HND in Computing Networking Unit 2 Assignment 1 Sample

Download as pdf or txt
Download as pdf or txt
You are on page 1of 85

Submission format

The submission is in the form of an individual written report. This should be written in a
concise, formal business style using single spacing and font size 12. You are required to
make use of headings, paragraphs and subsections as appropriate, and all work must be
supported with research and referenced using the Harvard referencing system. Please
also provide an end list of references using the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding
annexures
Unit Learning Outcomes:

LO1 Examine networking principles and their protocols.


Address P1, P2, M1, D1
LO2 Explain networking devices and operations.
Address P3, P4, M2, D1
LO3 Design efficient networked systems.
Address P5, P6, M3, D2
LO4 Implement and diagnose networked systems.
Address P7, P8, M4, D3

Assignment Brief and Guidance:

R.D.D.R.C.Jayarathna Unit No:- 02 Assignment No:- 01


You are the newly recruited Network Engineer of an eminent movie
company called Enclave Films. This company composes movies and
delivers high quality video to make it download through VividZone
company website. The original movie company management has
decided to consolidate the contract with VividZone by adding more
efficient staff and appliances.

Enclave Films is in building B and the web team is positioned in the


same building while majority of the administration, sales, accounts and
management functions are supported in building A. Both buildings are
located in the same premises. Movie company plans to aggregate all
their staff and resources in one building. Therefore when adjacent office
space becomes available in building A, these groups will be
accommodated together. Building A has a reception and a customer area
as well.

About the Network

The branch network of Enclave Films has grown without proper


planning. The LAN cabling in both offices is Cat5e Ethernet. The office
complex provides an Ethernet link between the two buildings. Because
of the recent acquisition of VividZone, the addressing and naming of the
network are inconsistent.

The combined network infrastructure has not been optimized or


redesigned. It is a flat network design with minimal redundancy. A small
wireless LAN is used occasionally by few project managers with laptops
and the guests at Building B. Movie company believes that the WLAN
may be used frequently since mobile and contract employees of
VividZone will require network access.

Remote access to Enclave Films network is provided through an ADSL


internet link terminating in Building A. Currently there are two sets of
Enclave Films staff onsite at the stadium in building A. The VividZone
provides them office space in their management offices.

The current network equipment includes:


a) Two routers
b) Three switches
c) One network and business server
d) One wireless router
e) One ADSL modem
The current network has TWO VLANs.
f) The General VLAN in building A serves the general office and managers,
including reception, accounts, and administration. It consists of 12 PCs and
02 printers.

g) The Production VLAN in building B serves the production suites and


provides networking for the media development and storage. It consists of
09 high-performance workstations, 05 office PCs, and 02 printers.

The Management expects to enhance the network based on following


major criteria:

h) Data traffic expected to increase by 80%


i) Possibly consider connecting directly to the VividZone network; must be a
fast and reliable connection
j) High network availability with redundant links and technology
k) Wireless network access at the stadium and at Building A and Building B
l) QoS to support video applications
m) High network reliability with network monitoring and security

LO1 Examine networking principles and their protocols

Task 1.1 (P1)


a) Discuss the benefits and constraints of different network types and
standards.
b) Explain the benefits & constraints of current network solution
including bandwidth & effectiveness of the networking system.

Task 1.2
a) What is a topology? Give a brief introduction about Logical and
Physical topologies including examples. (P2)
b) Identify what are the most suitable Logical & Physical topologies
for the given scenario. (D1)

Task 1.3
Identify the protocol structure models available in networking &
briefly explain how they work with comparisons. (M1)

Task 1.4
Define the protocols, their functions and identify the suitable protocols
for the given scenario. Explain for your selection. (D1)

LO2 Explain networking devices and operations


Task 2.1
Identify the current network equipments (devices) which have been
used and discuss the functionality of each device related to the given
scenario. Justify your choice of devices for this network design. (P3)

Task 2.2
Discuss the interdependence of workstation hardware with relevant
networking software. (P4)

Task 2.3 (M2)

a) How should you select a server/s for a network? Explain the


techniques to be followed by?
b) Identify the server types suitable for the given scenario. Justify your
selection considering cost and performance optimization.

LO3 Design efficient networked systems

Task 3.1 (P5)

a) Prepare a written step-by-step plan of how you are going to


design a Local Area Network including a blueprint of your
LAN.
b) Justify the security requirements and quality of services
needed for selection of accessories

Task 3.2 (P5)


a) Design a networked system to meet a given specification by using
packet tracer software
b) Find the IP addresses allocated for the two VLANs in given
scenario. (General VLAN & Production VLAN).
c) Network IP
d) Gateway
e) Hosts (Dynamic & Static)

Task 3.3
Install & configure network services and applications of your choice.
(M3)

Task 3.4
Conduct a test and evaluate the design to meet the requirements and
analyse user feedback. (P6)

Task 3.5
Suggest a maintenance schedule to support the networked system. (D2)

LO4 Implement and diagnose networked systems


Task 4.1
Implement a networked system based on your prepared design. (P7)

Task 4.2
Conduct verification with e.g. Ping, extended ping, trace route, telnet,
SSH, etc. Record the test results and analyze these against expected
results. (P8)

Task 4.3
Investigate what functionalities would allow the system to support device
growth and the addition of communication devices. (M4)

Task 4.4
Use critical reflection to evaluate own work and justify valid conclusions
beyond the given specification. (D3)
Table of Contents
1 Task 01.........................................................................................................................1

1.1 Network types and Standards................................................................................1

1.1.A Network Type.................................................................................................1

1.1.B Current Network Constraint and Benefit.......................................................4

1.2 Network topology..................................................................................................5

1.2.A Type of Network topology.............................................................................5

1.2.B Proposed solution design for the Enclave Film..............................................8

1.3 Protocol structure model........................................................................................9

1.3.1 TCP / IP..........................................................................................................9

1.3.2 OSI...............................................................................................................10

1.3.3 The OSI model /TCP / IP model..................................................................10

1.4 Suitable protocols for given scenario..................................................................12

1.4.1 Protocol is a set of rules...............................................................................12

1.4.2 TCP/IP..........................................................................................................12

1.4.3 Common network and Internet protocols.....................................................13

2 Task-02.......................................................................................................................14

2.1 Network devices..................................................................................................14

2.1.1 Current Network devices..............................................................................14

2.1.2 Choice of devices for this network design...................................................19

2.2 Interdependence of workstation hardware with relevant networking software...19

2.3 Server types and justification of the selection of a server...................................21

2.3.A Server...........................................................................................................21

2.3.B Identify the server types suitable for Enclave Films....................................23


3 Task-03.......................................................................................................................25

3.1 Design Step-by-step plan and Network and blueprint.........................................25

3.1.A Design of Local Area Network and blueprint..............................................25

3.1.B Security requirements and quality of services of Accessories.....................28

3.2 Design and Calculate Ip address..........................................................................29

1 .............................................................................................................................29

3.2.A Cisco Packet Tracer Design.........................................................................29

3.2.B Ip Addressing and Subnet Calculate............................................................30

3.3 Install and configure network services and applications.....................................31

3.3.1 Install and configuration Domain Server.....................................................31

3.3.2 Install Application Software.........................................................................38

3.4 Analyses user feedback.......................................................................................41

3.4.1 Speed of the Network for local resources (File Sharing, printer)................41

3.4.2 Internet Access Speed..................................................................................41

3.4.3 Security condition........................................................................................42

3.4.4 Performance of the network.........................................................................42

3.4.5 User friendliness of the network..................................................................43

3.5 Network maintenance..........................................................................................44

3.5.1 Maintenance Schedule.................................................................................45

4 Task-04.......................................................................................................................47

4.1 Implement a networked system based design.....................................................47

4.1.1 Configuration of Router...............................................................................48

4.1.2 Configuration Switch of Media Development Dip......................................48

4.1.3 Configuration Switch of Workstation Dip....................................................49

4.1.4 Configuration Switch of First Floor.............................................................49

4.1.5 Configuration Switch of Ground Floor........................................................50


4.1.6 Configuration Ip Address for Pc’s................................................................50

4.1.7 Configuration DHCP server.........................................................................52

4.1.8 Configuration Access Point..........................................................................53

4.1.9 Configuration Customer Area Router..........................................................54

4.2 Conduct verification with. Ping, extended ping, trace route, telnet, SSH...........55

4.2.1 Record the test results and analyze..............................................................55

4.3 Addition of communication devices and network growth..................................58

4.4 Evaluate work and justify valid conclusions.......................................................59

5 Gantt chart..................................................................................................................60

6 References..................................................................................................................61

7 Annexures..................................................................................................................63

7.1 Appendix 1..........................................................................................................63

7.2 Appendix 2..........................................................................................................71

Table of Figure
Figure 1 - LAN (Cisco Netacad, n.d.)..................................................................................1

Figure 2-WLAN (Cisco Netacad, n.d.)................................................................................1


Figure 3-PAN (Cisco Netacad, n.d.).....................................................................................2

Figure 4-MAN (Cisco Netacad, n.d.)...................................................................................2

Figure 5-WAN (Cisco Netacad, n.d.)...................................................................................3

Figure 6 - Network standards (Cisco Netacad, n.d.)............................................................3

Figure 7- Bus (Cisco Netacad, n.d.).....................................................................................5

Figure 8- Ring (Cisco Netacad, n.d.)...................................................................................6

Figure 9- Star (Cisco Netacad, n.d.).....................................................................................7

Figure 10- Hierarchical (Cisco Netacad, n.d.).....................................................................7

Figure 11- Hybrid (Cisco Netacad, n.d.)..............................................................................8

Figure 12- TCP / IP (Cisco Netacad, n.d.)............................................................................9

Figure 13- The OSI model /TCP / IP model (Cisco Netacad, n.d.)....................................11

Figure 14- TCP/IP (Cisco Netacad, n.d.)...........................................................................12

Figure 15- Router (Cisco Netacad, n.d.)............................................................................14

Figure 16- Switch (Cisco Netacad, n.d.)............................................................................14

Figure 17- Network Server (Cisco Netacad, n.d.)..............................................................15

Figure 18- Business Server (Cisco Netacad, n.d.).............................................................15

Figure 19- Wireless router (Harwood, n.d.).......................................................................16

Figure 20- Modem (Whetstone, 2011)...............................................................................16

Figure 21- Laptop Computer (lenovo)...............................................................................17

Figure 22- Desktop computer (lenovo)..............................................................................17

Figure 23- Workstation (WS) computer (boshdesigns)......................................................18

Figure 24- Smart Mobile phone (TechThirsty)..................................................................18

Figure 25- Asus TS500 Server (Newegg)..........................................................................23

Figure 26- Blue Print Network Design..............................................................................27

Figure 27- Network Design................................................................................................29

Figure 28- Install and configuration Domain Server..........................................................31


Figure 29- Install and configuration Domain Server..........................................................31

Figure 30- Install and configuration Domain Server..........................................................32

Figure 31- Install and configuration Domain Server..........................................................32

Figure 32- Install and configuration Domain Server..........................................................33

Figure 33- Install and configuration Domain Server..........................................................33

Figure 34- Install and configuration Domain Server..........................................................34

Figure 35- Install and configuration Domain Server..........................................................34

Figure 36- Install and configuration Domain Server..........................................................35

Figure 37- Install and configuration Domain Server..........................................................35

Figure 38- Install and configuration Domain Server..........................................................36

Figure 39- Install and configuration Domain Server..........................................................36

Figure 40-Install and configuration Domain Server...........................................................37

Figure 41 - Install and configuration Domain Server.........................................................37

Figure 42- Install and configuration Domain Server..........................................................38

Figure 43- Install Application Software.............................................................................38

Figure 44- Install Application Software.............................................................................39

Figure 45- Install Application Software.............................................................................39

Figure 46- Install Application Software.............................................................................40

Figure 47- Install Application Software.............................................................................40

Figure 48- Speed of the Network for local resources (File Sharing, printer)....................41

Figure 49- Internet Access Speed.......................................................................................41

Figure 50- Security condition.............................................................................................42

Figure 51- Performance of the network.............................................................................42

Figure 52- User friendliness of the network......................................................................43

Figure 53 - Implement a networked system based design.................................................47

Figure 54- Configuration of Router...................................................................................48


Figure 55- Configuration Switch of Media Development Dip..........................................48

Figure 56- Configuration Switch of Workstation Dip........................................................49

Figure 57- Configuration Switch of First Floor.................................................................49

Figure 58- Configuration Switch of Ground Floor............................................................50

Figure 59- Configuration Ip Address for Pc’s....................................................................50

Figure 60- Configuration Ip Address for Pc’s....................................................................50

Figure 61- Configuration Ip Address for Pc’s....................................................................51

Figure 62- Configuration Ip Address for Pc’s....................................................................51

Figure 63- Configuration DHCP server.............................................................................52

Figure 64- Configuration DHCP server.............................................................................52

Figure 65- Configuration Access Point..............................................................................53

Figure 66- Configuration Access Point..............................................................................53

Figure 67- Configuration Customer Area Router...............................................................54

Figure 68- Test Case Id 1...................................................................................................56

Figure 69- Test Case Id 2...................................................................................................56

Figure 70- Test Case Id 3...................................................................................................57

Figure 71- Test Case Id 4...................................................................................................57

Figure 72- Test Case Id 5...................................................................................................58

Table of Table
Table 1-TCP / IP (Cisco Netacad, n.d.)................................................................................9

Table 2 - OSI Model (Cisco Netacad, n.d.)........................................................................10

Table 3- Common Network Protocols and Ports (Cisco Netacad, n.d.).............................13

Table 4- IEEE standards Network Cable............................................................................20

Table 5- IP Table................................................................................................................30

Table 6- Maintenance Schedule.........................................................................................46


Table 7-Record the test results and analyze.......................................................................55
1 Task 01
1.1 Network types and Standards
1.1.1 Network Type
LAN

Figure 1 - LAN (Cisco Netacad, n.d.)

The LAN can be as small as a single home network installed in your home or small
office. Over time, the definition of LAN has evolved to include interconnected local
networks consisting of hundreds of devices installed in multiple buildings and locations.
(Cisco Netacad, n.d.)

WLAN
Wireless LAN (WLAN) is a local area network that uses radio waves to transfer data
between wireless devices. In traditional LANs, the devices are connected to each other
using copper wires. (Cisco Netacad, n.d.)

Figure 2-WLAN (Cisco Netacad, n.d.)

PAN
The personal network (PAN) is a network that connects devices, such as mice, keyboards,
printers, smartphones and tablets within the domain of an individual person. All these
devices are assigned to a host and are often connected to Bluetooth technology. (Cisco
Netacad, n.d.)

Figure 3-PAN (Cisco Netacad, n.d.)

MAN

Urban Network (MAN) is a network that runs on a large campus or city. The network
consists of different buildings connected through wireless or fiber optic networks. (Cisco
Netacad, n.d.)

Figure 4-MAN (Cisco Netacad, n.d.)

WAN
A wide area network (WAN) connects to multiple smaller networks, such as local

Figure 5-WAN (Cisco Netacad, n.d.)


networks located in geographically separate locations. The most common example of a
WAN is the Internet. The Internet is a large WAN that consists of millions of LANs
connected. (Cisco Netacad, n.d.)

Network standards

Many international standards organizations are responsible for developing network


standards. The standards are used by manufacturers as a basis for the development of
technology, especially technology and communication networksz

Figure 6 - Network standards (Cisco Netacad, n.d.)

1.1.2 Current Network Constraint and Benefit


It can be cited that the current network benefits from inter department communication is
done with a greater speed since cat 5 cables are being used. Also laptop users and mobile
users can connected to the network through the WIFI Technology.
As the deficiencies of the network, it has been identified that the security is inefficient
between the departments. Also both the customers as well as staff being connected to the
same Wi-Fi network can be considered as a security vulnerability.

Furthermore, it has been identified that, it would be more effective if VLANs are
introduced to separate departments within the network as well as it would be also
effective if the backbone between the two buildings is made out of fiber optics cable.
1.2 Network topology
1.2.1 Type of Network topology
Logical topologies

The logical topology describes how hosts arrive in the middle and communicate on the
network. The two most common types of logical topology are transmission and transit. In
the broadcast topology, a host transmits a message to all hosts in the same network
segment. There is no order that hosts must follow to transfer data. Messages are sent
based on First In, First out (FIFO). (Cisco Netacad, n.d.)

Physical topology

The physical topology determines how computers, printers and other devices
communicate with the network. Figure 6 provides a physical topology.
Bus
In the bus topology, each computer connects to a shared cable. The cable connects one
computer to another, like a bus line running through the city. The cable has a small cap
installed at the end called breakage. The term prevents signals from reoccurring and
causes network errors. (Cisco Netacad, n.d.)
Ring

In the ring topology, the hosts are connected in a physical loop or circle. Because there is
no beginning or end of the ring topology, the cable is not finished. The token travels
around the loop that stops at each host. If the host wants to send the data, the host adds
the data and the destination address to the token. The token continues around the loop
until it stops at the host with the destination address. The destination host removes the
data from the token. (Cisco Netacad, n.d.)

Star
Figure 9- Star (Cisco Netacad, n.d.)

Figure 10- Hierarchical (Cisco Netacad, n.d.)


The star topology contains a central focal point, usually a device such as a hub, switch, or
router. Each host in the network has a cable segment that connects the host directly to the
central connection point. Star topology is easy to solve. Each host is connected to the
central device with its own cable. If there is a problem with this cable, that host will only
be affected. The rest of the network still works. (Cisco Netacad, n.d.)

Hierarchical

The star topology or hierarchical topology is an astral network with an additional network
device connected to the main network device. A network cable is usually connected to a
single key, and many other keys are connected to the first adapter. Larger networks, such
as corporate networks or universities, use a hierarchical star topology. (Cisco Netacad,
n.d.)

Hybrid

Mixed topology is a combination of two or more basic layers of core networks, such as
star topology or circular topology. The advantage of the mixed topology is that it can be
implemented for several different network environments.

Figure 1- Hybrid (Cisco Netacad,


n.d.)
The type of structure determines the capabilities of the network, such as ease of
configuration, speed and cable length. The LAN architecture describes the physical and
logical topology used in the network. (Cisco Netacad, n.d.)

1.2.2 Proposed solution design for the Enclave Film

With all the precede topologies eluded, it is now vital to identify the suitable topology
that would suffice the network requirement of the Enclave Film company.

When building a LAN that meets the needs of a small or medium sized business like our
client, the implementation phase will more likely to be successful if we used a
hierarchical design model. Compared with other network designs, a hierarchical network
is at ease to manage and expand, which will be required within this SME eventually, and
problems are solved faster. So for the network design which I have chosen for Enclave
Film is Tree topology- Hierarchical Design

1.3 Protocol structure model


1.3.1 TCP / IP
The TCP / IP protocol suite is the standard for data transmission over networks and the
Internet. It consists of layers that perform the functions necessary to prepare the data for
transmission through a network. The table shows four layers of the TCP / IP model.
(Cisco Netacad, n.d.)

TCP/IP

TCP/IP Layer Description

Application Where high-level protocols such as SMTP and FTP operate


Specifies which application requested or is receiving data through
Transport specific ports

Internet Where IP addressing and routing take place


Where MAC addressing and physical components of the network
Network Access exist
Table 1-TCP / IP (Cisco Netacad, n.d.)
Figure 12- TCP / IP (Cisco Netacad, n.d.)

1.3.2 OSI
The OSI model divides network connections into seven distinct layers. Although there are
other models, most network providers are building their products today using this
framework. (Cisco Netacad, n.d.)

OSI Model
OSI Model Layer Description
Application 7 Responsible for network services to applications
Transforms data formats to provide a standard interface for
Presentation 6 the application layer
Establishes, manages, and terminates the connections
Session 5 between the local and remote application
Provides reliable transport and flow control across a
Transport 4 network
Responsible for logical addressing and the domain of
Network 3 routing
Data Link 2 Provides physical addressing and media access procedures
Defines all the electrical and physical specifications for
Physical 1 devices
Table 2 - OSI Model (Cisco Netacad, n.d.)

1.3.3 The OSI model /TCP / IP model

The OSI model and the TCP / IP model are two reference models used to describe the
data connection process. The TCP / IP model is used specifically for the TCP / IP protocol
Figure 13- The OSI model /TCP / IP model (Cisco Netacad, n.d.)

group and uses the OSI model to develop standard communications of equipment and
applications from different vendors.

The TCP / IP model performs the same process as the OSI model, but uses four layers
instead of seven. The graph shows how to compare the layers of the two models. (Cisco
Netacad, n.d.)
1.4 Suitable protocols for given scenario
1.4.1 Protocol is a set of rules
The protocol is a set of rules. Internet protocols are a set of rules that govern
communication within and between computers in a network. The protocol specification
specifies the format of the messages that are exchanged. The letter is also used to send
itself through the protocols of the mail system. Part of the protocol specifies where the
delivery address in the envelope should be written. If the delivery address is written in the
wrong place, the message cannot be delivered. (Ragan, 2017)

1.4.2 TCP/IP
Computers and computers connected to the Internet use a set of protocols called TCP / IP
to communicate with each other. The information is usually sent through two protocols,
TCP and UDP, as shown in the figure. (Cisco Netacad, n.d.)

Figure 14- TCP/IP (Cisco Netacad, n.d.)


1.4.3 Common network and Internet protocols
The format summarizes some of the most common network and Internet protocols, and
the port number used in these protocols. The more you understand about each of these
protocols, the more you will understand how networks and the Internet work. (Cisco
Netacad, n.d.)

Common Network Protocols and Ports


Protocol Port Description
TCP/IP NA A suite of protocols used to transport data on the
Internet
NetBEUI/ 137, 139, A small, fast protocol designed for a workgroup
NetBIOS 150 network that requires no connection to the Internet
HTTP 80 A communication protocol that establishes a
request/response connection on the Internet
HTTPS 443 Uses authentication and encryption to secure data as
it travels between the client and Web server
FTP 20/21 Provides services for file transfer and manipulation
SSH 22 Securely connects to a remote network device
Telnet 23 Connects to a remote network device
POP3 110 Downloads email messages from an email server
IMAP 143 Downloads email messages from an email server
SMTP 25 Sends email in a TCP/IP network
LDAP 389 Accesses information directories
SNMP 161 Manages and monitors devices on a network
SMB 445 Provides shared access to files, printers, and
communication between points on a network
SFTP 115 Provides an unsecured file transfer service
DNS 53 Resolves host names to IP addresses
RDP 3389 Used to provide access to a remote computer
Table 3- Common Network Protocols and Ports (Cisco Netacad, n.d.)

2 Task-02
2.1 Network devices
2.1.1 Current Network devices
Router
A router is a device that redirects data packets through networks. The router connects to at
least two networks, namely LAN, WAN, LAN and its ISP network. The routers are
located at the gateways, where two or more networks are connected. (Cisco Netacad, n.d.)

Figure 15- Router (Cisco Netacad, n.d.)

Switch

In networks, a device filters and redirects packets between parts of the LAN. The
switches operate in the data link layer (layer 2) and sometimes in the network layer (layer
3) of the OSI reference model therefore compatible with any packet protocol. Local
networks (LANs) that use switches to join switched LANs or, in the case of Ethernet
networks, are called Ethernet LAN switches. (Cisco Netacad, n.d.)

Figure 16- Switch (Cisco Netacad, n.d.)

Network Server
Figure
Figure 18-
17- Business
Network Server
Server (Cisco
(Cisco
Netacad,
Netacad, n.d.)
n.d.)
A network server is a computer designed to act as a central repository and helps provide a
variety of resources, such as access to hardware, disk space, access to printers, etc. To
other computers on the network. (Cisco Netacad, n.d.)

Business Server

A small business server is usually a low-quality server designed to be affordable and


manageable in a small business environment. Small Business Servers are suitable for
dozens of employees and can be preinstalled with software needed to run the server.
(Cisco Netacad, n.d.)

Wireless router

A wireless router is an electronic device that acts like a router, which means it sends data
from the Internet cable to a device, and a wireless access point so that this data can be
shared by wireless signals instead Cable. (Harwood, n.d.)

Figure 19- Wireless router (Harwood, n.d.)


Figure 21- Laptop Computer (lenovo)

Figure 20- Modem (Whetstone, 2011)


Modem

A modem is a more interesting network device in our daily lives. If you have noticed
about yourself, you can get an Internet connection through a cable (there are different
types of cables) to your home. This cable is used to transfer our Internet data out of the
Internet world. (Whetstone, 2011)

Laptop Computer

Laptop Computers that y can carry with you and use in different environments. It includes
a screen, keyboard, trackpad or trackball, which acts like a mouse.

Desktop computer
A desktop computer is a personal computer that fits the desktop or below it. In general, it
consists of a projector, a keyboard, a mouse, and a horizontal or vertical shape factor
(tower). Unlike a laptop, a notebook, a desktop computer is designed to stay in one place

Figure 22- Desktop computer (lenovo)

Workstation (WS) computer

A workstation computer dedicated to a user or group of dedicated users for a business or


professional. Includes one or more high-resolution screens and a faster processor than a
personal computer. The workstation has a greater multitasking capability due to additional
RAM, drives, and drive capacity. The workstation can also use high-speed graphics
adapters and most connected peripherals. (KelsusIT, 2017)

Figure 23- Workstation (WS)


computer (boshdesigns)

Smart Mobile phone


A mobile phone is a portable wireless device that allows users to make calls and send text
messages, among other features. Current mobile phones are full of additional features,
such as web browsers, games, cameras, video players, and even navigation systems.

Figure 24- Smart Mobile phone


(TechThirsty)

2.1.2 Choice of devices for this network design


 Cisco 1841-K9 Router
o The Cisco 1841 architecture is specifically designed to meet the
requirements of small and medium businesses and small business
branches.
 24 Port Cisco 2950 switch
o Cisco Catalyst 2950 switches provide speeds of 5 to 15 Mbps at distances
up to 5000 feet over existing cabling. (Cisco, 2017)
 Cyberoam utm firewall
o Cyberoam Unified Threat Management provides comprehensive security
for organizations, from large companies to small offices and branches.
 Wi-Fi access point devices
o Expand your wireless network in four selectable modes: Range Extender,
Access Point, Bridge or Media Connector.
 Dell Precision Tower 7910 workstation
o Power through more complex applications and faster demand with the
new generation of double socket performance with the latest series of
Intel® Xeon® E5-2600 v4 processors with up to 22 centers per processor.

The Choice of devices for this network design Note has attached on the appendix section,
kindly refer appendix 1 section to find Choice of devices for this network design.
2.2 Interdependence of workstation hardware with relevant networking software

Interdependence workstations and devices that have chosen to solve are critical. Most of
the devices in today's office environment in Sri Lanka are out of date or grouped without
further network assessments. To provide a more complete and comprehensive network,
the consultant decided to use the network environmental assessment delivery of the
structure due to the suitability of the hardware and workstations selected in the solution.

For the proposed solution to Enclave Film, the author chose the following types of
workstations to implement.

 Dell Precision 7710 and


 Dell Precision Tower 7910

The Ethernet standard on which the proposed network is based on the following IEEE
standards.

IEEE Data Maximum


Name Standard Rate Media Type Distance

Ethernet 802.3 10 Mbps 10Base-T 100 meters


100
Fast Ethernet/ 802.3u Mbps 100Base-TX 100 meters
100Base-T 100Base-FX 2000 meters
1000
Gigabit Ethernet/ 802.3z Mbps 1000Base-T 100 meters
GigE 1000Base-SX 275/550 meters
1000Base-LX 550/5000 meters
10 Gigabit IEEE
Ethernet 802.3ae 10 Gbps 10GBase-SR 300 meters
300m MMF/
10GBase-LX4 10km SMF
10GBase-LR/ER 10km/40km
10GBase- 300m/10km/40km
SW/LW/EW
Table 4- IEEE standards Network Cable
Using this table, the consultant used a gigabit Ethernet standard for LAN technology,
which is supported by both workstations very well. Therefore, workstations are justified
by LAN technology standard.

The 7710 comes with a built-in Wi-Fi adapter compatible with the new 802.11w
technology, which is implemented here. When a workstation does not need to be
connected to a protocol, it is the most appropriate way for managers and IT staff.

With this network and interconnected devices, a workstation model chosen by the
consultant for a truly network scope. Therefore, the main recommendation of the writer to
proceed with the purchase of the workstation, the establishment and increase the
prospects of network.

To implement the solution discussed above, the organization requires specific hardware
and software solutions in the system. Some will be implemented using existing hardware
and software, while others will be purchased. Enclave film management has been
approved to make necessary purchases. The following are the articles and specifications
required for this requirement in Enclave Film.

Several types of devices will be needed for this implementation. Next, the types of
programs that the author will be willing to use are displayed. They are divided as such

 System software

o Windows Server Essentials 2012 R2 (Small Business Server)


o Windows 10 Professional
 Applications Software

o Microsoft Office 2016

 Security programs

o Symantec Endpoint Protection

2.3 Server types and justification of the selection of a server


2.3.1 Server
A server in a non-technical language is a computer system that receives or receives many
information services to ensure that computers on the network or the Internet can
communicate in turn by two or more people on different computers to communicate
effectively.

2.3.1.1 Choose Server


When choosing the best solution for Enclave Films, it is important to understand the
client / server structure proposed by the consultant in this case. Therefore, in this chapter,
the main goal of the author is to analyze the different types of servers available on the
market in a critical manner, and to provide a more complete solution to the selected
scenario.

There are several types of servers and are classified according to the type of work they
do, they are
 Web servers
 Mail servers
 Application servers
 File servers
 Proxy’s servers
 Real-time servers

The choose server has attached on the appendix section, kindly refer
appendix 2 section to find the choose server.

Enclave Films Company wants to improve the uses an email, a dedicated email server is a
good idea. And company needs to manage large amounts of shared documents/file, the
file exchange server will be the ideal choice. And also company need to domain server to
connect to domain in the network computers.

Before select the servers we should check these features have or not have in the server
what we selected.

 Match the server to your primary need


 Match Server processing speed and type of processer
 Select storage capacity on the server
 Choose ram speed and motherboard type on the server
 Buy the right operating system
 Build in expansion and redundancy
 Support and maintenance
 Choose the right cloud service providers

Going wholesale to the cloud may be a very big step at the moment, but just adding to an
existing server expansion is not an option either. Being smart about purchasing server
capacity means understanding how your company uses data primarily. When you
understand this aspect of your business, choosing the right server is a clearer and less
risky job.
2.3.2 Identify the server types suitable for Enclave Films
Asus TS500 Server

Figure 25- Asus TS500 Server (Newegg)

Power tower server with flexible swords

CPU: Intel Xeon E5-2600 v3 | Graphics: not available | RAM: as ordered Storage: no
vacancies Connectivity: 8 USB ports, VGA, PS2, 3 x Gigabit Ethernet | Dimensions
(width x depth x height): 22 × 54.5 × 45.5 cm

• Ideal for our servers and workstations

• Lack of energy and flexibility

• Not all have all the characteristics

• Asus may be surprised to see some

Like Super Micro, Asus is not known for its servers. In contrast, the Taiwanese company,
one of the largest suppliers in the world, is very popular for a wide range of consumer
products, including motherboards. The TS500-E8-PS4 is a 5U jogging tower server
ideally designed for dual use and server. It features the latest Intel® E5-2600 v3 Intel
Xeon, eight DDR4 DIMMs, six expansion slots, three 5.25-inch device slots and one
Bronze 500W 80 Plus power unit. There are four 3.5-inch SATA / SAS HDD
interchangeable ports and it can also be expanded to eight slots so that the hard drives
meet the flexible storage requirements. Server price is $280.00

In addition, with the Intel Intelligent Platform Management Interface (IPMI) 2.0
compatible with ASMB8-iKVM on the TS500, you can monitor, control and manage the
server remotely. Other key features include 10 SATA ports, one DVD player, six USB
ports, one PS2 VGA port and one of three Gigabit Ethernet ports. Note that this is an
abstract server. (Asus, n.d.)

The server that selected for this scenario is Asus TS500 Server

The reasons for select this server for Enclave Films company,

 It is relatively cheap for the server, ideal for small and medium-sized companies
such as Enclave Films
 It has an easy installation and requires minimal storage. And also an easy access
to the panel, which is fundamental for the resolution of computer problems
 NOS is not yet installed, as the network consultant plans to use W2k12 SMB,
enough hardware requirements will suffice to satisfy the current server
requirements in Enclave Film.
 There is always room for expansion. In the near future, storage and NOS can be
updated.
 The brand also operates in a biosphere, where the provider is listed as DELL,
which has more experience in serving the servers.
 With these features at hand, it is a strong belief that this server will be more
suitable for the network and server requirements in Enclave Film.

3 Task-03
3.1 Design Step-by-step plan and Network and blueprint
3.1.1 Design of Local Area Network and blueprint
3.1.1.1 Step-by-step plan
With these requirements at hand, it is now imperative to design and implement the
solution for the Enclave Films.

As per the task which was apprehended by the client, the requirements of Enclave Films
is as follows

1. All departments’ and employees’ computers of the organization to be integrated


in to a centralized network. Named as “enclavefilms.com” (Across both floors).
2. All four department should be separated into four separate network segment
which will reduce the broadcast domain
3. Every user including department head and all other employees should be given
with a separate login with suitable privileges.
4. Both floors to be equipped with Wi-Fi connections which are limited only to their
respective sites.
5. The company wants to share some common types of files with all employees.
Therefore there is a need for a FTP server (located in the server room) to share
these files

To apprehend these requirements, the consultant will be initiating following procedures

 A domain server will be planted and the network will design as in the
client/server architecture, providing significant user privileges to certain users of
the domain, such as administrators, managers and executives of Enclave Film.
 A FTP Server, DHCP server and a Backup Server and Mail Server will be assigned
to fulfill the generic requirements of the Enclave Film.
 Wireless Access Point will be established in both the floors.
 A Server-based Anti-virus solution will be provided for all the users for security
and integrity reasons of the network
 The networking system will be implemented using the hieratical network design,
and abide its standards and procedures.
 All the departments will be segmented to VLANs of each respective paradigm,
and will be assign certain.
 The network will be taking classless subnet ip addresses range, the network will
be 192.168.1.0/27, 10.1.1.0/26 where the subnet mask will be 255.255.255.224,
255.255.255.192 and the wildcard mask will be 0.0.0.31
 Dynamic IP Addresses will be assigned to each required user pool, using the
router DHCP Pool Service
 A Software firewall will be implemented to limit both the internal and the
external threats
 Physical Access to the server room will be prohibited unless authenticated
 The LAN will abide the IEEE Standards of 802. Local area networking
technologies, and also will abide the protocols and rules of OSI reference
modeling standards, as well as the TCP/ IP Standard protocols.
Below, fill find the network design for the Enclave Film (PVT) Ltd. As well as followed
by the packet tracer implementation of the network. For more insightful details about the
packet tracer implementation, Please refer to the Attached of Blue Print for the respected
packet tracer file.
3.1.1.2 Blue Print Network Design

Figure 26- Blue Print Network Design


3.1.2 Security requirements and quality of services of Accessories

The Cisco 1841 router provides improved standard capabilities while protecting customer
investments. The typical architecture is designed to provide the highest data transfer rate
and performance required to support simultaneous and secure applications. Most current
WIC cards, multiple floppy cards (data only), and advanced integration units (AIM) are
compatible with Cisco 1841

The Cisco 1800 series includes accelerated hardware encryption built into the
motherboard that can be enabled with an optional Cisco IOS security image. Hardware-
based encryption acceleration downloads encryption to provide improved performance
for IPSec 3DES and AES. With optional VPN integration, NAC Anti-Virus, Cisco IOS-
based firewall and IPS support, Cisco offers a robust, scalable and robust security
solution for small and medium-sized businesses and small businesses.

As companies increase their security requirements and integrated service needs, more
intelligent office solutions are required. The best-in-class Cisco 1800 Series architecture
is designed to meet these requirements for secure concurrent services at cable speed
performance. The Cisco 1841 router provides the opportunity to integrate the functions of
separate devices into a single, small, manageable solution remotely. By providing
integrated services, as well as high standard density and high performance, the Cisco
1841 delivers security, versatility, scalability and flexibility for multiple SME and SMB
applications and a premium customer service provider. The Cisco 1841 router easily
accommodates a wide range of network applications, such as secure access to branch
data, including NAC for virus protection, VPN, firewall protection, enterprise-class DSL,
IPS support, VLAN routing and serial device focus . The Cisco 1841 router provides
customers with the industry's most flexible, secure and adaptable infrastructure to meet
business requirements today and tomorrow for maximum protection. (Cisco, 2014)
3.2 Design and Calculate Ip address
3.2.1 Cisco Packet Tracer Design
3.2.2 Ip Addressing and Subnet Calculate

Network Starting IP Ending IP Subnet Mask Network Id


General
10.1.1.1 10.1.1.62 255.255.255.192 10.1.1.0
Vlan
Production
192.168.1.1 192.168.1.30 255.255.255.224 192.168.1.0
Vlan
Reception
10.1.1.2 10.1.1.10 255.255.255.192 10.1.1.0
Area
Account Dep
101.1.11 10.1.1.20 255.255.255.192 10.1.1.0

Sales Dep
10.1.1.21 10.1.1.30 255.255.255.192 10.1.1.0

Management
10.1.1.31 10.1.1.40 255.255.255.192 10.1.1.0
Dep
Administration
10.1.1.41 10.1.1.50 255.255.255.192 10.1.1.0
Dip
Reception
10.1.1.60 10.1.1.100 255.255.255.192 10.1.1.0
Area
Media
Development 192.168.1.2 192.168.1.15 255.255.255.224 192.168.1.0

Dip
Workstation
192.168.1.16 192.168.1.25 255.255.255.224 192.168.1.0
Dip
It / Server Dip
192.168.1.26 192.168.1.30 255.255.255.224 192.168.1.0

Table 5- IP Table
3.3 Install and configure network services and applications
3.3.1 Install and configuration Domain Server.

Figure 28- Install and configuration Domain Server.

Figure 29- Install and configuration Domain Server.

Figure
Figure30-
31-Install
Installand
andconfiguration
configurationDomain
DomainServer.
Server.
Figure 33- Install and configuration Domain Server.

Figure 32- Install and configuration Domain Server.

35- Install and configuration Domain Server.


Figure 34-
Figure 37- Install and configuration Domain Server.

Figure 36- Install and configuration Domain Server.


Figure 39- Install and configuration Domain Server.

Figure 38- Install and configuration Domain Server.

Figure
Figure40-Install andand
41 - Install configuration Domain
configuration Server.
Domain Server.
Figure 42- Install and configuration Domain Server.

3.3.2 Install Application Software

Figure
Figure45-
43-Install
InstallApplication
ApplicationSoftware
Software
Figure 47- Install Application Software

Figure
Figure 44- Install Application 46- Install Application Software
Software
3.4 Analyses user feedback.
With the user analysis, the conclusions which has being made are being published using
the pie chart for the report. The designer software which the writer has being used is
Microsoft Visio. And the data is collected to create these pie charts are being stated with
the user feedback forms.

3.4.1 Speed of the Network for local resources (File Sharing, printer)

Figure 48- Speed of the Network for local resources (File


Sharing, printer)

3.4.2 Internet Access Speed

Figure 49- Internet Access Speed


3.4.3 Security condition

Figure 50- Security condition

3.4.4 Performance of the network

Figure 51- Performance of the network


3.4.5 User friendliness of the network

Figure 52- User friendliness of the network

According to the comments, 85% of the comments were positive. Most customers are
satisfied with the network solutions and systems provided by the consultant. Some
problems with network integrity, as well as lack of another server operating system to
authorize work

Based on these analyzes, the author requested that another server be installed for backup
and other mandated services in Enclave. . Since all other sections, except the leasing
section, requested another server to reduce traffic by the end of the month to delete
records. As a network administrator, the author plans to deploy other servers on the
company's network. This should be done as a future planning of the infrastructure with
the network. Therefore, the installed and available server installation process is highly
considered with Enclave Film Management.

3.5 Network maintenance


To better meet our customers' needs, we have developed a quarterly maintenance plan
covering many of the most common support cases we deal with. We will analyze the
performance of the network, servers and workstations and will provide you with details of
the problems and problems we may face.

These preventive maintenance tasks are performed in:

 Server and storage infrastructure


 Desktop Infrastructure
 Network equipment
 Backup and security systems

Each maintenance task can be performed at a standard frequency or on a specific basis for
your environment. These tasks include:

 Review the registry file and corrective action


 Test the vulnerability
 Manage anti-virus and anti-spam
 Review the active directory account
 File and manage data files
 Check routine backup and restore test
 Threshold direction and management - CPU (RAM), RAM (RAM), disk, network
bandwidth
 Interoperability of applications and alerts
 Asset management functions
 Custom maintenance tasks are developed to meet unique requirements.

Keep in mind that many maintenance tasks are performed in Real Time. We use our IT
management and control systems to automatically generate alerts based on predefined
thresholds or known error situations that are then run by the network maintenance when
they occur.

3.5.1 Maintenance Schedule

ENCLAVE FILM COMPANY NETWORK

Services Affected Occurrence Start Duration Impact to Business


Backup Schedules

Active Directory Nightly 12:00am 3 hours No Impact to Business

Email Server Weekly 2:00am 30 minutes No Impact to Business

Database Server Nightly 12:00am 3 hours No Impact to Business

File Server Nightly 2:00am 4 hours No Impact to Business

Log Server Review

Server Access
Monthly 9:00am 1 hours No Impact to Business
Logs
Data Base
Monthly 10:00am 1 hours No Impact to Business
Transaction Logs

Firewall Logs Monthly 11.00am 1 hours No Impact to Business

Update/Testing

All Windows servers


will need to be
restarted after update.

Windows Server This means servers


Weekly 10.00PM 3 hours
Updates will be down
throughout the night
for 5-10 minutes

All Windows desktop


clients will need to be
restarted after update.
Windows Desktop
Weekly 11.00PM 1 hour This means client
clients Updates
computers be down
throughout the night
for 5-10 minutes
IP addresses will not
DNS Server be mapped while the
Monthly 1:00AM 30 minutes
Updates DNS server is being
updated.
Virus Protection Nightly 1:00AM 1 hour Individual desktops
may run slower while
Software Updates virus update are being
performed on it.

Deployment Schedules

Hardware upgrades
will take the system
being updated down
Scheduled/ Schedule
Hardware for the time of the
On d/On Unknown
Deployments upgrade. All Hardware
Demand Demand
upgrades will occur
during the affected
systems down time.
Some server roles need
Scheduled/ Schedule
to restart sever. It
server roles On d/On Unknown
means server will
Demand Demand
down for 5-10 minutes
Table 6- Maintenance Schedule

4 Task-04
4.1 Implement a networked system based design

Figure 53 - Implement a networked system based design


4.1.1 Configuration of Router

Figure 54- Configuration of Router


4.1.2 Configuration Switch of Media Development Dip

Figure 55- Configuration Switch of Media Development Dip

Figure 56- Configuration Switch of Workstation Dip


4.1.3 Configuration Switch of Workstation Dip

4.1.4 Configuration Switch of First Floor

Figure 57- Configuration Switch of First Floor


4.1.5 Configuration Switch of Ground Floor

Figure 58- Configuration Switch of Ground Floor

4.1.6 Configuration Ip Address for Pc’s

Figure 2- Configuration
Figure Ip Address
59- Configuration for Pc’s for Pc’s
Ip Address

Figure 61- Configuration Ip Address for Pc’s


Figure 62- Configuration Ip Address for Pc’s

4.1.7 Configuration DHCP server

Figure 63- Configuration DHCP server

Figure 64- Configuration DHCP server


4.1.8 Configuration Access Point

Figure 66- Configuration Access Point

Figure 65- Configuration Access Point


4.1.9 Configuration Customer Area Router

Figure 67- Configuration Customer Area Router


4.2 Conduct verification with. Ping, extended ping, trace route, telnet, SSH
4.2.1 Record the test results and analyze

ID Test Case Test Data Step to Perform Expected Actual


Output
Output

1 Ping Customer area to 10.1.1.60 Success fully 100% Ping


ping
Router to ping

10.1.1.1

2 Ping Workstation Dip 192.168.1.10 Success fully 100% Ping


to ping
to ping
Router
192.168.1.1

3 Ping Same Vlan PC 10.1.1.4 Success fully 100% Ping


ping
to ping

10.1.1.42

4 Ping Same Vlan PC 192.168.1.3 Success fully 100% Ping


ping
to ping

192.168.1.25

5 Ping Different Vlan 10.1.1.31 Success fully 100% Ping


PC ping
to ping

192.168.1.11

Table 7-Record the test results and analyze


Test Case Id 1
Figure 68- Test Case Id 1

Test Case Id 2

Figure 69- Test Case Id 2

Test Case Id 3
Figure 70- Test Case Id 3

Test Case Id 4

Figure 71- Test Case Id 4


Test Case Id 5

Figure 72- Test Case Id 5

4.3 Addition of communication devices and network growth

 With the proposed optimization system for Enclave Film, it is necessary to update
the network reliability, sustainability, availability and scalability of the proposed
system.
 To improve network quality, the author requests potential expenditures for this
network after one year of implementation.
 With the current network sufficient with the network and management range,
with the proposed extensions must meet these most basic prerequisites.
 The current network cables are CAT6 Ethernet cable, which will not be sufficient
for future network. Therefore, the author strongly points to the transition to fiber
optic cables, which will support the large bandwidth size
4.4 Evaluate work and justify valid conclusions

This task has been subject to considerable research, fact-finding and comparisons. By
nature, we had to design and implement laws to protect networks, standards and data,
while this must also be possible for global standards. I must thank the E-soft task team for
delivering such a difficult but interesting task.

When I planned the structural design of this task, I had difficulty dealing with the tasks
individually, as they were tangled and strange. But I discovered that the error was in me,
because I took the entire task as one, when I had to do the opposite. Luckily, my subject
teacher explained to me during the feedback session, then I thought about the idea of each
task approach separately, and everything went smoothly. I tried to use as simple terms as
possible and reduced the use of abbreviations in reports unless they were mandatory.

I feel it would be better if I had used less time to create and develop the network, because
they themselves are an independent field of expertise. The effects and social documents
are correct to the point of knowledge and knowledge, but I believe that the actual design
of the network would be wiser, if I cited it from my environment, rather than referring to
it from research and meditation on the Internet. Special. Security effects were modified in
the context of customization, and the network design was adapted from case studies that
declared similar requirements. Documenting the task took longer than expected by the
author. Some tasks are intertwined so that the writer must follow different writing and
documentation methods. The main problem faced by the writer is time management for
designing, implementing and documenting the network. Apart from that, he insisted that I
had produced a true and well-established project
5 Gantt chart
February 2018 March 2018 April 2018

1st 2nd 3rd 4th 2nd 3rd 4th 4th 1st 2nd 3rd 4th

Task 01

Task 02

Task 03

Task 04
6 References
Asus, n.d. Asus. [Online]
Available at: https://www.asus.com/Commercial-Servers-Workstations/TS500E8PS4/
[Accessed 25 March 2018].

Cisco Netacad, n.d. IT Essentials. [Online]


Available at: http://static-course-
assets.s3.amazonaws.com/ITE50ENU/module6/index.html#6.2.1.1
[Accessed 28 Feb 2018].

Cisco Netacad, n.d. IT Essentials. [Online]


Available at: http://static-course-
assets.s3.amazonaws.com/ITE50ENU/module6/index.html#6.2.1.1
[Accessed 2 March 2018].

Cisco Netacad, n.d. IT Essentials. [Online]


Available at: http://static-course-
assets.s3.amazonaws.com/ITE50ENU/module6/index.html#6.2.1.1
[Accessed 03 March 2018].

Cisco Netacad, n.d. IT Essentials. [Online]


Available at: http://static-course-
assets.s3.amazonaws.com/ITE50ENU/module6/index.html#6.2.1.1
[Accessed 06 March 2018].

Cisco Netacad, n.d. IT Essentials. [Online]


Available at: http://static-course-
assets.s3.amazonaws.com/ITE50ENU/module6/index.html#6.2.1.1
[Accessed 10 March 2018].

Cisco, 2014. Cisco. [Online]


Available at: https://www.cisco.com/c/en/us/products/collateral/routers/1801-integrated-
services-router-isr/product_data_sheet0900aecd8028a95f.html
[Accessed 4 April 2018].

Cisco, 2017. Cisco 1800 Series Integrated Services Routers. [Online]


Available at: https://www.cisco.com/c/en/us/products/collateral/routers/1800-series-
integrated-services-routers-isr/product_data_sheet0900aecd8016a59b.html
[Accessed 20 March 2017].
Harwood, M., n.d. CompTIA Network+ Cert Guide: Wireless Networking | Foundation
Topics | Pearson IT Certification. [Online]
Available at: http://www.pearsonitcertification.com/articles/article.aspx?p=1617557
[Accessed 12 March 2018].

KelsusIT, 2017. computer – Page 3 – KelsusIT.com – Refurbished laptops, desktop


computers , servers. [Online]
Available at: https://kelsusit.wordpress.com/tag/computer/page/3/
[Accessed 18 March 2018].

Ragan, J., 2017. SysLink Comm Protocol. [Online]


Available at: http://www.jragan.com/syslink.htm
[Accessed 05 March 2018].

Whetstone, N., 2011. Computer-based Audio using streaming devices, and USB DAC's.
[Online]
Available at: http://www.decdun.me.uk/computeraudio.html
[Accessed 15 March 2018].

7 Annexures
7.1 Appendix 1
Cisco 1841-K9 Router
The router is responsible for connecting two different logical and logical networks. The
routers are connected to a chain in a WAN or a local area network (LAN) called a jump in
the chain. The work of the router is very simple since the router of a LAN or WAN finds
the IP address of the next hop (the next router) and the data is sent to and so on. D-Link,
TP-Link, Link-Sys, Cisco and Aztec are some of the best-known router manufacturers.
Routers are two main types of DSL routers and Wi-Fi routers. Almost all users, banks,
institutions, universities and end users use routers to connect to the Internet or to
interconnect their virtual private networks through the Internet.

For this solution, there are many advantages that the writer took into account with the
Cisco router that he chose in other brands and products. In the following table, the
features are listed through the benefits of this router.

Advantage

 High performance processor


 Supports the concurrent implementation of secure, high-performance data
services with an increase for future applications
 Standard architecture
 Offers a wide range of LAN and WAN options: network interfaces are updatable
to accommodate future technologies

 Supports more than 30 modules and interface cards, including WAN (WIC) and
Multiflex (VWIC) network cards (to support data only on the Cisco 1841 router)
and Advanced Integration Units (AMS)
 Accelerate encryption of embedded devices
 Provides a cryptographic accelerator as a standard built-in device that can be
enabled with optional Cisco IOS software for 3DES and AES.
 Offers a range of enhanced security performance features with optional 3DES
VPN acceleration card or AES encryption
 A wide virtual memory
 Provides 64 MB of Flash and 256 MB of synchronous dynamic memory (SDRAM)
to support the simultaneous deployment of services
 Ethernet ports dual Ethernet high speed and dual Ethernet
 Helps enable connection speeds of up to 100BASE-T Ethernet without the need
for cards and modules
 Allows LAN fragmentation
 Cisco IOS 12.3T, 12.4, 12.4T and later feature sets • Supports Cisco 1841 router
starting with Cisco IOS Software 12.3T
 Helps enable integrated solutions while supporting the latest service quality
based on Cisco IOS software, bandwidth management and security features
 Integrated standard power supply
 provides easy installation and administration of the management platform

24 port Cisco 2950 switch

The work of the network hub is very different from the switch. The advance in the
switches is that they have a switching table in them that makes the network safer and
faster. The difference is between the technology and the technique through which the data
is sent. The adapter has the ability to store the MAC address of the computers so that the
data is sent to the desired point only instead of being sent to each point. (Cisco, 2017)

Cyberoam UTM FIREWALL

Cyberoam Firewall is available as a firewall and UTM firewall. It provides a deep and in-
depth examination of network packages, applications and user security. Cyberoam
Firewall protects organizations from DoS, DDoS and Spoofing IP attacks.

The personal security system Cyberoam Level 8 allows employee-based policies and an
interface to create policies in all functions, providing ease of administration and high
security with flexibility

Network interface control

A piece of computer that allows the connected computer to connect to the network.

Wireless network interface control


A piece of computer allows the connected computer to connect through the LAN.

CONNECTOR RJ 45

RJ45 is a standard type of connector for network cables. Generally, you see RJ45
connectors with cables and Ethernet networks. The RJ45 connectors have eight pins
connected by the two cables to an electrolytic cable surface. The regular RJ-45 pins
define the order of the individual cables required when connecting the connectors to the

cable.

Several other types of connectors are very similar to the RJ45 and can be easily mixed
together. The RJ-11 connectors used with telephone cables, for example, are slightly
smaller (than the RJ-45 connectors). A shortcut for the Jack-45 recorder, an eight-wire
connector commonly used to connect computers to local area networks (LANs),
especially Ethernets. The RJ-45 connectors are similar to the RJ-11 connectors used
everywhere to connect telephone devices, but they are somewhat wider.

Unshielded Twisted Pair (UTP) - for the Upper Floors


UTP is more common. The degree of sound or degree of data may be the case. The UTP
cable generally has an impedance of 100 ohms. The cost of UTP is lower than the STP
and is easily available due to its intensive use. There are five levels of data cables.

 Category 1
o These are used in telephone lines and a low speed data cable.
 Category 2
o These cables can support up to 4 megabits per second.
 Category 3
o This cable supports up to 16 megabytes per second and is used mainly at
10 Mbps.
 Category 4
o These are used for long distance and high speed. It can withstand 20mps.
 Category 5
o This is the highest rating for the UTP cable and can support up to 100
Mbps.

UTP cables consist of 2 or 4 pairs of twisted cables. 2-pair cable Use the RJ-11 connector
and the 4-pair cable Use the RJ-45 connector

Shielded Twisted Pair (STP) - for Enclave Film ground floor


The STP is heavier and more difficult to manufacture, but it can significantly improve the
signal speed in a given transmission scheme. Torque provides cancellation fields with
currents and currents induced magnetically in a pair of conductors. Magnetic fields are
created around heavy current conductors and around large electric motors. Several grades
of copper cables are available, with the fifth grade being the best and the most expensive.
Copper Class 5, suitable for use in 100 Mbps applications, has more fluctuations per inch
than lower notes. It means more linear perpendicular inches than the copper cable used to
operate the cable, and more copper means more money. The shield provides a means to
revert or absorb electrical fields around the cables. The shield comes in a variety of forms
from brass braid or copper meshes to aluminum. Wrap the Mylar tape around each
connector and again around the twisted pair. BM has established a class for the STP cable.

With these big differences, it is necessary to understand the data transmission rate through
this type of cables, in order to make a careful evaluation of Enclave Film

With this analysis, the author decided to use the Cat6 cable system for Enclave Films.

Wi-Fi access point devices


For the solution in the film enclave, writer wireless access point of Linksys chose. The
access points are small physical devices very similar to domestic broadband routers. The
wireless routers used in home networks include built-in access points of the device, and
can work with AP independent units. Many providers of Wi-Fi products also produce
access points. AP devices consist of wireless transceivers, antennas and firmware.

Wi-Fi is usually one or more of the wireless access points of contact points are distributed
to support Wi-Fi coverage area of your own. Business networks also install APs typically
in all their office areas. While most households require a router a wireless device (AP) to
cover the real area, many of which businesses can use. It may be to determine the ideal
locations for a place to install a set of difficult task access points even for network
professionals due to the need to cover reliable signal distances.

Dell Precision Tower 7910


CPU: Intel Xeon E5-2623 v3 | Graphics: NVIDIA NVS 310 RAM: 8GB Storage: 500GB
HDD Communications: Gigabit Ethernet Dimensions (width x depth x height): 44 x 22 x
55 cm

Much wider selection of components

The update capabilities are impressive

Previous processor and memory type provided by default

Does not deserve expenses if you do not plan to update

The Precision Group is one of the oldest working class families on this tour, dating back
to the late 1990s. Since then, much has changed with a large amount of computing,
storage and memory capacity. Precision 7910 is the most powerful and scalable
workstation of the company, which allows to use dual Xeon CPUs, up to four graphics
cards and even liquid cooling to keep things going.

Dell is one of the few companies that combines its endpoint security solutions that
combine protection against malware, authentication and encryption. It is also one of the
few providers that sends legacy technology (PCI, Serial, PS2) by default. Do not be
fooled by the basic price (around £ 2,000). Once fully charged, the price is expected to
increase twenty times.

7.2 Appendix 2

Proxy Server

In general, these servers are located between a Web browser and a server that is usually
outside the Internet room, where it is filtered and helps meet initiator requests or queries,
as well as connections to share. It acts as a gateway by receiving and retransmitting
requests from the other simplification server so that the other server works in the shortest
possible time, improving server performance.

Web servers

A web server is a server that allows all website data to be received by the browser. This is
done by connecting to a disk that contains specific data that the client is looking for; this
information cannot be obtained from a disk to a Web page without this type of server.
This transfer is possible thanks to the use of programs called protocols; in this case, the
protocol responsible for the Hypertext Transfer Protocol.
Servers in real time

These servers are servers that make chat possible; allow to relay information at the touch
of a button. They are also responsible for services such as instant messaging and have the
ability to carry many of these messages or chats at the same time and deliver them on
time, instantly. These servers are constantly running and used in many mobile
applications, computer programs and the Internet.

File Transfer Server

FTP may be the oldest in the world of Internet Protocol (IP). It is the protocol that allows
the safe transfer of files over the Internet in the form of a Web page to another, from e-
mail to e-mail and the like. This type of protocol is what led to the design and coding
protocols, such as HTTP and languages such as HTML and XHTML.

Open Source Servers

Open source servers take the liberty of all other open source software and form an
essential part of data exchange across the entire IT infrastructure, but are mostly open
source operating systems such as Apache and Linux.

Servers in the cloud

These servers are the latest in the market and have the ability to perform many tasks,
including monitoring other servers and storing data. They are hypothetical, and therefore
they work on the web and help maintain the integrity of online data for most websites
now because they save space and money.

With this type of server, there are many server operating systems on the market, which are

Mac OS Servers

Solaris servers

Linux servers

Windows Servers

Free Bsd servers

With regard to customer requirements, however, the consultant has chosen


Grading Rubric

Grading Criteria Achieved Feedback

LO1 : Examine networking principles and their protocols.

P1 1-4 benefits and constraints of different network


Discuss the benefits and constraints of different network types types and standards discussed
and standards.

65
P2 5-8 The impact of topologies, and the bandwidth and

Explain the impact of network topology, communication and communication requirements identified

bandwidth requirements.

M1 9,12-13 Comparison of networking principals,protocols,their

Compare common networking principles and how protocols 9-10 effectiveness on the network discussed

enable the effectiveness of networked systems.

LO2 : Explain networking devices and operations

66
P3 14-19 Networking devices and server types discussed

Discuss the operating principles of networking devices and 21-23 clearly.

server types.

P4 19 Interdependence of workstation hardware with

Discuss the inter-dependence of workstation hardware with networking software discussed.

relevant networking software.

67
M2 21-23 A suitable server range with regard to the

Explore a range of server types and justify the selection of a requirements of the system is identified

server, considering a given scenario regarding cost and


performance optimization.

LO 1 & LO2

D1 5-8 A suitable topology for the system is identified

Considering a given scenario, identify the topology protocol 25-28 through an evaluation

selected for the efficient utilization of a networking system.

68
LO3 : Design efficient networked systems

P5 25-28 A network system to meet identified specification is


29-30 given

Design a networked system to meet a given specification.

P6 41-43 A detailed system testing done and the user feedback


55 taken is analysed

Test and evaluate the design to meet the requirements and

69
analyze user feedback.

M3 30-38 network services and applications Installed and


Install and configure network services and applications on your configured according to requirements
choice.

D2 44-45 A maintenance schedule designed applicable to the


designed system and its requirements

Design a maintenance schedule to support the networked


system.

70
LO4 : Implement and diagnose networked systems

P7 47-54 Packet tracer implementation of the designed system

Implement a networked system based on a prepared design.

P8 55 Test results analysed and presented clearly in the


report

Document and analyze test results against expected results.

71
M4 58 Enhancements recommended for the system
designed

Recommend potential enhancements for the networked


systems.

D3 58-59
A good reasonable critical evaluation done

Use critical reflection to evaluate own work and justify valid


conclusions.

72
73

You might also like