Ruzan Network Final Assignment - 082926

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 65

Higher Nationals

Internal verification of assessment decisions – BTEC (RQF)


INTERNAL VERIFICATION – ASSESSMENT DECISIONS

Programme title BTEC Higher National Diploma in Computing

Mr.Sudhesh
Assessor Internal Verifier
Unit 02: Networking
Unit(s)

Assignment title LAN Design & Implementation for SYNTAX SOLUTIONS


Mohamed Ruzan
Student’s name
List which assessment criteria Pass Merit Distinction
the Assessor has awarded.

INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded match


those shown in the assignment brief? Y/N

Is the Pass/Merit/Distinction grade awarded


justified by the assessor’s comments on the Y/N
student work?
Has the work been assessed
Y/N
accurately?
Is the feedback to the student:
Give details:
• Constructive? Y/N
• Linked to relevant assessment criteria? Y/N
• Identifying opportunities for Y/N
improved performance?
• Agreeing actions? Y/N
Does the assessment decision need
Y/N
amending?

Assessor signature Date

Internal Verifier signature Date


Programme Leader signature (if required)
Date

Confirm action completed


Remedial action taken
Give details:

Assessor signature Date

Internal Verifier
Date
signature
Programme Leader
Date
signature (if required)

Mohamed Ruzan Unit 02 – Networking 1


Higher Nationals - Summative Assignment Feedback Form
Student Name/ID Mohamed Ruzan/KAN00130309

Unit Title Unit 02: Networking

Assignment Number 1 Assessor Mr.Sudesh


17.10.2022 Date Received
Submission Date
1st submission
Date Received 2nd
Re-submission Date
submission

Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction P1 P2 M1
Descripts

LO2 Explain networking devices and operations.


Pass, Merit & Distinction P3 P4 M2 D1
Descripts

LO3 Design efficient networked systems.


Pass, Merit & Distinction P5 P6 M3 D2
Descripts

LO4 Implement and diagnose networked systems.


Pass, Merit & Distinction P7 P8 M4 D3
Descripts

Grade: Assessor Signature: Date:

Resubmission Feedback:

Grade: Assessor Signature: Date:

Internal Verifier’s Comments:

Signature & Date:

* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken
place and grades decisions have been agreed at the assessment board.

Mohamed Ruzan Unit 02 – Networking 2


Assignment Feedback
Formative Feedback: Assessor to Student
This is ok fine.

Action Plan

Summative feedback

Feedback: Student to Assessor

Sudesh.bandara@esoft.lk 17.10.2022
Assessor Date
signature
E161001@esoft.acdemy 17.10.2022
Student Date
signature

Mohamed Ruzan Unit 02 – Networking 3


Pearson Higher Nationals in
Computing
Unit 02: Networking
Assignment 01

Mohamed Ruzan Unit 02 – Networking 4


General Guidelines

1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.

Word Processing Rules

1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No,
and Page Number on each page. This is useful if individual sheets become detached for
any reason.
5. Use word processing application spell check and grammar check function to help editing
your assignment.

Important Points:

1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the
body except for the before mentioned compulsory information will result in rejection of
your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as
illness, you may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You
will then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text
citation and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade
could be reduced to A REFERRAL or at worst you could be expelled from the course

Mohamed Ruzan Unit 02 – Networking 5


Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to
present it as my own without attributing the sources in the correct form. I further understand
what it means to copy another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of Pearson UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be
my own, and where I have made use of another’s work, I will attribute the source in the
correct way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Pearson, UK.
6. I understand that my assignment will not be considered as submitted if this document is
not attached to the assignment.

E161001@esoft.academy 17.10.2022
Student’s Signature: Date:
(Provide E-mail ID) (Provide Submission Date)

Mohamed Ruzan Unit 02 – Networking 6


Higher National Diploma in Computing
Assignment Brief
Student Name /ID Number Mohamed Ramzy Mohamed Ruzan

Unit Number and Title Unit 2: Networking

Academic Year 2021/22

Unit Tutor Mr.Sudesh

Assignment Title LAN Design & Implementation for SYNTAX SOLUTIONS

Issue Date 06.07.2022

Submission Date 17.10.2022

IV Name & Date

Submission format

The submission should be in the form of an individual report written in a concise, formal business style
using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using Harvard
referencing system. Please also provide an end list of references using the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures,
although you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:

LO1 Examine networking principles and their protocols.

LO2 Explain networking devices and operations.

LO3 Design efficient networked systems.

LO4 Implement and diagnose networked systems.

Assignment Brief and Guidance:

Mohamed Ruzan Unit 02 – Networking 7


Scenario

SYNTAX SOLUTIONS is a privately owned, well-known Software company located in Colombo. The
Management of SYNTAX SOLUTIONS has purchased a 3-story building in the heart of Matara. They
are planning to make it one of the state-of-the-art companies in Matara with the latest facilities.

It is expected to have nearly 150 employees in Matara branch.

Department Number of Users

Customer Care 10

Sales and Marketing 20

Finance 25

Legal 5

HR 10

Developers 55

Network Team 5

Server Room Servers +ISP connections

Foll ow i ng r equir ements ar e g iv en by the Manag ement.


• All the departments must be separ ated with uni que subnet and sho uld no t
communicate with each o ther unless ther e is a speci al r equir ement .

• 19 2.16 8.10. 0/24 is giv en and sho uld be use d fo r all the departments except the
server room . IPs sho uld assign usi ng DHCP .

• ERP and CRM Sy stems need to be im plem ented in M ata ra branch in local serv ers.

• N umber of s erv ers requir ed for the S erver r oom need to be decided by the
Netwo rk designer and sho uld be assigned with 10.25 4.1. 0/24 subnet. (Uses static

Mohamed Ruzan Unit 02 – Networking 8


I Ps )

• Hig h l ev el of r edundancy is expected in netwo rk design to eliminate si ngle po int


o f failures and traffic bottle necks.

• S al es and Mar keti ng Team need to access Netwo rk reso urces usi ng WI FI
co nnectiv ity .

• Pr oper methods fo r netw or ki ng monitoring and tr oubl eshooting need to be


established.

• All possible netw or k sec ur ity mechanism s sho uld be im plemented.

Assume yo u have been appo inted as the new netwo rk co nsultant o f SYNT AX S OLUTI ONS .
P repare a netwo rk architectural design and im plement it with yo ur suggestio ns and
recommendatio ns to meet the com pany requirements.

(No te : C l ea rl y state you r a ssump tion s. You a re allow ed to d esign th e n etwo rk a cco rding
to you r a ssump tion s, bu t main requi remen ts sho uld n ot b e viol ated)

Ac tiv ity 01
• D iscuss the benefits and co nstraints o f different netwo rk system ty pes that can be
im plemented in the Matara branch and the m ain IEEE Ethernet standards that can
be used in above L AN and WLAN design .

• D iscuss the im po rtance and impact o f netwo rk to po lo g ies and netwo rk proto co l
suites while com paring the main network to po lo gies and netwo rk proto co l suites
that are used in netwo rk design using exam ples . Recomm end suitable netwo rk
topolo gies and network proto co l suites fo r above scenario and justify yo ur answer
with v alid po ints.

Mohamed Ruzan Unit 02 – Networking 9


Ac tiv ity 02
• D iscuss the o perating principles o f network dev ices (Ex: Ro uter, Switch, Etc.) and
server ty pes that can be used fo r abov e scenario while explo ring different servers
that are available in to day’s m arket with their specificatio ns . R ecommend
server/ servers fo r the abov e scenario and justify your selectio n with v alid po ints .

• D iscuss the inter -dependence o f wo rkstatio n hardware with networking so ftware and
prov ide exam ples fo r netwo rking so ftware that can be used in abov e netwo rk design.

Ac tiv ity 03
• P repare a written netwo rk design plan to meet the above mentio ned user
requirements including a blueprint drawn using a mo deling too l. ( Ex: M icroso ft Visio ,
EdrawM ax).
Support yo ur answer by pro viding the VL AN and IP subnetting scheme for the above
scenario and the list of dev ices, netwo rk com po nents and software used to design the
netwo rk for abo ve scenario and while justifying yo ur selectio ns.

• Test and ev aluate the proposed design to meet the requirem ents and analy se user
feedback by using a User feedbac k fo rm .

• Install and co nfigure Netwo rk services , devices and applications (Ex: VL AN,D HCP ,
D NS,Pro xy , Web, Etc.) acco rding to the pro posed design to accom plish the user
requirements and design a detailed M aintenance schedule for abov e Netwo rk.

*N ote: - Scr een s hots of C onfig ur ati on scri pts shoul d be pr esented.

Ac tiv ity 04
• Im plement a networked system based o n yo ur prepared design with v alid evidence s
and recommend po tential future enhancements fo r the networked system with valid
justificatio ns to yo ur recommendatio ns. Use critical reflectio n to critically evaluat e
the design, plan, co nfiguration, and testing o f yo ur network while justify ing with v alid
co nclusio ns.

Mohamed Ruzan Unit 02 – Networking 10


• D evelo p test cases and co nduct verificatio n (Ex: Ping, extended ping, trace ro ute,
telnet, SSH, etc.) to test the abov e Netwo rk and analyse the test results against the
expected results.

Mohamed Ruzan Unit 02 – Networking 11


Mohamed Ruzan Unit 02 – Networking 12
Grading Rubric

Grading Criteria Achieved Feedback

LO1 : Examine networking principles and their protocols.

P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Compare common networking principles and how protocols
enable the effectiveness of networked systems.

LO2 : Explain networking devices and operations

P3
Discuss the operating principles of networking devices and
server types.

Mohamed Ruzan Unit 02 – Networking 13


P4
Discuss the inter-dependence of workstation hardware with
relevant networking software.

M2
Explore a range of server types and justify the selection of a
server, considering a given scenario regarding cost and
performance optimization.

LO 1 & LO2
D1 Critically evaluate the topology protocol selected for a given
scenario to demonstrate the efficient utilisation of a networking
system.
LO3 : Design efficient networked systems

P5
Design a networked system to meet a given specification.
P6
Test and evaluate the design to meet the requirements and
analyze user feedback.
M3

Mohamed Ruzan Unit 02 – Networking 14


Install and configure network services and applications on your
choice.
D2
Design a maintenance schedule to support the networked
system.
LO4 : Implement and diagnose networked systems

P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D3
Use critical reflection to evaluate own work and justify valid
conclusions.

Mohamed Ruzan Unit 02 – Networking 15


Content
Activity 1……………………………………………………………………………….….21
Networking.……………………………………………………………………………...…21
Computer network……..……………………………………………………………….…..21
Topologies…..……………………………………………………………………………...21
Figure 1 Tree topology………………………...…………………………………...21
Figure 2 Star topology………………………....……………………………….…..22
Figure 3 Ring topology………………………...…………………………………..22
Figure 4 Bus topology……………...….………...….….………………………..…23
Figure 5 Hybrid topology……………………...……………………………….…..24
IEEE 802 Standards…………………………………………………...………………......24
IEEE 802 Standard table………………….…………………………...………………......25
802.2 Standard……………………………………………………………………...25
802.3 Standard……………………………………………………………………...25
802.11 Standard………..…………………………………………………………...25
Different network types based on geography………………………………………..........26
Figure 7 PAN…………………………………………………………………….....26
Figure 8 LAN…………………………………………………………………….....27
Figure 9 WAN…………………………………………………………...……….....27
Figure 10 MAN…………………………………………………………….…….....27
Figure 11 CAN………………………………………………………………..….....28
Wired and Wireless Network………………………………………………………….…..28
Wired network………………………………………………………………….…...28
Wireless network………..…………..……………………………………………....29
Figure 12 ISO OSI reference model…………………………………………………….....29
Physical layer…………………………………………………………………….….29
Data link layer……………………………………………...……………………….30
Network layer…………………………………………………………………….…30
Transport layer..………………………………………………………………….…30
Session layer……..…………………………………………………………………30
Present layer.………………….…….………………………………………………31
Application layer……………………………………………………………………31
Activity 2……………..…………………………………………………………………….32
Network Devices……………………………………………………………………………32
Figure 13 Switch……………………………………………………………………32
Characteristics of Switch………………………………………………....…33
Figure 14 Routers………………………………………………………………...…34
Characteristics………………………………………………………………34
Benefits of Router………………..…………………………………………34
Figure 15 Firewall…………………………………………………………………..35
Types of Firewall…………………………………………………………...35
Figure 16 Access Point………………………………………………………...…...36
Advantage and Disadvantage of Access Point……………………………...37

Mohamed Ruzan Unit 02 – Networking 16


Servers………………………………………………………………………………37
Types of Services…………………………………………………………………...39
Servers…………………………………………………………………………........40
Figure 38…………………………………………………………………....40
Figure 38…………………………………………………………………....41
Figure 38…………………………………………………………………....42
Figure 38…………………………………………………………………....42
Servers for above scenario………………………………………………………….43
Network Operating System…………………………………………………………………43
Types of NOS………………………………………………………………………43
Features of NOS……………………………………………………………………44
Example of NOS……...……………………………………………………………44
Activity 3………………………………………………………………………………....…45
Figure 21 Network Design………………………………………………………………….45
Network component and software used to design the network……………………………..45
Cisco Packet Tracer…………………………………………………………………45
Wonder share Edraw …………………………..……………………………………46
Microsoft Visio……………………………………………………………………...48
Feedback form for syntax solution………………………………………………………….49
Activity 4……………………………………………………………………………………49
Figure 22 Interface of Network……………………………………………………………..49
Figure 23 Assigning VLAN….……………………………………………………………..50
Figure 24 In VLAN switch port assigning……………...…………………………………..51
Figure 25 Trunking switch ports………..…………………………………………………..52
Figure 26 Assigning static IP for server…………..………………………………………..52
Figure 27 Configuring DHCP……..………………………………………………………..53
Figure 28 Telnet Configuration……………………………………………………………..53
Figure 29 Password configuration for network……………………………………………..54
Figure 30 Sub interface in router………………………..…………………………………..54
Develop test cases and conduct verification………………………………………………...55
Test case 1…………………………………………………………………………...55
Test case 2…………………………………………………………………………...56
Test case 3…………………………………………………………………………...57
Test case 4…………………………………………………………………………...58
Installing Wireshark network tool…………………………………………………………..59
Figure 31…………………………………………………………………………….59
Figure 32…………………………………………………………………………….59
Figure 33…………………………………………………………………………….60
Figure 34…………………………………………………………………………….60
Figure 35…………………………………………………………………………….61
Figure 36…………………………………………………………………………….61
Figure 37…………………………………………………………………………….62
Figure 38…………………………………………………………………………….62
Figure 39…………………………………………………………………………….63

Mohamed Ruzan Unit 02 – Networking 17


Future enhancements to be implemented for the above network system………………...…63
Maintenance schema for the syntax solution………………………………………………..64
Concluion……………………………………………………………………………………65

Mohamed Ruzan Unit 02 – Networking 18


Mohamed Ruzan Unit 02 – Networking 19
Acknowledgement
I would like to specially thank Sudesh sir for guiding us and helping us in our subject. The
Esoft administration has been a friendly group with the students. We were given the
resources and we were guided well to do our assignments. The lectures motivated us very
well.

Thank You!!!

Mohamed Ruzan Unit 02 – Networking 20


ACTIVITY 1

Networking

Networking is the exchange of information and ideas among people with common
profession or special interest, usually in an informal social setting. Networking often
begins with a single point of common ground.

Professionals use networking to expand their circles of acquaintance, find out about
job opportunities, in their fields, and increase their awareness of news and trends in
their fields or the greater world (KAGAN, n.d.)

Computer network

A computer network is a system that connects two or more computing devices for
transmitting and sharing information. Computing devices include everything from a
mobile phone to server. These devices are connected using physical wires such as
fiber optics but they can also be wireless.

Different network system types


Topologies

A network topology is the physical and logical arrangement of nodes and connections
in a network. Nodes usually include devices such as switches, routers and software
with switch and router features. Network topologies are often represented as a graph.

Tree topology

Tree topology is a hybrid of star topology and bus topology. In a bus


topology a central node known as the bus connects all the other nodes. In
star topology every node is connected through hubs. Tree topology is an
expansion of these two topologies and hence it is also known as an
expanded.
Figure 1 tree topology

Mohamed Ruzan Unit 02 – Networking 21


Advantages Disadvantages
Highly secure. Treatment of the topology is pretty complex.
It is reliable. The establishment cost increases as well.
Point-to-point wiring for individual segment. It is very difficult to configure as compared
to the other network topologies.
It is the combination of bus and star The length of a segment is limited .
topology.

Star topology

A star topology sometimes known as a star network is a network topology in which


each device is connected to a central hub. It is one of the most prevalent computer
network configurations and it's by far the most popular Network Topology. In this
network arrangement all devices linked to a central network device are displayed as a
star.

Figure 2 star topology

Advantages Disadvantages
Easier to put in. Extra hardware is required which adds to
cost.
It is very reliable. Performance is predicated on the one
concentrator hub.
It is high performing as no data collisions Requires more cable than a linear bus.
can occur.

Ring topology

A ring topology is a network configuration where device connections create a circular


data path. Each networked device is connected to two others, like points on a circle.
Together, devices in a ring topology are referred to as a ring network.

Mohamed Ruzan Unit 02 – Networking 22


Figure 3ring toplogy

Advantages Disadvantages
Minimum collisions. It is expensive.
It is cheap to install. Difficult to troubleshoot the ring.
It is cheap to expand. They were not scalable.
Easy to manage. Total dependence in on one cable

Bus topology

Alternatively referred to as line topology, bus topology is a network setup where each
computer and network device is connected to a single cable or backbone. Depending
on the type of computer network card, a coaxial cable or an RJ-45 network cable is
used to connect them together.

Figure 4 bus topology

Advantages Disadvantages
It is less expensive. Data traffic is high.
Easy to connect. Data collision is high.
Easy to implement and extend. Used to connect 5-9 systems only.
It is flexible and scalable. Proper termination is required.

Mohamed Ruzan Unit 02 – Networking 23


Hybrid topology

Hybrid topology combines two or more topologies. You can see in the above
architecture in such a manner that the resulting network does not exhibit one of the
standard topologies.

For example, as you can see in the above image that in an office in one department,
Star and P2P topology is used. A hybrid topology is always produced when two
different basic network topologies are connected.

Figure 5 hybrid
topology

Advantages

• Offers the easiest method for error detecting and troubleshooting.


• Highly effective and flexible networking topology.
• It is scalable so you can increase your network size.

Disadvantages

• The design of hybrid topology is complex.


• It is one of the costliest processes.

IEEE 802 standards

• The IEEE 802 standards comprises a family of networking standards that


cover the physical layer specification of technologies.
• IEEE (Institute of Electrical and Electronics Engineers) 802 committee defines
and publishes standards for wired Ethernet Local Area Networks (LAN),
Metropolitan Area Network (MAN), Wireless Area Networks (WAN) and etc.
• IEEE (Institute of Electrical and Electronics Engineers) Working groups work
to create and write the standards and IEEE working group focus for individual
area. (omnisecu, 2020)

Mohamed Ruzan Unit 02 – Networking 24


Figure 6 IEEE
standards
The 802.2 standard, referred to as the Logical Link Control (LLC), manages
data flow control and error control for the other IEEE LAN standards. Data flow
control regulates how much data can be transmitted in a certain amount of time. Error
control refers to the recognition and notification of damaged signals.

The 802.3 standard defines the characteristics for Ethernet networks. Ethernet
networking is by far the most widely implemented form of local area networking.
Several Ethernet LAN characteristics are defined in the 802.3 standard.

The 802.11 standard specify the characteristics of wireless LAN Ethernet networks.
Under the banner of 802.11, there are four common wireless standards. These include
802.11, 802.11a, 802.11b and 802.11g. Each of these wireless standards identifies
several characteristics. Here is a review of the 802.11 wireless standards and
characteristics:

Mohamed Ruzan Unit 02 – Networking 25


• Speed 802.11 standards are measured in Mbps and very between network
standards.
• Media the 802.11 standards use radio frequency (RF)
• As a transmission media. Depending on the standard, radio frequencies
include 2.4GHz and 5GHz.
• Topology 802.11 wireless standards can be implemented in an ad-hoc or
infrastructure topology.

Different network types based on geography

PERSONAL AREA NETWORK (PAN) is the computer network that connects


computer/ devices within the range of an individual person. As PAN provides a
network range within a person’s range typically within a range of 10 meters it is
called a Personal Area Network.

Figure 7 PAN

Advantages Disadvantages
It is portable. It is a slow data transfer.
It is reliable. It has a limited range.
It is secure. It interfaces with radio signal.
No extra space requires. It can only be used for the personal area.

Mohamed Ruzan Unit 02 – Networking 26


LOCAL AREA NETWORK (LAN) A Lan is a group of computers and devices that
are in a specific location, such as a building, office or home. A LAN can be small or
large, from a home network with a user to an enterprise network with thousands of
users and devices in an office or school.

Figure 8 LAN

WIDE AREA NETWORK (WAN) A wide area network is a computer network that
covers a large geographical area comprising a region, a country, a continent or even
the whole world. WAN includes the technologies to transmit data, image, audio and
video information over long distances and among different LANs and MANs. (Anon.,
n.d.)

Figure 9 WAN

METROPOLITAN AREA NETWORK (MAN) larger than a LAN but smaller than
a WAN a MAN incorporates elements of both types of networks. It connects multiple
LANs together and spans an entire geographical area such as a city or town (or
sometimes a campus). Ownership and management can be handled by a single person,
but it’s more likely done by a larger company or organization.

Figure 10
MAN

Mohamed Ruzan Unit 02 – Networking 27


CAMPUS AREA NETWORK (CAN) this is bigger than a LAN but smaller than
MAN. This is a type of computer network which is usually used in places like a
school or college. This network covers a limited geographical area that is it spreads
across several buildings within the campus.

Figure 11 CAN

Advantages Disadvantages
Sharing of data is easy. Limited for connection nodes.
Economical. Maintenance is expensive.
Use a wireless connection.
Transferring files is fast.

Wide area networks is better than other types of network because WANs can
facilitate communication, the sharing of information and much more between
devices from around the world through a WAN provider. WANs can be vital for
international business, but they also essential for everyday use, as the internet is
considered the largest WAN in the world.

Wired and Wireless Network

1. Wired Network

As well all known “wired” refers to any physical medium made up of cables.
Copper wire, twisted pair or fibre optic cables are all options. A wired network
employs wires to link devices to the internet or another network, such as
laptops or desktop PCs.

Mohamed Ruzan Unit 02 – Networking 28


2. Wireless Network

Wireless means without wire media that is made up of electromagnetic waves


(EM waves) or infrared waves. Antennas or sensors will be present on all
wireless devices. Cellular phones, wireless sensors, TV remotes, satellite disc
receivers and laptops with WLAN cards are all examples of wireless devices.
For data or voice communication, a wireless network uses radiofrequency
waves rather than wires.

ISO OSI reference model

Figure 12 ISO OSI referece model

1. Physical layer

The lowest layer of the OSI reference model is the physical layer. It is
responsible for the actual physical connection between the devices. The
physical layer contains information in the form of bits. It is responsible for
transmitting individual bits from one node to the text. When receiving data,
this layer will get the signal received and convert it into 0s and 1s and send
them to the Data Link Layer, which will put the frame back together (CRAIG
FREUDENRICH, n.d.)

Mohamed Ruzan Unit 02 – Networking 29


2. Data Link Layer

The data link layer is responsible for the node-to-node delivery of the
message. The main function of this layer is to make sure data transfer is error-
free from one node to another, over the physical layer. When a packet arrives
in a network, it is the responsibility of DLL to transmit it to the Host using its
MAC address (CRAIG FREUDENRICH, n.d.)

3. Network layer

Network layer works for the transmission of knowledge from one host of the
opposite located in several networks. It also takes care of packet routing i.e.,
selection of the shortest path to transmit the packet, from the amount of routes
available. The sender & receiver’s IP addresses are placed within the header
by the network layer.

4. Transport layer

Transport layer provides services to application layer and takes from network
layer. Info within the transport layer is mentioned as segments. It’s liable for
the top to finish delivery of the entire message. The transport layer also
provides the acknowledgment of the successful data transmission and re-
transmits the info if a mistake is found.

5. Session layer

This layer is responsible for establishment of connection, maintains of


sessions, authentication and also ensures security

Mohamed Ruzan Unit 02 – Networking 30


SCENARIO:
Let’s consider a scenario where a user wants to send a message through
some Messenger application running in his browser. The “Messenger”
here acts because the application layer which provides the user with an
interface to make the info. This message or so-called Data is compressed,
encrypted (if any secure data) and converted into bits (0’s and 1’s) in
order that it is often transmitted

6. Presentation layer

Presentation layer is additionally called the interpretation layer. The data from
the application layer is extracted here and manipulated as per the specified
format to transmit over the network.

7. Application layer

At the very top of the OSI reference modal stack of layers, we discover
application layer which is implemented by the network applications. These
applications produce the info, which has got to be transferred over the
network. This layer also is a window for the appliance services to access the
network and for displaying the received information to the user.

Mohamed Ruzan Unit 02 – Networking 31


Activity 2

Network Devices

1. Switch

A switch is a multiport device that improves network efficiency. A switch is a data


link layer device. The switch can perform error checking before forwarding data,
which makes it very efficient as it does not forward packets that have errors and
forward good packets selectively to the correct port only. In other words, the switch
divides the collision domain of hosts, but broadcast domain remains the same.
Examples of these devices include computers, printers and wireless access point.

Figure 13 switch

Type of switches

LAN switches- LAN switches are typically used to connect points on an


organization's internal LAN. By efficiently allocating bandwidth, it prevents data
packets traveling over a network from overlapping. Before sending the transmitted
data packet to its receiver, the LAN switch distributes it. By sending a package of
data only to the desired user, these switches minimize congestion issues

Unmanaged switches- Home networks, small companies and businesses


frequently use unmanaged switches. It allows networked devices to connect with
one another, such as connecting a computer or printer to another computer near
and it is simple to set up.

Mohamed Ruzan Unit 02 – Networking 32


Managed switches- The benefit of managed switches over unmanaged switches
is that they can be customized to improve a specific network functionality. They
provide characteristics like Quality of Service (QOS), SNMP (Simple Network
Management Protocol), and others. These switches can handle a variety of
advanced capabilities that are designed to be managed by a qualified
administrator.

POE switches- A network switch that uses Power over Ethernet is called a POE
Gigabit Ethernet switch. POE switches can handle continuous power and data
transfer over one network cable when linked with several additional network
devices.

Stackable switches- The network can be made simpler and more available with
the use of stackable switches. For example, you can handle all eight of your 48-
port switches as a single unit using stackable switches instead of configuring,
maintaining, and troubleshooting them separately. These eight switches would
operate as a single switch with a real stackable switch because there would be a
single SNMP/RMON agent, single Spanning Tree domain, and single CLI or
Web interface.

Characteristics of Switch

• 10/100/1000 Mbps or 10/100 Gbps.


• Available in different of configurations and according to data transmission
speeds like
• Supports full duplex mode.
• Data transmission from port to port avoids packet collision.
• Works at layer 2 (data link layer).

Mohamed Ruzan Unit 02 – Networking 33


2. Routers

A router is a device like a switch that routes data packets based on their IP
addresses. The router is mainly a Network layer device. Routers normally connect
LANs and WANs together and have a dynamically updating routing table based on
which they make decisions on routing the data packets.

Figure 14 routers

Characteristics of Router

• Similar like bridges, routers also enable filtering and encapsulation.


• Routers continuously evaluate the status of the network together in order to
dynamically react to changes in the condition of the network.
• Routers have multiple ports and fast interconnections.
• Similar like bridges, routers also enable filtering and encapsulation.

Mohamed Ruzan Unit 02 – Networking 34


Benefits of Router

• By establishing collision domains and broadcast domains, network traffic can


be reduced.
• Offers sophisticated traffic isolation, flow control, and routing.
• The network managers can set policies based on routing choices because they
are changeable.
• Allows links across various network designs, such as Ethernet and Token
Ring.

3. Firewall

A firewall is a network security device that monitors and filters incoming and
outgoing network traffic based on an organization’s previously established security
policies. At its most basic, a firewall is essentially the barrier that sits between a
private internet network and the public internet.

Figure 15
firewall

Types of firewalls

• Proxy firewall: This is an old type of firewall device, works as the gateway
between one Networks to another for a particular application. By blocking
direct connections from outside the network, proxy servers can add security
and other features like content caching.

Mohamed Ruzan Unit 02 – Networking 35


• UTM firewall: Stateful inspection firewall, intrusion prevention and antivirus
features are generally linked together in a UTM. Additional services and
frequently cloud management could also be part of it. Simplicity and usability
are the main UTM concerns

• Virtual firewall: To monitor and secure traffic across physical and virtual
networks, a virtual firewall is normally given as a virtual appliance in a private
cloud (Amazon Web Services, Microsoft Azure, Google Cloud Platform, and
Oracle Cloud Infrastructure. Frequently, a virtual firewall is a crucial element
in software-defined networks.

• Cloud Native firewall: Modernizing application and workload infrastructure


security at scale is what cloud native firewalls are doing. Cloud native firewalls
allow networking operations and security operations teams the ability to
operate at fast speed with automatic scaling features.

• Next-generation firewall: Simple packet filtering and stateful inspection are


no longer required for firewalls. To stop modern dangers like advanced
malware and application-layer attacks, the lot of businesses are using next-
generation firewalls.

4.Access Point

While a wired or wireless link is technological in an access point, it usually means a


wireless device. An access point operates on the second OSI layer, the data link
layer, and can either act as a bridge that connects a standard wireless devices or as a
router that transmits data to another access point. Wireless connectivity points are a
device that is used to generate a wireless LAN (WLAN) transmitter and receiver.
Access point are usually networked separate machines with an integrated antenna,
transmitter and adapter. (Twade, n.d.)

Mohamed Ruzan Unit 02 – Networking 36


Figure 16
access
point
Advantage of Access point

• More uses access


• Broader range of transmission
• Flexible networking
• Multi-Access point interconnection

Disadvantage of Access point

• High cost
• Inability to be used alone
• Poor stability

5.Servers

A server is a computer or system that provides resources, data, services or programs


to other computers, known as clients, over a network. In theory, whenever
computers share resources with clients machines they are considered servers. There
are many types of servers,

Application servers

These servers connect clients to software applications through virtual server


connections. This allows user to bypass downloading data to their own hardware in
order to access applications. Application servers can effectively host large amounts
of application data to many users at once, making them ideal for businesses. (Anon.,
n.d.)

Mohamed Ruzan Unit 02 – Networking 37


Proxy server

Proxy servers act as a bridge between a host server and a client server. A proxy
sends data from a website to your computer IP address after it passes through the
proxy’s server. This practice adds a layer of security sins the information is
requested then transferred from the source to the proxy server and never directly
from a client to another user. A proxy server can filter out various harmful internet
entities. (Anon., n.d.)

Mail server

A mail server is an application that receives incoming e-mails from local users
(people within the same domain) and remote senders and forwards outgoing e-mails
for delivery. (techtarget, n.d.)

Database server

Database servers function as large storage spaces that organizations use and access
to run multiple programs to meet their needs. A database server can run
independently of any database architecture. (Anon., n.d.)

File transfer protocol (FTP) server

FTP servers are used to relocate files from one computer to another. Uploaded files
move from your computer to the server while downloaded files are extracted from
the server onto your device. File transfer protocol also refers to the method of using
a server to another in order to share data safely. (Anon., n.d.)

Mohamed Ruzan Unit 02 – Networking 38


Types of Services

• User management

User management is the process of creating accounts for users, authenticating them
and providing access to services. It can be done on an individual level or in groups
like departments that require separate usernames and passwords depending on who’s
using it so there are no leaks from one person onto another’s account – this way
nobody has access everywhere all at once!

This is the ability to handle everything from user permissions and providing
passwords for access. This also covers enforcing security measures so only authorized
personnel can access certain computers or information.

• E-mail

Email is a widely used tool for communication that needs access to the Internet.
According to many businesses, staff members are assigned company-specific email
accounts, which requires them maintain an internal mail server and create messages
on behalf of their organization

The process of sending and receiving emails requires network services, which will
often include adding users as contacts, creating distribution lists, and managing email
attachments such as images, videos, and other files.

• Printing

Shared printing services are a great way for organizations of all sizes to save on
expensive equipment. All users can submit their print jobs when they need them,
without needing individual printers at each desk.

The ability to print from anywhere is a network service that can be accessed through a
web portal or application that will allow the user to send documents, images, and
other data for printing.

Mohamed Ruzan Unit 02 – Networking 39


• System administration

Includes the maintenance of servers as well as updating software so all computers


have access to the latest versions. The management of updates, upgrades, and patches
are also included in this type of service which controls how updates happen across a
computer network. These services often work hand-in-hand with User Management
Services because system administrators need permission from users before carrying
out an update on their computer.(Anon., n.d.)

Servers

PowerEdge T150 Tower Server

Figure 17

• Processor - Intel® Pentium G6405T 3.5GHz, 4M Cache, 2C/4T, No Turbo


(35W), 2666MT/s
• RAM - 16GB UDIMM, 3200MT/s, ECC
• Storage - 4TB HDD SATA 6Gbps 7.2K 512n 3.5in Cabled Hard Drive
• Power codes - NEMA 6-15P to C13 Wall Plug, 250 Volt, 13 AMP, 6 Feet
(1.8m), Power Cord, North America
• Additional network card - On-Board Broadcom 5720 Dual Port 1Gb LOM
• Password - iDRAC,Factory Generated Password

Mohamed Ruzan Unit 02 – Networking 40


Fujitsu Primergy TX1310 M1

Figure 18

• CPU: Intel Xeon E3-1226 v3.


• Graphics- Intel HD Graphics P4600.
• Dimensions (W x D x H) - 17.5 x 42 x 39.5cm.
• RAM- 16GB.
• Storage- 2 x 1TB HDD.
• Connectivity- 5 x USB 3.0, 2 x Gigabit Ethernet

Mohamed Ruzan Unit 02 – Networking 41


HPE ProLiant ML350 Gen10 server

Figure 19

• Processor- Intel® Xeon® Scalable processors, 1st and 2nd generations.


• RAM- 16GB.
• Graphics- Intel HD Graphics P530.
• Dimensions (W x D x H) - 18 x 65 x 47cm.
• Maximum memory- 3.0 TB with 128 GB DDR4 DIMM.
• Network controller- HPE Ethernet 1Gb 4-port 369i Adapter.
• Form factor- Tower.

(Anon.,
n.d.)

Work station

Dell Precision Tower 7920 Workstation

Figure 20

Mohamed Ruzan Unit 02 – Networking 42


• Dell Precision Tower 7920 Workstation 2x Silver 4114 Ten Core 2.2Ghz
Processors.
• RAM 384GB.
• 2TB 6Gb/s SATA Solid State Drive, DVDRW Optical Drive.
• NVidia Quadro M4000 8GB GDDR5 Graphic Card.
• 400W Power Supply.
• Operating system Windows 10 64-Bit Pre-Installed, and Power Cable.
• Product Dimensions 60.96 x 60.96 x 30.48 cm; 20.41 Kg.

(Anon., n.d.)

Servers for above scenario

We need Dell precision tower 7920 workstation and PowerEdge T150 Tower Server
hardware for the Matara branch to receive data backup, control network security, store
all files in one location where authorized customers can connect to them, and increase
performance, the same brand of workstation and server should be used, in addition
application servers, FTP servers, DHCP, DNS servers, web servers and Email servers.
The network’s stability is guaranteed by the servers. It makes it possible for users to
share resources. These server types and pieces of gear will help us grow our company.

Network Operating system (NOS)

A network operating system is a computer operating system that is designed primarily


to support workstations, personal computers and in some instances, older terminals that
are connected on a local area network(LAN). The software behind a NOS allows
multiple devices within a network to communicate and share resources with each other.
(Lewis, n.d.).

There are two types of Network Operating System

Mohamed Ruzan Unit 02 – Networking 43


1. Peer-to-peer NOS

It is allowed users to share network resources saved in a common, accessible


network location. In this architecture, all devices are treated equally in terms of
functionality. Peer-to-peer usually works best for small to medium LANs and
is cheaper to set up.

2. Client/server NOS

User can access to resources is provided via client/server network operating


systems. This architecture allows for the execution of individual client actions
from any location by consolidating all operations and applications under a
single file server. The most costly and technically demanding implementation
strategy is client/server. The fact that the network is managed centrally, making
changes or technological advancements easier to incorporate, is a benefit of the
client/server NOS.

Features of network operating system

• Sharing of a printer and application.


• Backup and web services.
• Directory and internetworking.
• Sharing a common file system and database.
• Capabilities for user authentication and access control in networks.

Examples for Network operating system

• Microsoft’s LAN Manager – it was created to run on the Microsoft OS and


operates as a server application. The most of LAN Manager’s functionality is
already built into the Windows OS.
• Novell’s NetWare – Based on the XNS protocol architecture, this was the
first NOS to be released.
• Artisoft’s LANtastic – The most of the PC operating systems are supported
by this simple and user-friendly NOS.
• Banyan’s VINES – Specific functions and services are requested using a
client-server architecture.
Mohamed Ruzan Unit 02 – Networking 44
Activity 3

Network Design

Figure 21 network design


Network components and software used to design the network

Cisco Packet Tracer

The main purpose of Cisco Packet Tracer is to help students learn the principles of
networking with hands-on experience as well as develop cisco technology specific
skills. Since the protocols are implemented in software only method, this tool cannot
replace the hardware routers or switches. Interestingly, this tool does not only include
Cisco products but also many more networking devices.

Using this tool is widely encouraged as it is part of the curriculum like CCNA.
CCENT where faculties use Packet Trace to demonstrate technical concepts and

Mohamed Ruzan Unit 02 – Networking 45


networking system. Students complete assignments using this tool, working on their
own or in teams. (Nikitha Sri, n.d.)

Wonder share EdrawMax Software

Edraw is a powerful, all-in-one diagramming application that allows you to draw


fishbone diagrams, flowcharts, UML diagrams, floor plans, office layouts, and more.
You can create more than 280 different diagram types, from infographics to technical
drawings.

With a massive library of templates and symbols at your disposal, you can get started
with network design immediately. There are thousands of templates, which are
professionally and intuitively designed, to choose from. Edraw offers excellent file
compatibility, so you can import Visio files and export your diagrams in a range of
formats. This includes Visio, Word, PDF, HTML, JPEG, and more.

Edraw has recently released an online version, which is another major benefit,
allowing you to access the program from anywhere, on any device and on any
operating system. If you have access to the internet, Edraw is at your disposal.

This network design software facilitates collaboration by letting you share diagrams
on social media via an HTML link. Because it’s based on cloud storage, you can work
on a project at the same time as other team members, while on multiple devices. You
can access the Edraw download here, and choose between the Windows, Mac, Linux,
or web versions of the program. (Anon., n.d.)

Mohamed Ruzan Unit 02 – Networking 46


Microsoft Visio

Microsoft Visio is probably the most well known network mapping and layout
software among Business & IT professionals alike.

Key Features:

• Graphics editor industry leader


• Network icons
• Topology templates

The newer versions of Visio now have added functionality that allows people to
comment on your Diagrams through either Visio itself or through a Browser (using
Sharepoint) and even goes as far as built in Instant messaging using either Microsoft
Skype for Business or Lync.

Bundled into the software are over 70 pre-built templates and thousands of Shapes,
including IT focused elements that represent Active Directory components, as well as
detailed network components and Network appliances and routes. (Parker, n.d.)

Mohamed Ruzan Unit 02 – Networking 47


VLAN and IP subnetting
Departments VLAN CIDR Subnet mask IP address range Usable IP address
range

192.168.10.0 - 192.168.10.1 -
Developers 10 /26 255.255.255.192 192.168.10.63 192.168.10.62

192.168.10.65 -
Finance 20 /27 255.255.255.224 192.168.10.64 -
192.168.10.94
192.168.10.95

192.168.10.97 -
Sales and 30 /27 255.255.255.224 192.168.10.96 -
192.168.10.126
marketing 192.168.10.127

192.168.10.128 -
192.168.10.129 -
Customer 40 /27 255.255.255.240 192.168.10.143
192.168.10.142
care

192.168.10.144 - 192.168.10.145 -
255.255.255.240
HR 50 /28 192.168.10.159 192.168.10.158

Legal 50 /28 255.255.255.248 192.168.10.160 - 192.168.10.161 -


192.168.10.167 192.168.10.166

Network 70 /29 255.255.255.248 192.168.10.168 - 192.168.10.169 -


team 192.168.10.175 192.168.10.174

Mohamed Ruzan Unit 02 – Networking 48


FEEDBACK FORM FOR SYNTAX SOLUTION
Name
Date
Does the network system fulfil POOR GOOD EXELENT
the requirements?
Level of Network Security

Efficient level

Access speed of the network

Server responses

Overall performance

Is this user friendly to


installing and using?
Opinions for this network

Network performance
Signature

Activity 4

Interface of the network

Figure 22 interface of the network

Mohamed Ruzan Unit 02 – Networking 49


Assigning VLAN

Figure 23 assigning VLAN

Mohamed Ruzan Unit 02 – Networking 50


In VLAN switch port assigning

Figure 24 in VLAN switch port assigning

Mohamed Ruzan Unit 02 – Networking 51


Trunking switch ports

Figure 25
trunking
switch port
Assigning static IP for server

Figure 26 assigning static ip for server

Mohamed Ruzan Unit 02 – Networking 52


Configuring DHCP

Figure 27 configuring DHCP

Telnet Configuration

Figure 28
telnet
configurati
on

Mohamed Ruzan Unit 02 – Networking 53


Password configuration for network

Figure 29 pasword
configuration for network

Sub interface in router

Figure 30 sub interface


in router

Mohamed Ruzan Unit 02 – Networking 54


Develop test cases and conduct verification

Test case 1

Test ID - 010 Date – 01.10.2022


Test department Pinging from network department to Finance

Steps Open command prompt | type the correct command

Expected outcome Reply from pinged workstation


Actual outcome

Tester Ruzan

Mohamed Ruzan Unit 02 – Networking 55


Test case 2

Test ID - 011 Date – 01.10.2022


Test department Traceroute from networking department to Finance

Steps Open command prompt | type the correct command

Expected outcome Reply from other side


Actual outcome

Tester Ruzan

Mohamed Ruzan Unit 02 – Networking 56


Test case 3

Test ID - 012 Date – 03.10.2022


Test Extended pinging from networking department to finance
department department.
Steps Open command prompt | type the correct command

Expected Reply from pinged workstation until manually stop.


outcome
Actual
outcome

Tester Ruzan

Mohamed Ruzan Unit 02 – Networking 57


Test case 4

Test ID - 013 Date – 05.10.2022


Test DHCP request
department
Steps Open IP configure | Request IP address DHCP server

Expected DHCP request successful


outcome
Actual
outcome

Tester Ruzan

Mohamed Ruzan Unit 02 – Networking 58


Installing Wireshark Network Monitoring tool

Figure 31

Figure 32

Mohamed Ruzan Unit 02 – Networking 59


Figure 33

Figure 34

Mohamed Ruzan Unit 02 – Networking 60


Figure 35

Figure 36

Mohamed Ruzan Unit 02 – Networking 61


Figure 37

Figure 38

Mohamed Ruzan Unit 02 – Networking 62


Figure 39

Future enhancements to be implemented for the above the network system

• Reconfigure network hardware.


• Add fire wall to this network system.
• Data compression.
• Add more Routers to this network.
• Do the necessary updates and upgrades.
• Provide a different network for employees.
• Monitoring tools are a sure way to improve network performance.
• Set expectation foe proper usage.
• Prepare for future capacity needs.
• Evaluate the current network system.
• Compress network traffic.

Mohamed Ruzan Unit 02 – Networking 63


Maintenance schema for the syntax solution

Plane Daily Weekly Monthly Annually

Network trouble shooting (check for


the virus protection) ✓
Update Hardware (checking router
and switches) ✓

Check for network upgrade


(installing latest version) ✓

Monitoring network

Check network security


Data backup

Inspection on network devices


Review

Mohamed Ruzan Unit 02 – Networking 64


Conclusion

To summarize, a network is two or more computers that are linked together via a
telecommunication system in order to communicate and share resources. Syntax
Solutions would be unable to efficiently share resources and increase productivity
without a network. As you can see, networks provide numerous advantages to end
users. Networks, whether wired or wireless, are an important part of technology.
When it comes to building a network, the key factors that are considered are design,
planning, configuration, and testing. To run a successful network, the company's
requirements, such as managing employee traffic and separating the network
according to departments, must be met. The network design is the next factor to
consider; the design has a large impact on the system and is a major factor to
consider. The network design will then be configured in order to meet the
requirements of Syntax Solutions. Each module must be checked thoroughly for an
error-free network so that the devices can operate efficiently. After that, the network
must be tested before implementation. To test the network, go through each module
looking for any faults that may cause a problem. After each step is successfully
completed, the network will be implemented in Syntax Solutions as shown above.

Mohamed Ruzan Unit 02 – Networking 65

You might also like