0% found this document useful (0 votes)
17 views114 pages

1594835321369-31001-A-006688-1594549052228-31001-Unit 02 Networking - Holistic Assignment (K.sathurcigan)

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views114 pages

1594835321369-31001-A-006688-1594549052228-31001-Unit 02 Networking - Holistic Assignment (K.sathurcigan)

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 114

Higher Nationals

Internal verification of assessment decisions – BTEC (RQF)


INTERNAL VERIFICATION – ASSESSMENT DECISIONS

Programme title HND in Computing (Software Engineering)

Assessor MNM. Najath Risni Internal Verifier J. Piragan


Unit 02: Networking
Unit(s)

Assignment title Network Solution for Vividzone

Student’s name Mr. Kamalendran Sathurcigan


List which assessment criteria Pass Merit Distinction
the Assessor has awarded.

INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded match


those shown in the assignment brief? Y/N

Is the Pass/Merit/Distinction grade awarded


justified by the assessor’s comments on the Y/N
student work?
Has the work been assessed
Y/N
accurately?
Is the feedback to the student:
Give details:
• Constructive? Y/N
• Linked to relevant assessment criteria? Y/N
• Identifying opportunities for Y/N
improved performance?
• Agreeing actions? Y/N
Does the assessment decision need
Y/N
amending?

Assessor signature Date

Internal Verifier signature Date


Programme Leader signature (if required)
Date

Confirm action completed


Remedial action taken
Give details:

Assessor signature Date

Internal Verifier
Date
signature
Programme Leader
Date
signature (if required)

Mr. K. Sathurcigan Unit 02 Networking 1


Higher Nationals - Summative Assignment Feedback Form
Student Name/ID Mr. Kamalendran Sathurcigan (BAT/A-006688)

Unit Title Unit 02: Networking

Assignment Number 1 Assessor MNM. Najath Risni


10/07/2020 Date 06/07/2020
Submission Date
Received 1st
submission
Date Received 2nd
Re-submission Date
submission

Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction P1 P2 M1
Descripts

LO2 Explain networking devices and operations.

Pass, Merit & Distinction P3 P4 M2 D1


Descripts

LO3 Design efficient networked systems.


Pass, Merit & Distinction P5 P6 M3 D2
Descripts

LO4 Implement and diagnose networked systems.


Pass, Merit & Distinction P7 P8 M4 D3
Descripts

Grade: Assessor Signature: Date:

Resubmission Feedback:

Grade: Assessor Signature: Date:

Internal Verifier’s Comments:

Signature & Date:

* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.

Mr. K. Sathurcigan Unit 02 Networking 2


Assignment Feedback
Formative Feedback: Assessor to Student

Action Plan

Summative feedback

Feedback: Student to Assessor

MNM. Najath Risni sir help me to learn the networking subject very friendly, especially in
CISCO Packet Tracer part he taught very clear. And helped me to finish the Assignment on
time.

Assessor Date
signature
[email protected] 10/07/2020
Student Date
signature

Mr. K. Sathurcigan Unit 02 Networking 3


Pearson Higher Nationals in
Computing
Unit 02: Networking
Assignment 01

Mr. K. Sathurcigan Unit 02 Networking 4


General Guidelines

1. A cover page or title page should be attached to your assignment. Use page 1 of this assignment
brief as your cover page and make sure all details are accurately filled.
2. The entire assignment brief should be attached as the first section of your assignment.
3. The assignment should be prepared using a word processing software.
4. The assignment should be word processing in an A4 sized paper.
5. Allow 1” margin on top, bottom and right sides of the paper and 1.25” on the left side (for binding).

Word Processing Rules

1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Set line spacing to 1.5. Justify all paragraphs.
3. Ensure that all headings are consistent in terms of size and font style.
4. Use footer function on the word processor to insert your name, unit, assignment no, and page
number on each page. This is useful if individual sheets get detached from the submission.
5. Use the spell check and grammar check function of the word processing application to review the
use of language on your assignment.

Mr. K. Sathurcigan Unit 02 Networking 5


Important Points:

1. Carefully check carefully the hand in date and the instructions given with the assignment. Late
submissions will not be accepted.
2. Ensure that sufficient time is spent to complete the assignment by the due date.
3. Do not wait till the last minute to get feedback on the assignment. Such excuses will not be
accepted for late submissions.
4. You must be responsible for efficient management of your time.
5. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
6. Failure to achieve at least a PASS grade will result in a REFERRAL grade.
7. Non-submission of work without valid reasons will lead to an automatic REFERRAL. You will then
be asked to complete an alternative assignment.
8. If you use other people’s work or ideas in your assignment, it must be properly referenced, using
the HARVARD referencing system, in your text or any bibliography. Otherwise, you’ll be found
guilty of committing plagiarism.
9. If you are caught plagiarising, your grade will be reduced to a REFERRAL or at worst, you could be
excluded from the course.

Mr. K. Sathurcigan Unit 02 Networking 6


Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct form. I further understand what it means to copy
another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of Edexcel UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my own,
and where I have made use of another’s work, I will attribute the source in the correct way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Edexcel UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.

Student’s Signature: Date:


[email protected] 10/07/2020

Mr. K. Sathurcigan Unit 02 Networking 7


Higher National Diploma in Computing
Assignment Brief
Student Name /ID Number Mr. Kamalendran Sathurcigan (BAT/A-006688)
Unit Number and Title Unit 2: Networking

Academic Year 2020/21


Unit Tutor MNM. Najath Risni
Assignment Title LAN Design & Implementation for Enclave Films Company

Issue Date 19/03/2020


Submission Date 10/07/2020
IV Name & Date

Submission format

The submission is in the form of an individual written report. This should be written in a concise, formal
business style using single spacing and font size 12. You are required to make use of headings,
paragraphs and subsections as appropriate, and all work must be supported with research and referenced
using the Harvard referencing system. Please also provide an end list of references using the Harvard
referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures,
although you will not be penalised for exceeding the total word limit.

Unit Learning Outcomes:

LO1 Examine networking principles and their protocols.

LO2 Explain networking devices and operations.

LO3 Design efficient networked systems.

LO4 Implement and diagnose networked systems.


Assignment Brief and Guidance:

Mr. K. Sathurcigan Unit 02 Networking 8


Scenario :
Enclave Films is an eminent movie company which composes movies and delivers
high quality video to make it download through VividZone company website. The
original movie company management has decided to consolidate the contract with
VividZone by adding more efficient staff and appliances.

Enclave Films is in building B and the web team is positioned in the same building
while majority of the administration, sales, accounts and management functions are
supported in building A. Both buildings are located in the same premises. Movie
company plans to aggregate all their staff and resources in one building. Therefore
when adjacent office space becomes available in building A, these groups will be
accommodated together. Building A has a reception and a customer area as well.

About the Network

The branch network of Enclave Films has grown without proper planning. The LAN
cabling in both offices is Cat5e Ethernet. The office complex provides an Ethernet link
between the two buildings.

The current network is a flat network design with minimal redundancy. A small
wireless LAN is used occasionally by few project managers with laptops and the
guests at Building B.

a) Building A - general office and managers, including reception, accounts, and


administration. It consists of 12 PCs and 02 printers.
b) Building B - production suites and provides networking for the media development
and storage. It consists of 09 high-performance workstations, 05 office PCs, and 02
printers.

The Management expects to enhance the network based on following major


criteria:

a) Separate the network into VLANs.


b) Data traffic expected to increase by 80%
c) Possibly consider connecting directly to the VividZone network; must be a fast and
reliable connection
d) High network availability with redundant links and technology
e) Wireless network access at Building B
f) QoS to support video applications
g) High network reliability with network monitoring and security

Mr. K. Sathurcigan Unit 02 Networking 9


Activity 01
You are newly recruited as a Network Engineer by the movie company to redesign
the network.
You need to produce a report for the company that includes the following:

1. An an overview of your report.


2. An explanation of;
• networking principles, protocols and devices, including benefits and
constraints of networked solutions
• the impact of network topology, communication and bandwidth
requirements, effectiveness of networking systems
• operating principles of networking devices and server types and
networking software

Activity 02

1. Prepare a written plan of how you are going to design a Local Area Network
including a blueprint of your LAN.
2. Justify the security requirements and quality of services needed for
selection of accessories
3. Design a networked system to meet a given specification
4. Provide the IP address allocation table for the redesigned network.
5. Install & configure network services and applications of your choice.
6. Conduct a test and evaluate the design to meet the requirements and analyse
user feedback.
7. Suggest a maintenance schedule to support the networked system.

Activity 03
1. Implement a networked system based on your prepared design.
2. Conduct verification with e.g. Ping, extended ping, trace route, telnet, SSH,
etc.
3. Record the test results and analyze these against expected results.
4. Investigate what functionalities would allow the system to support device
growth and the addition of communication devices.

Mr. K. Sathurcigan Unit 02 Networking 10


Mr. K. Sathurcigan Unit 02 Networking 11
Acknowledgement
First of all, I would like to express my first gratitude to Esoft and all its employees for being the
source of the life of many students by giving a degree as external. I am happy that my software
engineer dream will be fulfilled by Esoft. I express my gratitude to my parents, colleagues,
especially Esoft lecturers for this. And I am happy for Esoft gives a way of obtaining a British
degree in Sri Lanka.

As specially taught the network course and helped to solve all doubts with the lesson of the students
also helped to make the network assignment systematic through his help, and he helped what he
can also, for Risni sir I extend my sincere gratitude.

Mr. K. Sathurcigan Unit 02 Networking 12


Table of Contents
Acknowledgement ........................................................................................................................ 12

Table of Contents .......................................................................................................................... 13

Table of Figures ............................................................................................................................ 18

Table of Tables.............................................................................................................................. 21

Activity 01..................................................................................................................................... 22

1.1 An overview of your report ................................................................................................. 22

1.2 An Explanation of Networking Principles, Protocols and devices, including benefits and
constraints of networked solutions............................................................................................ 23

Network ................................................................................................................................. 23

1.2.1 Network Principles ....................................................................................................... 23

Benefits of Network principles ......................................................................................... 24

1.2.2 Network Protocols........................................................................................................ 24

1.2.2.1 OSI Model ............................................................................................................. 24

1.2.2.2 TCP/IP ................................................................................................................... 26

1.2.2.3 FTP ........................................................................................................................ 27

1.2.2.4 PPP ........................................................................................................................ 28

1.2.2.5 HTTP ..................................................................................................................... 28

1.2.2.6 LTE ....................................................................................................................... 28

Benefits of Network Protocols .......................................................................................... 29

Disadvantages of Network protocols ................................................................................ 29

Differences Between Network Principles & Protocols ............................................................. 29

1.2.3 Network Devices .......................................................................................................... 29

1.2.3.1 Modem .................................................................................................................. 30

1.2.3.2 RJ45 Connector ..................................................................................................... 31

Mr. K. Sathurcigan Unit 02 Networking 13


1.2.3.3 Ethernet Card ........................................................................................................ 31

1.2.3.4 Router .................................................................................................................... 32

1.2.3.5 Switch.................................................................................................................... 32

1.2.3.6 Gateway ................................................................................................................ 33

1.2.3.7 Wi-Fi Card ............................................................................................................ 34

1.2.3.8 Hub ........................................................................................................................ 34

1.2.3.9 Bridge .................................................................................................................... 35

Advantages of Network Devices ....................................................................................... 35

Disadvantages of Network Devices .................................................................................. 35

My suggestion of Network Devices for Vividzone Company .......................................... 36

1.3 An Explanation of the Impact of Network Topology, Communication and Bandwidth


requirements, the Effectiveness of Networking Systems ......................................................... 37

1.3.1 Network topology ........................................................................................................ 37

1.3.1.1 BUS Topology ...................................................................................................... 37

1.3.1.2 RING Topology .................................................................................................... 38

1.3.1.3 STAR Topology .................................................................................................... 39

1.3.1.4 MESH Topology ................................................................................................... 41

1.3.1.5 TREE Topology .................................................................................................... 42

Impact of Network Topologies ......................................................................................... 44

1.3.2 Communication & Bandwidth Requirements .............................................................. 44

1.3.2.1 Communication ..................................................................................................... 44

1.3.2.1.1 Local Area Network (LAN) ........................................................................... 45

1.3.2.1.2 Metropolitan Area Network (MAN) .............................................................. 48

1.3.2.1.3 Wide Area Network (WAN) .......................................................................... 49

1.3.2.1.4 Wireless Network ........................................................................................... 51

Mr. K. Sathurcigan Unit 02 Networking 14


1.3.2.1.5 Internet ........................................................................................................... 52

Impact of Network Communication ................................................................................. 52

1.3.2.2 Bandwidth Requirements .................................................................................. 52

Impact of Bandwidth ......................................................................................................... 53

1.3.3 Effectiveness of Networking Systems ......................................................................... 53

1.4 An Explanation of Operating Principles of Networking Devices and Server Types and
Networking Software ................................................................................................................ 55

1.4.1 Operating principles of Networking Devices ............................................................... 55

1.4.2 Server Types ................................................................................................................ 55

1.4.2.1 Operating principles of Server .............................................................................. 56

1.4.2.2 Simple explanation of server types ....................................................................... 56

My Suggestion of Server for Vividzone ........................................................................... 59

1.4.3 Networking Software ................................................................................................... 60

1.4.3.1 Operating principles of Network Software ........................................................... 60

1.4.3.2 Samples of Network software ............................................................................... 61

Activity 02..................................................................................................................................... 62

2.1 Blueprint for Vividzone company....................................................................................... 62

2.1.1 Written plan for the blueprint....................................................................................... 62

2.2 Network security requirements ........................................................................................... 63

2.2.1 Network Access Control .............................................................................................. 64

2.2.2 Antivirus and Antimalware Software .......................................................................... 64

2.2.3 Firewall Protection ....................................................................................................... 64

2.2.4 Virtual Private Networks ............................................................................................. 64

2.3 Design for Vividzone's Network system ............................................................................. 65

2.3.1 Building A Network Plan ............................................................................................. 65

Mr. K. Sathurcigan Unit 02 Networking 15


2.3.2 Building B Network Plan ............................................................................................. 66

2.4 IP address tables for systems .............................................................................................. 67

2.4.1 IP table for Building A ................................................................................................. 67

2.4.2 IP table for Building B ................................................................................................. 67

2.5 Install & Configuration details of Network services and applications ............................... 68

2.5.1 Create A New Virtual Machine ................................................................................... 68

2.5.2 Open A Virtual Machine .............................................................................................. 72

2.5.3 Create the Administrator Profile .................................................................................. 75

2.5.4 Change Server Computer Name, Date, Time zone ...................................................... 77

2.5.5 Create Active Directory Domain Services (AD DS) ................................................... 79

2.5.5 Configure the AD DS ................................................................................................... 83

2.5.6 Create the Active Directory Users and Computers (ADUC) ....................................... 88

2.6 Feedbacks for the Vividzone company Network plan ........................................................ 92

2.6.1 Analysing the Efficiency through the Feedback .......................................................... 94

2.7 Maintenance table for Server .............................................................................................. 94

Activity 03..................................................................................................................................... 95

3.1 Vividzone Company’s Network system Configuration ...................................................... 95

3.1.1 Set IP Address for PC .................................................................................................. 95

3.1.2 Router Configuration ................................................................................................... 97

3.1.2.1 Change Host Name ............................................................................................... 98

3.1.2.2 Set the Welcome Message on Server .................................................................... 98

3.1.3 Switch Configuration ................................................................................................... 99

3.2 Ping Test ........................................................................................................................... 100

3.2.1 ping command ............................................................................................................ 100

3.2.2 Extended ping command ............................................................................................ 100

Mr. K. Sathurcigan Unit 02 Networking 16


3.2.3 Traceroute Command ................................................................................................. 100

3.2.4 Telnet ......................................................................................................................... 100

3.2.5 SSH ............................................................................................................................ 100

3.3 Network System Connections analysing........................................................................... 101

3.3.1 Ping the other department PCs ................................................................................... 101

3.4 Investigation about finding the Upgradable Features on the Vividzone Network System 105

3.4.1 Security Features ........................................................................................................ 105

3.4.2 Firewall upgrades ....................................................................................................... 105

Conclusion .................................................................................................................................. 107

Self-Criticism .............................................................................................................................. 108

Gantt chart ................................................................................................................................... 109

References ................................................................................................................................... 110

Mr. K. Sathurcigan Unit 02 Networking 17


Table of Figures
Figure 1 7 Layers .......................................................................................................................... 25
Figure 2 TCP/IP data transfer ....................................................................................................... 26
Figure 3 Analogue & Digital signals ............................................................................................ 30
Figure 4 RJ45 cable....................................................................................................................... 31
Figure 5 Network Interface Card .................................................................................................. 31
Figure 6 Router ............................................................................................................................. 32
Figure 7 Switch ............................................................................................................................. 33
Figure 8 Gateway .......................................................................................................................... 33
Figure 9 Wi-Fi ............................................................................................................................... 34
Figure 10 Bridge ........................................................................................................................... 35
Figure 11 Bus topology ................................................................................................................. 37
Figure 12 Ring topology ............................................................................................................... 38
Figure 13 Star topology................................................................................................................. 39
Figure 14 Mesh topology .............................................................................................................. 41
Figure 15 Tree topology ................................................................................................................ 42
Figure 16 Hybrid Topology .......................................................................................................... 43
Figure 17 The connection between two different topologies through the LAN ........................... 45
Figure 18 More LAN networks make MAN ................................................................................. 48
Figure 19 WAN network............................................................................................................... 49
Figure 20 Internetwork.................................................................................................................. 52
Figure 21 Blueprint for Vividzone ................................................................................................ 62
Figure 22 Vividzone Network Design .......................................................................................... 65
Figure 23 Building A Network Design ......................................................................................... 65
Figure 24 Building B Network Design ......................................................................................... 66
Figure 25 Create New Virtual Machine Step 1 ............................................................................. 68
Figure 26 Create New Virtual Machine Step 2 ............................................................................. 68
Figure 27 Create New Virtual Machine Step 3 ............................................................................. 69
Figure 28 Create New Virtual Machine Step 4 ............................................................................. 69
Figure 29 Create New Virtual Machine Step 5 ............................................................................. 70
Figure 30 Create New Virtual Machine Step 6 ............................................................................. 70
Mr. K. Sathurcigan Unit 02 Networking 18
Figure 31 Create New Virtual Machine Step 7 ............................................................................. 71
Figure 32 Create New Virtual Machine Last Step ........................................................................ 71
Figure 33 Open a virtual machine step 1 ...................................................................................... 72
Figure 34 Open a virtual machine step 2 ...................................................................................... 72
Figure 35 Open a virtual machine step 3 ...................................................................................... 73
Figure 36 Open a virtual machine step 4 ...................................................................................... 73
Figure 37 Open a virtual machine step 5 ...................................................................................... 74
Figure 38 Open a virtual machine step 6 ...................................................................................... 74
Figure 39 Sign in the Vivdzone profile ......................................................................................... 75
Figure 40 Sign out the Vividzone profile...................................................................................... 75
Figure 41 Create the Administrator profile ................................................................................... 76
Figure 42 Create New Password for Administrator Profile .......................................................... 76
Figure 43 Change Computer Name .............................................................................................. 77
Figure 44 Change Date ................................................................................................................. 77
Figure 45 Change Time zone ........................................................................................................ 78
Figure 46 AD DS Setup Step 1 ..................................................................................................... 79
Figure 47 AD DS Setup Step 2 ..................................................................................................... 79
Figure 48 AD DS Setup Step 3 ..................................................................................................... 80
Figure 49 AD DS Setup Step 4 ..................................................................................................... 80
Figure 50 AD DS Setup Step 5 ..................................................................................................... 81
Figure 51 AD DS Install Step 1 .................................................................................................... 81
Figure 52 AD DS Install Step 2 .................................................................................................... 82
Figure 53 AD DS Install Final Step .............................................................................................. 82
Figure 54 AD DS Configuration Step 1 ........................................................................................ 83
Figure 55 AD DS Configuration Step 2 ........................................................................................ 83
Figure 56 AD DS Configuration Step 3 ........................................................................................ 84
Figure 57 AD DS Configuration Step 4 ........................................................................................ 84
Figure 58 AD DS Configuration Step 5 ........................................................................................ 85
Figure 59 AD DS Configuration Step 6 ........................................................................................ 85
Figure 60 AD DS Configuration Last Step ................................................................................... 86
Figure 61 System Restarting ......................................................................................................... 86

Mr. K. Sathurcigan Unit 02 Networking 19


Figure 62 Switch Other User ........................................................................................................ 87
Figure 63 Sign in the Administrator ............................................................................................. 87
Figure 64 ADUC Setup step 1 ...................................................................................................... 88
Figure 65 ADUC Setup step 2 ...................................................................................................... 88
Figure 66 ADUC Setup step 3 ...................................................................................................... 89
Figure 67 ADUC Setup step 4 ...................................................................................................... 89
Figure 68 ADUC Setup step 5 ...................................................................................................... 90
Figure 69 ADUC Setup step 6 ...................................................................................................... 90
Figure 70 ADUC Setup step 7 ...................................................................................................... 91
Figure 71 ADUC Setup last step ................................................................................................... 91
Figure 72 Feedback for Vividzone Network design ..................................................................... 92
Figure 73 Feedback by friends ...................................................................................................... 93
Figure 74 Configured Network System ........................................................................................ 95
Figure 75 Set IP Address for PC ................................................................................................... 95
Figure 76 IP Assigning step 1 ....................................................................................................... 96
Figure 77 IP Assigning step 2 ....................................................................................................... 96
Figure 78 IP Assigning step 3 ....................................................................................................... 97
Figure 79 Configure the Router .................................................................................................... 97
Figure 80 Change Host Name ....................................................................................................... 98
Figure 81 Set a Welcome message on the router .......................................................................... 98
Figure 82 Switch Configuration .................................................................................................... 99
Figure 83 Ping step 1 .................................................................................................................. 101
Figure 84 Ping Step 2 .................................................................................................................. 101
Figure 85 Ping other PCs ............................................................................................................ 102
Figure 86 Ping to Account department PC ................................................................................. 102
Figure 87 Ping to Reception department PC .............................................................................. 103
Figure 88 Ping to Admin department PC .................................................................................... 103
Figure 89 Ping to Building B Main Router ................................................................................. 104
Figure 90 Ping to the wrong PC .................................................................................................. 104

Mr. K. Sathurcigan Unit 02 Networking 20


Table of Tables
Table 1 Differences between Network principles and protocols .................................................. 29
Table 2 Network Device Suggestions ........................................................................................... 36
Table 3 Wireless network division................................................................................................ 51
Table 4 Operating Principles of Network Devices ....................................................................... 55
Table 5 Examples for Servers ....................................................................................................... 58
Table 6 Dell PowerEdge T30 Details ........................................................................................... 59
Table 7 IP Table for Building A ................................................................................................... 67
Table 8 IP Table for Building B.................................................................................................... 67
Table 9 Analyse about the feedback ............................................................................................. 94
Table 10 Maintenance Table for Server ........................................................................................ 94
Table 11 Gantt Chart ................................................................................................................... 109

Mr. K. Sathurcigan Unit 02 Networking 21


Activity 01

1.1 An overview of your report


Enclave films is a filmmaking company and that company that offers high-quality videos that
can be downloaded through the website Vividzone, both companies have decided to work
together with basic of the contract. The two companies, Enclave films and Vividzone, are
scheduled to be located in the same building. This is called building B. At the same time, building
A is scheduled to be set up for administration, sales, accounts and management activities. The
two buildings mentioned above are located on the same premises. The movie company has
decided to mobilize all its employees and their resources into one building. The customer
reception area is located in building A. which has been decided to work jointly by maintaining a
connection between the two buildings.

Branches of Enclave films grew without perfect planning. Both offices were cabling by Cat5e
Ethernet. Ethernet provides the connection between two buildings. The company using a flat
network design currently. Sometimes, the project managers and building B guests utilize a small
wireless LAN. So, the company like to develop themselves. Mainly the company considering
things given below.

1. Separate the network into VLANs.


2. Data traffic expected to increase by 80%
3. Possibly consider connecting directly to the Vividzone network; must be a fast and
reliable connection
4. High network availability with redundant links and technology
5. Wireless network access at Building B
6. QoS to support video applications
7. High network reliability with network monitoring and security

Mr. K. Sathurcigan Unit 02 Networking 22


1.2 An Explanation of Networking Principles, Protocols and devices, including
benefits and constraints of networked solutions.

Network

As the network define, two or more computers are having a connection between them. These are
connected by cables, telephone lines, radio waves, satellites or infrared light beams. Through these
connections, software, files, data or common sources can be share.

1.2.1 Network Principles

One or more computers connected to other computers and the hardware (printer, CDs, etc.) and
software may be shared by this connection, this whole setup is called Network. This connection
can be created by cables, telephone lines, radio waves, satellites. The Network can take several
sizes of area. Depend on how much of area was covered by the network, its name will change.

The Network is created based on some principles. These are given below.

• The perfect connection will provide the victory: - If the network has the strongest
connection, that will help the business for a long time. When a company need to make a
Network, this hires a professional network designer or developer. Because the company's
efficiency is based on its network system. After the network designing, the company need to
make their websites and other important network activities. If there any trouble in creating a
network system, the company need to move to another developer because the company's
achievement depends on its inner structure. So, the company when need to choose a developer
for making network, as usually have to focus on the best developer. At the same time, the
company need to get an opinion from other knowledgeable persons about the network system.
This will help to make a good network. Therefore, a good network will help keep good
management and provide victory.

• Give more: - Network is helpful for monitor the whole company employers, so this is an
opportunity for giving commands, analysing work issues, other company works.

Mr. K. Sathurcigan Unit 02 Networking 23


• Activity monitoring: - Communication is strength after the network foundation, so every data
can be transmitted through the network. Also, don't need to wait for the output because of
every activity monitor by the network operator. If the workers make any mistakes that will be
in corrected at the time.

• Quality assurance: - As stated above, every activity is monitored by the network operator,
so every work is incorrect.

The Network will be created based on these principles.

Benefits of Network principles


• This help to make the Network in specific area efficiently.
• Easy to monitor every activity through the Network system and this principle make this easy.
• When have to plan a Network, easy measure what are the things are important for this.

1.2.2 Network Protocols

Network Protocols is a collection of how to manage the way of secure data transmission and
network rules easily. The most well-known model used to set up open communication between
two frameworks is the Open Systems Interface (OSI) model proposed by ISO.

1.2.2.1 OSI Model


OSI model is not a structure of the network, because this has not specific services and protocols
for each step. Its steps saying how to do easily by defining the input and output data in each layer.
According to the receiving resources and needs of the layer depends the developers develop the
layers.

Mr. K. Sathurcigan Unit 02 Networking 24


OSI model's seven layers given below
1. Physical layer: - If the two systems want to make a connection between, this layer will make
a connection physically firstly. This transmits the information in bits and control simplex or
duplex transmission by modem. This likewise oversees Network Interface Card's equipment
interface to the network, such as cabling, cable terminators, topography, voltage levels, and
so forth.
2. Datalink layer: - This is a Network Interface Card's firmware layer. This changes the
datagrams into frames and adds start and stop flags to each frame. If the damaged, lost or
duplicate frames create problems, this will solve that.
3. Network layer: - This will consider the routing, switching and controlling the data
transmission between workstations. Also, this will change the transport layer data frames into
smaller.
4. Transport layer: - Until the session layer, the file has its format. Transport layer separates
this into data frames, gave check the errors at the network status, which stop overtake the
lower host by other hosts. The Transport layer is in the network hardware, but which separate
top layers.
5. Session layer: - This layer is responsible for if any two workstations want to make a
connection between them to share the data.
6. Presentation layer: - This layer is related to the right representation of data, for example,
syntax and semantics of data. This controls the file's security and changing of data to network
standards.
7. Application layer: - This layer will send to the lower layer depend on the user's requests and
which is the higher layer in whole layers. Usually, applications cover file transfer, email,
remote login, data entry for so forth.

Figure 1 7 Layers

Mr. K. Sathurcigan Unit 02 Networking 25


There is no need for all layer should be in every network. for example, a broadcast network
doesn't have a network layer.

If any computer wants to share the data with a workstation or send a request to the network, that
is received by the application layer. After processing the data goes to the lower layers until the
data reaches the physical layer.

At the physical layer, the information is moved and gotten by the physical layer of the goal
workstation. There, the data continues to upper layers in the wake of handling until which arrives
at the application layer.

At the application layer, data or solicitation is imparted to the workstation. So, each layer has
inverse functions for source and goal workstations. For instance, the data link layer of the source
workstation adds start and stop flags to the frames yet a similar layer of the goal workstation will
remove the beginning and finishing flags from the frames.

1.2.2.2 TCP/IP
TCP/IP is a short form of Transmission Control Protocol/Internet Protocol. TCP / IP is a
collection of layered protocols utilized to contact through the internet. The data transmission
model of this module is the client-server model. If a computer will send the request, that's called
client, but received the request that's called server.

Figure 2 TCP/IP data transfer

Mr. K. Sathurcigan Unit 02 Networking 26


TCP / IP consists of four layers

1. Application layer: - Application layer protocols such as HTTP and FTP are utilized.

2. Transport layer: - Data has been transferred in datagrams form by utilizing the Transmission
Control Protocol (TCP). Breaking up the client-side data and connect in the server-side,
responsible for these all duties is TCP.

3. Network layer: - Network layer connection is installed utilizing Internet Protocols (IP) at the
network layer. Each machine associated with the Internet is doled out an address called IP
address based on the protocol to handily distinguish source and goal machines.

4. Datalink layer: - Real data transmission in bits happens at the data connect layer utilizing the
goal address gave by the network layer.

TCP/IP is broadly utilized also in communication networks arranges other than the Internet.

1.2.2.3 FTP
Right up 'til today, File Transfer stays one of the most utilized facilities. The Protocol that handles
these solicitations is File Transfer Protocol or FTP.

FTP is helpful for the file transfer as these ways


• This will transmit the data between different networks easily.
• If the protocols were installed perfectly, if the data transfer may stop at the mid that can
be continued again.
• Enables cooperation between topographically isolated groups.

Mr. K. Sathurcigan Unit 02 Networking 27


1.2.2.4 PPP
PPP is the short form of Point to Point Protocol. This is connected layer protocol, which helps to
transfer of TCP/IP traffic through the serial link, like a telephone line.

PPP defines three following things


• Define the frame's starting point and ending point, and find the errors clearly, the framing
method is helped.
• This Link Control Protocol (LCP) need for bringing communication lines up, validating
and if is not fit at the time, bringing them down. The Control protocol is using for these
purposes.
• If every network protocol is supported by other networks, which is called the Network
Control Protocol (NCP).

1.2.2.5 HTTP
HTTP is the short form of HyperText Transfer Protocol. The site pages are made in hypertext
mark-up language and these pages are transmitted by the HTTP protocols. This likewise utilizes
DCP-IP protocol for webpage transmission and the other type of HTTP known as hypertext move
protocol secure, which gives the transmission of information in encrypted structure to forestall
spillage of touchy information.

1.2.2.6 LTE
The LTE represents Long term evolution and which gives rapid mobile data, broadband
information, telephone services (Voice Over LTE) multimedia video and secure database access,
and mapping and RMS. All smartphones support LTE and use LTE for data access and which is a
worldwide open interoperable standard for wireless remote rapid information. The present version
of LTE is 4G and the future version is 5G, for each three to four years the new forms of LTE are
discharged.

Mr. K. Sathurcigan Unit 02 Networking 28


Benefits of Network Protocols
• Flexibility
• File transfer takes less time.
• The data can transfer to different systems.
• Programs can be controlled in different systems.
• High speed

Disadvantages of Network protocols


• All data needs to transfer through all layers. If individual layers did not include a lot of
features, this methodology is wasteful and lead to bad performance.

Differences Between Network Principles & Protocols


Network Principles Network Protocols
• This gives the rule for how to make Network. • This gives the idea for how to make the Network
more efficient.
• This is just giving out the frame for the • This play a major role in making a Network.
Network.
• This is used uniformly to create a small or large • This can vary depending on the size of the area
network. used of the network.
• This can be omittable. • This compulsory for creating a network.
Table 1 Differences between Network principles and protocols

1.2.3 Network Devices

Equipment devices that are utilized to connect PCs, printers, fax machines and other electronic
gadgets to a network are called Network devices. These gadgets move information in a quick,
secure and right route over the same or various systems. Network devices may be inter-network or
intra-network. A few devices are introduced on the devices, as NIC card or RJ45 connector, while
a piece of some network, like a router, switch.
(Devices, 2020)

Mr. K. Sathurcigan Unit 02 Networking 29


1.2.3.1 Modem
The Modem is a device, which can manage a computer to transmit or receive data through the
telephone or cable wire. Data stored on the computer is digital, whereas a telephone line or cable
wire can only transmit analogue data.

Figure 3 Analogue & Digital signals


Changing the digital signal to analogue and reverse, these are the main function of the modem.
The Modem is a mix of two gadgets − modulator and demodulator. When the computer sends the
data, the modulator changes digital data into analogue data. The demodulator works opposite for
modulator, which means when the computer receives the data that change analogue data signal
into digital data.

• Types of Modem
The Modem can be classified in a more different way like which direction this would transmit
information, type of the association with the transmission line, transmission mode.

The modem is classified here based on the data transmission direction.


1. Simplex: - A simplex modem can transfer the data in one way at a time only (digital
device to the network or reverse direction)

2. Half-duplex: - The half-duplex modem can transfer data in both directions, but only one
at a time.

3. Full duplex: - A full-duplex modem can move data in both the directions at the same time.

Mr. K. Sathurcigan Unit 02 Networking 30


1.2.3.2 RJ45 Connector
RJ45 is the short form Registered Jack 45. RJ45 connector is used in a local area network (LANs)
to make the needed connection based on Ethernet.RJ45 connector has 8 pin jacks. Ethernet is the
technology that defines the protocol for how to installing a LAN. Twisted pair cable has RJ45
connector pins at the two nodes, which is connection medium the link utilized for Ethernet LANs.
These pins connect to the device's socket and connect the device to the network.

Figure 4 RJ45 cable

1.2.3.3 Ethernet Card


Ethernet card, otherwise called Network Interface Card (NIC), is a hardware part utilized by PCs
to subordinate with Ethernet LAN and connect with different gadgets on the LAN. The oldest
Ethernet cards were outside to the framework and should have been introduced physically. In
present-day PC structure, which is an inside equipment part. The RJ45 socket is in NIC where the
network cable has been physically inserted.

Figure 5 Network Interface Card

Ethernet card speeds might change based on the protocol which supports. The maximum speed of
older Ethernet cards is 10 MPPS. However, modern cards support Ethernet speeds of up to 100
Mbps. Some cards have 1 GPS capability.

Mr. K. Sathurcigan Unit 02 Networking 31


1.2.3.4 Router
A router is a layered hardware device if the dual network has been the same protocols only then
which will transfer the data from one LAN to another. The router connected to at least two LANs
and Internet Service Provider (ISP). This gets its information as packages, which are information
settings with their goal address included. Before transferring ring, the signals which can
strengthen. that's why which is called a repeater.

Figure 6 Router

• Routing Table
A router reads its routing table to quickly and accurately determine the best way the packet can
reach its destination. There are two types of routing table follows
1. Static: - In a static routing table the ways are given of physically. So, which is fit for little
networks that have two to three routers.

2. Dynamic: - In a unique routing table, the router communicates with other routers through
protocols to figure out which ways are free. This is especially true for large networks
where manual inserting is not possible due to a large number of routers.

1.2.3.5 Switch
The switch is a network device, which can connect different gadgets to Ethernet arranges through
twisted-pair links. This utilizes packet changing method to get, store and forward information
packet on the network. The switch keeps up an address of network locations of the considerable
number of gadgets associated with that.

Mr. K. Sathurcigan Unit 02 Networking 32


When a packet is received, which checks the destination address and sends the packet to the correct
port. Before sending, packets are checked for conflicts and other network errors. The data is sent
in full dual-mode.

Figure 7 Switch
Data transfer speeds on switches are twice as high as other network devices, such as hubs used for
networking. Because this switch imparts its most extreme speed to all the gadgets associated with
that. This helps manage network speed even though while heavy traffic. Higher information speeds
are accomplished on the network through the utilization of more switches.

1.2.3.6 Gateway
Gateway is helping make connections between two different type of Network devices. A Gateway
is a machine; this is including more NICs connected to different networks. The Gateway can be
installed by using the software. As networks are connected to other networks through this
Gateway, these act like the host and network node.

Figure 8 Gateway
For transfer the data from a network to another, Gateway using the packet changing method. As
this gateway works related to the router, but the router has one of the different characters from the
gateway. the router can only transfer data between to network through the same protocols.

Mr. K. Sathurcigan Unit 02 Networking 33


1.2.3.7 Wi-Fi Card
Wi-Fi is the short form of the Wireless Fidelity. If anyone wants to reach the network through the
wireless connection, should use the Wi-Fi technology. Wi-Fi card is helped to make a wireless
connection between local devices to the network. If any device should give the internet access
through the Wi-Fi for the local devices, that technology called Wi-Fi hotspot. Hotspots may be
easy to install in every area like an office, public places etc.

Figure 9 Wi-Fi
Some new features (teleconferencing, digital camera images, video chat) can be add in oldest
devices by Wi-Fi card. But the new devices have no needed the Wi-Fi card, because that was
already static inside, which called wireless network adapter.

1.2.3.8 Hub
A Hub is essentially a multiport repeater. A hub connects numerous wires originating from various
branches, for instance, the connector in star topology which associates various stations. Hubs can't
channel data, so data packets are sent to every single associated device. Another way to say, the
crash domain of all hosts associated into Hub remains one. The data packets don't have the skill to
identify the best way, which leads to worst and inefficiency.

Hub's types given below


1. Active Hub: - These types of Hubs has their power supply and can clean, increase and transfer
the signal alongside the network. This is worked like a repeater and wiring centre. can extend
the maximum distance between nodes through this.
2. Passive Hub: - These are the hubs which gather wiring from nods and power supply from the
working hub. These types of Hubs can't clean and increase but can relay signal along with the
network, which is not fit for extending the distance between nodes.

Mr. K. Sathurcigan Unit 02 Networking 34


1.2.3.9 Bridge
A bridge runs on the data link layer. A bridge is a repeater, with add on the usefulness of separating
content by reading the MAC address of source and goal. Two LANs can be working together on
the same protocol through this. This is a two-port device because which has single input and output
ports.

Figure 10 Bridge
Bridge types are given below
1. Transparent Bridges: - These are the bridge is where the stations are uninformed of the
bridge's presence for example regardless of whether a bridge is included or removed from the
network, reconfigured stations are unwanted. Bridge forwarding and bridge learning these two-
process used here.

2. Source Routing Bridges: - In these bridges, the routing operation performed by source station,
and the frame instructs which way to follow. The hot can discover frame by sending a special
frame called discovery frame, which spreads through the whole network utilizing every single
way for the goal.

Advantages of Network Devices


• This allows making the connection between the internet and one or more gadgets easily.
• This can help to make systems anywhere.
• This also Provide more speed for internet connection.

Disadvantages of Network Devices


• The hackers or other programmers can get the network users details from the network devices
stored data.

Mr. K. Sathurcigan Unit 02 Networking 35


My suggestion of Network Devices for Vividzone Company
Cost
Network Devices Specific type Reason
analyses
MATEIN CAT7
ETHERNET CABLE This cable has great performance, good for both
inside and outside use and Lifetime warranty. So,
RJ45 Cable RS.4680.00
the company will feel never problem-related this
(50ft)
cable.

NETGEAR Nighthawk
X10 AD7200
This Router provides Fast network access that’s
Router RS.4500.00
why to choose this type of router.

Amcrest Gigabit
Uplink 9-Port Poe+
Ethernet Switch with
This Switch has 9-ports. So, can use in all
Metal Housing
Switch RS.14400.00 department on Vividzone. That’s why to choose
this switch.

Table 2 Network Device Suggestions


As a Network Engineer, choose a switch for making a connection between computers in
Vividzone departments. Because the switch is faster compared to the hub that’s why to
choose this.

Mr. K. Sathurcigan Unit 02 Networking 36


1.3 An Explanation of the Impact of Network Topology, Communication and
Bandwidth requirements, the Effectiveness of Networking Systems

1.3.1 Network topology

Network topology refers to the physical or logical structure of a network. This defines how various
nodes are set and interconnected with everything. Also, arrange topology may depict how the
information is moved between these hubs. There are two types of network topologies: physical
and logical. Physical topology stresses the physical format of the associated gadgets and hubs,
while the logical topology mentions the Data transmission between topology nodes.
(Topology, 2017)
Some of the main types of topologies are the following:
1. BUS Topology
2. RING Topology
3. STAR Topology
4. MESH Topology
5. TREE Topology
6. HYBRID Topology

1.3.1.1 BUS Topology


Bus topology is a type of network in which every computer and network device is connected
through a single cable. This has exactly two edges, called the linear bus topology.

Figure 11 Bus topology


1. Features of Bus Topology
• This will only send data in one direction.
• Each device is connected to a cable.

Mr. K. Sathurcigan Unit 02 Networking 37


2. Advantages of Bus Topology
• This is very Low-priced.
• The required cable is low compared with other network topologies.
• This is used for small networks.
• Easy to understand this structure.
• Expanding the two cables joining together is easy.

3. Disadvantages of Bus Topology


• If the cables fail, the entire network will fail.
• If the network traffic is heavy or the nodes are high, the performance of the network is
reduced.
• The cable has an only certain length.
• Comparing to ring topology, which is slow.

1.3.1.2 RING Topology


This is called ring topology because every PC is connected with another PC, which shape is like
ring shape, with the last one associated with the first. Precisely two neighbours for every gadget.

Figure 12 Ring topology

Mr. K. Sathurcigan Unit 02 Networking 38


1. Features of Ring Topology
• Various repeaters are utilized for Ring topology with more hubs if somebody needs to send
a few information to the last hub in the ring topology with 100 nodes, who at that point the
information should go through 99 hubs to arrive at the 100th hub. Therefore, networks are
used in the network to prevent data loss.
• Data transmission is one way, yet this tends to be made connection points by making 2
associations between each Network Node, that’s why which is called Dual Ring Topology.
• In Dual Ring Topology, two ring systems are shaped, and information transmission is the
inverse way in them. Likewise, on the off chance that one ring comes up short, the second
ring can go about as a backup, to keep the network up.
• Information is moved a consecutive way that is a tiny bit at a time. If the information needs
to be transmitted to the goal hub, needs to go through every node of the system.

2. Advantages of Ring Topology


• Transmitting system isn't affected by high traffic or adding more hubs.
• For installing and expand cost is very low.

3. Disadvantages of Ring Topology


• Adjust ring topology is difficult. For example, adding or removing computers disrupts
network performance.
• If a computer will Failure, which disturbs the entire network.

1.3.1.3 STAR Topology


In this sort of topology, all the PCs are associated with a solitary centre point through a link. This
centre point is identified as the central node.

Figure 13 Star topology

Mr. K. Sathurcigan Unit 02 Networking 39


1. Features of Star Topology
• Each node has its committed association with the centre.
• Depend on the data flow, the hub act as a repeater.
• Can be used with twisted pair, optical fibre or coaxial cable for every PCs connect with the
central node.

2. Advantages of Star Topology


• Quick execution with fewer any hubs and low system traffic.
• Upgrade of the hub is so easy.
• The adjustment is simple.
• Easy to install and change.
• If any node should be failed, that particular PC will only fail, the rest of the nodes can work
smoothly.

3. Disadvantages of Star Topology


• Installation is expensive.
• Too expensive for the usage.
• If the main hub may be damaged, then the entire network will affect because of all the nodes
connected on the hub.
• The whole action depends on the main hub, which should rely upon its ability.

Mr. K. Sathurcigan Unit 02 Networking 40


1.3.1.4 MESH Topology
This is a kind of point-to-point guide associate with different hubs or gadgets. All the participations
hubs were connected with one to another. If anyone needs to interface n gadgets, the section should
be having n(n-1)/2 physical channels too.

Figure 14 Mesh topology

There are two kinds of transmitting data technique via Mesh Topology.
• Routing: - In steering, the hubs have a directing rationale, according to the system
necessities. There is a logical rationale to guide the information to arrive at the goal
utilizing the most limited separation. And which is also has broken nodes information.
This is help to re-configure the failed nodes.
• Flooding: - This has more characteristics like Routing type. But it leads to unwanted load
over the network.

Types of Mesh Topology


• Partial Mesh Topology: - In this topology, some portion of the frameworks are similar
to mesh topology however a few gadgets are just associated with only two or three
gadgets.

• Full Mesh Topology: - Every nodes or device has been connected.

1. Features of Mesh Topology


• Fully enclosed.
• Strong.
• Not being flexible.

Mr. K. Sathurcigan Unit 02 Networking 41


2. Advantages of Mesh Topology
• Each link can carry its data burden.
• This is strong.
• The fault is easily detected.
• This gives security and privacy.

3. Disadvantages of Mesh Topology


• Difficult to do the installation and configuration.
• Cabling is expensive.
• More wires required for connection.

1.3.1.5 TREE Topology


This has a root node, which is connected to every other node to form a hierarchy, that's why which
is also called hierarchical topology. There should be at least three levels per line.

Figure 15 Tree topology


1. Features of Tree Topology
• This is best because the workstations are in the group.
• This is habituated in a wide area network.

2. Advantages of Tree Topology


• This is an expansion of bus and star topologies.
• There is a possibility to the extent of the terminal, which is easy.
• Easy to manage the whole system and maintain.
• Easy to troubleshoot the errors.

Mr. K. Sathurcigan Unit 02 Networking 42


3. Disadvantages of Tree Topology
• More wire required for the connection.
• very expensive.
• Manage the network is difficult if many connections are included.
• If the central hub fails, also network will fail.

1.3.1.6 HYBRID Topology


This is a composition of two different types of topologies. For instance, if one of the divisions of
the office is utilized ring topology and in next division, star topology is utilized, a mixture of
these topologies will be called Hybrid Topology (ring topology connected with star topology).

Figure 16 Hybrid Topology


1. Features of Hybrid Topology
• This is a mixture of two or more topologies.
• Should be known about the advantages and disadvantages of added topology.

2. Advantages of Hybrid Topology


• Error detection and troubleshooting are reliable.
• This is more effective.
• Increase the network length is easy.
• This topology has more flexibility.

3. Disadvantages of Hybrid Topology


• The topology installation is very difficult and Costly.

Mr. K. Sathurcigan Unit 02 Networking 43


Impact of Network Topologies
• Everyone can use the same data, software, resources, so this help to reduce the cost.
• Easy to manage the whole system.
• If the main PC affected by a virus, the entire system will affect. So, the entire system should
be depending on the main computer. This is having some drawbacks like.
• A more experienced person required for maintaining the main PC.

My suggestion of Network Topology for Vividzone company is Star Topology. Because,


through this star topology, data transmission speed is high. If anyone computer connection
will be broken in a star topology, other computers do not affect by this and continuously
work normally.

1.3.2 Communication & Bandwidth Requirements

1.3.2.1 Communication
A communications network is a form of information flow in the organization. Communication
channels (information flowing networks) are formal networks or informal networks. Formal
networks follow the power chain and are limited to work-related communications. The informal
network is likely to go in any direction, avoid positions of power, and meet the social needs of
team members.

The type of network connection includes the following.


1. Local Area Network (LAN)
2. Metropolitan Area Network (MAN)
3. Wide Area Network (WAN)
4. Wireless
5. Inter-Network (Internet)

Mr. K. Sathurcigan Unit 02 Networking 44


1.3.2.1.1 Local Area Network (LAN)
This is additionally called the LAN and is intended for little zones, for example, an office, group
of buildings or a factory. LANs are utilized generally because which is easy to structure and to fix.
PCs and workstations are connected through LANs. Everyone can utilize various sorts of
topologies through LAN, these are Star, Ring, Bus, Tree and so on.

LAN can be a basic system also like associating two PCs, to share documents and system among
one another while that can likewise be interconnecting a whole structure. LAN systems are
additionally generally used to share assets like printers, shared hard-drive.

Figure 17 The connection between two different topologies through the LAN

1. Characteristics of LAN
• LAN's are private systems, not expose to taxes or other administrative controls.
• LAN's operate at relatively high speed when compared to the typical WAN.
• There are various kinds of Media Access Control strategies in a LAN, the conspicuous ones
are Ethernet, Token ring.
• This connects computers in a single building, block or campus, for example, these are work
in a confined land zone.
(Networks, 2020)

Mr. K. Sathurcigan Unit 02 Networking 45


2. Advantages of LAN
• Resource Sharing: PC assets like printers, modems, DVD-ROM drives and hard plates
can be imparted to the assistance of neighbourhood. That’s why decreases cost and
equipment buys.

• Software Applications Sharing: This is cheaper to utilize the same programming over the
system as opposed to buying separate authorized programming for every customer a
system.

• Easy and Cheap Communication: Information and messages can without much of a
stretch be moved over network PCs.

• Centralized Data: The information of all system clients can be saved data on the hard
drive of the server PC. This will assist clients with using any workstation in a system to get
to their information. Since information isn't put away on workstations locally.

• Data Security: Since information is saved on server PC hard drive, this will be anything
but easy to oversee information at just one spot and the information will be massively
secure as well.

• Internet Sharing: Neighbourhood gives the office to share a solitary web association
among all the LAN clients. In-Network, single web association sharing framework keeps
the web costs less expensive.

Mr. K. Sathurcigan Unit 02 Networking 46


3. Disadvantages of LAN
• High Setup Cost: Although the LAN will spare expense because of shared PC resource,
however the underlying arrangement expenses of introducing Local Area Networks is
high.

• Privacy Violations: The LAN chairman has the privileges to check individual
information records of every single LAN client. Besides he can't check the web history
and PC use history of the LAN client.

• Data Security Threat: Unapproved clients can steal to significant information of an


association whenever incorporated information source isn't made sure about appropriately
by the LAN director.

• LAN Maintenance Job: In the fact that there are issues of programming establishments
or equipment disappointments or link aggravations in Local Area Network. For these
reasons, the Neighbourhood requires a LAN Administrator required.

• Covers Limited Area: network covers a little region like one office, one structure or a
gathering of close by structures.

Mr. K. Sathurcigan Unit 02 Networking 47


1.3.2.1.2 Metropolitan Area Network (MAN)
This was created in the 1980s. This is fundamentally an upgraded version of LAN. This is
additionally called MAN and similar to LAN, which is extended over the whole city. This very
well may be like to associate various LANs into a bigger system or which tends to be a solitary
link. This is mostly held and worked by a single privately owned business or a big organization.

Figure 18 More LAN networks make MAN

1. Characteristics of MAN
• This by and covers towns and another town (50 km)
• Link medium utilized for MAN is optical cable, wires and so forth.
• Information rates are satisfactory for disseminated registering applications.

2. Advantages of MAN
• Providing more efficient and faster communication via high-speed conductors such as fibre
optic cables.
• This gives a decent spine to the huge system and gives more access to WANs.
• The double transport utilized in MAN by helps the transmission of information in two ways
at the same time.
• A MAN could cover a few squares of a city or an entire city.

3. Disadvantages of MAN
• More link required for creating a MAN association starting with one spot then onto the
next.
• This is hard to make the framework secure from hackers and modern espionage(spying)
graphical areas.

Mr. K. Sathurcigan Unit 02 Networking 48


1.3.2.1.3 Wide Area Network (WAN)
This is called WAN. WAN can be private or which very well may be open rented arrange. This is
utilized for the system that covers a bigger section, for example, spread conditions of a nation.
This is difficult to plan and keep up. Communication medium utilized by WAN is PSTN or
Satellite connections. WAN works on low information rates.

Figure 19 WAN network


1. Characteristics of WAN
• This by and large covers huge distances (states, nations, big landmasses).
• Communication medium utilized is satellite, open phone systems which are connected by
switches.

2. Advantages of WAN
• This is covered a huge geological zone, so significant distance business can be done using
the one system.
• Offers data and assets to interfaced workstations.
• Messages can be sent rapidly to any other individual on the system. These messages can
have pictures, sounds or information attached to them.
• Costly things (such as printers or telephone lines to the web) can be shared by all the PCs
on the system without purchasing alternate equipment for every PC.
• Everybody on the system can utilize the same information. This gives an intelligent
solution from issues where a few clients may have low seasoned data than others.

Mr. K. Sathurcigan Unit 02 Networking 49


3. Disadvantages of WAN
• Need a good firewall to confine strangers from entering and disturbing the system.
• Set up a WAN system can be a costly, slow and entangled.
• If set up a WAN, continually need to check the system ever thus requires to arrange
managers and experts to be utilized for this.
• Security is the main problem when various individuals can utilize data from different PCs.
Assurance against hackers and virus includes greater unpredictability cost.

My suggestion of Network communication type for Vividzone company is LAN. Each


Department PCs connected all together by the switch; this is seen as small LAN. Through
this, the data can be transferrable. And wireless access point also suggested for the company
customers usage.

Mr. K. Sathurcigan Unit 02 Networking 50


1.3.2.1.4 Wireless Network
Computerized remote communication is certainly not the latest thought. Prior, Morse code was
utilized to execute wireless systems. Current advanced remote frameworks have better execution;
however, the main thought is the equivalent.

Wireless Networks can be divided into three classes based on principle.

System interconnection Framework interconnection is developed in with interconnecting


the segments of a PC utilizing short-distance radio. A few
organizations planned together to structure a short-extend wireless
system called Bluetooth to associate different parts, for example,
screen, console, mouse and printer are connected to the PCs,
without wires. A few organizations planned together to structure a
short-extend wireless system called Bluetooth to associate different
parts, for example, Bluetooth likewise permits computerized
cameras, headsets, scanners and different gadgets to interconnected
with a PC by just being brought inside the range.
Wireless LANs Each PC has a radio modem and receiving wire, which can help to
connect with different devices. Wireless LANs are increasingly
found in smaller offices and homes, where installing Ethernet is
considered the most complex.
Wireless WANs The radio system utilized for cell phones is an example of a low-
data transmission remote WAN. This framework already has just
reached three generations.
• First-generation is for analogue and voice only.
• The second generation is limited to digital and voice.
• The third generation is advanced because this is limited for
both voice and information.
Table 3 Wireless network division

Mr. K. Sathurcigan Unit 02 Networking 51


1.3.2.1.5 Internet
Inter-Network or Internet is a blend of two or more systems. Internetwork may be framed by
joining two or more individual systems by methods for different gadgets, through switches,
gateways and bridges.

Figure 20 Internetwork

Impact of Network Communication


• Easy to maintain big area through this. Also, is helping to extend the networks.
• So, this is the secret of social development.
• At the same time, this system has some threats from hackers because hackers can get full
confidential data from the main PC.

1.3.2.2 Bandwidth Requirements


Bandwidth is an estimation of how much data can be transmitted through a connection in a given
measure of time. This measured the data transferring speed on bits per second or bytes per second.

• The basic calculation for Bandwidth

Bandwidth = Transmitted Data (Megabyte)


Connection time (Second)

The Bandwidth unit is depending on Data unit. If the transmitted data measured in Megabits,
bandwidth unit will define in Megabytes per second (Mbps).

Mr. K. Sathurcigan Unit 02 Networking 52


Data can be categorized based on their size as follows.

1. byte (B) 8 bits 1 byte


2. kilobyte (KB) 10001 bytes 1,000 bytes
3. megabyte (MB) 10002 bytes 1,000,000 bytes
4. gigabyte (GB) 10003 bytes 1,000,000,000 bytes

The measure of bandwidth required for the business can differ from 10 x 1 MBPS to 300 x 20
MBPS relying upon the number of clients and devices utilizing the internet.

Impact of Bandwidth
• Internet speed is depending on Bandwidth, so internet connectivity will be affected by this.
• Also, Background internet usage depends on bandwidth. If the bandwidth is high then,
uploading works are happening on the background without any notifications.
• If the bandwidth high only, can transfer the data without any interruption.

1.3.3 Effectiveness of Networking Systems

A fully created Networking system will help to make a good data transmission in the company,
according to the Network Principles. The full control of the company is based on its network
system, so that is always should be incorrect and efficient. In that respect, some of the effectiveness
of the Network system is given below.

• This spares time: - When managing a huge system atmosphere, the capacity to control the
whole business activity from a central PC is, can be considered a big-time saver. A good
Network Management System ought to permit C-Level executives to give their IT providers
direct access to any data. This is helpful to do their job effectively. This is helpful to avoid to
travel to other places for checking any Pcs because the superintendent has access for every
computer through the central computer. The Network management system provides access
for the employees can data inserting and getting by using their computers, At the same the
giving network managers access control.

Mr. K. Sathurcigan Unit 02 Networking 53


• This reduces the cost: - A good network management system gives the possibilities for
reducing administrators cost. Only one system administrator is required to monitor and
manage the whole network system through a centralized computer. This is saving the currency
from reducing the training, research and implement and additional inventory costs.

• This increases productivity: - Every hardware and software can be managed and monitor
through the Network management system. The whole system is created by interconnections
between the devices, if any one part damaged, the entire system will be affected. A survey by
CenturyLink proved that the most popular expected benefit of a Network Management
System would be freeing up staff time. The Network management system find the problem
before that will come for the common wisdom. This is the reason for their success. Therefore,
the employees have more time for focusing their other duties. (INS, 2016)

• This avoids business disruption: - The second important benefit of the Network system is
reducing the downtime; this is also proof by CenturyLink. The company is affected by
downtime but network system helps to minimize that, so this makes a good impact on
productivity.

• The performance of This document: - A good Network Management System will make this
simple for staff individuals to reach Service Level Agreements (SLAs) and record their
performance with reports. Network performance monitoring provides real-time statistics and
reflects in every part of the network. Some Network Management Systems can pull
performance metrics and KPIs, and present them as easy-to-read, customizable graphical
representations. (INS, 2016)

• This reduces security issues: - With the ever-increasing number of data breaches and hacking
incidents, companies should take extra precautions when this comes to protecting their data.
Which Network management system defend from virus, hacking and other outside threats that
are called a good system, and also manage the organization requirements. A secure network
will help to maintain compliance.
(INS, 2016)

Mr. K. Sathurcigan Unit 02 Networking 54


1.4 An Explanation of Operating Principles of Networking Devices and Server
Types and Networking Software

1.4.1 Operating principles of Networking Devices

Network devices Operating principles


Modem After connecting this into the PC, when data transmitted from PC to internet,
the analogue signal will change to a digital signal through this. When PC receive
data from the internet, this happens reversal.
RJ45 Connector This makes the connection between PC and Router forget network access in PC.
Ethernet Card This is the main part of PC or Server, through this receiving the network signal.
Router This help to get network facilities in PCs.
Switch This is utilized to make a connection between a large number of users.
Gateway This can help to merge the other department PCs.
Wi-Fi Card This is the main part of the router, so this is receiving the network signal and
provide to the user.
Hub This works like Switch.
Bridge This works like Gateway.
Table 4 Operating Principles of Network Devices

1.4.2 Server Types

Which computer move data to other computers, that's called Server. This can transmit the data on
Local Area Network (LAN) or Wild Area Network (WAN). There are many types of Servers is
here, some of them are web servers, mail servers and file servers. Every server has a special
software, which depends on their purpose. For instance, a Web server may run Apache HTTP
Server or Microsoft IIS, which both give access to sites over the Internet. A mail server may run a
program like Exim or iMail, which gives SMTP services to sending and getting email. A document
server may utilize Samba or the working operating systems built-in based file sharing
administrations to share files over a network through.

Although the server software is specific to the server type, the hardware is not important. Truth be
told, normal PCs can be transformed into a server PC by including the installing custom software.

Mr. K. Sathurcigan Unit 02 Networking 55


1.4.2.1 Operating principles of Server
While any PC can be arranged as a server, most famous organizations use rack-mountable
hardware designed for server usefulness. These frameworks, regularly 1U in size, occupy little
size space and more have valuable highlights, for example, LED status lights and hot-swappable
hard drive bays. Different rack-mountable servers can be put in a solitary rack and mostly share
the same monitor and input devices. Most servers are gotten to remotely utilized remote access
software to use in distance, so input devices are frequently not by any means essential. Although
servers can run on different types of PCs, the hardware is sufficient to support the demands of the
server. For example, a web server running a large number of web scripts in real-time should have
a fast processor and enough RAM to reduce "loads". A file server ought to have at least one or
more quick hard drives or SSDs that can read and write information rapidly. Regardless of the type
of server, a fast network connection is critical, since all data flows through that connection.
(Definition, 2014)

1.4.2.2 Simple explanation of server types


1. Application Servers: At times alluded to as a sort of middleware, application servers catch
a huge piece between database servers and the end-user, and they regularly interface the two.

2. Client Servers: In the client/server programming model, a server is a program that


anticipates and satisfies demands from client programs in the equivalent or different PCs. A
given application in a PC may work as a client with demands for administrations from
different programs and as a server of solicitations from different programs.

3. Collaboration Servers: From numerous points of view, collaboration software, once called
'groupware,' shows the original intensity of the Web. The collaboration software designed to
enable users to associate by never mind of location, through the internet or corporate intranet
to work collaborate in a virtual environment.

4. FTP Servers: File Transfer Protocol is one of the oldest internet services. When one or more
files transferring between computers, this is controlling the file structure, security and
transmission and make this possible.

Mr. K. Sathurcigan Unit 02 Networking 56


5. List Servers: List server gives a way of managing the mailing lists, at the same time this can
be as an open interactive discussion for announcing instructions, newsletters or advertising.

6. Mail Servers: This also important and ubiquitous like a web server. Mail server on corporate
networks and internet (via LANs and WANs) move the mails and store.

7. Open Source Servers: Open source server is important for doing our job from the operating
system to server software, and this is a critical part of many IT infrastructure.

8. Proxy Servers: Proxy server is in for filter the requests, develop the performance and share
the connections between a client program (typically a web browser) and external network
(typically another server on the web).

9. Real-Time Communication Servers: Real-time communication server was called before


chat server, IRC server and sometimes instant messaging server (IM), which is help to
transfer information between a huge number of users.

10. Server Platforms: A term often utilized frequently related to the operating system, a
platform is basic hardware or software of a computer, so this is an engine for driving the
server.

11. Telnet Servers: Telnet server helps users to log in to the host machine and perform tasks
like working on a remote machine.

12. Virtual Servers: In 2009, the quantity of virtual servers utilized surpassed the number of
physical servers. Today, server virtualization has in everywhere of the data centre. From
hypervisors to hybrid clouds, Server Watch looks at the most recent virtualization innovation
patterns.

13. Web Servers: At its centre, a Web server serves static substance to a Web browser by
stacking a file from a disk and serving this over the network to a user’s Web browser. This
whole exchange is centralized by the browser and server conversing with one another
utilizing HTTP.
(Purifoy, 2020 )
Mr. K. Sathurcigan Unit 02 Networking 57
Some of the most famous Server brands are below.

Servers Servers pictures

1. Dell PowerEdge T30

2. Dell PowerEdge T20 [barebones]

3. Lenovo ThinkServer TS150

4. Lenovo ThinkServer TS460

5. Scan 3XS SER-T25

6. Fujitsu Primergy TX1310 M1

7. HP Proliant Microserver Gen8


8. HP ProLiant ML350 G9 5U

9. HPE ProLiant ML350 Gen 10

10. Asus TS500

(Athow, 2020)
Table 5 Examples for Servers

Mr. K. Sathurcigan Unit 02 Networking 58


My Suggestion of Server for Vividzone
The Server selection is depending on companies need and budget, because Server machines are
very expensive. When choosing a Server, the buyer should aware of server Speed, Capacity, RAM,
Graphics and other facilities. My suggestion of Server for Vividzone company is following.

Requirements Details
CPU Intel Xeon E3-1225 v5
Graphics Intel HD Graphics P530
RAM 64GB
Storage Up to six SATA HDD
Connectivity 10 x USB ports, HDMI, DisplayPort, VGA, serial, PS2, Gigabit
Ethernet.
Dimensions (W x D x H) 17.5 x 43.5 x 36cm
Other • Fast quad-core Xeon processor
• Room for six internal disks
• Single Gigabit network port
• No hot-swapping of disks
Cost Rs122,000.00
Table 6 Dell PowerEdge T30 Details

The reason to choose this server


• Vividzone is doing the Film making and uploading the film. So, the server should be
satisfying their needs. This server has 64GB Ram, so this enough to do their works
without any interruptions. And the processor also very fast.
• This server has SATA HDD, which is the most trustable Hard drive.
• The most important reason is which is DELL Brand, this also most trustable.

Mr. K. Sathurcigan Unit 02 Networking 59


1.4.3 Networking Software

Network Software is the basic thing in any network. This is helpful to manage, deploy the
administrators and monitor a network. Basic network is created by the special’s hardware such
as routers and switches; these were produce-Networking software into solution. Software-defined
networking (SDN) isolates that software from the hardware, making which simpler to enhance
and adjust the network to rapidly satisfy changing network needs. The isolates the function from
hardware, for example, firewalls or burden adjusting, is called network function virtualization
(NFV).

1.4.3.1 Operating principles of Network Software


There are many contending structures for SDN from various providers. A high-level view of the
architecture is simple terms centralizes control of the network by separating the control logic to
off-device computer resources. Despite the distinctions, all designs have a type of an SDN
controller, southbound APIs, and northbound APIs. Brain regulators of the network that provide
a centralized view of the entire network. APIs controller and publish information between
switches, routers and applications.

NFV accept companies to run proprietary hardware in favour of white boxes that can install any
software. This decrease costs and makes observe easier. Operations are no longer carried out in
hardware but by software. These are virtual network functions (VNFs) and NFV is created by
these.

Network software is not equivalent to software applications. The former exposes the network's
internal functions to administrators, at the same time software applications help end-users to do
specific tasks. Network software is "invisible" for end-users, which is used to make this easier
for users to access network resources.

User management and file management are included in the basic activity. User management help
to the administrator, who allow users to add or remove from the network. File management allows
the administrator to limit the data storage location and user access.

Mr. K. Sathurcigan Unit 02 Networking 60


Network software permits various devices, for example, desktops, laptops, smartphones, tablets,
and different systems to interface with each other, as well as other networks. The internet is an
example of a comprehensively associated system of servers and PCs that depends on systems
networking software to guarantee openness by end clients.

1.4.3.2 Samples of Network software


1. Solarwinds Network Performance Monitor
2. PRTG Network Monitor from Paessler
3. ManageEngine OpManager
4. Wireshark
5. Nagios
6. Zabbix
7. Spiceworks
8. WhatsUp Gold
9. LogicMonitor, Inc.

This Network software utilizes to monitor network activities. So, this most helpful for the network
administrator.

My suggestion of Network Software for Vividzone company is Solarwinds Network


Performance Monitor. Because this is the most effective network software on this collection.
Evidence for this argument, this can automatically discover the networks and devices so, this
makes this easier to manage the whole system. And which can monitor CISCO ASA networks
with their New Network Insight™ for CISCO ASA.

Mr. K. Sathurcigan Unit 02 Networking 61


Activity 02

2.1 Blueprint for Vividzone company

Figure 21 Blueprint for Vividzone

2.1.1 Written plan for the blueprint

1. Building A has 05 departments. Those are Manager, General office, Reception, Admin and
Account departments. For these, the details of devices provided are followed.
• There are 02 PCs and 01 switches allocated for Manager department.
• There are 06 PCs and 01 switches allocated for General office department.
• There are 01 PC, 01 printers and 01 switches allocated for Account department.
• There are 02 PCs, 01 printers and 01 switches allocated for Reception department.
• There are 01 PC, 01 routers (main), 01 main servers and 01 switches allocated for Admin
department.

Mr. K. Sathurcigan Unit 02 Networking 62


2. Building B has 02 departments. Those are Media and storage departments. For these, the
details of devices provided are followed.
• There are 09 workstations, 01 printers and 01 switches allocated for the Media department.
• There are 05 PCs, 01 printers and 01 switches allocated for Storage department.
• And 01 wireless access point, 01 routers (main) and 01 switches also allocated for the
building B.

2.2 Network security requirements


Nowadays, everything is happening by the electronic technical equipment in this world. This
makes this easy to work and live. At the same time, this technical world has a major problem, that
is our every activity are continuously monitored by unknown persons. The company or single
person is faced with unexpected political and industry-wise issues by this. So, everyone has a
responsibility to keep their privacy protected. In this way, the Enclave films company need to
protect their privacy and company secrets. For this, suggested using some methods given below.

• Physical Network Security: Physical security controls are intended to keep unapproved
persons from increasing physical access to arrange parts, for, routers, cabling organize, etc.
Controlled access like, locks, biometric verification and different gadgets, is fundamental in
any association.

• Technical Network Security: Technical security controls secure the data that is put on the
system or which is in travel over, into or out of the network. Assurance is twofold; this needs
to shield data and frameworks from unapproved persons, and this additionally needs to shield
against malignant activities from workers.

• Administrative Network Security: Administrative security controls comprise of security


approaches and procedures that control client conduct, including how clients are validated,
their level of access and how IT staff individuals execute changes to the infrastructure.

Mr. K. Sathurcigan Unit 02 Networking 63


The company's secrets can be protected by implement These levels. And some restrictions can be
created for the users through the following things.

2.2.1 Network Access Control

To guarantee that potential assailants can't penetrate your network, complete access control
strategies should be set up for the two users and gadgets. Network access control (NAC) can be
set at the most granular level. For instance, the company could give executives full access to the
network yet deny access to secret private folders or block their gadgets from joining the network.
(Security?, 2020)

2.2.2 Antivirus and Antimalware Software

Antivirus and antimalware programming shield a company from malevolent programming,


including viruses, ransomware, worms and trojans. The best anti-virus software not just scan
records upon passage to the network yet constantly scan and tracks files.

2.2.3 Firewall Protection

A firewall is working like prevention between our internal network and implausible external
networks, which means this is work according to its name.2.2.4 Virtual Private Networks.
Administrators regularly in-build a collection of restrictive rules, for a block or permit the traffic
on the network. for example, Forcepoint Next-Generation Firewall (NGFW) offers consistent and
centralized management control of network traffic, whether this is physical, virtual or in the cloud.

2.2.4 Virtual Private Networks

Virtual private networks (VPNs) make a connection from an endpoint or site to the network. For
example, users studying from home regularly connect to the tutor's network over a VPN. Data
between the two focuses are encoded and the user would need to authorization to permit
communication between their gadget and the network. Forcepoint's Secure Enterprise SD-WAN
permits organizations to rapidly make VPNs utilizing drag-and-drop and to secure all areas with
our Next-Generation Firewall solution.

Mr. K. Sathurcigan Unit 02 Networking 64


2.3 Design for Vividzone's Network system

Figure 22 Vividzone Network Design


This picture shows the design of the plan for Vividzone company both buildings.

2.3.1 Building A Network Plan

Figure 23 Building A Network Design

Mr. K. Sathurcigan Unit 02 Networking 65


The five departments each have one switch, in that one is the main switch that is in the Admin
Department. Every other switch connected with the main switch and that was connected to the
main router. In these connections, every data transfer to other departments. Admin can monitor
every activity on his PC. These information show on the above picture.

2.3.2 Building B Network Plan

Figure 24 Building B Network Design

This picture shows the building B departments interconnection details. I.e., There are two
departments in this building. Each department has one switch, that switches connected with the
main switch which is connected with the main router, through this way internet accessibility has
given to departments. And one Wireless access point also in here.

Mr. K. Sathurcigan Unit 02 Networking 66


2.4 IP address tables for systems

2.4.1 IP table for Building A

Department No of VLAN Starting IP Ending IP Subnet mask Default


users gateway
Manager 02 5 192.168.5.5 192.168.5.6 255.255.255.0 192.168.5.1
General
06 5 192.168.5.7 192.168.5.12 255.255.255.0 192.168.5.1
office
Account 01 5 192.168.5.13 - 255.255.255.0 192.168.5.1
Reception 02 5 192.168.5.14 192.168.5.15 255.255.255.0 192.168.5.1
Admin 01 5 192.168.5.16 - 255.255.255.0 192.168.5.1
Table 7 IP Table for Building A

2.4.2 IP table for Building B

Department No of VLAN Starting IP Ending IP Subnet mask Default


users gateway
Media 09 6 192.168.6.10 192.168.6.18 255.255.255.0 192.168.6.1
Storing 05 6 192.168.6.19 192.168.6.23 255.255.255.0 192.168.6.1
Table 8 IP Table for Building B

Mr. K. Sathurcigan Unit 02 Networking 67


2.5 Install & Configuration details of Network services and applications

2.5.1 Create A New Virtual Machine

Click the ‘Create a New Virtual Machine’ option

Figure 25 Create New Virtual Machine Step 1


After selecting the ‘Typical option’, Click the ‘Next’ button

Figure 26 Create New Virtual Machine Step 2

Mr. K. Sathurcigan Unit 02 Networking 68


Choose the ‘Windows 2012_R2_64Bit.ISO’ file destination.

Figure 27 Create New Virtual Machine Step 3

Figure 28 Create New Virtual Machine Step 4

Mr. K. Sathurcigan Unit 02 Networking 69


Give a name for the User ‘Vividzone’

Figure 29 Create New Virtual Machine Step 5


Click the ‘Next’ button

Figure 30 Create New Virtual Machine Step 6

Mr. K. Sathurcigan Unit 02 Networking 70


Provide the limit of space for server

Figure 31 Create New Virtual Machine Step 7

Figure 32 Create New Virtual Machine Last Step


These eight steps show how to create a new virtual machine. After these steps can enter into the
virtual machine.

Mr. K. Sathurcigan Unit 02 Networking 71


2.5.2 Open A Virtual Machine

Following these steps can find how to open the virtual machine.

Figure 33 Open a virtual machine step 1

Figure 34 Open a virtual machine step 2

Mr. K. Sathurcigan Unit 02 Networking 72


Server turn on

Figure 35 Open a virtual machine step 3

Figure 36 Open a virtual machine step 4

Mr. K. Sathurcigan Unit 02 Networking 73


Window installation is going on

Figure 37 Open a virtual machine step 5

Figure 38 Open a virtual machine step 6


Mr. K. Sathurcigan Unit 02 Networking 74
2.5.3 Create the Administrator Profile

Following picture shows, the User account sign in details.

Figure 39 Sign in the Vivdzone profile

Figure 40 Sign out the Vividzone profile

Mr. K. Sathurcigan Unit 02 Networking 75


Switch the Administrator account

Figure 41 Create the Administrator profile

Figure 42 Create New Password for Administrator Profile


This step shows, how to create the Administrator account. I.e., Enter the virtual machine by sign
in the Vividzone account then sign out the account and come to the lock screen after, press ‘Ctrl +
Alt + Insert’. Through this, can create the Administrator account. Finally, create a new password
for the Administrator account.

Mr. K. Sathurcigan Unit 02 Networking 76


2.5.4 Change Server Computer Name, Date, Time zone

The following picture shows, how to change the server Name details.

Figure 43 Change Computer Name

Figure 44 Change Date

Mr. K. Sathurcigan Unit 02 Networking 77


Set the time zone

Figure 45 Change Time zone


Server computer needs to show the correct date and time. Because users get data from the server.
So, if the server shows the wrong date or time, this will make a mistake on the activities. Follow
the above steps can change the server date and time settings.

Mr. K. Sathurcigan Unit 02 Networking 78


2.5.5 Create Active Directory Domain Services (AD DS)

Figure 46 AD DS Setup Step 1


Click the ‘Next’ button

Figure 47 AD DS Setup Step 2


Mr. K. Sathurcigan Unit 02 Networking 79
Press ‘Add Feature’ button.

Figure 48 AD DS Setup Step 3


Select the ‘Active Directory Domain Services’

Figure 49 AD DS Setup Step 4

Mr. K. Sathurcigan Unit 02 Networking 80


Following picture shows, the last step of the install preparation.

Figure 50 AD DS Setup Step 5


After these steps can install the AD DS. That process shows the following pictures.
Click the ‘Install’ button

Figure 51 AD DS Install Step 1

Mr. K. Sathurcigan Unit 02 Networking 81


The following picture shows the progress of installing.

Figure 52 AD DS Install Step 2


Finishing of ADDS installation

Figure 53 AD DS Install Final Step

Mr. K. Sathurcigan Unit 02 Networking 82


2.5.5 Configure the AD DS

The following picture shows, how to promote the server to Domain.

Figure 54 AD DS Configuration Step 1


ADDS configuring is begin

Figure 55 AD DS Configuration Step 2

Mr. K. Sathurcigan Unit 02 Networking 83


The following picture shows the password assigning information.

Figure 56 AD DS Configuration Step 3


Click the ‘Next’ button

Figure 57 AD DS Configuration Step 4

Mr. K. Sathurcigan Unit 02 Networking 84


Give the NetBIOS Domain name information shows on the following picture.

Figure 58 AD DS Configuration Step 5


Click the ‘Next’ button

Figure 59 AD DS Configuration Step 6

Mr. K. Sathurcigan Unit 02 Networking 85


Last step of ADDS configuring

Figure 60 AD DS Configuration Last Step


After these steps, the system automatically going to restart.

Figure 61 System Restarting

Mr. K. Sathurcigan Unit 02 Networking 86


Account selection is shown in the following picture.

Figure 62 Switch Other User

Switch the administrator account

Figure 63 Sign in the Administrator


Mr. K. Sathurcigan Unit 02 Networking 87
2.5.6 Create the Active Directory Users and Computers (ADUC)

Figure 64 ADUC Setup step 1


Add an organizational unit

Figure 65 ADUC Setup step 2

Mr. K. Sathurcigan Unit 02 Networking 88


Provide a name for an organization unit.

Figure 66 ADUC Setup step 3


Add a user

Figure 67 ADUC Setup step 4

Mr. K. Sathurcigan Unit 02 Networking 89


Provide User details.

Figure 68 ADUC Setup step 5


Provide a password for the user

Figure 69 ADUC Setup step 6

Mr. K. Sathurcigan Unit 02 Networking 90


Last step of User creating.

Figure 70 ADUC Setup step 7


Added user show on below picture.

Figure 71 ADUC Setup last step

After finish these steps, the users or employees can add to the system.

Mr. K. Sathurcigan Unit 02 Networking 91


2.6 Feedbacks for the Vividzone company Network plan

Figure 72 Feedback for Vividzone Network design

Mr. K. Sathurcigan Unit 02 Networking 92


After finishing the Network design of Vividzone company, got Feedback for that, this detail is
shown in the above picture. After that, got feedback from my friends through the google form,
which information is showed on the following picture.

Figure 73 Feedback by friends


Mr. K. Sathurcigan Unit 02 Networking 93
2.6.1 Analysing the Efficiency through the Feedback

Result
No of People Conclusion
Developed Need to develop
60% of people give result about this system is
05 60% 40% excellent, but 40% of people gave very good,
so need to fulfil the 40% of people needs.
Table 9 Analyse about the feedback

2.7 Maintenance table for Server


Subject Sequence Day Time The person responsible
for the duty
H Check server connection Weekly Monday 10:00
A
R Check PCs connection Weekly Wednesday 09:00
D
W Check cable's condition Monthly Wednesday 16:00
A
R Check disk usage Weekly Friday 11:00
E Network Administrator
S Check system security Weekly Tuesday 09:00
O
F Check server utilization Weekly Monday 12:00
T
W Check for updates Monthly Friday 13:00
A
R Change passwords Weekly Tuesday 08:00
E
Table 10 Maintenance Table for Server

Mr. K. Sathurcigan Unit 02 Networking 94


Activity 03

3.1 Vividzone Company’s Network system Configuration

Figure 74 Configured Network System

3.1.1 Set IP Address for PC

Following pictures show how to change the display name.

Figure 75 Set IP Address for PC

Mr. K. Sathurcigan Unit 02 Networking 95


Following pictures show how to assign the IP Address for PC.

Figure 76 IP Assigning step 1

Figure 77 IP Assigning step 2

Mr. K. Sathurcigan Unit 02 Networking 96


IP Address assigning is shown on below picture.

Figure 78 IP Assigning step 3

3.1.2 Router Configuration

Figure 79 Configure the Router


Through this Command Lines, can configure the router. That details show on the above picture.

Mr. K. Sathurcigan Unit 02 Networking 97


3.1.2.1 Change Host Name

Figure 80 Change Host Name


This picture shows how to change the hostname of the router. Through these command lines,
hostname change from ‘Router’ to ‘Building_A_Main_Router’.

3.1.2.2 Set the Welcome Message on Server

Figure 81 Set a Welcome message on the router


Through these command lines, can set a welcome message on the router. In here, ‘Welcome to
Building A Main Router’ is set as a welcome message.
Mr. K. Sathurcigan Unit 02 Networking 98
3.1.3 Switch Configuration

Figure 82 Switch Configuration


Through this command lines, can configure the switch. These details show on the above picture.
And how to change the VLAN, details also showed here.

Mr. K. Sathurcigan Unit 02 Networking 99


3.2 Ping Test

3.2.1 ping command

Ping is a utility previously created by Michael Muss in 1983 that is utilized to confirm if the data
package transfer to the already decided location without errors through the network. The ping
utility is normally used to check the network errors.
(Hope, 2019 )

3.2.2 Extended ping command

At the point when a typical ping command is sent from a router, the source address of the ping is
the IP address of the interface that the packet uses to leave the router. If the extended ping
command is utilized, the main IP address can be changed into any IP address. And this is utilized
to test the network connection and host reachability. The extended ping command works just at
the favoured EXEC command line. The ordinary ping works both in the user EXEC mode and the
privileged EXEC mode. To utilize this feature, enter ping at the command line then press Return.
(CISCO, 2006)

3.2.3 Traceroute Command

This like the ping but this is a little bit advanced from that. i.e., Traceroute is utilized to test long-
distance of packet transmission and find where routing breaks down.

3.2.4 Telnet

Telnet, created in 1969, is a protocol that gives a command-line interface to communicate with a
remote device or server, now and then utilized for remote administration yet this utilized for initial
device arrangement like network hardware. Telnet represents Teletype Network, yet this can
likewise be utilized as a verb; 'to telnet' is to build up a protocol utilizing the Telnet convention.
(Extrahop, 2020)

3.2.5 SSH

SSH which means Secure Shell, this is a security protocol and this utilized to log into the remote
server. SSH gives an encrypted session for transferring the files and run the server programs. This
work as a secure client/server connection for access the database and Email.
Mr. K. Sathurcigan Unit 02 Networking 100
3.3 Network System Connections analysing

3.3.1 Ping the other department PCs

Figure 83 Ping step 1


This picture, i.e. first step opens the command prompt. That’s show here.

Figure 84 Ping Step 2


This picture shows the IP configuration part. After this can ping any departments PCs or can omit
the IP configuration part.

Mr. K. Sathurcigan Unit 02 Networking 101


• Following picture shows, manager department PC to Building A main router and same
department PC details

Expectation: - ‘Successful configuration’


Actual result: - ‘Successful configuration’
Result: - (0% loss)

Figure 85 Ping other PCs


Picture 1 shows ping the manager department PC to same department's another PC. Picture 2
shows ping the manager department PC to General office department PC. If this command prompt
show loss = 0, there is no problem in the connection between two departments. Because each
department every PCs connected with their switch. If one department PC connect with other
department PC, automatically connection is 100% passed. Likewise, the Account department,
Reception Department and Admin department PCs pinging test result are given below.

• Following picture shows, manager department PC to account department PC details

Expectation: - ‘Successful configuration’


Actual result: - ‘Successful configuration’
Result: - (0% loss)

Figure 86 Ping to Account department PC

Mr. K. Sathurcigan Unit 02 Networking 102


• Following picture shows, the manager department PC to reception PC pinging details.

Expectation: - ‘Successful configuration’


Actual result: - ‘Successful configuration’
Result: - (0% loss)

Figure 87 Ping to Reception department PC

• Following picture shows, the manager department PC to reception PC pinging details.

Expectation: - ‘Successful configuration’


Actual result: - ‘Successful configuration’
Result: - (0% loss)

Figure 88 Ping to Admin department PC

Mr. K. Sathurcigan Unit 02 Networking 103


• Following picture shows, the manager department PC to building B router pinging details.

Expectation: - ‘Successful configuration’


Actual result: - ‘Successful configuration’
Result: - (0% loss)

Figure 89 Ping to Building B Main Router

• Finally, try to ping the Building B Main router, that also 100% passed. So, both buildings were
connected correctly.

Expectation: - ‘Failure configuration’


Actual result: - ‘Failure configuration’
Result: - (100% loss)

Figure 90 Ping to the wrong PC


This picture shows, if ping to unfounded PC, then command prompt shows a 100% loss. This is
also evidence for proving the connection strength, if this will show reply message, there is an
unknown problem in Cisco packet tracer.

Mr. K. Sathurcigan Unit 02 Networking 104


3.4 Investigation about finding the Upgradable Features on the Vividzone
Network System

3.4.1 Security Features

though planned the security plans in how that is need to continuously change and upgrade. Because
security is the main thing about the company. So, every company need to the considered security
feature. For this, some of the techniques are given below.

• Continuously change the password -


Through this activity, can hack the company system is comparably hard. So, the company can
confirm their security.

• Set the strongest password -


When creating a new password for the system which is must need strongest. Through this, can
omit the company secrets went out. However, the password should be continuously changed.
For this activity, one of the employees must appoint in the coming days.

3.4.2 Firewall upgrades

• Web Usage Control -


Through this feature, can avoid unwanted websites access. So, this is helping to protect from
outside people to spread into the company system.

• Malware Detection -
NGFW is search for the malware and protects the user from that. Through this, the company
is protecting from the malware.

• Automated Intervention -
NGFW is deeply checking every files and web sites. If anything has a related pattern to the
malicious activity, this will protect the user from that by avoiding.

Mr. K. Sathurcigan Unit 02 Networking 105


• VPN Support -
Given the present exceptionally mobile workstyles, most associations need to permit clients to
get to access resource remotely. A virtual private system (VPN) makes a safe, private
association over the open Internet to secure the data moving between the remote client and the
data centre. NGFWs rearrange and secure remote access with worked in help for IPsec and
SSL VPNs.

• Application Awareness -
This will omit criminal and unwanted activities. Through this, the company can confirm their
safety and reputation.

Mr. K. Sathurcigan Unit 02 Networking 106


Conclusion
This is a good opportunity for developing skills in designing a Network plan for a specific
company. And get more knowledge about Network principles, protocols, devices, software and
Cisco packet tracer drawing techniques. Through this, when need to make a Network plan, able to
identify what to do next.

And get knowledge of how to make the connection between the switch, router, and PCs. In this
way, how to configure the Router, these kinds of knowledge also could get from this opportunity.
These skills one day help for work in the company and this a good experience for the trainee in
this field.

In here, each department PCs connected with their Switches. Finally, every department's Switches
connected with the main switch which is connected with a router. So, through this connection
internet access can be shared with other department PCs. This system is followed in both buildings.
And both building’s router is connected. This connection is allowing data transmission between
both buildings.

This setup is implemented based on VLAN principles. And the switch is utilized to make a
connection between one department’s PC. A router is a tool to get an internet connection. Every
department PCs utilized the RJ45 cable to connect with switch. The main server is placed on the
admin department. The company’s every data stored on the main server. So, those details must
secure. For this purpose, the Firewall used here. Network software help to monitor whole company
activity from the admin department. At the same time, Administrator following a maintenance
program to maintain the server safe and without interruption. These kinds of technique followed
for design this network plan.

Mr. K. Sathurcigan Unit 02 Networking 107


Self-Criticism
This is considered a good opportunity for the learner to learn about the Network principles, how
to plan a Network system, how to configure the router and how to protect our data. And, end of
this session the learner will have full knowledge about these features confirm.

The learner needs to identifies what are the strengths who have. In this way, the strengths of mine
• The skill of Do the work in a given period, through can be able to design and configure the
PCs on the given time.
• The skill of fast learning, which is helped to understand the configure parts in network design
and firewall concepts.
• Designing skill, which was helped to design a network design for Vividzone company here.

At the same time, the learner needs to identify his weakness, in this way, weakness of mine
• Forgetting is the main problem in myself, which was an effect on my Cisco packet tracer
network design part.

Achieve the goal which means finish the assignment perfect on time through control the weakness
and develop the strengths.

Mr. K. Sathurcigan Unit 02 Networking 108


Gantt chart
Feb 2020 Mar 2020 Apr 2020 May 2020 Jun 2020 Jul 2020
ID Task Name Start Finish Duration
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 1 2 3 4 5 6 7 8

Gather information about Network


1 03-Feb-20 26-Feb-20 24d
principles and protocols
2 Find the Network Devices 23-Feb-20 10-Mar-20 17d

3 Find the Network Topologies 28-Feb-20 28-Feb-20 1d


Find server types and Networking
4 03-Mar-20 19-Mar-20 17d
software
Design the Blueprint of the Vividzone
5 20-Mar-20 27-Mar-20 8d
company Network system
Implement the Design on CISCO Packet
6 16-Apr-20 06-May-20 21d
tracer
Check The Network connections by Ping
7 15-May-20 21-May-20 7d
method
8 Get Feedback For Network plan 25-May-20 29-May-20 5d
Investigate the future upgrades on the
9 02-Jun-20 18-Jun-20 17d
Network plan
10 Get conclusion from the Network plan 19-Jun-20 25-Jun-20 7d

Table 11 Gantt Chart

Mr. K. Sathurcigan Unit 02 Networking 109


References
Athow, D., 2020. Best small business servers of 2020. [Online]
Available at: https://www.techradar.com/news/best-small-business-servers
[Accessed 20 May 2020].

CISCO, 2006. Using the Extended ping and Extended traceroute Commands. [Online]
Available at: https://www.cisco.com/c/en/us/support/docs/ip/routing-information-protocol-
rip/13730-ext-ping-
trace.html#:~:text=The%20Extended%20ping%20Command,uses%20to%20exit%20the%20ro
uter.&text=The%20extended%20ping%20is%20used,host%20reachability%20and%20network
%20
[Accessed 19 June 2020].

Definition, S., 2014. Server Definition. [Online]


Available at: https://techterms.com/definition/server
[Accessed 10 May 2020].

Devices, N., 2020. Network Devices. [Online]


[Accessed 08 May 2020].

Extrahop, 2020. Extrahop. [Online]


Available at: https://www.extrahop.com/resources/protocols/telnet/
[Accessed 19 June 2020].

Hope, C., 2019 . Ping. [Online]


Available at: https://www.computerhope.com/jargon/p/ping.htm
[Accessed 19 June 2020].

INS, 2016. How an effective Network Management System benefits your business. [Online]
Available at: https://www.irisns.com/2016/04/14/how-an-effective-network-management-
system-benefits-your-business/
[Accessed 19 May 2020].

Mr. K. Sathurcigan Unit 02 Networking 110


Networks, T. o. C., 2020. Types of Communication Networks. [Online]
Available at: https://www.studytonight.com/computer-networks/types-of-networks
[Accessed 07 May 2020].

Purifoy, J., 2020 . NETWORK SERVER TYPES EXPLAINED. [Online]


Available at: https://www.nhgeorgia.com/blog/network-server-types-explained-6
[Accessed 14 June 2020].

Security?, W. i. N., 2020. What is Network Security?. [Online]


Available at: https://www.forcepoint.com/cyber-edu/network-
security#:~:text=Network%20security%20is%20a%20broad,both%20software%20and%20hard
ware%20technologies.
[Accessed 14 June 2020].

Topology, N., 2017. Network Topology. [Online]


Available at: https://www.techopedia.com/definition/5538/network-topology
[Accessed 08 May 2020].

Mr. K. Sathurcigan Unit 02 Networking 111


Grading Rubric

Grading Criteria Achieved Feedback

LO1 : Examine networking principles and their protocols.

P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Compare common networking principles and how protocols
enable the effectiveness of networked systems.

LO2 : Explain networking devices and operations

P3
Discuss the operating principles of networking devices and
server types.

Mr. K. Sathurcigan Unit 02 Networking 112


P4
Discuss the inter-dependence of workstation hardware with
relevant networking software.

M2
Explore a range of server types and justify the selection of a
server, considering a given scenario regarding cost and
performance optimization.

LO 1 & LO2
D1
Considering a given scenario, identify the topology protocol
selected for the efficient utilisation of a networking system.

LO3 : Design efficient networked systems

P5
Design a networked system to meet a given specification.
P6
Test and evaluate the design to meet the requirements and
analyze user feedback.
M3

Mr. K. Sathurcigan Unit 02 Networking 113


Install and configure network services and applications on your
choice.
D2
Design a maintenance schedule to support the networked
system.
LO4 : Implement and diagnose networked systems

P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D3
Use critical reflection to evaluate own work and justify valid
conclusions.

Mr. K. Sathurcigan Unit 02 Networking 114

You might also like