Higher Nationals Internal verification of assessment decisions – BTEC (RQF) INTERNAL VERIFICATION – ASSESSMENT DECISIONS Programme title BTEC Higher National Diploma in Computing Mr Dishan randika Assessor Unit(s) Assignment title Student’s name Unit 02: Internal Verifier Networking LAN Design & Implementation for SYNTAX SOLUTIONS Rangika pathmal de silva Pass List which assessment criteria the Assessor has awarded. Merit Distinction INTERNAL VERIFIER CHECKLIST Do the assessment criteria awarded match those shown in the assignment brief? Y/N Is the Pass/Merit/Distinction grade awarded justified by the assessor’s comments on the student work? Y/N Has the work been assessed accurately? Y/N Is the feedback to the student: Give details: • Constructive? • Linked to relevant assessment criteria? • Identifying opportunities for improved performance? • Agreeing actions? Y/N Y/N Y/N Does the assessment decision need amending? Y/N Y/N Assessor signature Date Internal Verifier signature Date Programme Leader signature (if required) Date Confirm action completed Remedial action taken Give details: Assessor signature Date Internal Verifier signature Date Programme Leader signature (if required) Date 1 A rangika de silva assignment 2 network Higher Nationals - Summative Assignment Feedback Form Student Name/ID Rangika de silva / Unit Title Unit 02: Assignment Number 1 Networking Assessor Submission Date Date Received 1st submission Re-submission Date Date Received 2nd submission Assessor Feedback: LO1 Examine networking principles and their protocols. Pass, Merit & Distinction P1 P2 Descripts M1 LO2 Explain networking devices and operations. Pass, Merit & Distinction Descripts P3 P4 M2 D1 P6 M3 D2 M4 D3 LO3 Design efficient networked systems. Pass, Merit & Distinction Descripts P5 LO4 Implement and diagnose networked systems. Pass, Merit & Distinction Descripts Grade: P7 P8 Assessor Signature: Date: Resubmission Feedback: Grade: Assessor Signature: Date: Internal Verifier’s Comments: Signature & Date: * Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades decisions have been agreed at the assessment board. 2 A rangika de silva assignment 2 network Assignment Feedback Formative Feedback: Assessor to Student Action Plan Summative feedback Feedback: Student to Assessor Assessor signature Date Rangikapathmal135@gmail.com Student signature 2022/04/25 Date 3 A rangika de silva assignment 2 network Pearson Higher Nationals in Computing Unit 02: Networking Assignment 01 4 A rangika de silva assignment 2 network General Guidelines 1. A Cover page or title page – You should always attach a title page to your assignment. Use previous page as your cover sheet and make sure all the details are accurately filled. 2. Attach this brief as the first section of your assignment. 3. All the assignments should be prepared using a word processing software. 4. All the assignments should be printed on A4 sized papers. Use single side printing. 5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page. Word Processing Rules 1. 2. 3. 4. The font size should be 12 point, and should be in the style of Time New Roman. Use 1.5 line spacing. Left justify all paragraphs. Ensure that all the headings are consistent in terms of the font size and font style. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and Page Number on each page. This is useful if individual sheets become detached for any reason. 5. Use word processing application spell check and grammar check function to help editing your assignment. Important Points: 1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the before mentioned compulsory information will result in rejection of your work. 2. Avoid using page borders in your assignment body. 3. Carefully check the hand in date and the instructions given in the assignment. Late submissions will not be accepted. 4. Ensure that you give yourself enough time to complete the assignment by the due date. 5. Excuses of any nature will not be accepted for failure to hand in the work on time. 6. You must take responsibility for managing your own time effectively. 7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may apply (in writing) for an extension. 8. Failure to achieve at least PASS criteria will result in a REFERRAL grade . 9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will then be asked to complete an alternative assignment. 10. If you use other people’s work or ideas in your assignment, reference them properly using HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and a reference list. 11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be reduced to A REFERRAL or at worst you could be expelled from the course 5 A rangika de silva assignment 2 network Student Declaration I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own without attributing the sources in the correct form. I further understand what it means to copy another’s work. 1. I know that plagiarism is a punishable offence because it constitutes theft. 2. I understand the plagiarism and copying policy of Pearson UK. 3. I know what the consequences will be if I plagiarise or copy another’s work in any of the assignments for this program. 4. I declare therefore that all work presented by me for every aspect of my program, will be my own, and where I have made use of another’s work, I will attribute the source in the correct way. 5. I acknowledge that the attachment of this document signed or not, constitutes a binding agreement between myself and Pearson, UK. 6. I understand that my assignment will not be considered as submitted if this document is not attached to the assignment. Rangikapathmal135@gmail.com Student’s Signature: (Provide E-mail ID) 2022/04/25 Date: (Provide Submission Date) 6 A rangika de silva assignment 2 network Higher National Diploma in Computing Assignment Brief Student Name /ID Number Rangika de silva Unit Number and Title Unit 2: Networking Academic Year 2021/22 Unit Tutor Assignment Title LAN Design & Implementation for SYNTAX SOLUTIONS Issue Date Submission Date IV Name & Date Submission format The submission should be in the form of an individual report written in a concise, formal business style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as appropriate, and all work must be supported with research and referenced using Harvard referencing system. Please also provide an end list of references using the Harvard referencing system. The recommended word count is 3,000–3,500 words for the report excluding annexures, although you will not be penalised for exceeding the total word limit. Unit Learning Outcomes: LO1 Examine networking principles and their protocols. LO2 Explain networking devices and operations. LO3 Design efficient networked systems. LO4 Implement and diagnose networked systems. Assignment Brief and Guidance: 7 A rangika de silva assignment 2 network Scenario SYNTAX SOLUTIONS is a privately owned, well-known Software company located in Colombo. The Management of SYNTAX SOLUTIONS has purchased a 3-story building in the heart of Matara. They are planning to make it one of the state-of-the-art companies in Matara with the latest facilities. It is expected to have nearly 150 employees in Matara branch. Department Number of Users Customer Care 10 Sales and Marketing 20 Finance 25 Legal 5 HR 10 Developers 55 Network Team 5 Server Room Servers +ISP connections Foll ow i ng r equir ements ar e g iv en by the Manag ement. • All the departments must be separ ated with uni que subnet and sho uld no t communicate with each o ther unless ther e is a speci al r equir ement . • 19 2.16 8.10. 0/24 is giv en and sho uld be use d fo r all the departments except the server room . IPs sho uld assign usi ng DHCP . • ERP and CRM Sy stems need to be im plem ented in M atara branch in local serv ers. • N umber of s erv ers requir ed for the S erver r oom need to be decided by the Netwo rk designer and sho uld be assigned with 10.25 4.1. 0/24 subnet. (Uses static 8 A rangika de silva assignment 2 network I Ps ) • Hig h l ev el of r edundancy is expected in netwo rk design to eliminate si ngle po int o f failures and traffic bottle necks. • S al es and Mar keti ng Team need to access Netwo rk reso urces usi ng WI FI co nnectiv ity . • Pr oper methods fo r netw or ki ng monitoring and tr oubl eshooting need to be established. • All possible netw or k sec ur ity mechanism s sho uld be im plemented. Assume yo u have been appo inted as the new netwo rk co nsultant o f SYNT AX S OLUTI ONS . P repare a netwo rk architectural design and im plement it with yo ur suggestio ns and recommendatio ns to meet the com pany requirements. (No te: Cl ea rl y state you r a ssump tion s. You a re allow ed to d esign th e n etwo rk a cco rding to you r a ssump tion s, bu t main requi remen ts sho uld n ot b e viol ated) Ac tiv ity 01 • D iscuss the benefits and co nstraints o f different netwo rk system types that can be im plemented in the Matara branch and the m ain IEEE Ethernet standards that can be used in above L AN and WLAN design . • D iscuss the im po rtance and impact o f netwo rk to po lo gies and netwo rk proto co l suites while com paring the main network to po lo gies and netwo rk proto co l suites that are used in netwo rk design using exam ples . Recomm end suitable netwo rk topolo gies and network proto co l suites fo r above scenario and justify yo ur answer with v alid po ints. 9 A rangika de silva assignment 2 network Ac tiv ity 02 • D iscuss the o perating principles o f network dev ices (Ex: Ro uter, Switch, Etc.) and server ty pes that can be used fo r abov e scenario while explo ring different servers that are available in to day’s m arket with their specificatio ns . R ecommend server/ servers fo r the abov e scenario and justify your selectio n with v alid po ints . • D iscuss the inter -dependence o f wo rkstatio n hardware with networking so ftware and prov ide exam ples fo r netwo rking so ftware that can be used in abov e netwo rk design. Ac tiv ity 03 • Prepare a written network design plan to meet the above mentioned user requirements including a blueprint drawn using a modeling tool. (Ex: Microsoft Visio, EdrawMax). Support your answer by providing the VLAN and IP subnetting scheme for the above scenario and the list of devices, network components and software used to design the network for above scenario and while justifying your selections. • Test and evaluate the proposed design to meet the requirements and analyse user feedback by using a User feedback form. • Install and co nfigure Netwo rk services , devices and applications (Ex: VL AN,D HCP , D NS,Pro xy , Web, Etc.) acco rding to the pro posed design to accom plish the user requirements and design a detailed M aintenance schedule for abov e Netwo rk. *N ote: - Scr een s hots of C onfig ur ati on scri pts shoul d be pr esented. Ac tiv ity 04 10 A rangika de silva assignment 2 network • Im plement a networked system based o n yo ur prepared design with v alid evidence s and recommend po tential future enhancements fo r the networked system with valid justificatio ns to yo ur recommendatio ns. Use critical reflectio n to critically evaluat e the design, plan, co nfiguration, and testing o f yo ur network while justifying with v alid co nclusio ns. • D evelo p test cases and co nduct verificatio n (Ex: Ping, extended ping, trace ro ute, telnet, SSH, etc.) to test the abov e Netwo rk and analyse the test results against the expected results. 11 A rangika de silva assignment 2 network Table of Contents Table of figures ..............................................................................Error! Bookmark not defined. Table of tables ............................................................................................................................... 15 1 Introduction ........................................................................................................................... 16 2 Overview ............................................................................................................................... 17 3 Activity 01 ............................................................................................................................ 18 3.1 LAN................................................................................................................................ 18 3.1.1 Benefits ................................................................................................................... 18 3.1.2 Constraints .............................................................................................................. 19 3.2 MAN............................................................................................................................... 19 3.2.1 Benefits ................................................................................................................... 19 3.2.2 Constraints .............................................................................................................. 20 3.3 Mesh topology ................................................................................................................ 20 3.3.1 Benefits ................................................................................................................... 21 3.3.2 Constraints .............................................................................................................. 21 3.4 Tree topology ................................................................................................................. 22 3.4.1 Benefits ................................................................................................................... 22 3.4.2 Constrains ............................................................................................................... 22 3.5 Star topology .................................................................................................................. 22 3.5.1 Benefits ................................................................................................................... 22 3.5.2 Constraints .............................................................................................................. 22 3.6 Ring topology ................................................................................................................. 23 3.6.1 Benefits ................................................................................................................... 23 3.6.2 Constraints .............................................................................................................. 23 3.7 Bus topology .................................................................................................................. 24 12 A rangika de silva assignment 2 network 4 3.7.1 Benefits ................................................................................................................... 24 3.7.2 Constraints .............................................................................................................. 24 3.8 Impact of network topologies ......................................................................................... 24 3.9 FTP ................................................................................................................................. 25 3.10 SMTP .......................................................................................................................... 25 3.11 TCP/IP ........................................................................................................................ 25 3.12 Impact of network protocols ....................................................................................... 25 Activity 2 .............................................................................................................................. 26 4.1 4.1.1 Switch ..................................................................................................................... 26 4.1.2 Hub.......................................................................................................................... 27 4.1.3 Router...................................................................................................................... 27 4.1.4 Bridge...................................................................................................................... 27 4.1.5 Gateway .................................................................................................................. 27 4.2 Server types .................................................................................................................... 28 4.2.1 Application server ................................................................................................... 28 4.2.2 Proxy server ............................................................................................................ 28 4.2.3 Web server .............................................................................................................. 28 4.2.4 Mail server .............................................................................................................. 28 4.2.5 FTP server ............................................................................................................... 28 4.3 5 Operating principles of network devices ........................................................................ 26 Workstation and networking .......................................................................................... 29 Activity 3 .............................................................................................................................. 30 5.1 Network diagram ............................................................................................................ 30 5.2 Table for allocating IP addresses ................................................................................... 32 5.3 Feedback analysis ........................................................................................................... 33 13 A rangika de silva assignment 2 network 5.4 6 7 Network configuration ................................................................................................... 34 5.4.1 VTP creation ........................................................................................................... 34 5.4.2 VLAN ..................................................................................................................... 36 5.4.3 DHCP server ........................................................................................................... 41 5.4.4 Windows 7 client installation.................................................................................. 42 5.4.5 Windows server installation .................................................................................... 57 Activity 4 .............................................................................................................................. 87 6.1 Network (Cisco Packet Tracer) ...................................................................................... 89 6.2 Testing ............................................................................................................................ 89 6.3 Future suggestions .......................................................................................................... 91 Reference .............................................................................................................................. 93 Table of figures Figure 4.2.5-1Network diagram .................................................................................................... 31 Figure 4.2.5-1Feedback form ........................................................................................................ 33 Figure 5.4.1-1VTP server configuration ........................................................................................ 34 Figure 5.4.1-2VTP client configuration ......................................................................................... 35 Figure 5.4.2-1VLAN configuration ................................................................................................. 36 Figure 5.4.2-2VLAN configuration ................................................................................................. 37 Figure 5.4.2-3VLAN configuration ................................................................................................. 38 Figure 5.4.2-4VLAN configuration ................................................................................................. 39 Figure 5.4.2-5VLAN configuration ................................................................................................. 40 Figure 5.4.3-1DHCP server configuration ..................................................................................... 41 Figure 5.4.3-2DHCP server services .............................................................................................. 42 Figure 5.4.4-1Windows 7 server installation ................................................................................ 43 Figure 5.4.4-2Windows 7 server installation ................................................................................ 43 Figure 5.4.4-3Windows 7 server installation ................................................................................ 44 Figure 5.4.4-4Windows 7 server installation ................................................................................ 44 Figure 5.4.4-5Windows 7 server installation ................................................................................ 45 Figure 5.4.4-6Windows 7 server installation ................................................................................ 45 Figure 5.4.4-7Windows 7 server installation ................................................................................ 46 Figure 19 windows 7 installation .................................................................................................. 47 Figure 20 windows 7 installation .................................................................................................. 48 Figure 21 windows 7 installation .................................................................................................. 49 14 A rangika de silva assignment 2 network Figure 22 windows 7 installation .................................................................................................. 50 Figure 23 windows 7 installation .................................................................................................. 51 Figure 24 windows 7 installation .................................................................................................. 52 Figure 25 windows 7 installation .................................................................................................. 53 Figure 26 windows 7 installation .................................................................................................. 54 Figure 27 windows 7 installation .................................................................................................. 55 Figure 28 windows 7 installation .................................................................................................. 56 Figure 29 windows 7 installation .................................................................................................. 57 Figure 30 windows server installation .......................................................................................... 58 Figure 31 windows server installation .......................................................................................... 58 Figure 32 windows server installation .......................................................................................... 59 Figure 33 windows server installation .......................................................................................... 60 Figure 34 windows server installation .......................................................................................... 61 Figure 35 windows server installation .......................................................................................... 62 Figure 36 windows server installation .......................................................................................... 63 Figure 37 windows server installation .......................................................................................... 64 Figure 38 windows server installation .......................................................................................... 65 Figure 39 windows server installation .......................................................................................... 66 Figure 40 windows server installation .......................................................................................... 67 Figure 41 windows server installation\......................................................................................... 68 Figure 42 windows server installation .......................................................................................... 69 Figure 43 windows server installation .......................................................................................... 70 Figure 44 windows server installation .......................................................................................... 71 Figure 45 windows server installation .......................................................................................... 72 Figure 46 windows server installation .......................................................................................... 73 Figure 47 windows server installation .......................................................................................... 74 Figure 48 windows server installation .......................................................................................... 75 Figure 49 windows server installation .......................................................................................... 76 Figure 50 windows server installation .......................................................................................... 77 Figure 51 windows server installation .......................................................................................... 78 Figure 52 windows server installation .......................................................................................... 79 Figure 53 windows server installation .......................................................................................... 80 Figure 54 windows server installation .......................................................................................... 81 Figure 55 windows server installation .......................................................................................... 82 Figure 56 windows server installation .......................................................................................... 83 Figure 57 windows server installation .......................................................................................... 86 Figure 58 windows server installation .......................................................................................... 87 Figure 5.4.5-1Network diagram packet tracer.............................................................................. 89 Table of tables Table 5.2-1IP addresses ................................................................................................................ 32 15 A rangika de silva assignment 2 network Table 5.3-1Feedback results ......................................................................................................... 33 Table 6.2-1Test plan ..................................................................................................................... 90 Table 6.2-2Test case ..................................................................................................................... 90 Table 6.2-3Test case ..................................................................................................................... 90 Table 6.2-4Test case ..................................................................................................................... 91 Table 6.2-5Test case ..................................................................................................................... 91 Table 6.2-6Test case ..................................................................................................................... 91 1 Introduction The term topology relates to the manner where the points of departure, or units, the setups of computers in a computing device in the setting of a computer network in SYNTAX SOLUTIONS are interconnected or connected to a network. SYNTAX SOLUTIONS has two branches and a head office. A single Supplier connects both the HO as well as the Branch (BR). As a Serial Interface, the interaction in between service provider and the client is ended. The HO as well as the BRs should communicate with each other. 16 A rangika de silva assignment 2 network It could be physical or conceptual in nature. The physical topology of a network refers to how a network is physically laid out, which includes the devices, installation, and placement. In contrast to its architecture in the organization, logical topology relates to how data travels in a network. 2 Overview The use of technology in business by SYNTAX SOLUTIONS, a recognized art firm, may be a complicated issue that requires a wide range of technical expertise and should be left to qualified professionals. In some cases, computer network systems managers may propose the use of different operating systems. This method is known as virtualization, and it has a number of advantages, including the ability to save power as well as consolidate servers. There are certain advantages to running many computer systems, but there are also some disadvantages. The branch network of SYNTAX SOLUTIONS has grown in an unexpected way. 17 A rangika de silva assignment 2 network 3 Activity 01 3.1 LAN A network that is assigned to a particular location is referred to as a "local area network." A lan is a network consisting of two communicating workstations that is confined to a limited geographical area, usually within another building. Wireless connections in the home or small commercial networks are examples of LANs. 3.1.1 Benefits • Devices connected to a lan can easily communicate and transfer data. • Other peripheral devices, such as printers and photocopiers, can be attached. • All network users' information can be stored on the central/server computer's hard disk. This technology allows users to access information from any computer on a network. 18 A rangika de silva assignment 2 network • Security measures that are simple to deploy to safeguard LAN users from intruders and attackers. Data will be easier to manage because it will be saved on the web server, and the information will be more secure. 3.1.2 Constraints • Because special necessary software is essential to establish a server, the initial cost of constructing a Local Area Network is typically considerable. Wired networks, switches, hubs, routers, and cables are all expensive pieces of communication hardware. • Each LAN user's private info files are accessible to the LAN administrator, who can review them. He also has accessibility to the internet and computer histories of the LAN user. • A LAN's service area is limited, such as for a single organization, a studio apartment, or perhaps a group of nearby buildings. • A virus on one computer can rapidly propagate to all of the other LAN users. 3.2 MAN In comparison to a local area network, a metropolitan area network allows users to connect to computer resources inside a larger geographic area or region. A MAN has similar to a LAN, but still, it covers an entire city or structure. The MAN Network is made up of many LANs that are connected together. As a result, MANs are typically much Smaller than WANs (WAN). The MAN infrastructure is extremely effective. It uses high-speed fiber optic lines to enable quick communication. As it is a medium-sized network, a MAN is excellent for a wide range of network users. Cities and towns are adopting MANs to establish large networks data connection speeds. The primary goal of MAN seems to be to link two LANs together. 3.2.1 Benefits • It is less expensive to connect a MAN to a WAN. MAN enables you to extract the maximum value from your data. Using MAN, all data can be easily centralized and handled. • You can send local emails fast and for free using MAN. • Data speeds may easily reach 1000 Mbps thanks to MAN's utilization of fiber optics. • File and database transfers are rapid. 19 A rangika de silva assignment 2 network • The installation of MANs allows users to share their internet connection. This allows multiple users to share the same high-speed internet connection. 3.2.2 Constraints • When the size and number of LANs in such a network expands, administration becomes increasingly challenging. • This seems to be due to issues with security plus extra configuration. • Because phone copper cables aren't suitable with it. Copper cables have an impact on MAN speed. As a result, fiber optics come at a high price. • By contrast to a LAN, such network is more vulnerable to hacker attacks. • As a result, a data breach may occur. High-level security personnel are necessary in MAN. • The implementation of MAN involves the involvement of highly skilled professionals. Among the technical staff are network managers and troubleshooters. IEEE802 is a standard developed by the Institute of Electrical and Electronics Engineers. Develop standards to facilitate the development of EE-related sectors, among other things. Standards for Local- and Metropolitan-Area Networks (IEEE802LAN/MAN Committee) Designed to work well in small geographic areas (e.g., campus) Firstmeeting: February1980(!) Goal: singleLANstandard, speeds1-20MHz PHY, MA Cand "High-level Interface" elements are logically divided. There were three LANMACs by the end of 1980: Token Bus, Token Ring, and CSMA/CD IEEE802 Requirements A single higher interface for Logical Link Control is provided by all 802 specifications (LLC) The AMAC protocol can be configured to work with a variety of physical media. IEEE 802.3 is the most common IEEE standard to utilize, as it permits and use of Ethernet connections over a network. LAN technology is defined by IEEE 802.3, also abbreviated as the Ethernet standard, which specifies the physical layer plus media access control (MAC) of both the data service layer for wired Ethernet connections. 3.3 Mesh topology The mesh topology IS network design wherein well almost every laptop on the network is simultaneously linked to every computer on the network. It uses a point-to-point link to connect 20 A rangika de silva assignment 2 network all network devices. This has a greater level of availability, which means that data can still reach its target even when a single wired network screws up. Mesh topology can be divided into two categories. • Partial mesh topology The large number of the computers in this topology are linked in a manner similar to that of a full topology. In most cases, just 2 or 3 devices have been linked. • Full mesh topology In this topology, each node or device is connected directly to the others. 3.3.1 Benefits • The network could've been enlarged without having any issues for current users. • Larger functionality is required in contrast to certain other LAN topologies. • Implementation is challenging. • Since each node does have its own related to the main, there have been no traffic issues. • Because it has lots of links, when one has blocked, both these routes for data transmission should be used. • Peer-to-peer (P2P) connections simplify the fault isolation method. • By connecting all the systems to the a single central node, you can avoid network failure. 3.3.2 Constraints • Installation is complicated because every node is linked to every other node. • Dedicated lines help to reduce traffic congestion. • Mesh topologies seem to be exceptionally long. • Each system has its own collection of data protection characteristics. • It is much more costly since more wires are being used. There is a deficiency in system utilization. • Extra area is needed for dedicated links. • It is expensive to install considering the amount of cabling and the relationship between the input. • The user will want a lot of space to run the cables. 21 A rangika de silva assignment 2 network 3.4 Tree topology The root node connects to all nodes, forming a hierarchy, in what appears to be a tree topology. It's also known as hierarchical topology. This topology is known as a Star Bus topology because it combines numerous star topologies into a single bus. The tree topology, which is comparable to the bus and star topologies, is a common word network topology. 3.4.1 Benefits • A single node's failure has no effect on the rest of the network. • The process of expanding a node seems to be simple and quick. • Error detection is just a straightforward procedure. • It's easy to handle and keep track of. 3.4.2 Constrains • It's a complicated topology with a great deal of cables. • When many nodes are deployed, it becomes difficult to maintain. • If the hub or ability to focus fails, the attached nodes are disabled. 3.5 Star topology A star topology is a network topology whereby each single piece of a network has been connected to a common node. A star represents the connection between such network nodes and the core component. Star topology is also known as a star network. Star topologies can be created using Ethernet/cabled frameworks, wireless routers, and/or those certain components. The server is frequently the central hub, with the extra nodes acting as clients. 3.5.1 Benefits • It is simple to diagnose, configure, and modify. • Only nodes which have ended in failure are impacted. Other nodes still are up and running. • Fast performance is feasible with a small number of nodes and restricted network traffic. • In a Star topology, adding, erasing, and able to transfer devices is simple. 3.5.2 Constraints • If the hub or ability to focus fails, the attached nodes become disabled. 22 A rangika de silva assignment 2 network • The cost of establishing a star topology seems to be high. • Heavy network traffic can significantly slow down buses. • The capacity of the hub determines performance. • A faulty cable or even a lack of available termination could have brought the network down. 3.6 Ring topology Ring topology is a network configuration wherein elements connected within a ring could indeed pass information to or from each other based on their closeness within the ring system. This architecture is less expensive than bus topology and therefore can manage heavier loads. A ring topology also is known as the active topology because messages are sent to each device in the ring. Various ring topology arrangements undertake differ based about which individual devices have been combined to form a network. 3.6.1 Benefits • It is easy to setup. • To add or remove a machine from a ring topology, only two links must be moved. • Troubleshooting is more difficult in a ring topology. • A regular computer failure could indeed bring the entire network to a halt. • Allows equal access to all computers on the network. • Error detection and acknowledgement are completed faster. 3.6.2 Constraints • There is only one lane of traffic. • An individual ring failing could jeopardize the entire network. • In recent years, high-speed LANs have agreed to create this topology less common. • Topology signals in the ring are constantly cycling, consuming unnecessary power. • The ring network seems to be notoriously difficult to troubleshoot. • The addition or removal of machines may cause network activity to be disrupted. 23 A rangika de silva assignment 2 network 3.7 Bus topology A bus topology is a network topology in which all of the network's devices are connected individually to a central or line. In overall, the term refers to the arrangement of countless network devices. A bus topology could be assumed of as an aisle linking all of the devices or network nodes across which a message is intended to be transmitted in way to attain the node to which it is intended to be transmitted. The cable in such a bus topology frequently has two end terminations which attenuate the message and inhibit it from trying to migrate from one end of the call to another. 3.7.1 Benefits • Since the cable is less costly than in other topologies, it really is frequently used to set up small networks. • LAN networks are very well despite the fact that they are inexpensive and simple to set up. • It is commonly used when the network installation has become small, basic, or transitory. • It exemplifies a passive topology. As an outcome, computers on the bus only listen for data being sent but are not responsible for moving files from one computer to another. 3.7.2 Constraints • If somehow the common connection fails, the entire network will be brought to a halt. • Collisions inside the network occur when network traffic becomes high. • When network traffic is high or there are too many nodes, the network's performance time drops dramatically. • The length of a cable is always restricted. 3.8 Impact of network topologies When we look at all of the topologies, we can see that there are some benefits and drawbacks, but some topologies have some beneficial features, and when we look at those qualities, we can see that there is less downtime. topologies in the above-mentioned topologies, however we must choose the most appropriate topologies. If we compare the above-mentioned topologies to this network, we can observe that it has a large number of nodes connected to it. 24 A rangika de silva assignment 2 network 3.9 FTP FTP (File Transfer Protocol) is a network usual procedure for transmitting information from a client to either a server or between servers. A client or administrator must have a username, password, plus host address in order to upload a document to a website. 3.10 SMTP The Simple Mail Transfer Protocol (SMTP) acts as a medium for transferring e-mail. SMTP is always used in conjunction with the POP3 service. 3.11 TCP/IP The TCP/IP stack consists of the Transmission Control Protocol as well as the Internet Protocol. It's basically two separate protocols. TCP/IP is linked to FTP, SMTP, and HTTP. 3.12 Impact of network protocols Linked devices can communicate with one another thanks to network protocols. Protocols are critical because they are the means by which users from diverse departments communicate both internally and outside. A protocol provides a suite of communication protocols that are commonly used on the internet and other computer networks. From packetizing to address and routing to receiving, this suite contains end-to-end data processing algorithms. The star topology seems to be the most preferred since each network equipment, along with a switch or router, is actually attached to the center node. The Internet Protocol (IP) and also the Transmission Control Protocol seem to be two protocols that make up the Internet. IP is used for broadcasting and transferring information over the Web, whereas TCP allows two hosts to establish a link and exchange data streams while ensuring data and packet delivery in the very same order as they were sent. 25 A rangika de silva assignment 2 network 4 Activity 2 4.1 Operating principles of network devices The ability to provide numerous connectivity options while maintaining closed user groups is crucial in today’s modern SYNTAX SOLUTIONS networks. Within certain proposed network architectures, network virtualisation, which allows different groups to access the same network infrastructure yet keeping them conceptually isolated to the point where they have zero visibility into other groups, has become a challenge for network managers. Virtual LANs (VLANs) and also the Spanning Tree Protocol were the first to give a way to partition a LAN into virtual networks to fulfil the requirement for separate workgroups inside a single network. 4.1.1 Switch A switch in a network is a device that directs data from one or more input ports to a particular output port which will send it to its intended destination. A network switch in an Ethernet-based local area network identifies where each incoming signal framing should be sent by focusing on the physical address of the device. Switches keep tables that correspond to each MAC address and the port in which it was received. A frame gets flooded to all ports in the switching domain if it is 26 A rangika de silva assignment 2 network to be redirected to a MAC address that really is unidentified to the switch infrastructure. Frames for broadcast and multicast are likewise saturated. 4.1.2 Hub A network hub is just a unit that distributes information to all linked computers as well as Wired devices. From the other side, a switch is more advanced than a hub about how this might segregate data flows to different devices. Tiny, simple local area networks benefit from network hubs (LANs). Hubs are incapable of performing complex network activities such as routing. Network hubs are sometimes referred to as "dumb switches" since they perform by random transferring packets across all ports. 4.1.3 Router Routers are networking devices which operate at the OSI architecture's layer three, or network layer. Accepting, analysing, and sending information between connected networks is their job. The router examines the destination address, reviews its routing tables, and then sends a packet down that route whenever a data packet is received. 4.1.4 Bridge A network bridge is a device that divides a network into sections. Because each segment shows a different collision region, the number of collisions on that network is kept to a minimum. A bridge improves network performance by ensuring so each collision domain has its own bandwidth. The Data link layer of the OSI model is where a bridge operates (Layer 2). It looks at incoming traffic to see if this could be forwarded or censored. Each arriving Ethernet frame's destination MAC address is examined. The frame gets forwarded to a separate network segment if the bridge determines that the destination host is on a various network segment. 4.1.5 Gateway A gateway is a network node that acts as a bridge between two networks which employ different transmission protocols. The network gateway seems to be the most common type of gateway, so it operates at the tier 3 network layer of the OSI model. In contrast, depending on the functionality, a gateway can operate at any of the OSI model's seven layers. The gateway acts as that of the 27 A rangika de silva assignment 2 network network's entry point because all traffic passing across networks needs pass through it. The only form of traffic that does not pass via the gateway is traffic between LAN nodes. 4.2 Server types 4.2.1 Application server An application server is just a platform middleware server that is commonly used nowadays. It's system software which stands between both the operating system and external resources (such as database management systems, communication, and Online services) on but one hand, and users' apps on the other. 4.2.2 Proxy server A proxy server, also known as a proxy router, is a server or router that acts as a conduit here between server and the client. It was among the methods for setting up a firewall, and it assists in keeping intruders out from a private local network. A proxy server operates on behalf of users, as the word proxy implies "to act on behalf of another." 4.2.3 Web server A web server is indeed a computer application that oversees website hosting. It's a computer program that requisitions and distributes web pages as needed. The fundamental aim of the web database to store, process, and deliver online pages to users. This communication is carried through the Hypertext Transfer Protocol. 4.2.4 Mail server A mail server, also known like a mail transfer agency, as well as MTA; mail transport agent; mail router; or online mailer, is just a software application that receives email from both local and remote senders and forwards it to the intended recipient. 4.2.5 FTP server An FTP server's main purpose of allowing visitors to uploading and also downloading files. The FTP server appears to be a machine with an FTP address that receives File transfer protocol connections. FTP (File Transfer Protocol) is an internet protocol for sending and receiving data between servers (senders) and clients (receivers) (receiver). This FTP system is a 28 A rangika de silva assignment 2 network computerized system that makes documents available using the FTP protocol, which is a typical method of transmitting data between computers remotely. 4.3 Workstation and networking A workstation is a computer that is built for scientific and technical tasks and can only be used by one person at a time. It usually has a functional local area network that operates a multi-user operating system. The network interface card is simply a piece of machinery that connects computers to form a network, most commonly a local area network. Computers on a network constantly communicate by transmitting packets of data using the protocol that has been defined. This network interface card acts as a translator, allowing data to be sent and received between devices on the same local network. workstations are high-performance computer system featuring advanced graphical, large memory, and strong central processing units that is primarily designed for single users. Workstations are more capable over personal computers (PCs), although they lack the sophistication of servers. Network software is a category of features that enable machines to exchange data and users to share computer applications. As a result, workstation computer and network software are linked, with the network software ensuring that the workstation hardware is secure. Ex: One of the most important concepts in network computing is the client/server model. The client/server architecture is used in the wide range of business applications today. TCP / IP, the Internet's primary program, is similar. The term has been used in marketing to differentiate distributed computing by smaller scattered computers from the computer monolith of centralized mainframe computers. 29 A rangika de silva assignment 2 network 5 Activity 3 5.1 Network diagram When creating a network diagram, 2 factors must be taken into account: design and implementation. To create a good, functional network, we must first analyse network requirements and then choose the best solutions to suit consumer expectations. There are a few steps to take. Step 1 In terms of reliability, power, plus network ports, meet the needs of the business. Meet with Films co-workers from each department to learn about their apps and potential expansion needs. Step 2 Plan and design this cable distribution system. Cabling is a vital aspect of network design since it gives the Enclave film company with a physical communication path. Step 3 Examine the current state of the network's performance. Use protocol analysers as well as network management software to analyse the results at various times throughout the business day, such as at the start of shifts as well as during periods that usually result in higher traffic, including such deadlines, heavy workloads, and perhaps moving difficult engineering data across the network. 30 A rangika de silva assignment 2 network Step 4 Collect information from data logical and physical diagrams that support the Enclave Film Company's current state architecture. Identify wireless access routers, switch, LAN uplink bandwidth, network infrastructure, and current standards. Because additional building A and B are present, collect recent data for the IP address architecture for the LAN, includes virtual LAN information as well as connectivity requirements. Step 5 Develop an IP address architecture that satisfies future growth requirements and choose a routing system for the network that supports fast convergence while remaining simple to manage. Figure 4.2.5-1Network diagram 31 A rangika de silva assignment 2 network 5.2 Table for allocating IP addresses You are nonetheless setting a standard that would be difficult to update when you declare certain IP addresses would be on whichever network, but you are also restricting the number of your network. Because IP networks/subnets are limited in size, this is the case. A Category C network (for example, 192.168.1.0/24) can support up to 254 computers. That may be sufficient for your network now, although it may not be sufficient next year. Of course, the best moment to size such IP networks comes when they're being designed. Your design can only be as excellent as the data you have at your disposal. Assume that each network will contain 125 computers and will not expand beyond 254 machines. Department Number of users VLAN ID Network ID Broadcasting ID Gateway Subnet mask Customer Care 10 10 192.168.10.144 192.168.10.159 192.168.10.145 255.255.255.240 Sales and Marketing 20 20 192.168.10.96 192.168.1.127 192.168.10.97 255.255.255.224 Finance 25 30 192.168.10.64 192.168.1.95 192.168.10.65 255.255.255.224 Legal 5 40 192.168.10.160 198.168.10.167 192.168.10.161 255.255.255.248 HR 10 50 192.168.10.128 192.168.10.143 192.168.10.129 255.255.255.240 Developers 55 60 192.168.10.0 192.168.10.63 192.168.10.1 .255.255.255.192 Network Team 5 70 192.168.10.168 192.168.10.175 192.168.10.169 255.255.255.248 Server Room 5 100 10.254.1.0 10.254.1.255 10.254.1.1 255.255.255.0 Table 5.2-1IP addresses 32 A rangika de silva assignment 2 network 5.3 Feedback analysis Figure 4.2.5-1Feedback form Question No 01 02 03 04 05 Positive response 85% 88% 99% 75% 93% Negative response 15% 12% 1% 25% 7% Status √ √ √ √ √ Table 5.3-1Feedback results As per the feedback I've gotten, consumers are really pleased with the system's user-friendliness. They were pleased with the results. The system's security is moderate; however, a firewall seems required to improve the system's security. A firewall, to be precise. A firewall protects the system from unauthorized access. As a result, a firewall will indeed be linked in the not-too-distant future. 33 A rangika de silva assignment 2 network 5.4 Network configuration 5.4.1 VTP creation Figure 5.4.1-1VTP server configuration 34 A rangika de silva assignment 2 network Figure 5.4.1-2VTP client configuration 35 A rangika de silva assignment 2 network 5.4.2 VLAN Figure 5.4.2-1VLAN configuration 36 A rangika de silva assignment 2 network Figure 5.4.2-2VLAN configuration 37 A rangika de silva assignment 2 network Figure 5.4.2-3VLAN configuration 38 A rangika de silva assignment 2 network Figure 5.4.2-4VLAN configuration 39 A rangika de silva assignment 2 network Figure 5.4.2-5VLAN configuration 40 A rangika de silva assignment 2 network 5.4.3 DHCP server Figure 5.4.3-1DHCP server configuration 41 A rangika de silva assignment 2 network Figure 5.4.3-2DHCP server services 5.4.4 Windows 7 client installation 42 A rangika de silva assignment 2 network Figure 5.4.4-1Windows 7 server installation Figure 5.4.4-2Windows 7 server installation 43 A rangika de silva assignment 2 network Figure 5.4.4-3Windows 7 server installation Figure 5.4.4-4Windows 7 server installation 44 A rangika de silva assignment 2 network Figure 5.4.4-5Windows 7 server installation Figure 5.4.4-6Windows 7 server installation 45 A rangika de silva assignment 2 network Figure 5.4.4-7Windows 7 server installation 46 A rangika de silva assignment 2 network Figure 8 windows 7 installation 47 A rangika de silva assignment 2 network Figure 9 windows 7 installation 48 A rangika de silva assignment 2 network Figure 10 windows 7 installation 49 A rangika de silva assignment 2 network Figure 11 windows 7 installation 50 A rangika de silva assignment 2 network Figure 12 windows 7 installation 51 A rangika de silva assignment 2 network Figure 13 windows 7 installation 52 A rangika de silva assignment 2 network Figure 14 windows 7 installation 53 A rangika de silva assignment 2 network Figure 15 windows 7 installation 54 A rangika de silva assignment 2 network Figure 16 windows 7 installation 55 A rangika de silva assignment 2 network Figure 17 windows 7 installation 56 A rangika de silva assignment 2 network Figure 18 windows 7 installation 5.4.5 Windows server installation 57 A rangika de silva assignment 2 network Figure 19 windows server installation Figure 20 windows server installation 58 A rangika de silva assignment 2 network Figure 21 windows server installation 59 A rangika de silva assignment 2 network Figure 22 windows server installation 60 A rangika de silva assignment 2 network Figure 23 windows server installation 61 A rangika de silva assignment 2 network Figure 24 windows server installation 62 A rangika de silva assignment 2 network Figure 25 windows server installation 63 A rangika de silva assignment 2 network Figure 26 windows server installation 64 A rangika de silva assignment 2 network Figure 27 windows server installation 65 A rangika de silva assignment 2 network Figure 28 windows server installation 66 A rangika de silva assignment 2 network Figure 29 windows server installation 67 A rangika de silva assignment 2 network Figure 30 windows server installation\ 68 A rangika de silva assignment 2 network Figure 31 windows server installation 69 A rangika de silva assignment 2 network Figure 32 windows server installation 70 A rangika de silva assignment 2 network Figure 33 windows server installation 71 A rangika de silva assignment 2 network Figure 34 windows server installation 72 A rangika de silva assignment 2 network Figure 35 windows server installation 73 A rangika de silva assignment 2 network Figure 36 windows server installation 74 A rangika de silva assignment 2 network Figure 37 windows server installation 75 A rangika de silva assignment 2 network Figure 38 windows server installation 76 A rangika de silva assignment 2 network Figure 39 windows server installation 77 A rangika de silva assignment 2 network Figure 40 windows server installation 78 A rangika de silva assignment 2 network Figure 41 windows server installation 79 A rangika de silva assignment 2 network Figure 42 windows server installation 80 A rangika de silva assignment 2 network Figure 43 windows server installation 81 A rangika de silva assignment 2 network Figure 44 windows server installation 82 A rangika de silva assignment 2 network Figure 45 windows server installation 83 A rangika de silva assignment 2 network 84 A rangika de silva assignment 2 network 85 A rangika de silva assignment 2 network Figure 46 windows server installation 86 A rangika de silva assignment 2 network Figure 47 windows server installation 6 Activity 4 The network upgrading will be implemented with minimum or no downtime inside SYNTAX once all specifics are completed and the upgrade design plan is complete. A network model test will be conducted as component of our implementation strategy. It will be performed during an off to avoid any potential issues, but the result of the test will be done throughout regular business hours to fully assess the network upgrade's performance. The items listed below will be thoroughly scrutinized. 87 A rangika de silva assignment 2 network 1. Confirm that the design improvement achieves important business and technical objectives. 2. Double-check your LAN and WAN architecture and device choices. 3. Verify that the service provider is providing the service that was agreed upon. 4. Look for any bottlenecks or issues with connectivity. 5. Verify the network's redundancy. 6. Examine the effects of network link failures on performance. 7. Determine the approaches for optimizing performance as well as other technical objectives. 8. Examine the implications of network link or device upgrades on performance while they are being built ("what-if analyses"). 9. Identify any risks that may obstruct execution and devise contingency strategies. 88 A rangika de silva assignment 2 network 6.1 Network (Cisco Packet Tracer) Figure 5.4.5-1Network diagram packet tracer 6.2 Testing When testing a network, the tester must be familiar with ping, ipconfig, and sending a file over the network. Computer is the final destination. By the way, network testing necessitates a thorough understanding of network fundamentals such as ping, share documents, internet access, and trace route. Test case Description Name Date send a ping to DHCP server Rangika 04/04/2022 No 1 10.254.1.1 from PC 11 89 A rangika de silva assignment 2 network 2 Customer vlan SYNATX Rangika 04/04/2022 Rangika 04/04/2022 Rangika 04/04/2022 Rangika 04/04/2022 Web server ping test 3 SYNATX Web server is accessed through a customer vlan. 4 Customer's ping to the webserver was extended. 5 Telnet access is available. Table 6.2-1Test plan Test case No 1 Input process Ping 192.168.1.6 Expected The actual Status outcome outcome send a ping to Successful ping Pass Expected The actual Status outcome outcome Customer vlan Timeout request DHCP server 10.254.1.1 from PC 11 Table 6.2-2Test case Test case No 2 Input process Ping 192.168.1.6 Fail SYNATX Web server ping test Table 6.2-3Test case 90 A rangika de silva assignment 2 network Test case No Input process Expected outcome The actual Status outcome 3 Ping 192.168.1.6 SYNATX Web Successful ping Pass The actual Status server is accessed through a customer vlan. Table 6.2-4Test case Test case No Input process Expected outcome outcome 4 Tracer 10.254.1.11 Customer's ping to Pass the webserver was extended. Table 6.2-5Test case Test case No Input process Expected outcome The actual Status outcome 5 Ping Telnet access is Successful ping Pass available. 10.254.1.11 Table 6.2-6Test case 6.3 Future suggestions • The Return of the Clouds Unclouding, or cloud repatriation, is a type of reverse migration. It entails moving apps and tasks from the cloud platform to on-premises infrastructure. Technology is growing popularity among organizations nowadays, which is understandable given its advantages. Private clouds not only give enterprises more control, but they also improve compliance, resource management, and assist minimize the dangers and frequency of cybersecurity threats. This trend's cost-cutting initiatives are an extra bonus. • Computing at the Periphery (Edge computing) 91 A rangika de silva assignment 2 network This is yet another network technology with the potential to increase business and organization operational efficiency. Edge computing is just a consumer-oriented technology for data collecting and processing optimization. This can improve the efficiency of business system which reduces traffic volumes and removing latency, allowing for faster data processing and improved security if used properly. We can ensure that your firm continue to be have accessibility to the key information it needs to keep things operating smoothly and efficiently if you implement cuttingedge networking solutions. 92 A rangika de silva assignment 2 network 7 Reference • Williams, L. (2021). Type of Network Topology: Bus, Ring, Star, Mesh, Tree, P2P, Hybrid. [online] www.guru99.com. Available at: https://www.guru99.com/type-of-networktopology.html. • Wikipedia. (2022). Network bridge. [online] Available at: https://en.wikipedia.org/wiki/Network_bridge [Accessed 5 Apr. 2022]. • Praveen (2013). The Undo Sent E-Mail (USE) Protocol. International Journal of Information and Computation Technology, [online] 3(6), pp.593–602. Available at: http://www.ripublication.com/irph/ijict_spl/16_ijictv3n6spl.pdf [Accessed 5 Apr. 2022]. • Praveen (2013). The Undo Sent E-Mail (USE) Protocol. International Journal of Information and Computation Technology, [online] 3(6), pp.593–602. Available at: http://www.ripublication.com/irph/ijict_spl/16_ijictv3n6spl.pdf. • Prakash, P. (2013). Impact Of Network Protocols On Data Center Applications. Open Access Dissertations. [online] Available at: https://docs.lib.purdue.edu/open_access_dissertations/72/ [Accessed 5 Apr. 2022]. • Kimanzi, S. (2018). Wireless Router configuration in Cisco Packet Tracer. [online] Computer Networking Tips. Available at: https://computernetworking747640215.wordpress.com/2018/06/22/wireless-routerconfiguration-in-cisco-packet-tracer/. • Transtutors.com. (2018). (Solved) - Discuss the interdependence of workstation hardware with relevant... | Transtutors. [online] Available at: https://www.transtutors.com/questions/discuss-the-interdependence-of-workstationhardware-with-relevant-networking-softwar-2824686.htm. • Techopedia.com. (n.d.). What is an FTP Server? - Definition from Techopedia. [online] Available at: https://www.techopedia.com/definition/26108/ftp-server. • www.youtube.com. (n.d.). VLAN Configuration in Cisco Switch. [online] Available at: https://www.youtube.com/watch?v=njU_EigSXcg [Accessed 5 Apr. 2022]. 93 A rangika de silva assignment 2 network 94 A rangika de silva assignment 2 network