NT HND

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 71

Acknowledgement

I take this opportunity to express my profound gratitude and deep regards to my guide
Mr. Prasad Thisera for his exemplary guidance, monitoring and constant
encouragement throughout the course. The blessing, help and guidance given by him
time to time shall carry me a long way in the journey of life on which I am about to
embark. Learning this subject was a good experience for me and it gave me a good
knowledge about networking technologies.

Mohammed Basith Network Technologies


Page 1
Contents
1 Introduction............................................................................................................6
2 Task 1.....................................................................................................................8
2.1 Network System Types....................................................................................8
2.2 Network Topologies........................................................................................9
2.3 Suggested network topology for winsoft (Pvt) Ltd.......................................10
3 Task 02.................................................................................................................11
3.1 Network communications standards..............................................................11
4 Task 03.................................................................................................................14
4.1 Protocols in data communication:.................................................................14
5 Task 04.................................................................................................................15
6 Task 05.................................................................................................................19
6.1 Hardware components employed in the solution..........................................19
7 Task 06.................................................................................................................22
7.1 Types of servers for the solution...................................................................22
7.2 Types of servers available in the market.......................................................24
8 Task 7...................................................................................................................27
9 Task 8...................................................................................................................30
10 Task 9...................................................................................................................34
10.1 Activity 3...................................................................................................45
10.2 Activity 4...................................................................................................48
10.3 Test cases...................................................................................................56
11 Task 10.................................................................................................................64
11.1 Future enhancements for the network........................................................64
12 Task 11.................................................................................................................65
13 Conclusion............................................................................................................66
14 Self-Criticism.......................................................................................................67
15 Appendix..............................................................................................................68
15.1 Gantt chart..................................................................................................68
16 Reference list........................................................................................................69

Mohammed Basith Network Technologies


Page 2
List of figures
Figure 1- Network solution for the Winsoft call center...............................................16
Figure 2........................................................................................................................34
Figure 3........................................................................................................................34
Figure 4........................................................................................................................35
Figure 5........................................................................................................................35
Figure 6........................................................................................................................36
Figure 7........................................................................................................................37
Figure 8........................................................................................................................37
Figure 9........................................................................................................................38
Figure 10......................................................................................................................38
Figure 11......................................................................................................................39
Figure 12......................................................................................................................39
Figure 13......................................................................................................................40
Figure 14......................................................................................................................40
Figure 15......................................................................................................................41
Figure 16......................................................................................................................41
Figure 17......................................................................................................................42
Figure 18......................................................................................................................43
Figure 19......................................................................................................................43
Figure 20......................................................................................................................44
Figure 21......................................................................................................................44
Figure 22......................................................................................................................45
Figure 23......................................................................................................................45
Figure 24......................................................................................................................46
Figure 25......................................................................................................................46
Figure 26......................................................................................................................47
Figure 27......................................................................................................................48
Figure 28......................................................................................................................48
Figure 29......................................................................................................................49
Figure 30......................................................................................................................49
Figure 31......................................................................................................................50
Mohammed Basith Network Technologies
Page 3
Figure 32......................................................................................................................50
Figure 33......................................................................................................................51
Figure 34......................................................................................................................51
Figure 35......................................................................................................................52
Figure 36......................................................................................................................52
Figure 37......................................................................................................................53
Figure 38......................................................................................................................53
Figure 39......................................................................................................................54
Figure 40......................................................................................................................54
Figure 41......................................................................................................................55
Figure 42......................................................................................................................55
Figure 43......................................................................................................................62
Figure 44......................................................................................................................62
Figure 50......................................................................................................................62

Mohammed Basith Network Technologies


Page 4
List of Tables
Table 1............................................................................................................................6
Table 2..........................................................................................................................17
Table 3..........................................................................................................................18
Table 4..........................................................................................................................19
Table 5..........................................................................................................................20
Table 6..........................................................................................................................21
Table 7..........................................................................................................................56
Table 8..........................................................................................................................57
Table 9..........................................................................................................................58
Table 10........................................................................................................................59
Table 11........................................................................................................................60
Table 12........................................................................................................................61
Table 13........................................................................................................................65

Mohammed Basith Network Technologies


Page 5
1 Introduction

Winsoft (Pvt) Ltd is an upcoming call center. It has 02 branches with the head
office at Colombo and the other is located in Kandy. The building of the head
office has 03 floors, and the Kandy is with 02 floors. As the Chief Network
Engineer of the Winsoft (Pvt) Ltd, I have given a great opportunity to create a
networking solution for the Winsoft (Pvt) Ltd. They provided us some of their
requirements for their buildings.

The setup of the Head Office and Branch is as follows:


Head office in Colombo
Floor 1: Floor 2: Floor 3
 Reception Area  Calling Center for  Calling Center for
 Marketing Department  USA UK
(10 employees) clients - 150 compu clients - 120 compu
 GM’s Room ters ters
 Accounts Department   Video conferencing  Auditorium – with
(08 employees) room Wi-Fi facilities
 Customer Interview  Training  The Server
Area – with Wi-Fi Center with 50 Room with the IT
facilities computers team
Branch in Kandy
Floor 1: Floor 2:
 Reception Area  Calling Center for
 Center Manager’s Asian
Room clients - 80 comput
 Calling Center for ers
Australian  Training
clients - 100 computer Center with 30
s computers
 Video conferencing  Auditorium – with
room Wi-Fi facilities
Table 1

Mohammed Basith Network Technologies


Page 6
The requirements of the WINSOFT.com are as follows:

a. All departments’ computers of the HEAD OFFICE are to be integrated in to a


centralized network. Name – WINSOFT.com.

b. All computers in the KANDY branch are to be integrated in to a child entity of


the main domain which supposed to be designed under (a).Name
– KANDY.WINSOFT.com

c. Finance department should be kept independently in separate non-centralized


environments.

d. The Auditorium of each branch and Customer Interview Area are to be


equipped with Wi-Fi connections which are limited only to their respective
sites.

e. A dedicated connection between two branches (Head Office and Kandy)


which would allow the intra network connectivity between departments.

According to these facts as the chief network engineer of my company I have


suggested a networking solution for this company. And you will see what kind of
things that I did for Winsoft (Pvt) Ltd. when you go through this assignment.

Mohammed Basith Network Technologies


Page 7
2 Task 1

2.1 Network System Types


Local Area Network (LAN)
Local area network is isolated from the network. Generally, it is built in a
physical place such as office or home, etc. computers are connected by a small
server and connected to the wide area network (Internet). Such networks are
useful for sharing data like files, big or small documents, network gaming etc.

Wide Area Network (WAN)


As the name suggests, the Wide Area Network (WAN) covers a wide area
which may span across provinces and even a whole country. Generally,
telecommunication networks are Wide Area Network. These networks provide
connectivity to MANs and LANs. Since they are equipped with very high speed
backbone, WANs use very expensive network equipment.

Metropolitan Area Network (MAN)


Metropolitan Area Network is a large computer network where all the
computers are connected with each other from different geographical location.
Its structure and the built process are quite similar with the LAN. The only
difference its spans an entire city or a selected are like college or university
campus or a shopping area. We can get a shared network connection form
MAN.

Personal Area Network (PAN)


A Personal Area Network (PAN) is a computer network organized around an
single person. Personal Area Networks typically involve a Laptop, a mobile
phone or a handheld computing device such as a PDA, Tablet PC. You can use
these networks to transfer files including email, calendar appointments, photos
and music.

Wireless LAN (WLAN)


A Wireless LAN (or WLAN, for wireless local area network) is one in which a
mobile user can connect to a local area network through a wireless (radio)

Mohammed Basith Network Technologies


Page 8
connection. The IEEE 802.11 is the group of standards specify for the
technologies for WLAN.

2.2 Network Topologies


Bus Topology
Bus networks use a common backbone to connect all the devices. Single cable
of the backbone functions as a shared communication medium that devices
attach or seize an interface connector. Any device wanting to communicate with
another device on the network sends a broadcast message onto the wire that all
other devices to see, but only the recipient actually accepts and processes the
message.

Ring Topology
In a ring network, each device has exactly two neighbors for the communication
purposes. All the messages travel through a ring in the same direction (either
"right" or "left"). A failure in any cable or device breaks the loop and can take
down the entire network.

Star Topology
Most of the home networks use the star topology. Star network features a
central connection point called the "hub node" which may be a network hub,
switch or router. The devices are usually connected to the hub with Unshielded
Twisted Pair (UTP) Ethernet. Compared to the bus topology, a star network
generally requires more of the cable. But a failure in any star network cable will
only take down network access to a computer and not the entire LAN.

Tree Topology
Tree topologies integrate multiple star topologies together into a bus topology.
Only the hub devices connect directly to tree bus, and each hub functions as the
root of a tree of the devices. This hybrid bus / star approach supports future
expandability of the much better than a bus (limited in the number of devices
due to the broadcast traffic it generates) or a star (limited by the number of
connection points hub) single network.

Mohammed Basith Network Technologies


Page 9
2.3 Suggested network topology for winsoft (Pvt) Ltd
I can suggest to use the star topology as the suitable network topology to design
the network for winsoft (Pvt) Ltd. we can say that the star topologies are best
suited for segmented environments.

The reasons for suggesting the star topology


 Here in the network solution we can implement the star networks
individually as all the devices in each LAN is connected to a central device
which is the switch.
 winsoft (Pvt) Ltd is segmented. Star topology is also divided into sections.
So the star topology can be used to implement the network solution.
 The client server centralized architecture is used in the network so the star
topology is the most suitable network topology for the centralized
networks.
 Centralized management is provided with the star topology which all the
nodes of the department is connected to a central device which is the
switch. So it helps to monitor the winsoft network better.
 And also adding or removing a device in the star topology can be done
without much effort and without changing the network.
 And also the performance of the network can be high with the use of the
star topology because the failure of certain devices or links doesn’t affect
the whole network. As an example, when one access point fails it does not
affect the other access point in the network. And the security can be said to
be higher too.

As the star topology is fault tolerant, it is easy to maintain. And also the error
detection is easy and very easy to maintain. So it can be said that it is the
suitable network topology for winsoft (Pvt) Ltd.

Mohammed Basith Network Technologies


Page 10
3 Task 02

3.1 Network communications standards


Ethernet (IEEE 802.3)
Ethernet is a technology data link layer and physical for local area networks
(LAN). Ethernet was invented by engineer Robert Metcalfe. When first widely
deployed in the 1980s, Ethernet supports a theoretical maximum data rate of 10
megabits per second (Mbps). Later, calls "Fast Ethernet" standards increased
this maximum data rate of 100 Mbps. The Gigabit Ethernet technology further
extends peak performance up to the 1000 Mbps, and 10 Gigabit Ethernet
technologies also exist nowadays. Network Protocols higher level, such as
Internet Protocol (IP) use Ethernet as the transmission medium. And data
travels over Ethernet inside protocol units called as frames. Single Ethernet
cable is limited to about 100 meters, but the Ethernet network can be easily
extended to link entire schools or office buildings using network bridge devices.

Fast Ethernet
Fast Ethernet is a local area network (LAN) transmission standard. Fast
Ethernet data transfer rate is 100Mbps. In the network solution proposed for the
winsoft (pvt) Ltd, fast Ethernet can be used as the data transferring standard
between the different client nodes of the network.

Gigabit Ethernet (IEEE 802.3)


And also there is new Ethernet are introduced such as gigabit Ethernet and 10
gigabit Ethernet. Gigabit Ethernet is a data transmission technology which is
based on the Ethernet frame technology. Gigabit Ethernet provides a data rate of
1 billion bits per second (one gigabit). Gigabit Ethernet is defined in the IEEE
802.3 standard and at present it is being used as the backbone in many

Mohammed Basith Network Technologies


Page 11
enterprise networks. Gigabit Ethernet is carried primarily on optical fiber.
According to the designing network for the company, gigabit Ethernet can be
used for the communication between the servers.

Wi-Fi (IEEE 802.11)


IEEE 802.11 is a set of medium access control (MAC) and Physical Layer (PHY)
specifications for implementing the local area network (WLAN) computer
communication wireless bands at 2.4, 3.6, 5 and 60 GHz. They are created and
maintained by the LAN / MAN Standards Committee IEEE (IEEE 802). The base
version of the standard was released in 1997 and has been amended. The standard and
amendments constitute the basis of wireless networking products that use Wi-Fi
brand. While each of the amendment is officially revoked when incorporated in the
latest version of the standard, business marketing tends to revisions as concisely
denote capabilities of their products. As a result, in the market, each revision tends to
become its own standard.

TCP/IP
When we discuss about the network related standards, transmission Control
Protocol/Internet Protocol (TCP/IP) is another standard which is followed when
designing the network. TCP/IP is a network standard and a protocol. TCP/IP
technology defines how data is delivered from one node to the other node in the
network. It makes sure the fact that whether data is arrived correctly. According to
this technology, rules are defined in transferring the data in the network.
1. Splitting the message into data packets.
2. Assigning a designation address for each data packet.
3. Checking for errors.
4. Sequentially organize data packets
5. Regulate packets along the network
6. Reassemble data packets

TCP/IP is a network standard for Internet communications too. The implemented


VPN can be set up through the internet too. So the internet is involved in the network.

Mohammed Basith Network Technologies


Page 12
Same above mentioned rule set applies for data transferring through the Internet. This
process is known as packet switching. So we can use this TCP/IP standard in the
network implementing for the winsoft (pvt) Ltd because data is needed to be
transferred within the company network and some data is needed to be transferred
through the virtual private network.

IPv4 and IPv6


IPv4 is another network standard used in the modern networks. Internet Protocol
version 4 (IPv4), the fourth version of Internet Protocol is a standard which is used for
addressing computers. In the IPv4 technology, the addressing helps in the process of
identifying the devices on a network. IPv4 standard uses a 32-bit address. The address
is in binary format (1s and 0s). Over 4 billion addresses are allowed by IPv4. It also
allows unicast, multicast and broadcast.

According to techtarget (2016), Internet Protocol version 6 (IPv6) was introduced


later because addressing computers with IPv4 is limited. IPv6 uses a 128 bits address
and it is in hexadecimal format. It allows unicast, multicast and unicast. And also it
provides efficient routing in the network. IPv6 has been an aim to achieve for the
modern networks from almost a decade. Driving this standard has been the
recognition that IP addresses for public use are running out and this is caused by the
increase in devices that need an IP address. IPv6 standard aims to address several
shortcomings and errors with the current IPv4 standard. The need for more address
spaces is often cited as the primary reason for moving to IPv6. The IPv6 address
mechanism in the IPv6 standard is designed to allow addresses to be divided into two
parts, a unique identifier for a device and the location that the device gets connected
to the network. For the network it means that any device in the network can be
uniquely recognized. So then it would be possible to track devices physically and it
would enhance the security of the network.

This Internet protocol standard is a must have standard in the implementing network
of winsoft (pvt) Ltd, because it addresses all the nodes in the network and helps to
uniquely identify each device with IP address.

Mohammed Basith Network Technologies


Page 13
4 Task 03

4.1 Protocols in data communication:

HTTP
The Hypertext Transfer Protocol (HTTP) is an application protocol,
collaborative systems, distributed hypermedia information. HTTP is the
foundation of data communication for the World Wide Web. Hypertext is
structured text using logical links (hyperlinks) between nodes that containing
the text. HTTP is the protocol for the exchange or transfer of hypertext.

SMTP (Simple Mail Transfer Protocol)


(Pronounced as separate letters) Short for Simple Mail Transfer Protocol
(SMTP). This is a protocol for sending email messages between the servers.
Most of the e-mail systems that send mail over the Internet use SMTP to send
messages from one server to another; messages can be retrieved with an email
client using POP or IMAP. In addition, SMTP is generally used to send
messages from a mail client to a mail server. This is why it is necessary to
specify both the POP or IMAP server and the SMTP server when you configure
your email application.

FTP
The short term for File Transfer Protocol (FTP), the protocol is for exchanging
files over the Internet. FTP works the same way as HTTP for transferring Web
pages from a server in the user's browser and SMTP for transferring electronic
mail across the Internet in which, like these technologies, FTP uses TCP / IP

Mohammed Basith Network Technologies


Page 14
protocols to allow data transfer. FTP is used most often to download a file from
a server via Internet or upload a file to a server (for example, upload a Web
page file on a server).

TCP/IP
TCP / IP are based on a reference model of four layers. All protocols belonging
to / IP suite of protocols are TCP in the top three layers of this model. As shown
in the below illustration, each layer of the TCP / IP model corresponds to one or
more layers of the reference model seven-layer Open Systems Interconnection
(OSI) proposed by the International Organization for Standardization (ISO).

5 Task 04

Requirements of the WINSOFT call center


In the winsoft (pvt) Ltd, main domain will be the WINSOFT.com and the child
domain will be KANDY.WINSOFT.com. All the computers in the Kandy branch
is needed to be integrated into a child entity of the main domain called
KANDY.WINSOFT.com. The networks of the two places which are the head
office and the Kandy branch office are needed to be connected through the
Virtual private network (VPN). So the VPN can be used as the dedicated network
connection to maintain intra network connectivity between departments. To
design the network solution for the winsoft (pvt) Ltd, the star topology is used to
design the network. Client/server centralized architecture is implemented for star
topologies.

There are two branches and head office consists of three floors and the branch
office consists of 2 floors. For the finance department in head office, peer-to-peer
architecture is needed to be used because they have to be kept independently in
non-centralized environment. A single switch is needed to connect the GM’s
room devices and reception areas devices. (For design purpose only one switch is
used).

Auditorium of each branch and Customer Interview Area are needed to be


equipped with Wi-Fi connections which are limited only to their respective sites.
So the Wireless access points are placed in the auditorium and in the customer
interview area.
Mohammed Basith Network Technologies
Page 15
Mohammed Basith Network Technologies
Page 16
Figure 1- Network solution for the Winsoft call center

Mohammed Basith Network Technologies


Page 17
Analysis of the network solution diagram
The diagram shows the networked environment of winsoft (pvt) Ltd.

Head office
1st Floor
Department IP Range Network Wi-Fi Network Other
Name Topology /Ethernet Components equipment

Marketing Logical Star Ethernet Firewall,


Topology Router, Core
Switch
GM’s Room Logical Star Ethernet Printer 1
and reception Topology
area
Finance 192.168.1.0/ Logical Star Ethernet Printer 2
24 Topology

Customer Logical Star Wi-Fi Access Point


interview area Topology (802.11b) 1
2nd Floor
Department IP Range Network Wi-Fi Network Other
Name Topology /Ethernet Components equipment

Training Logical Star Ethernet


centre Topology

192.168.2.0/ ---
Calling 24 Logical Star Ethernet
centre - USA Topology
clients
Video Star Ethernet
conferencing Topology
room
3rd Floor
Calling centre – Logical Star Ethernet
UK clients Topology
auditorium Logical Star Wi-Fi Access Point
--
Topology (802.11b) 2
192.168.
Server room 3.0/24 Star Ethernet
Topology
Table 2

Mohammed Basith Network Technologies


Page 18
Branch office
1st Floor
Department IP Range Network Wi-Fi Network Other
Name Topology /Ethernet Components equip
ment

GM’s Room and Logical Ethernet Printer


reception area Star 1
Firewall,
Topology Router, Core
Call centre –aus Logical Ethernet Switch
clients Star
Topology

Video Logical Ethernet


conferencing 192.168.4.0/24 Star
room Topology

2nd Floor
Department IP Range Network Wi-Fi Network Other
Name Topology /Ethernet Components equip
ment

Training centre Logical Ethernet


Star
Topology
---
Calling centre – Logical Ethernet
Asian clients 192.168.5.0/24 Star
– Topology

Logical Wi-Fi
Access Point
Star (802.11b)
Auditorium 1
Topology
Table 3

Mohammed Basith Network Technologies


Page 19
6 Task 05

6.1 Hardware components employed in the solution


Hardware Components:
Chassis Standard 1U-4U chassis are generally used.
CPU Most often used are 64-bit x86 CPU (Intel/AMD), Core i3 or greater,
running at least 2-2.5 GHz
RAM At least 4 GB of RAM for each TB of disk. System RAM also caches
the XFS inodes and buffers cache to quickly serve frequently accessed
objects.
Storage Desktop-grade drives or enterprise-grade drives can be used. 3TB or
disks 4TB 7200 RPM SATA drives provide good price/performance value.
Since the system does not use RAID, each request for an object is
handled by a single disk. Subsequently, faster drives will increase the
single-threaded response rates. SwiftStack does not recommend using
“green” drives as Swift is continuously ensuring data integrity and the
power-down functions of green drives may result in excess wear.
OS disks (100+GB per disk) Desktop-grade drives or enterprise-grade drives can
be used commonly deployed as a RAID1 pair to prevent a single drive
failure from taking out an entire node.
Network 1 or 2 port 10 GbE adapter (outward-facing)
cards 1 or 2 port 10 GbE adapter (cluster-facing)
1 x 1 GbE adapter for out-of-band management (IPMI/iLO)
1 x 1 GbE adapter for in-band management and route to Controller
SSDs To ensure that account and container listings are quick, and to provide
higher sustained object uploads per second, SwiftStack recommends
adding a pair of SSDs in each storage node. These SSDs would then be
utilized for only Account/Container storage, while the rotating-platter
drives would be utilized for only Object storage.
Routers I recommend NETGEAR Pro safe Wireless management router. This
is the latest router available in the market. NETGEAR ProSafe
Wireless Management Solutions solve the dilemma of the settings
individually, implementation and management of multiple independent
wireless access points. With support for up to 150 access points,
wireless controller provides a central point for configuring and
managing your wireless network.
Switches NETGEAR ProSafe Smart Switches is purposely designed for SMB
customers with high performance, SMB-oriented features and easy to
use - allowing SMB networks to support Voice over IP (VoIP),
streaming media, multicasting and security.
Table 4

Mohammed Basith Network Technologies


Page 20
Software Components:
Operating System Requirements
The Winsoft must use the 64-bit versions of the Windows® 8 OS and the Windows®
Server 2008 R2 family operating system. The Windows Server 2008 R2 is a server
OS developed by Microsoft, which is based on the improvements in the operating
system (OS), which is highly integrated with the client edition of Windows 7
Windows Server 2008 offers improved scalability and availability as well as energy
consumption.

The key improvement in the server operating system is the hypervisor technology in
the form of the Hyper-V. The ability to deliver virtualized applications and operating
systems is provided. The Hyper-V can also be used to build virtual desktop
infrastructure (VDI).

Windows Server 2008 R2 has also improved Remote Desktop Services, which
enables corporate desktop management through virtualization and VDI.

Internet Requirements
This table shows Internet requirements related to using SQL Server 2008 (64-bit).
Component Requirement
Internet software Microsoft Internet Explorer 11 or newer is required to
view the online documentation (HTML Help). This
software is included with the 64-bit versions of the
Windows Server 2008 R2 family operating system.

Network Software Requirements


The 64-bit versions of the Windows Server 2008 R2 family have built-in network
software.
Table 5

Mohammed Basith Network Technologies


Page 21
Software Version

Microsoft Windows Server 2008  Service Pack 1


R2 Standard Edition

Microsoft Windows Active  Windows Server 2008, and 2012


Directory

Microsoft SQL Server 2008 R2  Service Pack 2


x64 Standard Edition

Antivirus  Symantec Endpoint Protection 12.1


 Trend Micro Server Protect version
5.8
 McAfee Virus Scan Enterprise 8.8i

Java  Java 6 Update 30 or latest update.

Other

Table 6

7 Task 06

Mohammed Basith Network Technologies


Page 22
7.1 Types of servers for the solution

File Server
File server is use for the network solution; it is responsible for the central
storage and manages data files. So other computers on the same network can
access the files.it is allows users to share information over a network. Every
computer can be configured to be a host and act as a file server.it can be
configure multiple ways.

Print Server
Reason for chose print server, it is a software application, it allows any number
of users to share the same printer and it can control one or more printers. If we
want to move files to a computer that is the only way to reach a printer that's
connected directly to it.

Database Server
Using Database Server, it is very helpful for Winsoft (PVT) Ltd because of it is
used to analysis the data, storage, data manipulation, archiving, and other non-
user specific tasks. They can store their important data and employee details.

Web Server
A web server's principle intention is to store site documents and communicate
them over the web for your website guest's to see. Generally, a web server is
essentially a capable PC that stores and transmits information through the web.
When somebody visits a site page on your webpage their program speaks with
your web server, sending and accepting data that eventually directs what shows
up on the guest's PC screen. Therefore, the principle motivation behind a web
server is to store and exchange site information upon the demand of a guest's
program.

DHCP Server

Mohammed Basith Network Technologies


Page 23
Use for the Dynamic Host Configuration Protocol (DHCP) it is client/server protocol
it provide IP Address and other related configuration information. It can be assign
automatically. Generally, This DHCP severs maintains a pool of IP Address.it leases
an address. Dynamic Host Configuration Protocol (DHCP) is a client/server protocol
that automatically provides an Internet Protocol (IP) host with its IP address and other
related configuration information such as the subnet mask and default gateway. RFCs
2131 and 2132 define DHCP as an Internet Engineering Task Force (IETF) standard
based on Bootstrap Protocol (BOOTP), a protocol with which DHCP shares many
implementation details. DHCP allows hosts to obtain necessary TCP/IP configuration
information from a DHCP server. The Microsoft Windows Server 2003 operating
system includes a DHCP Server service, which is an optional networking component.
All Windows-based clients include the DHCP client as part of TCP/IP, including
Windows Server 2003, Microsoft Windows XP, Windows 2000, Windows NT 4.0,
Windows Millennium Edition (Windows Me), and Windows 98.

DNS Server
Domain Name Servers (DNS) are what might as well be called a telephone directory.
They keep up a catalog of area names and make an interpretation of them to Internet
Protocol (IP) Address. This is vital in light of the fact that, in spite of the fact that
space names are simple for individuals to recollect, PC or machines, gets to sites in
view of IP address. Data from all the space name servers over the web are assembled
and housed at the Central Registry. Host organizations and Internet Service Providers
collaborate with the Central Registry on a customary timetable to get refreshed DNS
data. For instance, when a client sort www.google .com, the Internet Service Provider
(ISP) sees the DNS related with the area name and make an interpretation of it into
machine agreeable IP address and guides web association with the right site.

Mohammed Basith Network Technologies


Page 24
7.2 Types of servers available in the market
To meet the requirements of the network designed for winsoft (pvt) Ltd, HP
ProLiant rack and tower servers are suggested to be used for the solution.
These servers provide more storage capacity, right-sized compute with flexible
choices, and lower compute energy and floor space consumption.
With HP ProLiant rack and tower servers, you can accelerate your business
results with faster Performance, memory, and I/O performance, coupled with
increased storage and performance.

HPE ProLiant MicroServer Gen8


The HPE ProLiant MicroServer Gen8 is a small, quiet, and uniquely designed
server and it is ideal server to be used when setting up a new network solution
for micro size or small businesses. With server-class performance in a form
factor that is easy to use and service, this server helps to reduce the costs and it
also helps to improve the efficiency and the productivity. you don’t need a
server room to have a server like this. It can make a starter solution for a small
front office business. This is very cost effective and it is around Rs. 150,000/=
in the market. So this is very cost effective and suitable for small business.
This server can be used as the file server of the winsoft company network
because of the faster file transfer speed provided with the link aggregation.
And also the HPE ProLiant MicroServer Gen8 provides simple installation
and setup.

Features of the HP ProLiant MicroServer Gen8


 Number of processors: 1
 Maximum processor frequency: 2.5 GHz
 Cache memory: 3 MB
 Maximum memory: 16 GB
 Maximum internal storage: 16 TB

The HP ProLiant MicroServer Gen8 provides the following benefits:


• Easy to manage and service
• Attractive design and the ability to place in anywhere
• Seamless networking with stackable HP router and switch

Mohammed Basith Network Technologies


Page 25
• Stylish blue LED bar is provided to check the health state of server.

HP ProLiant ML350 Gen9 servers (tower)


The ML family of servers delivers simple, efficient business value. HP ProLiant
ML30 Gen9 server include simple management and storage tools, along with proven
configurations that provide easy remote access and improved energy efficiencies to
lower your total cost of ownership (TCO). This cost around Rs. 500,000/= in the
market. Integrated with a simplified suite, the ProLiant Gen9 tower delivers more of a
value to the business and help to improve the productivity of the IT staff of the
company. This tower server is more suitable to be used as the database server with the
storage capacity and as the email server with the remote access ability. And also this
server can be implemented with a lower cost related to other database servers. We can
see many ProLiant ML server types available in the market such as HP ProLiant
ML30, HP ProLiant ML110, HP ProLiant ML150 and HP ProLiant ML350. But we
have chosen the HP ProLiant ML350 server as the database and the email server of
the company network because of its below features.

Features of the HP ProLiant ML350 Gen9 server


 Number of processors: 1 or 2
 Maximum processor frequency: 3.5 GHz
 Cache memory: 55 MB
 I/O expansion slots: Up to 1 PCIe 2.0, 8 PCIe 3.0
 Maximum memory: 3 TB
 Maximum internal storage: 240 TB
 Warranty: 3years

Benefits of HP ProLiant ML30 Gen9 server


• Simplicity with easy-to-use tools, processes, and supports to help server
administrators keep Hardware running
• The massive storage capacity
• Easy remote access ability
• Efficiency that office managers need to help improve employee productivity
• Affordability to increase business agility and help acquire and retain customer

Mohammed Basith Network Technologies


Page 26
HP ProLiant DL580 Gen9 server (rack)
The DL family of servers is the most flexible, reliable, and performance-optimized
ProLiant rack servers ever produced by HP. HP ProLiant Gen9 rack portfolio, with
flexible choices and versatile design, along with improved energy efficiencies, This
server costs around Rs. 1,700,000/= in the market. Integrated with a simplified, but
comprehensive management suite and industry-leading support, the ProLiant Gen9
rack portfolio delivers a more reliable, fast, and secures infrastructure solution, helps
increase IT staff productivity, and accelerates service delivery. And also this rack
server is a performance-optimized for multi-application workloads to significantly
increase the speed of IT operations and to respond faster to the business needs. We
can see man types of Proliant DL servers available in the market. They are ProLiant
DL20 Gen9, ProLiant DL80 Gen9, ProLiant DL160 Gen9, ProLiant DL380 Gen9,
ProLiant DL560 Gen9 and ProLiant DL580 Gen9. But with the features available in
each server we can select the HP ProLiant DL580 Gen9 server to be used as the
application server of the network.

Features of HP ProLiant DL580 Gen9 server


 Number of processors: 2,3 or 4
 Maximum processor frequency: 3.3 GHz
 Cache memory: 60 MB
 I/O expansion slots: Up to 9 PCIe 3.0
 Maximum memory: 12 TB
 Maximum internal storage: 40 TB
 Warranty: 3years

The HP ProLiant DL850 Gen9 rack server delivers:


• Flexible choices to redefine compute economics with 3 times the compute per
watt, and up to 62 percent lower from the total cost of ownership.
• This server is a performance-optimized server for the multi-application
workloads.
• Reliable infrastructure can be taken with faster service delivery up to 66 times.

Mohammed Basith Network Technologies


Page 27
• Optimized servers boost business performance with 4 times faster workload
performance.

8 Task 7

Network Interface Card


A network interface card (NIC) is a circuit board or card that is installed in a
computer so that it can be connected to a network. A network interface card
provides the computer with a dedicated, full-time connection to a network.
Personal computers and workstations on a local area network (LAN) typically
contain a network interface card specifically designed for the LAN transmission
technology

Function and Purpose of an NIC


In general, people refer to Ethernet-enabled cards are NICs. Wireless cards are
sometimes called WNICs, but they are often just called wireless cards. However,
the term "NIC" encompasses all of these items. While Ethernet ports and cards
are less common than they once were, they are still important for enterprise
infrastructure, and servers use them to control multiple connections and to handle
a high volume of traffic. One NIC can handle a number of Ethernet connections
by attaching a switch or router to it. While most people are used to standalone
routers, many enterprise and server-grade routers are full servers attached to
switches. In some cases, two or more NICs might be used to provide more
throughputs. Offices often use Ethernet connections for workstations and
desktops. Ethernet cables are easier to configure than wireless cards, and they can
provide better throughput in certain scenarios. As more offices move to cloud-
based operations, Ethernet cables are likely to be used to prevent wireless
channels from becoming congested.

Switch
A switch is a piece of a physical circuitry component that governs the signal
flow. Having a switch or toggle switch allows a connection to be opened or
closed. When opened, the switch allows a signal or power to flow through the
connection. When closed, the switch stops the flow and breaks the circuit
connection. On a network, a switch is a hardware device that filters and forwards

Mohammed Basith Network Technologies


Page 28
network packets, but often not capable of much more. The first network device
that was added to the Internet was a switch called the IMP, which helped send the
first message on October 29, 1969. A network switch is more advanced than a
hub but not as advanced as a router. The picture shows an example of a
NETGEAR 5 port switch.

Router
A router is a networking device that forwards data packets between computer
networks. Routers perform the traffic directing functions on the Internet. A data
packet is typically forwarded from one router to another router through the networks
that constitute the internetwork until it reaches its destination node.

A router is connected to two or more data lines from different networks. When a data
packet comes in on one of the lines, the router reads the network address information
in the packet to determine the ultimate destination. Then, using information in its
routing table or routing policy, it directs the packet to the next network on its journey.
This creates an overlay internetwork.

The most familiar type of routers is home and small office routers that simply pass IP
packets between the home computers and the Internet. An example of a router would
be the owner's cable or DSL router, which connects to the Internet through an Internet
service provider (ISP). More sophisticated routers, such as enterprise routers, connect
large business or ISP networks up to the powerful core routers that forward data at
high speed along the optical fiber lines of the Internet backbone. Though routers are
typically dedicated hardware devices, software-based routers also exist.

Cables
Cables are another main part in network developing. There are different types of
cables. Those cables are different when they are comparing with other cables. Cables
are using in a network to transfer data and information from a device to another
device. When cables are selecting for a network, it is depending on the network size
and accuracy.

Mohammed Basith Network Technologies


Page 29
Different Scenarios for hardware interdependency with network components

Printing a document through a shared printer


In this networked environment workstations will be provided with shared printers to
fulfill printing requirements. Each workstation is not provided with a printer because
it is costly to install printers for each and every client and through a networked
environment many computers can share one printer. To share a printer a network
printer is required. Network printers can be directly connected to the network.
According to the following diagram we can see how the network printer is connected
to the network. In the following network of a certain department of the winsoft (pvt)
Ltd call center, there are 4 PCs and a network printer connected to the central
networking device which is a switch. Switch is a network layer 2 devices and it
recognizes the connected devices from the MAC address table. When a command is
sent from a workstation PC, then the switch will check the destination MAC address
and send the command to the network printer. Then the printer will execute the
command and print the document. The printer will print documents on the first-

Mohammed Basith Network Technologies


Page 30
9 Task 8

User Feedback Form (Sample)

User Feedback Form

Does the system response fast?

◊ Poor
◊ Average
◊ Fast
Does the new network solution provide data and resource sharing?

◊ Yes
◊ No
How fast is accessing a shared folder?

◊ Poor (2 min- 3min)


◊ Average (1min-2min)
◊ Fast (less than 1min)

What do you think about the security of the system?

◊ Poor
◊ Satisfying
◊ Excellent

Is communicating with the other branch easier with the new solution?

◊ Yes
◊ No

Does the system cater all your requirements?


Mohammed Basith Network Technologies
Page 31
◊ Yes
◊ Up to a certain extent
◊ No

How do you rate the overall performance of the system?

0 1 2 3 4 5
Poor Excellent

Are you satisfied with the Wi-Fi coverage?

◊ Yes
◊ No

How do you rate the speed of the Internet connection?

0 1 2 3 4 5
Poor Excellent

What do you recommend for future improvements?

Mohammed Basith Network Technologies


Page 32
Analysis of user feedback

Assumption- 30 members filled the feedback form

After done with the implementation of the network of Winsoft it handed over to the
users to check the new solution. After they go through the new solution we gave
feedback forms to provide their ideas about the new network solution. After analysed
those questionnaires the following facts came up.

1) Data retrieval speed


05 15 10
Slow Average Fast

 30% of the members stated the data retrieval speed is slow.

 50 % of the members stated the data retrieval speed is average.

 20% of the members stated the data retrieval speed is fast.

2) Speed of accessing a shared folder

Poor 05 Average 10 Fast 15

(2 min- 3min) (1min-2min) (less than 1min)

 20% of the members stated speed of accessing a shared folder is poor.

 30 % of the members stated speed of accessing a shared folder is


average.

 50% of the members stated speed of accessing a shared folder is fast.

3) Security of the system

00 Poor 15 Satisfying 15 Excellent

Mohammed Basith Network Technologies


Page 33
 0% of the members stated Security of the system is poor.

 50 % of the members stated Security of the system is satisfying.

 50% of the members stated Security of the system is excellent.

Satisfaction about the all system requirements

20 Yes 10 Up to a certain extent 0 No

 70% of the members stated yes.

 30 % of the members stated Up to a certain extent.

 0% of the members stated no.

How do you rate the overall performance of the system?

0 0 05 10 10 5
Poor Excellent

The results show most of the members are satisfied with the overall performances
while some members have stated the overall performances are middle.

Speed of the Internet connection

0 5 5 10 5 5
Poor Excellent

The results show most of the members are satisfied with the Internet connection while
some members have stated the speed of the Internet connection is poor.

Mohammed Basith Network Technologies


Page 34
10 Task 9

Record your test results obtained in Activity 04 (with proper descriptions and
screenshots) and analyze with the expected outputs. Evaluate your analysis.

To install Windows Server 2012 R2, VMware workstation was used.

Figure 2

Installing Windows Server 2012 R2

Mohammed Basith Network Technologies


Page 35
Figure 3

Then login as Administrator. Password which was set before installing the operating
system will be asked to be changed at the first login attempt.

Figure 4

After logging into the account the desktop is shown.

Mohammed Basith Network Technologies


Page 36
Figure 5

IP setting are changed next.

Figure 6

Mohammed Basith Network Technologies


Page 37
Mohammed Basith Network Technologies
Page 38
Configure the Primary Domain Controller for WINSOFT.com

After IP settings are changed. Then open the server manager window and select the
‘Add roles and features’ option.

Figure 7

Then ‘Add roles and features wizard’ window is displayed. Click next.

Figure 8

Mohammed Basith Network Technologies


Page 39
Select the option as following

Figure 9

Select server roles ‘Active directory domain services’ and click the ‘install’ button.
Then the active directory domain services are installed.

Figure 10

Mohammed Basith Network Technologies


Page 40
Run the ‘active directory domain services configuration wizard’ by clicking on the
‘promote this server as a domain controller’ which becomes visible after clicking the
notification icon.

Figure 11

Creating a new domain in a new forest and enter the domain name

Figure 12

Mohammed Basith Network Technologies


Page 41
Select the forest functional level and the domain functional level. Then enter the
password

Figure 13

Then select paths

Figure 14

Mohammed Basith Network Technologies


Page 42
Check prerequisites and install.

Figure 15

Figure 16

Then Restart the computer to complete the process.

Logging in to the administrator account once the computer is restarted.


Mohammed Basith Network Technologies
Page 43
Figure 17

Adding a new user via administrator to the WINSOFT.COM domain.


Mohammed Basith Network Technologies
Page 44
In server manager, click on tools tab and select ‘Active Directory Users and
Computers’ to go to window.

Figure 18

Entering user details.

Figure 19

Mohammed Basith Network Technologies


Page 45
Entering user password. The user will have to change his/her password at the next
login.

Figure 20

Displaying user details summary

Figure 21

Mohammed Basith Network Technologies


Page 46
10.1 Activity 3
On client machine install Windows XP professional is installed.

Figure 22

Figure 23

Mohammed Basith Network Technologies


Page 47
IP settings and DNS settings are changed.

Figure 24

Through My computer and ‘computer Name’ tab the client can be added to the
domain.

Figure 25

Mohammed Basith Network Technologies


Page 48
Entering domain name and clicking OK will lead the user to enter a username and
password to enter to the domain.

Figure 26

Mohammed Basith Network Technologies


Page 49
10.2 Activity 4

Designing the child domain for the KANDY.WINSOFT.COM


First another virtual PC with the windows server 2012 R2 is installed and logged as
administrator.

Figure 27

Figure 28

Mohammed Basith Network Technologies


Page 50
New IP address is set

Figure 29

Then install the active directory domain services in the PC by running the add roles
and features wizard.

Figure 30

Mohammed Basith Network Technologies


Page 51
Figure 31

Figure 32

Mohammed Basith Network Technologies


Page 52
Then add the child domain KANDY.WINSOFT.com to the parent domain
WINSOFT.com, from the ‘active directory domain services configuration wizard’.

First click on the notification icon and then click ‘promote this server to a domain
controller’.

Figure 33

Then the following window is viewed. Follow the wizard to configure the child
domain.

Figure 34

Mohammed Basith Network Technologies


Page 53
Then click on the ‘change’ button then following window is displayed. Then insert
data and

Click ‘ok’.

Figure 35

Select the functional level and give the password

Figure 36

Mohammed Basith Network Technologies


Page 54
Figure 37

Figure 38

Mohammed Basith Network Technologies


Page 55
Then give the paths.

Figure 39

Figure 40

Mohammed Basith Network Technologies


Page 56
Check prerequisities

Figure 41

Click ‘install’ to begin the installation.

Figure 42

Then Child domain is configured.

Mohammed Basith Network Technologies


Page 57
10.3 Test cases

Test Case #: 1.1 Test Case Name: Installing Windows Server 2012 R2

System: winsoft call center

Short Description: Windows Server 2012 R2 is installed in the VMware to create a


domain for Winsoft.

Pre-conditions
VMware is required.

Step Action Expected System Pass/ Comment


Response Fail

1 Install Windows Prompt user to input Pass -


Server 2012 R2 new password

2 Login as the Display desktop Pass -


administrator

3 Set IP configurations New IP Address Pass -

Post-conditions
Windows Server 2012 R2 should be working with proper IP configurations.

Table 7

Mohammed Basith Network Technologies


Page 58
Test Case #: 1.2 Test Case Name: Creating a domain

controller

System: winsoft call center

Short Description: Windows Server 2012 R2 is used to configure the primary domain

controller with Active Directory Services.

Pre-conditions
Windows Server 2012 R2 needs to be installed.

Step Action Expected System Pass/ Comment


Response Fail

1 In server manager go to Install the active pass


Add new roles and directory domain services
features
2 In server manager click Display Active directory Pass -
on the notification icon domain services
and select ‘promote this configuration wizard
server as a domain
controller’

3 Create a new domain Prompt user to input new Pass -


named administrator password
‘WINSOFT.COM’ for domain

4 Create active directory New domain named Pass -


domain ‘WINSOFT.COM’ is
created.

Post-conditions
A new domain needs to be created.

Table 8

Mohammed Basith Network Technologies


Page 59
Test Case #: 1.3 Test Case Name: Add new user to the
domain
System: winsoft call center
Short Description: Windows Server 2012 R2 is installed in the VMware to create a
domain for winsoft (Pvt) Ltd. A new user will be added to the domain by the
administrator
Pre-conditions
A domain is required.

Step Action Expected System Pass/ Comment


Response Fail

1 Go to server manager Display Active Directory Pass -


and click tools and click Users and Computers
on the ‘Active Directory window
Users and Computers’
option

2 Create new user by right Display add user details Pass -


clicking on computers, window
selecting ‘users’ and
then ‘new’ option

3 Enter new user details New user is created. Pass -


and set password

Post-conditions
New user is created in the WINSOFT domain.

Table 9

Mohammed Basith Network Technologies


Page 60
Test Case #: 2.1 Test Case Name: Add client PC to the domain
System: winsoft call center
Short Description: A client computer with Windows XP professional operating
system will be added to the WINSOFT.com domain.
Pre-conditions: WINSOFT.com domain needs to be created.

Step Action Expected System Pass/ Comment


Response Fail

1 Install Windows XP Work with Windows XP Pass -


professional professional Operating
system

2 Configure IP setting New IP settings are set to Pass -


and DNS client PC

3 Through my New computer name Pass -


computer, go to created and domain is
‘computer name’ tab selected
and give the
computer name and
select the domain

4 Connect to Prompt the user to input Pass -


WINSOFT domain username and password to
enter to the domain

Post-conditions
Client PC should be connected to the domain.

Mohammed Basith Network Technologies


Page 61

Table 10
Test Case #: 3.1 Test Case Name: design the child domain
System: winsoft call center
Short Description: windows server 2102 R2 will be configured as the child domain
Pre-conditions: another windows server 2012 R2 has to be created.

Step Action Expected System Pass/ Comment


Response Fail

1 Install windows server Display the desktop Pass -


2012 R2 and login as the
administrator

2 Configure IP setting and New IP settings are set Pass -


DNS to server

3 Add new roles and Install active directory Pass -


features in server domain services
manager

4 Create the child domain Prompt the user to Pass -


KANDY.WINSOFT.Com input username and
password to enter to
the child domain

Post-conditions
Child domain should be connected to the parent domain.

Mohammed Basith Network Technologies


Page 62

Table 11
Test Case #: 4.1 Test Case Name: Ping Commands
System: winsoft call center
Short Description: Ping Commands is used for testing the system.
Pre-conditions
Domain and a client required.

Step Action Expected System Pass/ Comment


Response Fail

1 Ping 127.0.0.1 to check Getting the reply from Pass -


Internet connectivity 127.0.0.1

2 Ping 192.168.10.2 Getting the reply from Pass -


(client IP) 192.168.10.2

3 Ping 192.168.10.10 Getting the reply from Pass -


(child domain server IP 192.168.10.10
in the same network)

Post-conditions
--------

Table 12

Mohammed Basith Network Technologies


Page 63
Ping 127.0.0.1 to check Internet connectivity

Figure 43

Ping 192.168.10.2 (client IP)

Figure 44

Ping 192.168.10.10 (child domain server)

Figure 45

Mohammed Basith Network Technologies


Page 64
Evaluation of test results
The testing activity included installing Windows 2012 R2 Server, configuring IP,
creating primary domain controller for winsoft and adding a client to the domain.
Installing Windows Server 2012 R2 on the VMware workstation took so much time
but at the end it was installed properly. Creating the primary domain controller for
winsoft was successful too. After the domain WINSOFT.com was created to check
whether the domain was working a new user was created in the domain. All the IP
configurations on the server and the client PCs were done successfully. After that the
client was added to the domain. After that the child domain for the
KANDY.WINSOFT.com was created. Using the PING commands, the connections
were tested. Actual output was matched with the expected result in every test case.

Mohammed Basith Network Technologies


Page 65
11 Task 10

11.1 Future enhancements for the network


 Cloud computing
In the modern world it is very famous with the virtual space management. We
call it as cloud computing. As some examples I Cloud, Google Drive, Drop
Box etc. in the future it will willing to introduce that cloud computing
technology to the Winsoft. With the cloud computing it will help to manage
the data storing in cloud. It not requires a database. By the cloud storage it will
helps to protect data and information from system failures and data corruption.

 Internet Access and Internet Speed


If the company wants more speed with the internet they can shift into 4G
connection or fiber optic connection. And also they can use wireless networks
t inter communicate among the computers and devices.

 Windows 10 into Client computers


With the time past company can upgrade their client computer up to Windows
10 But before they are upgrade the computers they have to analyse what is the
suitable OS to the client computers and after that upgrade them.

 Use more advanced security methods.


Make improvements on routers and switches. Such as security of those routers
and switches. Make the security tight help to keep the business safe from
intruders.

 Use an own email server


With the own email server, it helps to increase the privacy of the company. It
is more effective than using third party email services.

Mohammed Basith Network Technologies


Page 66
12 Task 11

A maintenance schedule is provided for Winsoft (Pvt) Ltd to maintain their


networked system free from errors.
Maintenance schedule for winsoft network

Procedure Everyday Once Once Responsib


a a le Person
week month
1.0 Server Activity Management Network
Admin
1.1 Reviews user log files 
1.2 Review hard disk usage 
1.3 Review system errors  
1.4 Backup Winsoft Finance data 
2.0 Antivirus Program Network
Admin
2.1 Schedule system scans 
2.2 Update antivirus program 
2.3 Run antivirus program  
2.4 Review scan history 
3.0 Network maintenance Network
Admin
3.1 Device check-up (Routers/Switches) 
3.2 Review device configuration 
3.3 Examine firewall configuration 
4.0 Workstation maintenance Network
Admin
4.1 View disk usage 
4.2 Run disk clean-up 
4.3 View application updates and install

if updates are available
4.4 Run antivirus program 
4.5 Backup PC data 
4.6 Reset user account password 
Table 13

13 Conclusion
Mohammed Basith Network Technologies
Page 67
Utilizing innovation in the organizations are extremely normal today. With the
insurgency of innovation entire world end up plainly worldwide town. In the
business today they are attempting to impart among different organizations and
with their own particular branches. They utilize organizing strategies to
intercommunicate. System arrangements have the capacity to satisfy their
imparting purposes and additionally their security issues as well. A system ought
to be create by following those related system conventions. System is worked
with the mix of equipment and programming. So before we build up the system
we need to pick the equipment and programming necessities. Before create need
to make a legitimate arrangement. It ought to be rich by the assets which will be
utilize when the system is creating, equipment and programming which are
utilizing as a part of the system, arrange sort, cost, advantages of utilization the
system and chose organize sort, and so on it ought to be an assistance to take a
harsh thought regarding the system and the parameters of it.

Mohammed Basith Network Technologies


Page 68
14 Self-Criticism
Building up a system for the rent organization is the task. This task was useful to
enhance my insight on a few criteria. I could know more on topologies and how
they are executing by alluding web. And furthermore I could discover more
learning on server design by doing the action in this task. By this I got an
appropriate information about system conventions and why we are utilizing those
conventions in organize creating.

Strengths
 Ability to answer questions and identify various network topologies and
types successfully.

 Understanding network standards and protocols.

 Identifying the suitable network topology for the solution.

Weaknesses
 Designing the network diagram was challenging.

 Choosing the servers for the network was hard.

 Preparing the test plans were challenging

Mohammed Basith Network Technologies


Page 69
15 Appendix

15.1 Gantt chart

Mohammed Basith Network Technologies


Page 70
16 Reference list

Firstfocus (2016). Network maintenance. [ONLINE]. Available at:


www.firstfocus.com.au . accessed date: 2017/01/30

Hewlett P. (2016). HP proliant rack and tower servers. [ONLINE]. Available at:
www.hpe.com. accessed date: 2017/01/20

Mitchell B. (2016). FTP. [ONLINE]. Available at: www.lifewire.com. accessed


date: 2017/01/16

Mitchell B. (2016). HTTP. [ONLINE]. Available at: www.lifewire.com. accessed


date: 2017/01/15

Packetworks. (2016). LAN vs WAN. [ONLINE]. Available at:


www.packetworks.net. accessed date:2017/01/09

Reality press. (2016). Network maintenance tasks. [ONLINE]. Available at:


www.howtonetwork.org. accessed date: 2017/01/30

Rouse M. (2008). DHCP (Dynamic Host Configuration Protocol), [ONLINE],


Available at: www.searchunifiedcommunications.techtarget.com, accessed date:
2017/01/30

Sparrow p. (2016). Network topologies [ONLINE]. Available at:


www.ianswer4u.com. accessed date: 2017/01/05

Mohammed Basith Network Technologies


Page 71

You might also like