71
A rangika de silva
assignment 2 network
Figure 34 windows server installation
72
A rangika de silva
assignment 2 network
Figure 35 windows server installation
73
A rangika de silva
assignment 2 network
Figure 36 windows server installation
74
A rangika de silva
assignment 2 network
Figure 37 windows server installation
75
A rangika de silva
assignment 2 network
Figure 38 windows server installation
76
A rangika de silva
assignment 2 network
Figure 39 windows server installation
77
A rangika de silva
assignment 2 network
Figure 40 windows server installation
78
A rangika de silva
assignment 2 network
Figure 41 windows server installation
79
A rangika de silva
assignment 2 network
Figure 42 windows server installation
80
A rangika de silva
assignment 2 network
Figure 43 windows server installation
81
A rangika de silva
assignment 2 network
Figure 44 windows server installation
82
A rangika de silva
assignment 2 network
Figure 45 windows server installation
83
A rangika de silva
assignment 2 network
84
A rangika de silva
assignment 2 network
85
A rangika de silva
assignment 2 network
Figure 46 windows server installation
86
A rangika de silva
assignment 2 network
Figure 47 windows server installation
6 Activity 4
The network upgrading will be implemented with minimum or no downtime inside SYNTAX once
all specifics are completed and the upgrade design plan is complete. A network model test will be
conducted as component of our implementation strategy. It will be performed during an off to
avoid any potential issues, but the result of the test will be done throughout regular business hours
to fully assess the network upgrade's performance. The items listed below will be thoroughly
scrutinized.
87
A rangika de silva
assignment 2 network
1. Confirm that the design improvement achieves important business and technical
objectives.
2. Double-check your LAN and WAN architecture and device choices.
3. Verify that the service provider is providing the service that was agreed upon.
4. Look for any bottlenecks or issues with connectivity.
5. Verify the network's redundancy.
6. Examine the effects of network link failures on performance.
7. Determine the approaches for optimizing performance as well as other technical objectives.
8. Examine the implications of network link or device upgrades on performance while they
are being built ("what-if analyses").
9. Identify any risks that may obstruct execution and devise contingency strategies.
88
A rangika de silva
assignment 2 network
6.1 Network (Cisco Packet Tracer)
Figure 5.4.5-1Network diagram packet tracer
6.2 Testing
When testing a network, the tester must be familiar with ping, ipconfig, and sending a file over the
network. Computer is the final destination. By the way, network testing necessitates a thorough
understanding of network fundamentals such as ping, share documents, internet access, and trace
route.
Test case
Description
Name
Date
send a ping to DHCP server
Rangika
04/04/2022
No
1
10.254.1.1 from PC 11
89
A rangika de silva
assignment 2 network
2
Customer vlan SYNATX
Rangika
04/04/2022
Rangika
04/04/2022
Rangika
04/04/2022
Rangika
04/04/2022
Web server ping test
3
SYNATX Web server is
accessed through a
customer vlan.
4
Customer's ping to the
webserver was extended.
5
Telnet access is available.
Table 6.2-1Test plan
Test case No
1
Input process
Ping 192.168.1.6
Expected
The actual
Status
outcome
outcome
send a ping to
Successful ping
Pass
Expected
The actual
Status
outcome
outcome
Customer vlan
Timeout request
DHCP server
10.254.1.1 from
PC 11
Table 6.2-2Test case
Test case No
2
Input process
Ping 192.168.1.6
Fail
SYNATX Web
server ping test
Table 6.2-3Test case
90
A rangika de silva
assignment 2 network
Test case No
Input process
Expected outcome
The actual
Status
outcome
3
Ping 192.168.1.6
SYNATX Web
Successful ping
Pass
The actual
Status
server is accessed
through a
customer vlan.
Table 6.2-4Test case
Test case No
Input process
Expected outcome
outcome
4
Tracer 10.254.1.11
Customer's ping to
Pass
the webserver was
extended.
Table 6.2-5Test case
Test case No
Input process
Expected outcome
The actual
Status
outcome
5
Ping
Telnet access is
Successful ping
Pass
available.
10.254.1.11
Table 6.2-6Test case
6.3 Future suggestions
•
The Return of the Clouds
Unclouding, or cloud repatriation, is a type of reverse migration. It entails moving apps and tasks
from the cloud platform to on-premises infrastructure. Technology is growing popularity among
organizations nowadays, which is understandable given its advantages. Private clouds not only
give enterprises more control, but they also improve compliance, resource management, and assist
minimize the dangers and frequency of cybersecurity threats. This trend's cost-cutting initiatives
are an extra bonus.
•
Computing at the Periphery (Edge computing)
91
A rangika de silva
assignment 2 network
This is yet another network technology with the potential to increase business and organization
operational efficiency. Edge computing is just a consumer-oriented technology for data collecting
and processing optimization. This can improve the efficiency of business system which reduces
traffic volumes and removing latency, allowing for faster data processing and improved security
if used properly. We can ensure that your firm continue to be have accessibility to the key
information it needs to keep things operating smoothly and efficiently if you implement cuttingedge networking solutions.
92
A rangika de silva
assignment 2 network
7 Reference
•
Williams, L. (2021). Type of Network Topology: Bus, Ring, Star, Mesh, Tree, P2P, Hybrid.
[online] www.guru99.com. Available at: https://www.guru99.com/type-of-networktopology.html.
•
Wikipedia.
(2022). Network
bridge.
[online]
Available
at:
https://en.wikipedia.org/wiki/Network_bridge [Accessed 5 Apr. 2022].
•
Praveen (2013). The Undo Sent E-Mail (USE) Protocol. International Journal of
Information and Computation Technology, [online] 3(6), pp.593–602. Available at:
http://www.ripublication.com/irph/ijict_spl/16_ijictv3n6spl.pdf [Accessed 5 Apr. 2022].
•
Praveen (2013). The Undo Sent E-Mail (USE) Protocol. International Journal of
Information and Computation Technology, [online] 3(6), pp.593–602. Available at:
http://www.ripublication.com/irph/ijict_spl/16_ijictv3n6spl.pdf.
•
Prakash, P. (2013). Impact Of Network Protocols On Data Center Applications. Open
Access
Dissertations.
[online]
Available
at:
https://docs.lib.purdue.edu/open_access_dissertations/72/ [Accessed 5 Apr. 2022].
•
Kimanzi, S. (2018). Wireless Router configuration in Cisco Packet Tracer. [online]
Computer
Networking
Tips.
Available
at:
https://computernetworking747640215.wordpress.com/2018/06/22/wireless-routerconfiguration-in-cisco-packet-tracer/.
•
Transtutors.com. (2018). (Solved) - Discuss the interdependence of workstation hardware
with
relevant...
|
Transtutors.
[online]
Available
at:
https://www.transtutors.com/questions/discuss-the-interdependence-of-workstationhardware-with-relevant-networking-softwar-2824686.htm.
•
Techopedia.com. (n.d.). What is an FTP Server? - Definition from Techopedia. [online]
Available at: https://www.techopedia.com/definition/26108/ftp-server.
•
www.youtube.com. (n.d.). VLAN Configuration in Cisco Switch. [online] Available at:
https://www.youtube.com/watch?v=njU_EigSXcg [Accessed 5 Apr. 2022].
93
A rangika de silva
assignment 2 network
94
A rangika de silva
assignment 2 network
Download