Professional Documents
Culture Documents
Idm Assignment Cover Page
Idm Assignment Cover Page
• Constructive?
Y/N
• Linked to relevant assessment
criteria? Y/N
Give details:
Internal
Date
Verifier
Programme Leader
Date
signature (if
Course Tittle
Assignment Title
3|Page
Date
Grade: Assessor Signature:
Please note that grade decisions are provisional. They are only confirmed once internal and external
moderation has taken place and grades decisions have been agreed at the assessment board.
Programme:
Unit:
4|Page
Plagiarism
Plagiarism is a particular form of cheating. Plagiarism must be avoided at all costs and
students who break the rules, however innocently, may be penalised. It is your responsibility
to ensure that you understand correct referencing practices. As a university level student, you
are expected to use appropriate references throughout and keep carefully detailed notes of all
your sources of materials for material you have used in your work, including any material
downloaded from the Internet. Please consult the relevant unit lecturer or your course tutor if
you need any further advice.
Student Declaration
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences
of plagiarism. I understand that making a false declaration is a form of malpractice.
5|Page
Activity 3
Figure 1
6|Page
Network devices, components and software List
1. Wireless Router
Figure 2
Specification
Brand -TP-Link Archer C6 Gigabit MU-MIMO
Connections - Wireless
Frequency band class -Dual-band
Wi-Fi speeds -300 Mbps and 867 Mbps
Wireless type -80802.11ac standard bandwidth.
Justification
7|Page
2. Switch
Figure 3
Specification
Justification
• Silent operation.
• Prosafe lifetime protection.
• Helps to transfer data.
• Energy efficient.
8|Page
3. Servers
Figure 4
Specification
Justification
Decent candidate.
• Very extensible.
• Superior performance.
9|Page
4. Desktop Computer
Specification
Processor -Intel Core i5 3rd Generation.
Motherboard -H61 Series Motherboard.
Graphics -Intel HD Graphics.
Ram -8GB DDR3 Ram.
SSD (OS) -120GB Sata SSD.
Hard Disk -500GB Seagate HDD.
PSU -500 WATTS SMPS.
Justification
More data may be stored.
Quicker file saving.
Effective power delivery.
10 | P a g e
Software
Justification
• We can build, set up, configure, and debug complex networks using virtual
equipment.
• It provides an instructional setting with lifelike simulations and visuals.
2. Wondershare Edrawmax
Justification
11 | P a g e
Feedback Form
12 | P a g e
Name Zoro
Date 28.05.2023
Responses
13 | P a g e
Installing network monitoring tool
Wireshark
Figure 5
Figure 6
14 | P a g e
Figure 7
Figure 8
15 | P a g e
Figure 9
Figure 10
16 | P a g e
Figure 11
Figure 12
17 | P a g e
Installing configuration
Vlan
Figure 13
18 | P a g e
Assigning ports on VLAN
Figure 14
19 | P a g e
Figure 15
20 | P a g e
Trunking switch ports
Figure 16
21 | P a g e
Figure 17
Figure 18
22 | P a g e
Figure 19
Figure 20
Figure 21
23 | P a g e
Figure 22
DHCP output
Wireless connections
Figure 23
Wireless connection
24 | P a g e
Maintenance schedule
Maintenance schedule
Backup data
Monitoring network
Activity 4
25 | P a g e
This form of network module can be highly recommended to consumers because there are no
risks of failure
Any problems may easily be found because of how reliable this network is. Furthermore,
authors can easily correct errors in this type of network. The router's security password was
also added by the author, restricting who can access the internal network to approved users
who have a security password and username. The constancy of data transfer is another
important aspect of this network, the author has connected all switches using trunk ports. The
author also made use of VTY lines in networks. In a normal VLAN network, we can only
transfer data within the same VLAN. On the other hand, inter-VLAN routing enables us to
send and receive data between other networks. One benefit of conventional inter-VLAN
routing is its ease of configuration.
The author has employed the VTP configuration of the network. To distribute every VLAN
and domain name to clients, we can set up a server switch and employ trunk ports. Therefore,
we do not need to give each switch a unique feature. It saves time and keeps us from giving
false information to every switch. We do this by using the same domain name (VTP domain)
across all switches. Additionally, the author created a wireless connection for some
departments. ACCESS POINT, enabling us to connect devices without wires and manage
devices with simplicity.
26 | P a g e
Test 01 Login User attempts to Secret The system should Actual findings were
access system password: allow the user to in line with
through router 987abc successfully log in expectations, and the
by providing using a secret user was able to log
secret password. on.
password
Test 02 Login User attempts to Incorrect The system should Actual results were in
(Incorrect access system Secret allow the user to line with what was
Password) through router password: successfully log in anticipated, making it
by providing s7896 using a secret impossible for the user
wrong secret password. to log in.
password
Test 03 Ping Pinging with Ping Ping should be Ping Successful Packet sent = 4
different Vlan 192.168.10.98 unsuccessful Packet received
=4
Lost packets = 0
Test 04 Ping 2 Pinging in Ping Ping should be Ping Successful Packet sent = 4
Same 192.168.10.162 successful, and reply Packet received
Vlan should come from =4
another network Lost packets = 0
with 100% accuracy.
Test cases
We're talking about reinforcement right now. Reinforcement is another vital part of our
organization, and there is no reinforcement for the framework at the moment. They might
27 | P a g e
lose every piece of data. We wanted to select a response to this. The best answer to this is a
cloud worker. If a cloud backup is possible, worker, it will always exist, and one worker's
failure will not have an impact on the entire framework since in the cloud,
For guests to connect to the internet while keeping corporate separate, the company can build
up a separate network.
Depending on the viewpoint, there are various ways that the switching network is set up:
The software that runs on them and the improvements in technology do not always keep up
with one another. It is unlikely that new programs running on outdated hardware will
function properly when combined with more recent software.
Information compression
Data compression lowers the number of bits needed to represent data. You may reduce
storage and network traffic costs, speed up file transfers, and save space by using data
compression.
By dividing an existing physical network into many logical networks, a VLAN creates its
broadcasting domain. VPN must be included into the network architecture because it protects
online data as we browse the web using sophisticated encryption methods. The network's
capacity can be boosted by using a VPN.
Critical Evaluation
The organization firm is the owner of this network infrastructure. Because the current
28 | P a g e
network system is unreliable and insecure, they engaged a network engineering firm to
maintain and modify the network. As the newly hired network engineer, he had plans to
revamp the network system and make many improvements to increase its speed and security.
As needed in the scenario, a high-speed internet connection and wireless network were
necessary. The facility had a number of distinct departments. It has been implemented in the
system and is anticipated to increase the data traffic by 85%. It uses VLANs to link to other
buildings and implements quality of service. Every gadget is password-protected to ensure
security and prevent illegal access. No matter if they are wireless or wired, networks are an
essential component of technology. The company's requirements must be followed, such as
controlling employee traffic and dividing the network into departments, in order to maintain
an efficient network. The network architecture is the next issue to think about because it has a
big impact on the system and is important to take into account. Next, each and every module
must be meticulously evaluated for an error-free network that enables the devices to operate
properly in order for the network to operate in line with Call Management (Pvt) Ltd's criteria.
Prior to implementation, the network must first be evaluated. In order to test the network, it is
important to review each module and look for any issues that might lead to issues.
29 | P a g e