lOMoARcPSD|38339166 Networking Assignment -1st semester HND in Computing (ESOFT Metro Campus) Scan to open on Studocu Studocu is not sponsored or endorsed by any college or university Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Pearson Higher Nationals in Computing Unit 02: Networking Assignment 01 1 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Higher Nationals Internal verification of assessment decisions – BTEC (RQF) INTERNAL VERIFICATION – ASSESSMENT DECISIONS BTEC Higher National Diploma in Computing Programme title Assessor Internal Verifier Unit 02: Networking Unit(s) LAN Design & Implementation for SYNTAX SOLUTIONS Assignment title List which assessment criteria the Assessor has awarded. Pass Merit Distinction INTERNAL VERIFIER CHECKLIST Do the assessment criteria awarded match those shown in the assignment brief? Is the Pass/Merit/Distinction grade awarded justified by the assessor’s comments on the student work? Has the work been assessed accurately? Y/N Y/N Y/N Is the feedback to the student: Give details: • Constructive? • Linked to relevant assessment criteria? • Identifying opportunities for improved performance? • Agreeing actions? Y/N Y/N Y/N Y/N Does the assessment decision need amending? Y/N Assessor signature Date Internal Verifier signature Date Programme Leader signature (if required) Date Confirm action completed Remedial action taken Give details: Assessor signature Date Internal Verifier signature Date Programme Leader signature (if required) Date 2 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 3 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Higher Nationals - Summative Assignment Feedback Form Student Name/ID Unit Title Unit 02: Networking Assignment Number 1 Assessor 27/10/2021 Submission Date Date Received 1st submission Re-submission Date Date Received 2nd submission 27/10/2021 Assessor Feedback: LO1 Examine networking principles and their protocols. Pass, Merit & Distinction P1 P2 Descripts M1 LO2 Explain networking devices and operations. Pass, Merit & Distinction Descripts P3 P4 M2 D1 P6 M3 D2 M4 D3 LO3 Design efficient networked systems. Pass, Merit & Distinction Descripts P5 LO4 Implement and diagnose networked systems. Pass, Merit & Distinction Descripts Grade: P7 Assessor Signature: P8 Date: Resubmission Feedback: Grade: Assessor Signature: Date: Internal Verifier’s Comments: Signature & Date: * Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades decisions have been agreed at the assessment board. Assignment Feedback 4 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Formative Feedback: Assessor to Student Action Plan Summative feedback Feedback: Student to Assessor Assessor signature Date 27/10/2021 Student signature Date 5 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 General Guidelines 1. A Cover page or title page – You should always attach a title page to your assignment. Use previous page as your cover sheet and make sure all the details are accurately filled. 2. Attach this brief as the first section of your assignment. 3. All the assignments should be prepared using a word processing software. 4. All the assignments should be printed on A4 sized papers. Use single side printing. 5. Allow 1” for top, bottom, right margins and 1.25” for the left margin of each page. Word Processing Rules 1. The font size should be 12 points, and should be in the style of Time New Roman. 2. Use 1.5 line spacing. Left justify all paragraphs. 3. Ensure that all the headings are consistent in terms of the font size and font style. 4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and Page Number on each page. This is useful if individual sheets become detached for any reason. 5. Use word processing application spell check and grammar check function to help editing your assignment. Important Points: 1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the before mentioned compulsory information will result in rejection of your work. 2. Avoid using page borders in your assignment body. 3. Carefully check the hand in date and the instructions given in the assignment. Late submissions will not be accepted. 4. Ensure that you give yourself enough time to complete the assignment by the due date. 5. Excuses of any nature will not be accepted for failure to hand in the work on time. 6. You must take responsibility for managing your own time effectively. 7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may apply (in writing) for an extension. 6 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 8. Failure to achieve at least PASS criteria will result in a REFERRAL grade. 9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will then be asked to complete an alternative assignment. 10. If you use other people’s work or ideas in your assignment, reference them properly using HARVARD referencing system to avoid plagiarism. You have to provide both intext citation and a reference list. 11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be reduced to A REFERRAL or at worst you could be expelled from the course 7 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Student Declaration I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own without attributing the sources in the correct form. I further understand what it means to copy another’s work. 1. I know that plagiarism is a punishable offence because it constitutes theft. 2. I understand the plagiarism and copying policy of Pearson UK. 3. I know what the consequences will be if I plagiarise or copy another’s work in any of the assignments for this program. 4. I declare therefore that all work presented by me for every aspect of my program, will be my own, and where I have made use of another’s work, I will attribute the source in the correct way. 5. I acknowledge that the attachment of this document signed or not, constitutes a binding agreement between myself and Pearson, UK. 6. I understand that my assignment will not be considered as submitted if this document is not attached to the assignment. Student’s Signature: Provide E-mail ID 27/10/2021 Date: Provide Submission Date 8 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Higher National Diploma in Computing Assignment Brief Student Name /ID Number Unit Number and Title Unit 2: Networking Academic Year 2021/22 Unit Tutor Assignment Title LAN Design & Implementation for SYNTAX SOLUTIONS Issue Date 01/09/2021 Submission Date 27/10/2021 IV Name & Date Submission format The submission should be in the form of an individual report written in a concise, formal business style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as appropriate, and all work must be supported with research and referenced using Harvard referencing system. Please also provide an end list of references using the Harvard referencing system. The recommended word count is 3,000–3,500 words for the report excluding annexures, although you will not be penalised for exceeding the total word limit. Unit Learning Outcomes: LO1 Examine networking principles and their protocols. LO2 Explain networking devices and operations. LO3 Design efficient networked systems. LO4 Implement and diagnose networked systems. Assignment Brief and Guidance: Scenario SYNTAX SOLUTIONS is a privately owned, well-known Software company located in Colombo. The Management of SYNTAX SOLUTIONS has purchased a 3-story building in the heart of Matara. They are planning to make it one of the state-of-the-art companies in Matara with the latest facilities. 9 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 It is expected to have nearly 150 employees in Matara branch. Department Number of Users Customer Care 10 Sales and Marketing 20 Finance 25 Legal 5 HR 10 Developers 55 Network Team 5 Server Room Servers +ISP connections Following requirements are given by the Management. A ll the depa rt ment s must be separated w ith unique subnet and shou ld not commu nicate with each ot her unless there is a s pecial requirement . 19 2.168 .1 0.0/24 is given an d sh ou ld b e use d for all the de partm ent s exce pt the server room . I Ps sh ou ld assign us ing DHCP . ERP and CRM Systems ne ed to be imp le mente d in Mata ra branc h in loca l servers. Number of s er vers required for the Ser ver room ne ed to be decide d by the Network de signe r and sh ou ld be assigne d w it h 10 .2 54.1 .0 /2 4 sub net. (U ses static IPs ) High level of redundancy is ex pecte d in n etwork desig n to e liminate single point of failu re s and traffic bottle necks. Sales and Marketing Tea m nee d to access Network re source s us ing W IFI connec tivity. Proper methods for network ing monitoring and troubleshooting nee d to be esta blishe d. 10 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 A ll p ossible network security mecha nism s should be imp le mented. Assu me you have be en app ointed as th e n ew network consultant of SYNTAX SOLU TIONS . P repa re a n etwork arch itec tural de sign and imp lem ent it wit h your sug gestions an d re com men dations to me et th e compa ny req uirem ent s. (Note: Clear ly state your assumptions. You ar e allowed to design the network accor ding to your assumptions, but main requirements should not be violated) Activity 01 D isc uss t he benefits an d const ra int s of different n etwork system type s that can be imp le mente d in the Matara b ranc h an d the main IEEE Ethe rn et sta ndards that can be u sed in above LAN an d WLA N design . D isc uss t he im portanc e an d im pact of network topologies an d n etwork protocol suites wh ile comp arin g the main network topologies an d n etwork protocol suites th at are used in n etwork desig n u sing exa mp le s. Recomme nd su itab le n etwork topologies and n etwork protocol suites for above sce nario an d justif y your answe r w ith va lid points. Activity 02 Discu ss t he op erating princ ip le s of network dev ice s (Ex : Rou ter, Switc h, Etc .) and se rve r typ es that can be u sed for above scena rio wh ile exp lorin g different se rve rs that are ava ilab le in today ’s market with th eir spec ification s. Recomme nd se rve r/se r vers for the above sce nario and ju stif y you r selection with va lid point s. Discu ss t he inte r-de pen denc e of workstation hard wa re w ith networkin g softwa re and provide examp le s for n etworking soft ware that can be use d in above n etwork desig n. Activity 03 11 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Pre pare a written network desig n plan to meet th e above mentione d user req uirem ent s inc lu ding a b lue print drawn usin g a modelin g tool. (Ex : Microsoft Visio, Ed raw Max ). Supp ort your answe r by prov id in g th e VLA N and IP su bletting sche me for th e above scen ario an d the list of d evices, n etwork comp on ent s an d soft ware u sed to de sign the n etwork for above sce nario and wh ile ju stif ying you r se lec tion s. Test an d eva lu ate the proposed de sign to me et the re qu irements and ana lyze user feed back by using a User feed back form. Insta ll and configu re Network ser vices, d evices and ap plication s (E x: VLA N, DHCP, DNS , Proxy, We b, Etc .) according to the proposed d esign to accomp lish the use r req uirem ent s and desig n a detaile d Mainte nance sch edu le for above Network. * Note: - Screen s hots of Confi guration scripts s hould be pres ented. Activity 04 Imp le ment a networked syste m ba se d on your prep are d de sign w ith va lid ev id ence s and re com men d potentia l fu ture enh ance ment s for th e networke d system wit h va lid ju stification s to you r recomm endation s. Use c ritica l reflec tion to c ritically eva lu ate the design , pla n, config uration , and te sting of you r net work while ju stif ying w it h va lid conc lu sion s. Deve lop te st cases and conduc t verification (Ex: P in g , ex ten ded p in g , t race route , telnet, SSH, etc. ) to test th e above Network and ana lyse the test results aga inst the exp ected re su lt s. 12 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 13 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Table of Contents 1. Network System..............................................................................................................17 1.1. Network System Types...........................................................................................19 1.1.1. Peer – to – Peer System...................................................................................19 1.1.2. Client Server...................................................................................................20 1.2. Types of Computer Network...................................................................................20 1.2.1. Personal Area Network (PAN)........................................................................21 1.2.2. Local Area Network (LAN)............................................................................21 1.2.3. Metropolitan Area Network (MAN)................................................................21 1.2.4. Wide Area Network.........................................................................................22 1.3. Network Standards..................................................................................................22 1.3.1. The Websites for Major Standards Organizations...........................................23 1.3.2. IEEE Standards...............................................................................................23 Suitable Solutions for syntax solutions- 1...............................................................................24 1.4. Network Models.....................................................................................................25 1.4.1. ISO OSI Model...............................................................................................25 1.4.2. TCP/IP Model.................................................................................................25 1.4.3. OSI Model vs. TCP/IP Model.........................................................................26 1.4.4. Apple Talk.......................................................................................................26 1.5. Protocols.................................................................................................................27 1.1.2. Suitable protocol for Syntax Solutions branch........................................................31 1.6. 2. Network Topology......................................................................................................31 1.6.1. Physical Topology...........................................................................................31 1.6.2. Logical Topology............................................................................................32 1.6.3. Difference between Physical topology and Logical Topology.........................32 1.7. Bandwidth...........................................................................................................33 1.8. Suitable topology for SYNTAX SOLUTIONS...................................................34 Hardware Devices...........................................................................................................35 2.2. Network security.........................................................................................................39 2.3. Data Transmission Media............................................................................................42 2.4. Networking software...................................................................................................44 2.5. The recommendation for SYNTAX SOLUTIONS Matara branch..............................48 2.6. Recommendation for SYNTAX SOLUTIONS branch................................................53 14 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 2.7. Compatibility..............................................................................................................54 2.8. VLAN.........................................................................................................................54 2.9. SYNTAX SOLUTIONS Matara branch VLAN and IP subnetting scheme.................56 3. Network Diagram for SYNTAX SOLUTIONS Matara branch.......................................58 3.1. Windows server installation........................................................................................63 3.2. DHCP.........................................................................................................................66 3.3. Creating users.............................................................................................................82 3.4. Active directory configuration....................................................................................88 3.5. Network Maintenance.................................................................................................92 4. Implementing and designing the network system...........................................................93 4.1. Network device configuration.....................................................................................93 4.3. Network monitoring..................................................................................................105 4.4. Troubleshooting........................................................................................................106 4.5. Future enhancement..................................................................................................107 4.6. Evaluating design......................................................................................................107 Reference List.......................................................................................................................108 15 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Table of Figures Figure 1 (Network, Wikipedia, 2021)..........................................................................18 Figure 2(Integrated Network Systems, 2021)..............................................................19 Figure 3 (Advantages and Disadvantages of Network systems, Pinterest, 2021)........19 Figure 4(Peer to Peer Network System, Wikipedia, 2021)..........................................20 Figure 5(Client Server, Wikipedia, 2021)....................................................................20 Figure 7(Perzi, 2021)....................................................................................................21 Figure 6(LAN, Wikipedia, 2021).................................................................................21 Figure 8(Java point, 2021)...........................................................................................22 Figure 9 (BlogSpot, 2021)............................................................................................22 Figure 10(7 Layers of ISO OSI Model, Cloud Flare, 2021)........................................25 Figure 11(Layers of TCP/IP Model, guru99, 2021).....................................................26 Figure 12(guru99, 2021)..............................................................................................26 Figure 13(Apple Talk, Wikipedia, 2021)......................................................................27 Figure 14(How FTP works, Educba, 2021)..................................................................28 Figure 15(How SSH works, Wikipedia, 2021)............................................................28 Figure 16(How Telnet works, network interview, 2021).............................................28 Figure 17(Process of sending and receiving email through SMTP, Wikipedia, 2021) 29 Figure 18(HTTP, javatpoint, 2021)..............................................................................29 Figure 19(TCP, javapoint, 2021)..................................................................................30 Figure 20(UDP, educba, 2021).....................................................................................30 Figure 21(Physical Topologies, Informationq, 2021)..................................................31 Figure 22(Concept Draw, 2020)...................................................................................32 Figure 23(Author developed).......................................................................................32 Figure 24(Physical Topology and Logical Topology, wustl, 2008).............................33 Figure 25-Router..........................................................................................................36 Figure 26-Switch..........................................................................................................36 Figure 27-Modem.........................................................................................................37 Figure 28-Repeater.......................................................................................................37 Figure 29-Access point.................................................................................................38 Figure 30-Proxy server.................................................................................................40 Figure 31-UTP..............................................................................................................42 Figure 32-STP..............................................................................................................42 Figure 33-Coaxial cable...............................................................................................43 Figure 34-Fiber optics..................................................................................................43 Figure 35-PowerEdge R830 rack server......................................................................48 Figure 36- PowerEdge R240 rack server.....................................................................49 Figure 37- PowerEdge R7515 rack server...................................................................50 Figure 38-Fusion server pro 1288H V5 rack server.....................................................51 Figure 39-Dell 3240 Compact Desktop Workstation...................................................52 Figure 40- MySQL / Database.....................................................................................53 16 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 41-VIDCO-19 Kandy branch VLAN & IP subnetting scheme........................56 Figure 42-Network diagram for SYNTAX SOLUTIONS Matara branch...................58 Figure 43-Windows server 2012..................................................................................63 Figure 44- Windows server- Install..............................................................................64 Figure 45-Windows server setup..................................................................................64 Figure 46-Windows server type of installation............................................................65 Figure 47-Installing windows.......................................................................................65 Figure 48-Desktop........................................................................................................66 Figure 49-Start..............................................................................................................67 Figure 50-DHCP configure............................................................................................68 Figure 51- Add roles and features................................................................................69 Figure 52-Select installation type.................................................................................70 Figure 53- Select destination server.............................................................................71 Figure 54- Add features that required for DHCP.........................................................72 Figure 55- Roles...........................................................................................................72 Figure 56-Roles............................................................................................................73 Figure 57-Confirmation................................................................................................73 Figure 58-Installation progress.....................................................................................74 Figure 59- Feature installation.....................................................................................74 Figure 60-Start..............................................................................................................75 Figure 61- Selecting the content...................................................................................75 Figure 62-Selecting Ip4................................................................................................76 Figure 63-New scope Wizard window.........................................................................76 Figure 64-New scope wizard........................................................................................77 Figure 65-Enter IP address details................................................................................77 Figure 66-Add exclusions and delay............................................................................78 Figure 67-Lease Duration.............................................................................................78 Figure 68-Configure DHCP options.............................................................................79 Figure 69- Enter the IP address....................................................................................79 Figure 70-DNS IP.........................................................................................................80 Figure 71-WINS servers................................................................................................80 Figure 72-Activating Scope.........................................................................................81 Figure 73-Completing the New scope Wizard.............................................................81 Figure 74-Start..............................................................................................................82 Figure 75-Window of Active Directory.......................................................................82 Figure 76-Selecting the relevant user group................................................................83 Figure 77-Filling the details of the User......................................................................83 Figure 78-Setting a password.......................................................................................84 Figure 79-Select Password server options...................................................................84 Figure 80-Create...........................................................................................................85 Figure 81-Users............................................................................................................85 Figure 82-Properties.....................................................................................................86 Figure 83-Select Groups window.................................................................................86 Figure 84-Installation type...........................................................................................88 Figure 85- Select features.............................................................................................89 Figure 86- future installation........................................................................................89 17 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 87-Result...........................................................................................................90 Figure 88- Active directory..........................................................................................91 Figure 89-Network devices configuration....................................................................93 Figure 90-IP configuration...........................................................................................93 Figure 91-Configuration...............................................................................................94 Figure 92-VLAN Switch..............................................................................................94 Figure 93-Switch ports assign to VLANS....................................................................94 Figure 94-Command Prompt........................................................................................95 Figure 95-Ping..............................................................................................................95 Figure 96-Ping..............................................................................................................96 Figure 97-Ping..............................................................................................................96 Figure 98-Ping..............................................................................................................97 Figure 99-Ping..............................................................................................................97 Figure 100-Ping............................................................................................................98 Figure 101-Ping............................................................................................................98 Figure 102- Ping...........................................................................................................99 Figure 103-Test case and test.....................................................................................100 18 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 1. Network System It is a collection of computers sharing resources placed on or provided by network nodes. The computers use common communication with one another. They’re identified by network unique addresses, and have hostnames.[ CITATION Wik211 \l 1033 ] Figure 1 (Network, Wikipedia, 2021) A computer network is a collection of autonomous computing devices that are interconnected in several ways in order to exchange information by common conventions, referred to as protocols, over a shared communication medium. A special fact to remember is that a single computer with its peripherals such as printers, scanners etc… are not considered as a network. The speed with which data is moved from one place on a network to another is referred to as ‘Data transfer rate’. It is a key issue in computer networks. (Lecture notes) Advantages of computer networks Share information and resources Access databases E-commerce Easy administration Communication Provide data security 19 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Factors to be considered when installing a network 1. Performance 2. Reliability 3. Security The security of a computer is challenged everyday by: Equipment malfunctions System failures Computer Hackers Virus attacks… are the main reasons for that… (Lecture Notes) Figure 2(Integrated Network Systems, 2021) 20 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 3 (Advantages and Disadvantages of Network systems, Pinterest, 2021) 1.1. Network System Types 1.1.1. Peer – to – Peer System These networks are very common where less than 10 computers are used and a high security is not needed. The term peer presents the idea of that all computers have the same status and they communicate with one another with equal abilities.[CITATION HND21 \l 1033 ] Figure 4(Peer to Peer Network System, Wikipedia, 2021) 1.1.2. Client Server These networks are more appropriate for larger networks. Here a central computer, or ‘server’, acts as the storage location for files and applications shared on the network. Normally a ‘server’ has higher average performance. It controls the network access of other computers which are referred as ‘client’ computers. Only network administer has access rights to the server. 21 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 5(Client Server, Wikipedia, 2021) 1.2. Types of Computer Network Computer networks can be classified according to geographical distribution of computers in the network. There are mainly 4 network types: LAN (Local Area Network) PAN (Personal Area Network) MAN (Metropolitan Area Network) WAN (Wide Area Network) 1.2.1. Personal Area Network (PAN) It is a network involved with the exchange of vicinity of a person. These systems are wireless and involve the transmission of data between devices like smartphones, personal computers, tablet computers etc… [ CITATION Wik211 \l 1033 ] Figure 6(Perzi, 2021) 1.2.2. Local Area Network (LAN) A LAN connects computers inside a room or several rooms in a building. Ex: A computer network built in a school, university, a small-scale business or an office etc… 22 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 7(LAN, Wikipedia, 2021) 1.2.3. Metropolitan Area Network (MAN) MAN is a combination of several Local Area Networks which covers less than 16 miles. Ex: Banking networks, institute and universities with branches. Figure 8(Java point, 2021) 1.2.4. Wide Area Network These networks cover a wide area. This can be inside or outside a country. The best example for Wide Area Network is Internet. 23 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 9 (BlogSpot, 2021) 1.3. Network Standards These standards are essential in creating and associated maintaining an open among the competitive world market for product manufactures and guaranteeing national and international ability of data information and telecommunication technology and processes. They provide tips to manufacturers, vendors, government agencies, and different service suppliers to make sure their interconnectivity necessary in today’s marketplace and in international communications. 1.3.1. The Websites for Major Standards Organizations ANSI (American National Standards Institute) www.ansi.org IEEE (Institute of Electrical and Electronic Engineers) www.ieee.org ISO (International Organization for Standardization) www.iso.org IETF (Internet Engineering Task Force) www.ietf.org W3C (World Wide Web Consortium) www.w3c.org 1.3.2. IEEE Standards The computer society of the IEEE started a project called “Project 802” to set standards and enable intercommunication among equipment from variety of manufacturers. Basically, this can specify functions of the physical layer and the data link layer of major LAN protocols. 24 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Ex: - IEEE 802.x This deals with LAN and MAN, and they are restricted to networks carrying variablesize packets. The services and protocols which used this standard are map in the lower two layers of the OSI networking reference model. IEEE 802.3 This is a working group and a collection of IEEE standards produced by working group defining the physical layer and data link layer’s media access control of wired Ethernet.[ CITATION HND21 \l 1033 ] Suitable Solutions for syntax solutions- 1 1.1. 1.1.1. According to the scenario Client server is the best network model. In SYNTAX SOLUTIONS have 7 departments except for the server room, so there are lot of client computers. That’s why I suggest Client- Server network model. The main reason why Peer-to-peer network model is not suitable is that it is only suitable for a network with less than 10 computers. If we consider the first requirement given for this scenario, it has said that every department should be separated with unique subnet and in the server room a DHCP should be used as the protocol, so because of that I think that the Local Area Network (LAN) and Wireless Local Area Network (WLAN)are the networks which has to be implemented here as mentioned in the question. The major reason for my suggestion is that because it spans relatively small area, and the other reasons are It allows multi-access to high-bandwidth media. Control the network privately under local administration. And if the employers in each department have to connect to one another’s system if there is a special requirement, so in that case local administrator must distribute passwords for each employer to log in to the system via a VPN (Virtual Private Network) connection. It is a network that uses a public telecommunication infrastructure, such as the internet, to provide remote offices or individual users with secure access to their organization’s network.[ CITATION Qui21 \l 1033 ] 25 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 The main benefit of this network is that it uses encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted. So, in overall I think the network types LAN, WLAN, VPN are the types which have to be used for this scenario while the network model which must be implemented is the Client- Server Network system. I suggest IEEE 802.11 should be used for the interior design of this branch here because it is especially devoted to wireless LAN. And also, IEEE 802.7fibre optic connection can be used for this case. These days the most popular way to connect devices is WIFI which has the IEEE 802.11 especially in branches like this so as I said before those are the IEEE standards which are going to useful in for this process. Except for those IEEE standards Bluetooth (IEEE 802.15.1) also will be useful in sharing information. 1.4. Network Models What are Network Models? Those models are conceptual models that help to explain the data communication within a computer network. There two types of models 1. ISO OSI Model 2. TCP/IP Model 1.4.1. ISO OSI Model The Open System Interconnection model is a conceptual model that characterizes and standardises the communication functions of telecommunication or computing system without regard to its underlying internal structure and technology. 26 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 10(7 Layers of ISO OSI Model, Cloud Flare, 2021) 1.4.2. TCP/IP Model This is the set of communications protocols used in the internet and similar computer networks. In long form it is transmission control protocol and internet protocol. There are 4 layers in this model. [ CITATION Wik211 \l 1033 ] Figure 11(Layers of TCP/IP Model, guru99, 2021) 1.4.3. OSI Model vs. TCP/IP Model 27 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 12(guru99, 2021) 1.4.4. Apple Talk Apple Talk is a set of local area network communication protocols. It is originally created for Apple computers by Apple Company. This network supports up to 32 devices. The data exchanging speed is 230.4Kbps. From connecting Apple Talk equipped systems mechanically assign addresses, update the distributed namespace and configure any necessary inter networking routing. It has 4 basic components such as sockets, nodes, networks, and zones and it is hierarchically arranged.[ CITATION Wik211 \l 1033 ] 28 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 13(Apple Talk, Wikipedia, 2021) 1.5. Protocols It is a set of rules and procedures for transmitting data between two or more devices. A protocol defines What is communicated? How it is communicated? When it is communicated? Protocols can be categorized into 3 main groups as, 1. Application Layer Protocols 2. Transport Layer Protocols 3. Internet Layer Protocols [ CITATION HND21 \l 1033 ] Below are some examples for protocols 1. File Transfer Protocol (FTP) – Transfer files from the server to a client computer. This is built on client server model. Figure 14(How FTP works, Educba, 2021) 2. Secure Shell Protocol (SSH) It is a network protocol for operating network services securely over an unsecured network. Any network service can be secured with Secure Shell Protocol. 29 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 15(How SSH works, Wikipedia, 2021) 3. Telnet This protocol connects one system with another. It is types of client- server protocol that can be used open a command line on a remote computer. [ CITATION Tec21 \l 1033 ] Figure 16(How Telnet works, network interview, 2021) 4. Simple Mail Transfer Protocol (SMTP) This protocol is an internet standard communication protocol for electronic mail transmission. This protocol is responsible in sending and receiving mail messages.[ CITATION Wik21 \l 1033 ] Figure 17(Process of sending and receiving email through SMTP, Wikipedia, 2021) 5. Post Office Protocol (POP3) 30 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 As mentioned in the above example SMTP is the protocol use in emailing but it is not the only protocol needed in this process as in the above figure when receiving an email, it come across the protocol POP3 which is a one version of Post office Protocol. 6. Hypertext Transfer Protocol (HTTP) This protocol is designed for distributed, collaborative, hypermedia information systems. It transmits hypertext messages between client and servers in order to give the HTTP user a way to interact with web resources such as HTML files. Figure 18(HTTP, javatpoint, 2021) It is very popular communication protocol which enables application programs and computing devices to exchange messages over a network. Figure 19(TCP, javapoint, 2021) 31 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 7. User Datagram Protocol (UDP) It is a communication protocol which creates low- tolerating and low – latency linking between different applications. It comes under Transmission Control Protocol. Figure 20(UDP, educba, 2021) 8. Internet Protocol (IP) This protocol is the network layer communication protocol. It consists datagrams across network boundaries. The functions of this protocol are internetworking, and essentially establish the internet. [ CITATION Wik212 \l 1033 ] 1.1.2. Suitable protocol for Syntax Solutions branch I think for this scenario TCP/IP is the best option, since it is the open protocol standard and the other reasons are that it is freely available and anyone can implement in any hardware or operating system unique to the device. It is widely use in such branches. 1.6. Network Topology The geometric way of how computers are connected to each other is referred to as Network Topology. These topologies can be mainly divided into two categories 1. Physical Topology 2. Logical Topology 32 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 1.6.1. Physical Topology It is the term which refers the way in which a network is laid out physically. Examples for Physical Topologies 1. Star Topology 2. Bus Topology 3. Ring Topology 4. Tree Topology 5. Mesh Topology 6. Hybrid Topology Figure 21(Physical Topologies, Informationq, 2021) 1.6.2. Logical Topology This topology defines the architecture of the communication mechanism for all nodes in a network. The topologies fall under this category contrasts with physical topologies, which refer to the physical interconnections of all devices in the network. 1. Ethernet 2. Local Talk 3. Token ring 33 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 22(Concept Draw, 2020) 1.6.3. Difference between Physical topology and Logical Topology Physical Topology Logical Topology Depicts physical layout of network Depicts Can be modified based on needs. (Logistics of network) No Interference or manipulation involved hoe data is transmitted. here. Has major impact on cost, scalability and Has major impact on speed and delivery bandwidth capacity of networked based of data packets. Also handles flow control on selection and availability of devices. and ordered delivery of data packets. Can be arranged in star, ring, bus, mesh Only exists in bus and ring topologies. and bus topologies. Figure 23(Author developed) Both the physical and logical topologies are equally important in designing and implementing a network. However logical topology has a negative impact on the data transmitting in the form of packets, if not planned carefully. [ CITATION Tec211 \l 1033 ] 34 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 24(Physical Topology and Logical Topology, wustl, 2008) 1.7. Bandwidth In networking, this term refers to the measure of the capacity of a medium to transmit data. A medium that has a higher capacity for example, has a high bandwidth, whereas a medium that has limited capacity has a low bandwidth. Importance of Bandwidth a. Bandwidth is limited by physics and technology b. Bandwidth is not free c. Bandwidth requirements are growing at a rapid rate d. Bandwidth is critical to network performance [ CITATION HND21 \l 1033 ] 1.8. Suitable topology for SYNTAX SOLUTIONS With a properly managed network topology, a business will improve the potency of data transfer. Better efficiency, in turn can reduce cost for maintenance and operations. 35 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 For this SYNTAX SOLUTIONS Matara branch, the topology I suggest is star topology because in star topology all devices are connect to a central switch, which makes it easy to add new nodes without rebooting all currently connected device and this topology makes efficient use of cable and is easy to administer. Also, this is a commonly encountered topology especially in companies like this. 2. Hardware Devices Computer hardware means the physical components of a computer and related devices. Hardware devices that used to connect computers, printers, and other electronic devices are called network devices. Network devices can be inter network or intra network. Some devices are installed on the device, as NIC card or RJ45 connector and some parts of network are; • Router • Switch • Modem • Repeater • Access point [ CITATION tut21 \l 1033 ] Router The router is a physical or virtual internet networking device that designed to receive, analyze and forward data packets between computer networks. A router works on the third layer of the OSI model. It is based on the IP address of the computer and it is used for protocols such as ICMP to communicate between two or more network. A router is used in LAN and WAN network and it ideal for officers’ connectivity. It shares information with other routers in network and used to routing protocol to transfer the data across the network. It is more expensive than other network devices like switches and hubs. A router reads its routing table to determine on the best possible route the packet can take to quickly and reliably reach it destination. There are two group of routing table; Static the routes are fed manually inside a static routing table. It is also only suitable for very limited network with approx. two or three routers Dynamic the router communicates with other routers through protocols in a dynamic routing table to decide the routes are accessible. This 36 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 is ideal for wider networks where due to a large number of routers, feeding may not be feasible in manually.[ CITATION jav21 \l 1033 ] Static Routes are fed manually in a static routing table. It is only suitable for networks with two to three routers. Dynamic The routers communicate with each other through protocols to determine which routes are free. It is suitable for lager networks where manual feeding may not be feasible. Figure 25-Router Switch The switch is a network device that connects other devices to Ethernet networks through twisted pair cables, packet switching technique is used to receive, store and forward data packets. The switch has a list of network addresses of those all devices connected to it. The packet is sent to correct port. The packets are checked for network errors before they are forwarded. In full duplex mode, the data is transmitted. 37 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 26-Switch [ CITATION tut21 \l 1033 ] Modem Modems are used to transmit digital signals through phone lines. The two main functions of Modem are Modulation and Demodulation. Digital signals are converted into analog signals and transmitted to a modem at receiver location. A computer connected to a modem gets a digital output when the receiving modem turns the other way. Digital data can be transmitted via the RS-232 standard interface of the serial line modem. Most cable operators use modems as final terminals to locate and remember their homes and personal clients. The data link layers are in the modems. [ CITATION EDU21 \l 1033 ] Figure 27-Modem Repeater A repeater is an electronic device that re-transmits a signal. It is used to extend transmissions so that the signal can be received on the other side of an obstruction. It is a type of hardware that is simple to operate. This device operates at the physical layer of the ISO open system interconnection reference mode, which is where the signal is received on cable segment and then transmitted onto cable segment. [CITATION tut20 \l 1033 ] 38 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 28-Repeater Access point A wired or wireless link in an AP is usually means a wireless device. An AP can either act as a bridge that connects a standard wireless network to wireless devices or as routers that send data to another access point. WAP or a wireless connection point is a device that is used to generate a wireless LAN (WLAN) transmitter and receiver. An access point is a machine with an integrated antenna, transmitter, and adapter. It is usually networked in separate machines. [ CITATION EDU21 \l 1033 ] Figure 29-Access point 39 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 2.2. Network security A wide range of technologies, devices and processes are covered by network security. It is a set of rules and configurations designed to protect the integrity, confidentiality, and accessibility of computer networks and data using both software and hardware technologies. There are three different controls, such as; physical, technical and administrative. Following devices can be used for the SYNTAX SOLUTIONS Matara branch network security enhancement. Proxy server Proxy server is an intermediary server between client and the internet. It has different basic functionalities. Such as; firewall and network data filtering, network connection sharing and data caching. If you using this on its way to address you need, internet traffic flows through the proxy server. The request then reruns from the same proxy server and then the proxy server will forward to you the data obtained from the websites. Organizations and individuals use proxy server for different reasons. Such as; • To control internet usage of employees Proxy server setting up in organizations is to monitor and control how their members use the internet. Most of companies don’t want you to look at particular company time websites and they can configure the proxy server to block access to some websites. They can even track and monitor all web requests there for they know how much time you spend on cyber loafing, even though they do not block the websites. • Bandwidth saving and improved speeds Organizations with a good proxy server will get best overall network efficiency. Proxy servers will cache famous websites. There for when you ask for www.SYNTAXSOLUTIONS.com. The proxy server can search to see if it has the site’s current copy and give you the saved copy afterwards. In other word that when hundreds of users from the same proxy server hit www. SYNTAXSOLUTIONS.com at the same time, the proxy server only sends one request to www.SYNTAXSOLUTIONS.com. This saves the company bandwidth and increase the network efficiency. [ CITATION ava20 \l 1033 ] 40 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 30-Proxy server Firewall A firewall is a network security device that monitors incoming and outgoing network traffic and decides based on a set of explained security rules if allow or not to allow specific traffic. A firewall can be hardware, software or both. Firewall can be stand alone or can used in other devices for infrastructure, as routers or servers. Firewall used to both corporate and consumer setting.it can installed at an organizations network perimeter to protect against external threats or within the network to create segmentation and protect against insider threats. Hardware firmware firewalls are often used for setting restrictions between in home devices. Some firewalls are available as applications which serve as the primary device that separates two networks. It excludes unnecessary and unwanted network traffic from accessing networks inside the company. The firewall can be completely blocked. Some or all traffic depends on firewall policy of the organization or it can conduct a check on some or all of the traffic. There are two types of firewall policies used in widely; • Whitelisting The firewall rejects all connections except for those specifically listed as acceptable • Blacklisting The firewall allows all connections except those specifically listed. Intrusion detection system (IDS) 41 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 An intrusion detection system is a monitoring system that detects unsure activities and generates alerts when they are detected. A security operation center (SOC) analyst or incident responder can investigate the issue and take the appropriate action to remediate the threat based upon these alerts. There is a wide range of IDS, ranging from antivirus tools to tiered control systems that track whole network traffic. When installed at strategic point or points in the network to manage traffic to and from all devices on the network. IDS perform a passing traffic analysis and compare the traffic transmitted to the library of known attacks on the subnets. [ CITATION Gee21 \l 1033 ] IDS classifications; • Network intrusion detection system (NIDS) NIDS operate at the network level and monitor traffic from all devices going in and out of the network. • Host-based intrusion detection system (HIDS) HIDS is a system that monitor important operating system files. Intrusion prevention system (IPS) IPS is a technology that keeps an eye on a network for any malicious tasks attempting to exploit a known vulnerability. This is used to recognize malicious task, record detected threats, and report detected threats and take preventative action to stop a threat from doing damage. And also, it can used to monitor a network continually in real time. An IPS will work through all network traffic by scanning. To do this, IPS stands directly behind the firewall and offers a complementary inspection layer that searches for dangerous content in a negative way. As this, IPS tools are placed in direct communication paths between a system and network, enabling the tool to analyze network traffic. The IPS has number of methods for detecting but the three main techniques. [ CITATION pal20 \l 1033 ] They are; • Signature based detection • Anomaly based detection • Policy based detection 42 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 2.3. Data Transmission Media This is another important factor that should be considered when creating a system. There are two types of data transmission media 1. Guided/wired 2. Unguided/wireless Guided/wired If the medium used in data transmission is a physical medium, it is called guided/wired. 1. Twisted pair a. Unshielded twisted pair (UTP) This is the twisted copper wire pairs used for telephone connections. These are very flexible and low-priced. However, it is difficult to transmit data for a long distance through UTP wires. Figure 31-UTP b. Shielded twisted pair (STP) STP is a better quality and secures data transmission medium. However, it is expensive. Figure 32-STP 43 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 3. Coaxial cable It consists of an electronic cable pair. The outer cable which is like a braided copper net produces electromagnetic field around the central cable. These two cables are separated by a plastic shield. These cables are expensive and used for CCTV and TV antenna. Figure 33-Coaxial cable 4. Fiber Optics cable It consists of pair of cables. The data transmission is carried out by while reflecting light. These are used in present very commonly. The cable is relatively more expensive. This is the fastest data transmission media at present. As I mentioned in activity 1 for SYNTAX SOLUTIONS Matara branch fiber optic cable is the best option because it is the fastest data transmission media. Figure 34-Fiber optics Unguided/wireless media Data is transmitted as signal through the air without using physical medium. Ex: 1. Radio waves 2. Microwaves 3. Infrared 44 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 When SYNTAX SOLUTIONS Matara branch want to use Wi-Fi or Bluetooth or options like that, they are using radio waves in communication. And like wise other wireless media like microwaves and infrared are also will be used. As an example, mouse, wireless keyboards use infrared data transmission. 2.4. Networking software Networking software is any software that interact, increases and facilitates the functions of computer network. This is a backbone for every network. Traditional networks were hardware based with software embedded. Network software is not same as a software application. It is invisible to end users. It is simply used to facilitate the access those users have to network resources in a seamless way. Functions of network software • Helps to set up and install computer network • Enables users to have access to network resources in a seamless manner • Enables virtualizations of network • Helps to define locations of data storage and allows users to access that data • Allows administrations to add or remove users from the network Cisco IOS It is world widely most developed networking software Cisco IOS main function is to enable data communication between network nodes. It combines cutting edge technology, business critical services and broad hardware platform support. From these routing and switching can be used to improve the performance and security of network traffic. Cisco IOS has the ability to share and maintain consistent features with reusable code across the network. This help to deliver services faster and improve innovation. [ CITATION tec20 \l 1033 ] Server OS It is specifically designed to run on servers, which are specialized computer that operate within a client or server architecture. Server operating systems help enable and facilitate typical server roles such as Web server, mail server, file server, database server, application server and print server. [ CITATION web20 \l 1033 ] 45 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 As for the SYNTAX SOLUTIONS Matara branch it has to use Microsoft server 2019. Active directory Active directory is database and group of service which is developed by Microsoft for windows that connect users with the network resources they need to get their work done. It stores data as objects. It classifies directory objects by name and attributes. Active directory main server is Domain services. It stores directory information and handles the interaction of the user with the Domain. Active directory Domain server verifies access when a user signs into a device or try to connect to over a network. Active directory Domain controls which users have access to each resource or group of policies. [ CITATION Wik216 \l 1033 ] Solar winds Solar winds network show monitor can be configured quickly. Solar winds reduce network downtime and detect, diagnose and resolve network performance issues with affordable, easy to use network monitoring software. In an hour the tool automatically discovers and deploys network devices. It has an intuitive interface because it uses a straightforward approach in running a whole network. The interface of the software is very easy to use and change. It is able to create a topology that is customized to the entire network infrastructure and also can create smart alerts tailored to the dependency aware and much more. [ CITATION tec21 \l 1033 ] Server Network server is a powerful computer that provides workstations and other servers in a network with different shared resources. A user can set up a server to control access to a network, send or receive email, manage printing or host a website. They are also good at making tough calculations. Some servers are dedicated to a specific task, often referred to as commitment. Many servers today are shared servers that take responsibility for email, DNS, FTP and multiple websites on a web server. A 46 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 server may have more RAM installed than a typical workstation. [ CITATION PAE21 \l 1033 ] Importance of server Remote accessibility If employees want to work from home or elsewhere a server is very useful. And above all of that this information is much safer because the server uses a range of tools to ensure that all information is encrypted, allowing those who choose to download at the other end to keep a secure file that does not in any way affect their desktop or laptop. Geographical constrains become an issue as those who choose to work outside of the office have access to all of their email addresses. Increased reliability Many servers now have an excess power supply. This means that no data is lost in this case and the data can still be backed up during a power cut. Most servers prevent data loss in RAID configuration and do not interfere with the workflow. As mentioned earlier, it will make the unit look more reliable. Expand easily If you are looking to expand your business in the future, a client will allow you to do so. A server allows you to easily configure a variety of devices, computers, and users and add new applications. There for meaning there is no disruption to anyone in the business. Servers can classify according to their intended function There are different types of servers are available in today. Such as; • Application server There are large numbers of application servers, which is also referred to as middleware calculate the terrain between the database servers and the end sure and often connect both. • Mail server It transfers and store mail over corporate networks (LAN and WAN) through the internet, web server are also important. 47 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 • Web server Simply, a web server supports a web browser with static content by loading a file disk and servers as a web browser for a user across the network. Entire communication is facilitated by the use of HTTP by browser and server communication with each other. [ CITATION PAE21 \l 1033 ] Server components Client consists of different components and sub-components. At the hardware level, clients usually have a rack mounted chassis that includes a power supply and system. Keyboard, one or more CPUs, memory, storage, network interface and power supply. Many server hardware networks support out of zone control over a dedicated port. External management systems can be used to enable or disable the server. Most of the hardware on the network off zone is using a dedicated port. External management system can be used to remotely rotate the server.[ CITATION Hyp20 \l 1033 ] Server physical types; Rack server A rack server is known as a rack mounting server or a rack mounting computer. It is a computer called a server rack located in a rectangular structure. Rack servers are the most widely used servers in military, industrial and commercial programs and applications because of their high size, scalability, upgrade capability and support for computer intensive software but tower and blade servers from time to time. [ CITATION Rac18 \l 1033 ] Tower server The tower server is a computer intended to be used as a server and is built into a standalone cabinet. A cabinet called a tower is similar in shape and shape to a cabinet for tower type personal computer. This is in contrast to rack server s or blade server s, which is designed to be rack mounted. It is easier when cooling because the overall component density is fairly low and scalability, because an unlimited number of servers can be added to an existing network. [ CITATION ser21 \l 1033 ] Blade server 48 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 The blade server, sometimes referred to as a high-density server, is a compact device that contains a computer used to manage and distribute data over a collection of computers and systems known as a network. Its role is to act as a path between computers, programs, applications and systems. Many blade servers are dedicated and focused on a single application because professionals have more control over how they access and use and transfer data between devices.[ CITATION Rac18 \l 1033 ] 2.5. The recommendation for SYNTAX SOLUTIONS Matara branch According to the scenario, my recommendation is to use rack server because it is easy to mount server room, server rack. As well as it increased scalability, maximized air flow when coupled with a cooling systems and ease of regular computer maintenance and diagnostics given that their design allows technicians and operators to easily slide rack servers in and out of them. PowerEdge R830 rack server It has excellent functionality and cost effectiveness productivity for mainstream databases, virtualization and VDI. Features Processor Technical specification Intel®Xeon®processor E5-4600 v4 product Supported Operating System family Microsoft Microsoft Windows Server®2012 Windows Server R2 2012 Novell®SUSE®Linux Enterprise Server Red Hat®Enterprise Linux® VMware Chipset Memory vSphere®ESXi® Intel C612 (48 DIMM slots): 8GB/16GB/32GB/64GB Slots DDR4, RDIMM, LRDIMM up 2400MT/s 7 Pcle slots; 2×16 half-length, full-height 1×8 half-length, full-height 3×8 half-length, fullheight 1×8 half-length, full-height for the Storage RAID controller 16×2.5” SATA/SAS SSD, SAS 49 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) HDD lOMoARcPSD|38339166 (15K,10K), nearline SAS HDD (7.2K) Figure 35-PowerEdge R830 rack server PowerEdge R240 rack server It is specially designed for web hosting and multitasking applications with an accessible 1U rack server that simplifies performance and scaling. Features Processor Technical specification Segment 14G Wave 4 XL CPUs Advanced E- Supported Operating System 2176G Standard E-2136, E-2144G Certify XenServer Citrix® XenServer® Microsoft Windows Server® with Hyper-V Red Hat® Enterprise Ubuntu server 4×DDR4 DIMM slots, Supports UDIMM, up Memory to 2666MT/s, 64GB Max. Supports registered ECC Networking options; 2×1GbE LOM network Slots interface controller (NIC) ports Front ports; 1×USB 2.0,1×IDRAC micro-USB 2.0 management port Rear ports; 2×USB 3.0 VGA, serial connector Internal controllers: PERC H730P, H330, Storage HBA330 (non-RAID) Software RAID: PERC S140 External HBAs: 12Gbps SAS HBA (nonRAID) Boot Optimized Storage Subsystem: 2×M.2 240GB (RAID 1 or No RAID), 1×M.2 240GB (N0 RAID Only) Figure 36- PowerEdge R240 rack server 50 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 PowerEdge R7515 rack server Features Processor Technical specification One 2nd Gen AMD EPYC™ processor with Supported Operating System up to 64 cores Canonical®Ubuntu®Server LTS Citrix®Hypervisor® Microsoft® Windows Server® with Hyper-V Red Hat® Enterprise Linux SUSE® Linux Enterprise Server Memory VMware® ESXi® RDIMM 1TB Slots LRDIMM 2TB PCIe Up to 4: 2×Gen3 slots (1×8;1×16), Storage 2×Gen4 slots (2×16) Up to 8×3.5” hot plug SATA/SAS (HDD) Up to 12×3.5” hot plug SAS/SATA (HDD) Up to 24×2.5” hot plug SATA/SAS/NVMe Figure 37- PowerEdge R7515 rack server Fusion server pro 1288H V5 rack server The Huawei fusion server pro 1288H V5 is a 1U, 2-socket rack server. Deployment of dens to process workloads generated by cloud computing virtualization is high. It has high performance. Excellent scales while enhancing the use of space in data centers total expenses. Features Processor Technical specification 1st or 2nd Generation Intel® Xeon® Scalable processors (3100/4100/5100/6100/8100 Supported Operating System series) Microsoft windows server Red hat enterprise Memory server Cent OS 24 DDR4 DIMM slots, 2933 MT/s; up to 12 Internal storage Intel® Optane™ PMem modules (100 series) Supports hot plug hard drives and the following configuration options: 10×2.5-inch hard drives (6-8 NVMe SSDs and 2- 4 51 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 SAS/SATA drives with a total number of 10 or less) Power on password Administrator password Up to 5PCIe 3.0 slots, including 1 for a RAID Security PCIe Expansion controller card and 1 for a flexible NIC Figure 38-Fusion server pro 1288H V5 rack server Dell 3240 Compact Desktop Workstation Feature Processor Technical specification Intel Core i5-10500 (6 core, 12M cache, Supported operating system base 3.1GHz-4.5GHz) DDr4-2666 Windows 10 pro 64bit English, French, Graphic card RAM Spanish Intel Integrated Graphics – core i 8GB 1×8GB DDR4 2666MHz or 2933MHz (2933MHz required level core i7 or above) SoDIMM Non-Ecc Memory 256GB PCIe NVMeClass 40M.2 SSD Storage Figure 39-Dell 3240 Compact Desktop Workstation 2.6. Recommendation for SYNTAX SOLUTIONS branch According to scenario, I recommend to use three server computers for this Matara branch requirement. In SYNTAX SOLUTIONS there are lots of projects out there. Many software engineers work in SYNTAX SOLUTIONS. Therefore, MySQL and oracle can be configured as database server. I recommend, Dell PowerEdge R830 52 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 rack server to configure the database because of the system required, server installation required. Features Processor RAM Supported MySQL Oracle Windows Server 2012 or Linux7 or higher 64bit higher Minimum of 4GB RAM operating Minimum 30GB hard disk system Hard drive space Red Hat enterprise Minimum of 2GB RAM Typical Install Type total: 10GB Intel® core (™) dual core Intel 2Ghz (×86) AMD64 InteIEM64T Figure 40- MySQL / Database I recommend DNS server, DHCP server, Proxy and mail server because for the work in this branch they are essential. Dell PowerEdge R7515 rack server can be used because this server computer has powerful hardware therefore it can manage these all the services and Dell PowerEdge R240 rack server for web server because web server has lots of traffics and more load. 2.7. Compatibility Compatibility is the ability to work together on two systems without modification to do so. Compatible software applications use the same data formats. Compatibility may interaction of any two products; hardware and software, same or different types or different versions of the same product. Designed accessories compatibility with future versions is called forward compatible. In the network following should be compatible; 53 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 • Hardware • Operating system • Software If these are not compatible lot of errors will occur Such as, • Without minimum requirement for server OS, you install the OS for server it cab be crash • Routers, switches and other main networking devices are in deferent models, so it will be a big trouble in configure that • When install some server without there are requirements it will be not work or crash • Servers and clients are in deferent OS so; compatible devices must be select as requirement. [ CITATION tec211 \l 1033 ] 2.8. VLAN A VLAN (Virtual LAN) is a logical subset of devices that can be grouped together in separate physical local area network (LANs). Network virtualization is part of the virtualization described above and it is virtualization. We use network virtualization with VLANs on switches to allow connecting multiple broadcast domains with a single switch with the VLANs we divide switches in to multiple switches. [ CITATION Lif211 \l 1033 ] SYNTAX SOLUTIONS Matara branch has seven department. And 192.168.10.0/24 IP address is divided to subnet for departments. IP address are allocated for department member count. VLAN can configure because it can categorize many broadcast domains into number of logical subnets. A team at VLAN high security users can be included and external users can be removed. VLAN cannot interact with them. 54 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 2.9. SYNTAX SOLUTIONS Matara branch VLAN and IP subnetting scheme Departmen Users VL AN t Customer Care Sub Network ID net 10 VLAN 10 Mask 27 Broadcast IP Range ID 192.168.1 192.168.1 192.168. 0.1 0.11 1 0.2- 192.168. 55 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Sales and 20 Marketing VLAN 27 20 192.168.1 192.168.1 1 0.10 192.168. 0.12 0.33 1 0.13- 192.168. HR 10 VLAN 27 30 192.168.1 192.168.1 1 0.32 192.168. 0.34 0.45 1 0.35- 192.168. Legal 10 VLAN 27 40 192.168.1 192.168.1 1 0.44 192.168. 0.46 0.57 1 0.47- 192.168. Finance 25 VLAN 27 50 192.168.1 192.168.1 1 0.56 192.168. 0.58 0.84 1 0.59- 192.168. Developers 55 VLAN 27 60 192.168.1 192.168.1 1 0.83 192.168. 0.85 0.146 1 0.86- 192.168. Network Team 5 VLAN 70 27 192.168.1 192.168.1 1 0.145 192.168. 0.147 0.153 1 0.147192.168. 1 0.152 Figure 41-VIDCO-19 Kandy branch VLAN & IP subnetting scheme Wireshark Wireshark is the world’s leading network traffic analyst. It is an essential tool for security system administrator. This free software allows analyzing network traffic in real time, often the best tool for troubleshooting in network. It allows keeping network traffic under a microscope and filtering that traffic, magnifying the root cause of the problem. Administrators use it to detect faulty network devices that drop packets, delays caused by machines disrupting traffic around the world and 56 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 data leakage or unauthorized access attempts against your organization. [ CITATION Wik217 \l 1033 ] FileZilla The FileZilla software is an open-source FTP tool that allows a user to transfer files to a remote computer from a local computer. This is consisting of client and server. Client binaries are available for Windows, Linux and MacOS but server binaries are available for only Windows. Client and server both are supported protocol for FTP, SFTP and FTPS. [ CITATION Wik218 \l 1033 ] PuTTY PuTTY is a free terminal emulator that supports various network protocols such as SSH, Telnet, SCP and rlogin. It is originally available for Windows and Linux. [ CITATION Wik219 \l 1033 ] According to the scenario, to monitor the network traffic SYNTAX SOLUTIONS Matara branch has to use the wireshark. Because it analyzes the malicious data packet enters the network. SYNTAX SOLUTIONS Matara branch can use FileZilla as the remote file transfer tool. PuTTy software use as the remotely login tool for routers and switches. In this network the devices that should be used are switch, routers, access point and servers which are already explained under Hardware devices. 3. Network Diagram for SYNTAX SOLUTIONS Matara branch 57 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 42-Network diagram for SYNTAX SOLUTIONS Matara branch User feedback from about network Employee Email Department Job role Date 58 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 kamal@syntax.lk Developer Very Good Good Are you satisfied about this network? What do you 2021/10/20 Manager Excellent Bad think about the network topology implement that in network system? Did you satisfy with the speed of the internet in network? How about the security and efficiency in this network? Did you satisfy with response time with server room? Overall experience Employee Email henry@syntax.lk Department Customer Care Good Are you satisfied about this Job role Manager Very Good Date 2021/10/20 Excellent Bad 59 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 network? What do you think about the network topology implement that in network system? Did you satisfy with the speed of the internet in network? How about the security and efficiency in this network? Did you satisfy with response time with server room? Overall experience Employee Email devin@syntax.lk Department HR Good Are you satisfied about this network? What do you Job role Officer Very Good Date 2021/10/20 Excellent Bad think about the 60 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 network topology implement that in network system? Did you satisfy with the speed of the internet in network? How about the security and efficiency in this network? Did you satisfy with response time with server room? Overall experience The feedback was really good as in the above forms. According to those feedbacks it is able to conclude that the overall system was a success. 61 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 3.1. Windows server installation Windows server is a brand name for a group of server operating system released by Microsoft. That allows network activities such as print server, Domain controller, Web server and file server to be performed by a computer. It is also the framework for separately obtained server applications such as Exchange server or SQL server as a server operating system. In SYNTAX SOLUTIONS Matara branch it can use Windows Server OS for server machine. After creating a bootable USB or DVD media, insert it and boot your computer. Virtual box, KVM and VMware users need 62 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 to attach the ISO file when creating a VM and follow the installation steps shown. Then click install now on the install screen. Figure 43-Windows server 2012 Start the installation by clicking on “Install now” 63 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 44- Windows server- Install Select the Windows server 2012 edition to installed click Next Figure 45-Windows server setup Read the License term, turn on checkbox “I accept the License term” and then click next. 64 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Click custom: Install Windows only (Advanced) Figure 46-Windows server type of installation Select the disk you will be installing on. If you do not want to change drive option and click Next It will then start copying files. This will take a while (could be 20 mins or so depending on hardware performance). It will reboot a couple times (automatically) Figure 47-Installing windows 65 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 The system should automatically reboot after the installation. Set Administrator password when prompted on the next screen. Click Finish to complete the installation. Then use Ctrl + Alt + Del combination. Figure 48-Desktop That’s all now the installation is fully finished. 3.2. DHCP A DHCP server is a server that automatically assigns IP addresses to computers and other devices on the network. DHCP configure process 66 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Open server manager ----- Start Server manager Figure 49-Start Server manager------ Manage-------- Add roles and features 67 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 50-DHCP configure Before Next 68 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 51- Add roles and features Select role based or feature based installationRole and feature based Select Next 69 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 52-Select installation type Select destination server Choose the server that wants the DHCP service installed on. In this example can choose the local server next 70 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 53- Select destination server Select server roles- Select DHCP server roles next When select the roll you will get a pop up asking to add features that are required for DHCP server Add Features 71 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 54- Add features that required for DHCP Back on the select server roles page Next Figure 55- Roles 72 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 56-Roles On features DHCP Next Net Framework Next On the confirmation page can select to automatically restart the server if required. Figure 57-Confirmation 73 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Click install and Finish the installation Install progress page, it will say install succeeded when complete. Figure 58-Installation progress Figure 59- Feature installation 74 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 That completes the install of the DHCP role Move onto the next section for steps on configuring the DHCP server. Figure 60-Start Click DHCP Figure 61- Selecting the content 75 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 62-Selecting Ip4 Select Ip4 and click New Scope Figure 63-New scope Wizard window Click ‘Next’ 76 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 64-New scope wizard Figure 65-Enter IP address details 77 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 66-Add exclusions and delay Figure 67-Lease Duration 78 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 68-Configure DHCP options Select the first one which says ‘Yes, I want to configure DHCP options’ And click ‘Next’ Figure 69- Enter the IP address 79 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Enter the default gateway which is the IP of your Router then click on Next Figure 70-DNS IP Add DNS IP Figure 71-WINS servers 80 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 72-Activating Scope Select Yes I want to activate the scope now Figure 73-Completing the New scope Wizard Click Finish 81 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 3.3. Creating users Following screenshots show the step-by-step procedure of creating users. Figure 74-Start Select Active Directory Figure 75-Window of Active Directory 82 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 76-Selecting the relevant user group Figure 77-Filling the details of the User 83 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 78-Setting a password Figure 79-Select Password server options 84 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 80-Create Click Finish Figure 81-Users 85 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 82-Properties Figure 83-Select Groups window 86 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 3.4. Active directory configuration Microsoft’s proprietary directory service is an active directory (AD). It runs on windows allows clients and administrators to control network resource access and 87 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 permissions. The data is stored as objects by the active directory. A single thing, like a user, a party. A computer is an object such as a program or a printer. Objects are usually described as user or groups of principals or a printer. As users or group of principals or security printers such as printers or computers. The active directory configuration follows; Server manager Manage Add roles and features Wizard Select installation Type Add roles and features Next Select role based or feature based installation Next Figure 84-Installation type Select a server from the server pool. In server pool ensure that the local computer is selected Next After select Active Directory Domain services from roles 88 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 85- Select features Click Add features Next Figure 86- future installation Active Directory Domain Servers page Next 89 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Confirmation page Install -to install the roles, role services, or features on the server Figure 87-Result After complete installation click on notification in server manager click on the link promote this server to a domain controller When the Active Directory Domain Servers configuration wizard Select Add a new forest and enter root domain name Then verify NetBIOS domain name open Next Next Given specify locations for AD DS database folder log files folder SYSVOL folder The wizard all validates the prerequisites before installing AD DS. When all checks are passed successfully, Install When the installation is completed Close to finish wizard 90 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Active Directory Domain Services have been successfully installed. Machine will be rebooted automatically. Figure 88- Active directory 91 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 3.5. Network Maintenance It is the range of services a company intends to use to keep the work running smoothly. [ CITATION MGl21 \l 1033 ] Network Maintenance schedule SYNTAX SOLUTIONS Matara branch maintain schedule Service Occurrence Start time Duration Notice Affected Backup schedule File server Daily 12.00AM 3 hours Email server Weekly 2.00AM 2 hours Database Daily 12.00AM 2 hours Weekly 2.00AM 2 hours server A 2-3 hours’ notice will be given when the administrative server is taking down. We will give you 2-3 hours’ notice on taking down of our server. No additional notes Update testing Server update No additional notes Windows Weekly 2.00AM 2 hours update We provide will 4 hours’ notice when longer down time is Security update Daily 12.00AM 50 minutes requires. No additional notes 92 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 4. Implementing and designing the network system 4.1. Network device configuration Bellow given is the SYNTAX SOLUTIONS Matara branch network design. Figure 89-Network devices configuration Figure 90-IP configuration 93 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 91-Configuration Figure 92-VLAN Switch Figure 93-Switch ports assign to VLANS 94 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Change IP Figure 94-Start Figure 95-Adjust computer settings 95 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 96-Network settings Figure 97-Network connection Click on Ethernet then property window will appear. 96 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 98-Ethernet properties After clicking ok the IP version properties will appear. Figure 99-IP Version 4 properties 97 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Click on use following IP address After typing the address, the subnet mask will appear automatically. Then select the use the following DNS server address and give the address. Now click on ok to finish. 98 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 4.2. Ping First go to apps and select command prompt. Figure 100-Command Prompt After selecting it this window will appear 99 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 101-Ping Then ping the IP address Figure 102-Ping After that it’ll give the reply if it is correctly pinged. 100 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 103-Ping As in the following screenshot now it is successfully pinned. Figure 104-Ping 101 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 105-Ping Figure 106-Ping 102 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Figure 107-Ping Figure 108- Ping *The process of create users is included in Task 3. 103 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Test case and test above the network Test no Description Expected 1 result Telnet to router Successfully Actual result Successful in network team login client pc. 2 Ping customer Ping care pc Successful to successfully developer’s 3 client pc Check Ping connectivity successfully between room 4 server and department DHCP server Client pc get Successful working 5 Successful IP address correctly from DHCP Check routing Ping between Successful working two networks Figure 109-Test case and test Test 01: Telnet to router in network team client pc Test 02: Ping customer care pc to developers’ client pc Test 03: Check connectivity between server room and department Test 04: DHCP server working correctly Test 05: Check routing working 104 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 4.3. Network monitoring It is the use of a system that constantly monitors a computer network for slow or failing components and that notifies the network administrator in case of outages or other trouble. The ping program is one example of s basic network monitoring program. Finding performance issues and barriers can help identify problems at an early stage. Effective active monitoring can prevent network malfunctions or failures. Important features of network monitoring; • Monitoring the essentials • Selecting the correct protocol • Setting the threshold • Optimizing the monitoring time interval [ CITATION HND21 \l 1033 ] 105 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 4.4. Troubleshooting Network administrators will need to use different resources to amplify the problem in order to avoid network distortion. Troubleshooting is the process use to identify and solve the problems if anything happens in the computer network. It is the logical process that network engineers use to resolve network problems and to improve network operations. The network should be subject to troubleshooting in the following order; 1. Identify the problem 2. Make an educated guess of the possible cause of the problem. 3. Explore the system to check whether your idea is valid. 4. Identify system elements in error; plan and implement remediation steps. 5. Check that the solution worked and change procedures to prevent the problem from happening again. [ CITATION com20 \l 1033 ] 106 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 4.5. Future enhancement As for the future enhancement of the network security in SYNTAX SOLUTIONS Matara branch author recommends IPS (Invasion Prevention System). The reason for thinking that IPS is much suitable is that it has the ability to detect and secure the system. However, on the other hand IDS can identify risks. A slow running network is the main concern of companies like this SYNTAX SOLUTIONS for that infrastructure upgrade is needed. Finally, the internet of things is a trend that continues to grow, so we must also keep that in our mind and work with the newest technology for the best result. 4.6. Evaluating design According to the requirements of SYNTAX SOLUTIONS Matara branch I provide the best suitable resources. First this plan started by giving suggestions for protocols, network system type and topology which were also described very well. Then I presented the devices which should be used. After that I also came up with server suggestions. Likewise, the designing part was over. Then the next step was to ensure the security more. For that I provide the steps to follow. When designing the plan, I also suggest some ways that can make the officers who wants to work from home access the system. In order to increase network efficiency and productivity several networks control several tools was introduced. As mentioned earlier security is one of the main things which we are concerned about so as an example I use firewall because it acts as a barrier between the internet and the network. Finally, to confirm that this network design was a success author got feedbacks from some of the workers from several departments. And the feedbacks were positive which concluded that overall network design of SYNTAX SOLUTIONS Matara was a huge success. 107 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Reference List Rack Solutions, 2018. Blade server vs Rack server. [Online] Available at: https://www.racksolutions.com/news/data-center-optimization/bladeserver-vs-rack-server/#:~:text=Rack%20servers%20in%20an%20EIA %2019%E2%80%B3%20rack%20A,configured%20to%20support%20a%20wide %20range%20of%20requirements. avast, 2020. How proxy servers work. [Online] Available at: https://www.avast.com/c-what-is-a-proxy-server BTECH Pearson ,ESOFT METRO Campus, 2021. HND in Computing. s.l.:s.n. comparitech, 2020. Troubleshooting. [Online] Available at: https://www.comparitech.com/net-admin/network-troubleshootingtools/#:~:text=Follow%20a%20formalized%20routine%20when%20troubleshooting %20networks%3A%201,problem%2C%20the%20solution%2C%20and %20recommendations%20for%20procedural%20change. EDUCBA, 2021. Network devices. [Online] Available at: https://www.educba.com/types-of-network-devices/ GeeksForGeeks, 2021. IDS. [Online] Available at: https://www.geeksforgeeks.org/intrusion-detection-system-ids/ Hypertec Direct, 2020. Server Components. [Online] Available at: https://hypertecdirect.com/knowledge-base/server-componentsexplained/ java point, 2021. What is Router. [Online] Available at: https://www.javatpoint.com/router Life Wire, 2021. VLAN. [Online] Available at: https://www.lifewire.com/virtual-local-area-network-817357 M Global Services, 2021. What is Network Maintenence. [Online] Available at: https://mglobalservices.com/knowledge-center/blog/what-is-networkmaintenance PAESLER, 2021. Serever:Definition and details. [Online] Available at: https://www.paessler.com/it-explained/server paloalto, 2020. IPS. [Online] Available at: https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusionprevention-system-ips Quizlet, 2021. Virtual Private Network. [Online] Available at: https://quizlet.com/6954634/virtual-private-network-flash-cards/ serverwatch, 2021. Tower server. [Online] Available at: https://www.serverwatch.com/guides/tower-server/ Tech Differences, 2021. Difference Between Black Box and White Box Testing. [Online] Available at: https://techdifferences.com/difference-between-physical-and-logicaltopology.html Tech Target , 2021. What is Telnet and How is It Used?. [Online] Available at: https://www.techtarget.com/searchnetworking/definition/Telnet 108 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 techtarget, 2020. What is Cisco IOS?. [Online] Available at: https://www.techtarget.com/searchnetworking/definition/Cisco-IOSCisco-Internetwork-Operating-System techtarget, 2021. Compatibility. [Online] Available at: https://whatis.techtarget.com/definition/compatibility#:~:text=%20Definition%20from%20WhatIs.com%20Compatibility%20is%20the %20capacity,to%20open%20their%20document%20files%20in%20either %20product. techtarget, 2021. Solar winds. [Online] Available at: https://whatis.techtarget.com/feature/SolarWinds-hack-explainedEverything-you-need-to-know tutorialspoint, 2020. What is a repeater?. [Online] Available at: https://www.tutorialspoint.com/what-are-the-repeaters-in-computernetwork#:~:text=What%20are%20the%20Repeaters%20in%20Computer %20Network%3F%20A,of%20the%20OSI%20layer%20is%20the%20physical %20layer. tutorialspoint, 2021. Network devices. [Online] Available at: https://www.tutorialspoint.com/communication_technologies/communication_tec hnologies_network_devices.htm#:~:text=Hardware%20devices%20that%20are %20used%20to%20connect%20computers%2C,networks.%20Network%20devices %20may%20be%20inter-network%20or%20intra-net webopedia, 2020. Server Operating system. [Online] Available at: https://www.webopedia.com/definitions/server-operatingsystem/#:~:text=Forrest%20Stroud.%20A%20server%20operating%20system%2C %20also%20called,WEBOPEDIA%20FACTOID.%20Using%20server%20hardware %20sales%20data%2C%20 Wikipedia, 2021. Active directory. [Online] Available at: https://en.wikipedia.org/wiki/Active_Directory Wikipedia, 2021. Computer network. [Online] Available at: https://en.m.wikipedia.org/wiki/Computer_network Wikipedia, 2021. FileZilla. [Online] Available at: https://en.wikipedia.org/wiki/FileZilla Wikipedia, 2021. Internet Protocol. [Online] Available at: https://en.wikipedia.org/wiki/Internet_Protocol Wikipedia, 2021. PuTTy. [Online] Available at: https://en.wikipedia.org/wiki/PuTTY Wikipedia, 2021. Simple Mail Transfer Protocol. [Online] Available at: https://en.m.wikipedia.org/wiki/Simple_Mail_Transfer_Protocol Wikipedia, 2021. Wireshark. [Online] Available at: https://en.wikipedia.org/wiki/Wireshark 109 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 Grading Rubric Grading Criteria Achieved Feedback LO1: Examine networking principles and their protocols. P1 Discuss the benefits and constraints of different network types and standards. P2 Explain the impact of network topology, communication and bandwidth requirements. M1 Compare common networking principles and how protocols enable the effectiveness of networked systems. LO2 : Explain networking devices and operations P3 Discuss the operating principles of networking devices and server types. P4 Discuss the inter-dependence of workstation hardware with relevant networking software. 110 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 M2 Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimization. LO 1 & LO2 D1 Critically evaluate the topology protocol selected for a given scenario to demonstrate the efficient utilisation of a networking system. LO3 : Design efficient networked systems P5 Design a networked system to meet a given specification. P6 Test and evaluate the design to meet the requirements and analyze user feedback. M3 Install and configure network services and applications on your choice. D2 Design a maintenance schedule to support the networked system. 111 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com) lOMoARcPSD|38339166 LO4 : Implement and diagnose networked systems P7 Implement a networked system based on a prepared design. P8 Document and analyze test results against expected results. M4 Recommend potential enhancements for the networked systems. D3 Use critical reflection to evaluate own work and justify valid conclusions. 112 Matheesha Nuhansi Kalamulla –Networking Assignment 01 Downloaded by she per (shenal_6161@yahoo.com)