Professional Documents
Culture Documents
Bibek Networking Assignment
Bibek Networking Assignment
NOLOGY
STUDENT DETAILS
STUDENT ID Kit22d.36bky@ismt.edu.np
UNIT NUMBER 02
SUBMISSION
1. I declare that:
a) this assignment is entirely my own work, except where I have included
fullydocumented references to the work of others,
b) the material contained in this assignment has not previously been submitted
for any other subject at the University or any other educational institution,
except as otherwise permitted,
c) No part of this assignment or product has been submitted by me in another
(previous or current) assessment, except where appropriately referenced, and
with prior permission from the Lecturer / Tutor / Unit Coordinator for this unit.
2. I acknowledge that:
a) if required to do so, I will provide an electronic copy of this assignment to the
assessor;
b) the assessor of this assignment may, for the purpose of assessing this
assignment:
I. reproduce this assignment and provide a copy to another member of
academic staff;
II. Communicate a copy of this assignment to a plagiarism checking
service such as Plagiarism Check (which may then retain a copy of
this assignment on its database for the purpose of future plagiarism
checking).
I am aware of and understand that any breaches to the Academic Code of Conduct
will be investigated and sanctioned in accordance with the College Policy.
Table of Contents
Activity 1 ........................................................................................................................................ 6
Introduction .....................................................................................................................................
6
Slides ...............................................................................................................................................
6
Activity 2 ...................................................................................................................................... 36
Introduction ...................................................................................................................................
36
Router ........................................................................................................................................ 39
Switch: .................................................................................................................................. 39
IP address ..............................................................................................................................
40
Network address.................................................................................................................... 40
67
Memory: ................................................................................................................................
70
Storage .................................................................................................................................. 70
Network................................................................................................................................. 70
Expansion Slots:.................................................................................................................... 70
Processor ...............................................................................................................................
71
Memory .................................................................................................................................
71
Storage .................................................................................................................................. 71
Networking ........................................................................................................................... 72
Expansion ..............................................................................................................................
72
Virtualization ........................................................................................................................ 74
Conclusion .................................................................................................................................... 74
Activity 3 ...................................................................................................................................... 74
Introduction ...................................................................................................................................
74
Introduction ............................................................................................................................... 75
Methodology .........................................................................................................................
75
Results ...................................................................................................................................
75
Discussion .............................................................................................................................
75
Conclusion ............................................................................................................................ 75
References .............................................................................................................................
75
Configuration ........................................................................................................................
77
For HR Department................................................................................................................... 90
• Modems: .......................................................................................................................
128
• Firewall......................................................................................................................... 129
Features .......................................................................................................................................
Features ...............................................................................................................................
130
Critical reflection on the final implemented network and design ........................................... 133
References ...................................................................................................................................
134
Activity 1
Introduction
A network is any collection of two or more connected computers typically through wires or
wireless networks. A server is present in some computer networks. An efficient computer known
as a server frequently serves as the focal point for network services including email, internet
access, and file storage. A client is any device that is connected to a server. The term "standalone
computer" refers to a computer that is not networked.
Slides
Supporting notes
In this slide, I have discussed about LAN. Ethernet technology, a wired networking standard that
use physical cable to link devices to a central network switch or hub, is commonly used to build
LANs. As an alternative, wireless technologies like Wi-Fi may be used to create LANs, enabling
devices to connect to the network without the use of physical cables. (Anon., 2022)
In this slide, I have discussed about PANA specific kind of computer network that links gadgets
in a constrained, individual space, such a single home or a person's body. PAN technologies
include Bluetooth and ZigBee, for instance. (Anon., n.d.)
A private computer network used within a company to distribute information and resources to
staff members. Internet-like intranets are restricted to authorized users within the company,
unlike the public internet. Documents, calendars, corporate news, and other information can be
shared over intranets. In these slide, I have given a shortly brief about Intranet. (Anon., n.d.)
In this slide, I have discussed about Data Link Layer. Data transport between nearby network
nodes is made possible by the data link layer. Data framing, error detection and correction, and
flow control are all handled by it. (Anon., 2020)
In this slide, I have discussed about Network Layer. This layer is responsible for data routing
between various networks. It offers logical addressing and routing capabilities to enable the
transmission of packets across various networks. (Anon., 2020)
, I have discussed about Transport Layer. Data delivery from beginning to end is
In this slide, I have discussed about Session Layer. This layer controls how programs
communicate with one another. It enables data synchronization and checkpointing as well as the
establishment, maintenance, and termination of sessions. (Anon., 2020)
In this slide, I have discussed about Presentation layer. The depiction of data is the focus of this
layer. It performs data conversions between multiple file formats and offers compression and
encryption options. (Anon., 2020)
, I have discussed about Application Layer. This layer acts as a bridge between the
In above slide, I have discussed about Benefits and Constraints of OSI Layer.
In this slide, I have described about Hybrid Topology. In the hybrid Topology, Two or more of
the aforementioned topologies can be combined to form a hybrid topology. As an illustration, a
network may consist of a major bus topology that is connected to several smaller star topologies.
By limiting their downsides, this design can offer the advantages of several other topologies.
(Anon., n.d.)
In this slide, I presented about Workstation hardware and the relevant networking software.
Activity 2
Introduction
As Network design is the process of organizing and putting computer network architecture into
place. For the network design, we need software that can show the network connection between
the devices and the server. In order to deliver better services, I carried out study prior to the
network's launch. Before a network is put into use, a design that meets with a certain
specification is produced. The server services must pass testing and evaluation in order for the
expected and actual output to match. After testing, a design is recorded, the test results are
As we were building the networked system, we devised a maintenance schedule to maintain it.
Networking Design
A simple local area network (LAN) in a home or office can be designed using network design,
which is the planning of a computer system's connections, to a large, intricate system in a
business environment. Networks can occasionally be thrown together quickly and out of
necessity. For instance, this can be the situation when connecting a computer and printer.
However, careful network planning and deliberate choices in specific regions are required for
optimal operation.
Topology: the positioning of devices, the utilization of cabling, and the data routing that make up a
network's physical and logical configuration.
Protocols: The protocols used for network communication, such as TCP/IP and OSI model.
Security: The network is shielded from illegal access and attacks by mechanisms including firewalls,
VPNs, and intrusion detection systems.
Reliability: The capacity of the network to maintain performance and availability under both typical
and unusual circumstances.
Manageability refers to the network's ability to be easily administered, monitored, and troubleshooter.
Before the final design is executed, several rounds of testing and adjustments may be necessary because
the design process is iterative. Because it significantly affects the performance, security, and overall
effectiveness of the company, network architecture is a crucial component of IT infrastructure. (Anon.,
2021)
There are Four Department in cutting edge IT company. The Four department are IT department,
ch is also
Finance department, HR department, connected
Sales team. IntoIT
server.
department there are 7computers.In
Finance department there are 5computers. In HR department there are 4computers. And in Sales
team there are 6computers. For every department they have individual switch and for every
Switch there are Only One router. The switch is connected to computers and the routers are
connected to switch. The swit
I used router, switch, Access PT, Server and pc these devices are used individually or in combination to
build a network that meets an organization's needs. The right networking devices will be chosen based on
the organization's specific needs and the type of network being designed.
Router
A router is a networking device that transfers data packets between computer networks. It is
connected to two or more networks and uses routing tables and protocols to choose the optimum
route for data to go between them. Local area network (LAN), wide area network (WAN), and
Internet networks are all connected through routers. To exchange knowledge about the networks
they are connected to and to decide the most effective route for data to take, they employ routing
protocols like OSPF and BGP.
Routers also serve other purposes, such as:
IP address assignment: using DHCP or static IP addresses to assign IP addresses to networked
devices
Network Address Translation (NAT): the method used to share a single public IP address among
several devices on a private network.
Quality of Service (Qu’s): Making certain traffic types more significant than others so that
important data always gets precedence.
Firewalls: Controlling data flow can defend networks against intrusions and attacks.
VPN: connecting distant devices to a network using a secure virtual private network.
Routers come in three different forms: independent units, integrated parts of DSL or cable modems,
and built-in parts of network switches. The organization's unique requirements and the kind of
network being developed will determine the best router to use. (Anon., n.d.)
Switch:
A switch is a networking tool that joins various hardware components together in a local area
network (LAN) and routes data in accordance with the Media Access Control (MAC) addresses
of those hardware components. The data link layer of the OSI Model is where it functions (layer
2). In contrast to a hub, which broadcasts data to every connected device, a switch allows
numerous devices to communicate within a network by exclusively sending data to the intended
recipient.
Overall network performance and security are enhanced as a result.
Switches can be managed, unmanaged, or intelligent. While managed switches offer more
sophisticated functionality and configuration choices, and smart switches contain the capability
to monitor and administer the network using software, unmanaged switches are the most basic
and least costly. Based on the unique requirements of the company, the best switch will be
picked. (Tim Fisher, 2022)
IP address:
Every device connected to a computer network that uses the Internet Protocol is given an IP
address, also known as an Internet Protocol address. Its two main purposes are to locate the host in
the network and to identify the host or network interface.
Both IPv4 and IPv6 types of IP addresses exist. Dot-decimal notation is often used to represent
the 32-bit integers that make up IPv4 addresses (e.g. 192.168.0.1). Addresses for IPv6 are 128-bit
hexadecimal numbers (e.g. 2001:0db8:85a3:0000:0000:8a2e: 0370:7334).
Both static and dynamic IP addresses are possible. Unlike dynamic IP addresses, which are
provided by DHCP servers and are subject to change over time, static IP addresses are
permanently allocated to a device.
Public and private IP addresses are the two different types. Public IP addresses are accessible via
the Internet and are distinctive internationally. Private IP addresses are only meant to be used
inside of a private network and are not available online. (Tim Fisher, 2022)
Network address
A computer network device's or collection of devices' network address is a special identification
number. It's employed for data routing to the proper device, device identification, and device
localization on networks. IP addresses and MAC addresses are only two of the several types of
The term "software requirements" refers to the operating systems and applications needed for a
device to operate correctly. Software needs might be, for instance, an operating system, a web
browser, or certain programs or apps.
Depending on the device or system and the functions it is intended to accomplish, different hardware and
software configurations will be needed.
Some required hardware and software to install and implement in workstation are shown below in
table:
Router name Subnet mask
Window server 2012 This is Network Operating system which will execute on different
workstation in Digital network solution.
Kaspersky antivirus Real-time protection, virus, Trojan, worm, spyware, adware, key logger,
malicious tool, and auto-dialer detection and eradication are just a few
of the functions offered by Kaspersky Anti-Virus.
Ethernet cable Network cables include Ethernet cables. They have Ethernet ports
compatibility built in. The majority of internet-capable gadgets,
including routers, PCs, Televisions, and computers, all have Ethernet
ports. The advantages of hardwiring include quicker internet and more
Switch cisco Performance, flexibility, and security are all provided by Cisco network
switches. Cisco switches can scale, are inexpensive, and satisfy the
needs of hybrid work.
Firewall The monitoring and filtering of incoming and outgoing network traffic
by a firewall, a network security tool, is done in accordance with the
security policies that have already been defined by the company.
VPN Anyone may safeguard their internet traffic and maintain their privacy
online by using a VPN (virtual private network). This method is the
simplest and most effective. Your internet traffic passes through an
encrypted tunnel when you connect to a secure VPN server, making it
impossible for hackers, governments, or your internet provider to view
it.
Printer A printer is a small device that creates a permanent reproduction of text
or pictures, typically on paper. Although the majority of output is
understandable by humans, bar code printers are an example of a
printer's wider application. 3D printers, inkjet printers, laser printers,
and thermal printers are a few of the several types of printers.
Step 10: Choose Add a New Forest then type root domain name and click Next.
Step 12: Click next until install comes then click install.
DNS INSTALLATION
Step 4: Select to all DNS servers running on domain controllers in this domain then click Next.
Step 11: Check DNS using ns-lookup command using CMD prompt.
Step 1: Open Server manager then select manage and click on add roles and features .
Step 4: Click on Select a server from the server pool then click Next.
troubleshooting 9-10
troubleshooting 5-6
A section on expected results should be included in the test plan as well. This section should
include the expected outcome of each test, the standards for judging success or failure, and any
acceptance standards that must be satisfied before the software or system can be deemed
prepared for release.
Date: 2023/02/22
Description of Project: Making a successful strategy with the management of the networked
system's design and execution for a cutting-edge IT company is the project's primary goal.
Features of the project: A secure link exists between the main office and the branch office thanks
to the efficient plan. The computers at the main office are connected to one another, enabling data
interchange with the computers in the branch office as well. Strong security is provided by the use
of the newest networking hardware and servers from CUTTING EDGE IT Pvt. Ltd.
Significance of the project: The network system of Cutting Edge IT solution is more secured. The
complete client PC network, both within and outside the corporate headquarters, may be managed
by the primary domain controller. It has been simple to communicate between the head office and
branch offices thanks to the employment of specialized servers like RODC, CDC, VPN, and print
servers.
Project Limitation: There are several limitations within the system, despite the fact that it has
been effectively deployed and many changes have been made to the Cutting Edge IT solution.
because the system operates through a community focused on a certain domain. Via several
requests being made at once, there may be network traffic. Due to the preservation of the complete
computer and networking equipment inside the same network, the system may be experiencing
issues.
Feedback Evaluation
Feedback evaluated by: Pashupati
Chaudhary Signature:
Date: 2023/02/22
After the domain controller is set up, we can observe the firm's centralized network. The company
has a website, and DNS (Domain Name Services) helps to provide the website with an IP address,
and the information is updated using IIS (Internet Information Services). Dynamic Host
Configuration Protocols, or DHCP, are used in businesses to issue IP addresses to client
computers on an individual basis. If there is no shared physical subnet, DHCP relay agents are
used to transfer requests and responses between clients and servers. The usage of a print server
had improved the efficiency of all client computers' operations. The usage of a VPN has
safeguarded the connection and allows us to unblock a blocked website when we need to at a
critical moment. Our usage of the CDC, also known as a subdomain, was helpful for data backup.
The branch office's security has improved as a result of the RODC server. We used Window
deployment services (WDS) to install the OS on all client computers, which enhanced workplace
productivity.
HP ProLiant DL380G5
Hewlett Packard (now known as HPE) introduced the HP ProLiant DL380 G5 rack-mounted
server in 2006. Because of its excellent performance and dependability, it was a common server
type for companies and data centers.
Storage: Eight 2.5" SAS or SATA hard drives or six 3.5" SAS or SATA hard drives, respectively,
are supported.
Expansion Slots: Three PCIe slots (one x8, one x4, and one x4 when the optional PCI-X
Mezzanine card is not installed)
For usage in data centers and other enterprise-level contexts, the HP ProLiant DL380 G5 was
created, and it was especially well-suited for virtualization and high-performance computing
workloads. It might not be the ideal option for contemporary workloads that need more potent
technology, though, considering it was introduced more than ten years ago. (Anon., n.d.)
Processor: Up to two Intel Xeon Scalable processors, each with a maximum of 28 cores
Memory: Up to 3TB of DDR4 memory with RDIMM, LRDIMM, and NVDIMM support
Networking: With optional 10GbE or 25GbE NICs, there are 4 1GbE LAN ports.
Expansion: Support for low-profile, half-height, and full-height cards is provided by up to 8 PCIe
3.0 slots.
Overall, the Dell PowerEdge 5606 is a strong and adaptable server that can be set up to satisfy a
variety of corporate requirements. It comes with enough of processing power, memory, and
storage space in addition to cutting-edge administration tools for simple setup and upkeep.
The Differences between HP ProLiant DL380G5 and Dell PowerEdge5606 (Anon., 2023)
S.N Systems HP ProLiant DL380 Dell PowerEdge 5606
G5
192GB up to 192GB
5 Price and Has almost Flexible pricing.
Equipment no HP
Workload Requirements: The first step is to assess your workload needs. This covers things like
the need for network needs, memory, storage, and computing power. Knowing these
specifications will help you choose a server that will satisfy your demands without costing too
much for extra resources.
Virtualization: Servers that are built for virtualization should be taken into consideration if you
intend to utilize virtualization software like VMWare or Hyper-V. The ability to run several virtual
machines on these servers can assist cut costs by combining various workloads onto a single
server, which is why these servers are designed for this purpose.
Server Hardware: Also, the server's hardware requirements have to be taken into account. For
instance, to satisfy your particular requirements, you could wish to select a server with a faster
CPU, more memory, or more storage space. To make sure you don't overpay on superfluous
gear, it's crucial to strike a balance between these requirements and budgetary concerns.
Server Location: Cost and efficiency may be affected by the server's location as well. If you want
to minimize latency and increase speed, it could be more economical to select a server that is
situated in the same area where your users reside.
From the about points above I have to recommend the Dell PowerEdge 5606 Because it is cost
efficient and have the best performance through the processor second gen intel Xeon scalable
processor with PCle Gen 4.0 performance included.
Activity 3
Introduction
A technical report describing a perfect network architecture would also include implementation
information, test and analysis results, and suggestions for future enhancements. I will offer a
technical report for this area of the paper that analyzes the results of the test plan, makes
suggestions for future networked system improvements, and contains all the documentation
required for the optimal design's successful implementation.
Technical Report
Technical reports are written summaries of a technical or scientific project's methodology,
methodologies, findings, and conclusions. Engineers, scientists, managers, and other technical
professionals are among the target audiences for technical reports, which provide information
about a project or study's specifics to them. The sections listed below are typical components of a
technical report:
Introduction: In regard to the project or study's aim, objectives, and scope, this section gives
background information.
Methodology: This section outlines the processes and methods utilized for the study or project, along
with the tools, supplies, and methodologies that were employed.
Results: This section includes tables, graphs, and figures to help show the research or project's data
and conclusions.
Conclusion: In this part, the major conclusions and findings of the study or project are outlined, along
with suggestions for further research.
References: A list of the books, papers, and other publications cited in the study may be found in this
section.
Appendices: This section contains any supplemental information supporting the report, including raw
data, computations, and images. (Anon., 2022)
To meet the given requirement, I designed our network using a star topology with two
Cisco routes and four Cisco switches.
System Requirement
Based on scenario
Create network topologies and simulate contemporary computer networks with Packet
Tracer, a cross-platform visual simulation tool created by Cisco Systems. With the use of a
simulated command line interface, the program enables users to practice configuring Cisco
routers and switches.
Transport: TCP and UDP, TCP Nagle Algorithm & IP Fragmentation, RTP
Network: BGP, IPv4, ICMP, ARP, IPv6, ICMPv6, IPSec, RIPv1/ v2/ng, Multi-Area OSPF, EIGRP,
Static Routing, Route Redistribution, Multilayer Switching, L3 QoS, NAT, CBAL, Zone-based
policy firewall and Intrusion Protection System on the ISR, GRE VPN, IPSec VPN.
Network Access Interface: Ethernet (802.3), 802.11, HDLC, Frame Relay, PPP, PPPoE, STP,
RSTP, VTP, DTP, CDP, 802.1q, PAgP, L2 QoS, SLARP, Simple WEP, WPA, EAP.
Configuration
For IT Department
Network Hardware
Network hardware refers to a group of physical or networked devices that are necessary for
interaction and communication among hardware components operating on a computer network.
A network may operate successfully and efficiently thanks to these specialized hardware
elements that are connected to one another.
The technology of today has entwined its tentacles with every aspect of our life. It has changed
from being only an industrial addition to becoming a necessary evil. Businesses must create a
network that is safe, dependable, and keeps people connected to their applications while tech
enablement drives the industrial revolution. The fundamental network hardware takes advantage
of the very foundation's core.
Twisted pair or fiber cable is used as the connecting medium by network equipment, which is a
component of Ethernet network protocol improvements. Examples of network gear include
routers, hubs, switches, and bridges.
• Modems: A modem makes it possible for a computer to connect to the internet through a
phone connection. The modem at one end transforms the digital impulses from the
computer into analog signals and transmits them via a telephone line. The analog impulses
are transformed into digital signals at the other end so that a different computer can
comprehend them.
• Routers: Many networks are linked together using a router. Using a router to link a LAN
(local area network) in a house or office to the internet is a popular usage for them
(WAN). Together with connections to link computers on the LAN, it frequently includes
an internet cable plugged in. In contrast, a LAN connection can be wireless (Wi-Fi
enabled), making the network device wireless. The term "wireless access points" is also
used to describe them (WAPs).
• Hubs: Data is broadcast to all networked devices by a hub. Because many computers
might not need to receive the transmitted data, it uses a lot of bandwidth. A wired or
wireless LAN might be used to connect the hub to a few gaming consoles for a local
multiplayer game.
Network Software
Any network's foundation is its network software. It aids in managing, monitoring, and
controlling network traffic as well as reducing network complexity. Network software has
developed into a crucial instrument for enabling uninterrupted information transmission and
promoting ongoing communication. Network software is used to make it easier for users to
seamlessly access network resources, but it is invisible to them. The functions of network
software.
• Users can be added to or removed from the network using user management.
• File management gives administrators control over user access to data and where data is
stored.
• The user may access network resources without interruption thanks to Access.
• Administrators can protect security and stop data breaches with the help of network
security technologies. (Ramya Mohanakrishnan, 2022)
Features
• It allows pluggable authentication modules that are set up using the web interface to
be used for authentication.
• With monitoring and alarm features, volume snapshot and recovery capabilities,
Openfiler supports both software and hardware RAID.
• Replication at the block level, multipath I/O (MPIO), and active/passive high
availability clustering are all supported.
• It offers flexible quota control, a simple Web-based admin Interface, and support for
NIS, LDAP, and Windows NT/active directory authentication
• It offers online file sharing, volume expansion support, and file system scalability of
up to 60TB+. (Anon., n.d.)
With its user-friendly GUI and task-based menu, Cisco Network Assistant makes managing
wired and wireless networks for networks with up to 80 devices simpler. In order to
implement common services across Cisco switches, routers, wireless controllers, and access
points, Cisco Network Assistant is free. You may examine crucial details about the items on
your network, such as Warranty and Contract Details, Advisories, and End of Life notices,
by going directly to Cisco Active Advisor. Devices managed by Cisco Network Assistant
will immediately be added to Cisco Active Advisor.
Any network is supported by its network software. It facilitates the management, monitoring, and
control of network traffic as well as the reduction of network complexity. Software for networks
requires more processing power. Insufficient hardware renders even the greatest network
software ineffective. Extreme requirements, such as high computing power, are present in
workstation gear. Large data storage capacity and quick ram with large capacity are needed to
operate these programs. Hardware and network software can't be used independently. Hardware
are objects composed of plastic and metal, while software is merely a collection of codes.
Hardware and network software therefore depend on one another. To execute programs, they
must be present. Hardware supplies the computing power needed to operate network software.
The system must be setup and compatible with the hardware and software. The system won't
function properly if the hardware and software aren't set and compatible. The system will heat
up, lag, become slow, and occasionally crash if the hardware requirements are not satisfied by
the program. If this happens, the hardware won't be able to deliver the necessary power. (Anon.,
2022)
Conclusion:
In this activity, I have given so many proof of cisco which includes IP, Ping test, and described
about Network Hardware and Network Software. As Conclusion, In terms of information
systems, Cisco System is a well-known, prosperous firm. It is one of the most well-known
companies in this industry and specialises in offering networking solutions for businesses. In
order to accommodate the expanding and creative generations, Cisco is introducing fantastic new
internet usage options. Customers may choose from a wide range of items offered by Cisco
system that greatly simplify internet use. Regarding Cisco's internal performance, they put a lot
of emphasis on utilizing the finest information systems to have a flexible and effective
performance both within the company and with clients and suppliers, which are in some ways the
same solutions they offer for their clients. Yet, we have covered several advantages that Cisco, in
our opinion, has over its rivals as well as some drawbacks. Activity 4:
Introduction
The physical configuration of different links and endpoints in a business network is known as the
topology of the network. The many forms of network topology, as well as the best practices for
choosing the most appropriate topology for your company, are all covered in detail in this article.
Selection of Topology:
The selection of a network topology is determined by the network's specific requirements and
constraints. Consider the following factors when selecting a topology:
• Distance between devices: The selected topology is influenced by the actual distance
between devices. For example, a bus topology may be suitable for devices that are
adjacent to one another, but a star topology may be preferable for devices that are
dispersed across a broader region.
• Network traffic: The topology used will be influenced by the volume of data that has to
be conveyed. For networks with heavy traffic, a mesh topology, for instance, may be
preferable since it offers several routes for data transmission.
• Security: The network's desired level of security will have an impact on the topology
selection. Because there is no single point of failure, a mesh architecture, for instance,
offers more security but is more challenging to install.
I selected star topology because Star topologies have the natural benefit of making the addition
of additional sites simple only the central site has to be modified. The center site in star topology
is crucial; if it fails, all connections would be lost. The connection's performance is determined
by the central hub's performance. (Anon., n.d.)
Selection of protocol
The topology chosen will be influenced by the volume of data that has to be conveyed. A mesh
topology, for instance, may be desirable for high-traffic networks since it offers several pathways
for data to flow.
Security: The network's need for security will have an impact on the topology that is selected. In
order to avoid the risk of a single point of failure, a mesh topology, for instance, offers higher
security, but it is more challenging to deploy.
Bibek Kumar Yadav 133 | P a g e
Interoperability: The ability to connect to and communicate with other networks and devices will
influence protocol selection. For example, connecting to the internet or other networks may
necessitate the use of a widely used and supported protocol, such as TCP/IP.
The Points to remember while Critical reflection on the final implemented network and design
are as given below:
• It is important to expressly identify the project goals and KPIs when critically evaluating
a network and design execution. What were the project's precise objectives, and how
were they assessed? Were the objectives met, and if not, what factors contributed to the
failure? To evaluate the success of the network and design execution, it's critical to have a
clear grasp of the project goals and KPIs.
• to examine the information and findings. Compared to what was anticipated, were the
results accurate? Compared to expectations, how well or poorly did the network and
design implementation perform? Has the data shown any surprising outcomes or
patterns? To spot any problems with the network and design execution, it's crucial to
thoroughly study the data and findings.
• figuring out how to execute the idea while identifying any network restrictions or flaws.
Were the resources or data used for the project subject to any limitations? The
performance of the model may have been impacted by any restrictions in the network
architecture or design decisions. The network and architecture may be enhanced and
iterated upon in the future by recognizing these constraints.
• Overall, critically evaluating the execution of a network and design calls for a complete
comprehension of the project's objectives, data, and outcomes, as well as a close
assessment of any constraints or downsides. You may direct next network and design
iterations to provide even better outcomes by identifying areas for improvement. (Anon.,
n.d.)
Conclusion
The key ideas you discussed in the body should be summarized in the conclusion, along with
your choice of the best plan of action. To let readers know when you will be completed, use
language to indicate that you are finishing up your job. The conclusion ought to be brief and
uncomplicated. The major goal is to address all of the reader's questions, though.
References
Anon., 2020. [Online]
Available at: https://www.imperva.com/learn/application-security/osi-model
[Accessed 10 03 2023].
Anon., n.d. Take Online Courses. Earn College Credit. Research Schools, Degrees & Careers.
[Online]
Available at: https://study.com/academy/lesson/types-of-networks-lan-wan-wlan-man-san-
panepn-vpn.html
[Accessed 03 march 2023].