You are on page 1of 37

NETWORKING

PROGRAM TITLE: NETWORK INFORMATION


UNIT TITLE: NETWORKING

ASSIGNMENT NUMBER: 2
ASSIGNMENT NAME: Network Design and Implement

SUBMISSION DATE:
DATE RECEIVED:

TUTORIAL LECTURER: TRAN HOANG BACH


WORD COUNT: 3211

STUDENT NAME: NGO VAN HUY

STUDENT ID: BKD18400


MOBILE NUMBER: 0383930441

ASSIGNMENT 1
NETWORKING

Summative Feedback:

Internal verification:

ASSIGNMENT 2
NETWORKING

Contents

A. Introduction....................................................................................................................................4
B. Content...........................................................................................................................................4
I. Identify the topology protocol selected for the efficient utilization of a networking system (D1)
4
II. Written step by step plan on how you are going to design a Local Area Network(P5)................5
III. Install and configure network services and applications (M3)................................................9
IV. Implement a networked system based on your prepared design(P7)...................................15
V. Design a maintenance schedule to support the networked system(D2)...................................31
VI. Recommend potential enhancements for the networked systems (M4)..............................33
VII. Discuss significance upgrades and security requirements in your network design(D3)........34
VIII. References............................................................................................................................35

ASSIGNMENT 3
NETWORKING

A. Introduction
After more than 25 years of establishment and continuous development, the Internet has
outstanding features that no one can deny, from the ability to connect strongly to abundant
information sources as well as a matter of time. and information processing speed. But in
parallel with those advantages, the Internet has contained in it immeasurable dangers.

Therefore, as a person in the network training industry, consulting and designing network
systems for partners. We want to build a completely new, effective and secure network
based on partner requests.

We believe that, with this project, we can help your company manage, use and secure
information well so that the company makes good use of technology and is suitable for the
financial resources of a medium company. and small is on the rise.

B. Content
I. Identify the topology protocol selected for the efficient
utilization of a networking system (D1)
A protocol is a set of rules and procedures for communicating data. Rules are defined for
each step and process during communication between two or more computers. Networks
have to follow these rules to successfully transmit data.
The Ethernet is a local area network (LAN) set of protocols which serves the physical and
data link layers. Ethernet utilizes a linear bus or star topology. Ethernet served as the basis
for the IEEE 802.3 standard.
The Ethernet deals with the low level Physical and Data Link Layers.
The Data Link Layer is divided into two sublayers:
Logical Link Control (LLC). This sublayer establishes the transmission paths between
computers or devices on a network.
Media Access Control (MAC). On a network, the network interface card (NIC) has a unique
hardware address which identifies a computer or peripheral device. The hardware address is
used for the MAC sublayer addressing. Ethernet uses the MAC hardware addresses for the
source and destination for each packet transmitted.

ASSIGNMENT 4
NETWORKING

Ethernet uses CSMA/CD when transmitting packets. The Carrier Sense Multiple Access with
Collision Detection (CSMA/CD) is an algorithm, for transmitting and receiving packets over a
common network hardware medium, by aiding in avoiding transmission collisions. The
network is checked for other transmissions, when the way is clear, the computer
transmissions can begin. If a collision is detected the packet is retransmitted later.
The topology that I will use in the scenario will be bus topology.

II. Written step by step plan on how you are going to design a
Local Area Network(P5)
LAN-
LAN stands for “Local Area Network” Designing a Local Area Network also known as a LAN is
a complex process with a variety of factors to consider. A well-designed LAN will provide
consistent, high quality service to every device attached to the network, no matter its size.
Likewise, the network must be able to provide continuous access to functions such as
printing and file sharing. To make sure the network is fast, efficient and secure, all these
aspects should be planned in advance.

A Local Area Network provides connectivity to a relatively small group of users in a single
building, office or campus. It also typically connects to the global Internet through a gateway
server, which acts as the main defence against unauthorized access to network resources.
With all this in mind, the main consideration in the early stages of LAN planning is what size
it will be and what services it will provide. While a LAN featuring ten nodes can be set up in
as little as one day, a larger network is a bigger undertaking.

Justification of the topology the topology that is used for the network is bus topology.
It is easy to connect a device to the network.

If the computer or peripheral has the appropriate connection device, then it can be easily
added to the network. The new device connects to the linear bus topology and becomes part
of the network immediately. For those who need a temporary network that can be setup
quickly, there isn’t a better option that is available right now. If several users need mutual
access to a printer, adding the printer to the network meets that need immediately.
The failure of one station does not affect the rest of the network.

If one computer or peripheral should fail when using bus topology, the rest of the network is
not affected by this change in performance. The linear nature of the network means that
each unit transmits to the backbone and that data is then available to the other units that

ASSIGNMENT 5
NETWORKING

remain connected. This makes it an effective way to share uninterrupted communication.


Extensions can be made to the network.

The size and scope of bus topology is naturally incomplete. It can, however, be extended
quite easily. Joining cable with a repeater or connector allows for additional peripherals or
computers to be added to the network. Although this can increase the number of packet
collisions that may occur, it is a simplified solution that can get people up and working
quickly and for a minimal overall cost.
Multiple peripherals can be supported through bus topology.

Routers, printers, and other data devices can be connected to this network in addition to
computers or terminals. This can increase the speed of productivity because instead of
sending commands to a centralized network, a command can be sent directly to the needed
peripheral. Since it’s a for a college multiple peripheral devices will be used therefore bus
topology would work best.

Blueprint of the network system

ASSIGNMENT 6
NETWORKING

Logical design of the network

Justification of devices used for the network


1. PC
This a machine or device that does processes, calculations and operations based on
instructions provided by a software or hardware program. It is intended to perform
applications and provides a variety of solutions by combining integrated hardware and
software components.

ASSIGNMENT 7
NETWORKING

2. Router
This a device that examines the contents of data packets transmitted within a network or to
another network. Routers control whether the source and destination are on the same
network or whether data must be transferred from one network type to another, which
requires summarizing the data packet with routing protocol header information for the new
network type.

3. Cloud
This is a type service where cloud computing resources and substructure are used to return
and manage data and services which is done over the internet.

4. Server
A server is a computer, a device or a program that is dedicated to managing network
resources. Servers are often referred to as dedicated because they carry out hardly any other
tasks apart from their server tasks.

5. Switch
In the context of networking a switch is a highspeed device that receives incoming data
packets and redirects them to their destination on a local area network (LAN).

6. iPhone
An IP telephone system uses packet switched Voice over IP (VoIP), or Internet telephony, to
transmit telephone calls over the Internet as opposed to the circuit switched telephony used
by the traditional Public Switched Telephone Network (PSTN).

7. Firewall
A firewall is a network security device that monitors incoming and outgoing network traffic
and decides whether to allow or block specific traffic based on a defined set of security rules.

8. Printer
A printer is an external hardware output device that takes the electronic data stored on a
computer or other device and generates a hard copy of it Internal connections.
The devices used in the network use dissimilar types of connection from the wired to the
wireless which include the following cables: Fiber optic cable.
An optical fiber cable is a type of cable that has a number of optical fibers bundled together,
which are usually covered in their individual protective plastic covers. Optical cables are used
to transfer digital data signals in the form of light up to distances of hundreds of miles with
higher throughput rates than those achievable via electrical communication cables.

ASSIGNMENT 8
NETWORKING

Coaxial cable
A coaxial cable is a type of shielded and insulated copper cable that is used in computer
networks and to deliver cable TV services to end users.

External connections
The external connections are completed wirelessly using the wireless LANs which has high
frequency radio signals, infrared light beams to communicate between the workstations,
servers and hubs where the workstation the data is been sent has a transceiver to send and
receive the data and they are great for the smart devices mostly from the phones and
laptops.

III. Install and configure network services and applications (M3)


Ping

The above result shows that the packets sent are 4 and the received packets are 4 so it
means that ping is working correctly.

ASSIGNMENT 9
NETWORKING

IP COFING

The above result shows the default gateway address and the IP address for the specific

computer.

ASSIGNMENT 10
NETWORKING

IP CONFIG/ALL

The above result shows the IP address the subnet mask the default gateway the DNS serves
and the DHCP server.

ASSIGNMENT 11
NETWORKING

Tracert

The above result shows the tracing route from one IP to another DHP server

The above snippet shows the DCHP server working and giving a PC an IP address.

ASSIGNMENT 12
NETWORKING

DNS Server

The name of the DNS server is (mail.bkacad.com)


The address is 192.168.9.21

ASSIGNMENT 13
NETWORKING

The Web Server

TheiwebiserveriisiworkingiandiitsiusingitheiIPiaddressi192.168.9.7

ASSIGNMENT 14
NETWORKING

Email

ASSIGNMENT 15
NETWORKING

IV. Implement a networked system based on your prepared


design(P7)
Group work
Network design

a) Installing window server 2003


Step 1: Click new workstation

Step 2: Select typical and then click next

ASSIGNMENT 16
NETWORKING

Step 3: Click disk image file then click browse and select window 2003 then click next

Step 4: Enter the product key and type name

ASSIGNMENT 17
NETWORKING

Stepi5: Then click next

Click finish

ASSIGNMENT 18
NETWORKING

ASSIGNMENT 19
NETWORKING

b) Set the time zone


Click start button and go to control panel and the select time and date properties. As it show

below set Time zone there.

c) Configuring network adapter: Click start and go to the control panel


Then go to network connections then Local Area connection and Go to the properties

ASSIGNMENT 20
NETWORKING

Click Internet protocol TCP/IP then click on properties again

Enter IP address

ASSIGNMENT 21
NETWORKING

d) Installing active directory


Click start button and then click run then enter dcpromo

Click next

Create the domain


Enter domain and clink next

ASSIGNMENT 22
NETWORKING

As it show below the screenshot that active directory is installed

ASSIGNMENT 23
NETWORKING

e) Installing DNS server


Click added or remove role then Click DNS server then next and after that enter Zone name
Kenya

i
As it show below DNS was installed successfully

ASSIGNMENT 24
NETWORKING

f) Installing DHCP server


Click Added or remove and select DHCP server then click next

Then enter scope bkacad and click next

ASSIGNMENT 25
NETWORKING

Enter IP address and End IP address and then click next

ASSIGNMENT 26
NETWORKING

As it show below DHCP is installed

g) Adding file server


Click add or remove role then select file server and then click next

ASSIGNMENT 27
NETWORKING

Click next

Type the path to folder you want share or click browser to pick the folder and
Clickiwindowitheninewifolderiknowniiticommonipoolitheniokayitheniclickinext

ASSIGNMENT 28
NETWORKING

At it show below file server installed

h) Adding groups in active Directory


This will allow the Bkacad to manage their students
In order to add groups in AD step one click Manage user and computer click and Then
Active.lan then click user the right click on user

ASSIGNMENT 29
NETWORKING

Then new group

Enter BTEC and then click okay

Enter ACCA and click okay

ASSIGNMENT 30
NETWORKING

Map the allocated network drive


Go to start the right click my computer then click map network drive

ASSIGNMENT 31
NETWORKING

Then enter \\ computer name then browse it show the domain go to

Check computer server two go to my computer then go to properties copy the name

Theievidentishowibelowimapitheiallocatedinetworkidriveiwasisuccessfully

V. Design a maintenance schedule to support the networked


system(D2)
Network maintenance basically means you have to do what it takes in order to keep a network up
and running and it includes a number of tasks: Troubleshooting network problems. Hardware and
software installation/configuration. Monitoring and improving network performance.

ASSIGNMENT 32
NETWORKING

Data Backup Services


There are 2 main reasons for critical data loss: either there was no backup or the media that
was used failed to successfully capture the data

To prevent this catastrophe from occurring we require clients to maintain


backups on the cloud
External hard drives, DVD-RW, etc.
Upon each visit, we verify that all of your critical information is being safely captured Anti-
Virus Protection and Spam Removers.
We require our clients to maintain a current version of antivirus software and spam remover
software
Systems will be automatically scheduled to receive updates and will be scanned weekly for
their ats The antivirus software will be incorporated into our client’s email systems because
the most common method of virus transfer is from incoming and outgoing emails.
Firewall Protection
We also require that our clients have adequate firewall protection that keeps personal data
in and hackers out
It makes your PC invisible on the Internet so that hackers can’t find it
Firewall programs also contain intelligent intrusion prevention technology that blocks
suspicious Internet traffic
Internal/External Component Cleaning
Dust is one of the leading causes of hardware failure
All moving components are thoroughly cleaned and lubricated during service visits
All data cables are checked to be sure they are securely seated on system boards
CD and floppy drives are opened, cleaned and tested for data transfer
Server Management
We will make sure that your server is running optimally.
VPN Management

A VPN creates a secure “tunnel” by which you can access your network remotely. Array can
establish, manage, and support your firewall services for you.
Router Management
Array will ensure your router is configured properly to optimize network performance and
ensure critical business systems run.

ASSIGNMENT 33
NETWORKING

Asset Management
Arrayiwilliworkiwithiyouitoireviewiyouricorporateiassetsiandidevelopiailifecycleiplaniforiboth
isoftware and hardware. This process will ensure that each member of your team is working
with the right technology that will increase workforce productivity.
It is naturally done using network backup software, which classifies the network components
to back up, configures the backup schedule and copies the data to a backup storage. Backups
with having information backed up in case anything happens to any of the servers and data is
lost the data will be recovered then easily through the backup.

VI. Recommend potential enhancements for the networked


systems (M4)
Implement monitoring and automation
Due to an uptick in the complexity of modern networks that operate at higher layers within
the OSI model, visibility into layer 7 data lows is becoming increasingly important. When
planning for your new network, be sure that you have the necessary network performance
monitoring tools in place to help you quickly identify and resolve application specific problem
in a short amount of time. These tools help identify common problems so they can be easily
resolved using proactive automation techniques.

Increasing growth of the network, the switches and more of access points will be added that
helps the network to expand meaning your business/organization also expand and the
outcome of your business increases.

Upgrade the network switch


Once you upgrade your switch you conserve energy efficiency was not a major concern in the
past, but network equipment manufacturers are now paying more attention to the issue and
installing more efficient power supplies and fans. The improvements are usually not
sufficient to justify replacing a switch but they are a bonus when upgrading for other
reasons.

ASSIGNMENT 34
NETWORKING

The decision to replace equipment should be made carefully even in the best of times.
Current conditions dictate extra diligence, but new technology and applications can yield
over all savings that make upgrades worthwhile.

Implementing a wireless router


The network is configured with a wired router with the latest and new technology of wireless
routers, you need not to have a USB or any other means for the port and be involved in
carrying different types of devices for a file transfer, with the latest wireless connection, you
can easily transfer your files from one source to another. Different types of clouds like
OneDrive, Google Drive, iCloud are on your devices these days where you can store as well as
let other people see your files without having to have a single device for putting in a port,
sharing files and the removing it.

With the advancement of Wireless routers, one does not need to have any care or worry
about the surroundings, wireless routers whenever they are able to work can give you a
tremendous amount of speed without having to have any wires attached to your device.

VII. Discuss significance upgrades and security requirements in


your network design(D3)
Upgrade the Firewall: A firewall provides protection for your network by blocking
unauthorized access while still permitting approved communications. Make sure that you
have one and that it is current, meaning that everything is being automatically patched and
updated on a consistent basis. While you are at it, check that these updates are being
applied regularly to your firmware as well.
Emphasize Password Strength and Best Practices: Cybercriminals often gain access to
networks through hacking employees’ passwords. To combat this, make sure your employees
know and outs of creating strong passwords (ones that are lengthy, use multiple characters,
and are unique to that account). A little education can go a long way in securing one of
cybercriminals' easiest access points.

ASSIGNMENT 35
NETWORKING

Encrypt the entire network


You can also encrypt an entire network. One option is IPsec. A Windows Server can serve as
the IPsec server and the client capability is natively supported by Windows as well. However,
the encryption process can be quite an overhead burden on the network; effective
throughput rates can drop dramatically. There are also proprietary network encryption
solutions out there from networking vendors, many of which use a Layer 2 approach instead
of Layer 3 like IPsec to help with reducing latency and overhead.

Perform auditing and mapping


Doing auditing and mapping of your network. Always have a clear understanding of the
entire network’s infrastructure, for instance the vendor/model, location, and basic
configuration of firewalls, routers, switches, Ethernet cabling and ports, and wireless access
points. Plus, know exactly what servers, computers, printers, and any other devices are
connected, where they are connected, and their connectivity path throughout the network.
During your auditing and mapping you might find specific security vulnerabilities or ways in
which you could increase security, performance and reliability. Maybe you’ll run across an
incorrectly configured firewall or maybe physical security threats.

Physically secure the network


Although often overlooked or minimized, the physical security of the network can be just as
crucial as say your Internet facing firewall. Just as you need to protect against hackers, bots
and viruses, you need to protect against local threats, too.

VIII. References

reliability, n., n.d. [Online] Available at: Chapter 11 Network reliability [online]
sciencedirect.com. Available at:
https://www.sciencedirect.com/science/article/abs/pii/S0927050705801288
https://www.networkworld.com/article/2175048/8-ways-to-improve-wired-network-
security.html https://www.networkcomputing.com/networking/7-tips-upgrading-your-
network https://cordkuttersconnect.com/understanding-the-advantages-and-disadvantages-
of-wireless-routers/

ASSIGNMENT 36
NETWORKING

ASSIGNMENT 37

You might also like