You are on page 1of 122

Higher Nationals

Internal verification of assessment decisions – BTEC (RQF)


INTERNAL VERIFICATION – ASSESSMENT DECISIONS

Programme title HND Programming

Assessor Mr. Prasad Thissera Internal Verifier

Unit(s) Unit 02: Networking

Assignment title LAN Design & Implementation for Enclave Films Company

Student’s name K. A. Damith Sriyantha Karunathilake


List which assessment criteria Pass Merit Distinction
the Assessor has awarded.

INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded match


those shown in the assignment brief? Y/N

Is the Pass/Merit/Distinction grade awarded


justified by the assessor’s comments on the Y/N
student work?
Has the work been assessed
Y/N
accurately?
Is the feedback to the student:
Give details:
• Constructive? Y/N
• Linked to relevant assessment criteria? Y/N
• Identifying opportunities for Y/N
improved performance?
• Agreeing actions? Y/N
Does the assessment decision need
Y/N
amending?

Assessor signature Date

Internal Verifier signature Date


Programme Leader signature (if required)
Date

Confirm action completed


Remedial action taken
Give details:

Assessor signature Date

Internal Verifier
Date
signature
Programme Leader
Date
signature (if required)

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 1


Higher Nationals - Summative Assignment Feedback Form
Student Name/ID K. A. Damith Sriyantha Karunathilake / GAM/A-008724

Unit Title Unit 02: Networking

Assignment Number 1 Assessor


Date Received
Submission Date
1st submission
Date Received 2nd
Re-submission Date
submission

Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction P1 P2 M1
Descripts

LO2 Explain networking devices and operations.


Pass, Merit & Distinction P3 P4 M2 D1
Descripts

LO3 Design efficient networked systems.


Pass, Merit & Distinction P5 P6 M3 D2
Descripts

LO4 Implement and diagnose networked systems.


Pass, Merit & Distinction P7 P8 M4 D3
Descripts

Grade: Assessor Signature: Date:

Resubmission Feedback:

Grade: Assessor Signature: Date:

Internal Verifier’s Comments:

Signature & Date:

* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 2


Assignment Feedback
Formative Feedback: Assessor to Student

Action Plan

Summative feedback

Feedback: Student to Assessor

Assessor Date
signature

Student Date
signature

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 3


Pearson Higher Nationals in
Computing
Unit 02: Networking
Assignment 01

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 4


General Guidelines

1. A cover page or title page should be attached to your assignment. Use page 1 of this
assignment brief as your cover page and make sure all details are accurately filled.
2. The entire assignment brief should be attached as the first section of your assignment.
3. The assignment should be prepared using a word processing software.
4. The assignment should be word processing in an A4 sized paper.
5. Allow 1” margin on top, bottom and right sides of the paper and 1.25” on the left side (for
binding).

Word Processing Rules

1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Set line spacing to 1.5. Justify all paragraphs.
3. Ensure that all headings are consistent in terms of size and font style.
4. Use footer function on the word processor to insert your name, unit, assignment no, and
page number on each page. This is useful if individual sheets get detached from the
submission.
5. Use the spell check and grammar check function of the word processing application to
review the use of language on your assignment.

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 5


Important Points:

1. Carefully check carefully the hand in date and the instructions given with the assignment.
Late submissions will not be accepted.
2. Ensure that sufficient time is spent to complete the assignment by the due date.
3. Do not wait till the last minute to get feedback on the assignment. Such excuses will not be
accepted for late submissions.
4. You must be responsible for efficient management of your time.
5. If you are unable to hand in your assignment on time and have valid reasons such as illness,
you may apply (in writing) for an extension.
6. Failure to achieve at least a PASS grade will result in a REFERRAL grade.
7. Non-submission of work without valid reasons will lead to an automatic REFERRAL. You will
then be asked to complete an alternative assignment.
8. If you use other people’s work or ideas in your assignment, it must be properly referenced,
using the HARVARD referencing system, in your text or any bibliography. Otherwise, you’ll
be found guilty of committing plagiarism.
9. If you are caught plagiarising, your grade will be reduced to a REFERRAL or at worst, you
could be excluded from the course.

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 6


Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present
it as my own without attributing the sources in the correct form. I further understand what it
means to copy another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of Edexcel UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my
own, and where I have made use of another’s work, I will attribute the source in the correct
way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Edexcel UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.

kadamith@gmail.com

Student’s Signature: Date:


(Provide E-mail ID) (Provide Submission Date)

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 7


Higher National Diploma in Business
Assignment Brief
Student Name /ID Number K. A. Damith Sriyantha Karunathilake / GAM/A-008724

Unit Number and Title Unit 2: Networking

Academic Year 2017/18

Unit Tutor

Assignment Title LAN Design & Implementation for Enclave Films Company

Issue Date

Submission Date

IV Name & Date

Submission format

The submission is in the form of an individual written report. This should be written in a concise,
formal business style using single spacing and font size 12. You are required to make use of headings,
paragraphs and subsections as appropriate, and all work must be supported with research and
referenced using the Harvard referencing system. Please also provide an end list of references using
the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures,
although you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:

LO1 Examine networking principles and their protocols.

LO2 Explain networking devices and operations.

LO3 Design efficient networked systems.

LO4 Implement and diagnose networked systems.


Assignment Brief and Guidance:

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 8


Scenario :
Enclave Films is an eminent movie company which composes movies and delivers
high quality video to make it download through VividZone company website. The
original movie company management has decided to consolidate the contract with
VividZone by adding more efficient staff and appliances.

Enclave Films is in building B and the web team is positioned in the same building
while majority of the administration, sales, accounts and management functions are
supported in building A. Both buildings are located in the same premises. Movie
company plans to aggregate all their staff and resources in one building. Therefore
when adjacent office space becomes available in building A, these groups will be
accommodated together. Building A has a reception and a customer area as well.

About the Network

The branch network of Enclave Films has grown without proper planning. The LAN
cabling in both offices is Cat5e Ethernet. The office complex provides an Ethernet
link between the two buildings.

The current network is a flat network design with minimal redundancy. A small
wireless LAN is used occasionally by few project managers with laptops and the
guests at Building B.

a) Building A - general office and managers, including reception, accounts, and


administration. It consists of 12 PCs and 02 printers.
b) Building B - production suites and provides networking for the media development
and storage. It consists of 09 high-performance workstations, 05 office PCs, and 02
printers.

The Management expects to enhance the network based on following major


criteria:

a) Separate the network into VLANs.


b) Data traffic expected to increase by 80%
c) Possibly consider connecting directly to the VividZone network; must be a fast and
reliable connection
d) High network availability with redundant links and technology
e) Wireless network access at Building B
f) QoS to support video applications
g) High network reliability with network monitoring and security

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 9


Activity 01
You are newly recruited as a Network Engineer by the movie company to redesign
the network.
You need to produce a report for the company that includes the following:

1. An an overview of your report.


2. An explanation of;
 networking principles, protocols and devices, including benefits and
constraints of networked solutions
 the impact of network topology, communication and bandwidth
requirements, effectiveness of networking systems
 operating principles of networking devices and server types and
networking software

Activity 02

1. Prepare a written plan of how you are going to design a Local Area
Network including a blueprint of your LAN.
2. Justify the security requirements and quality of services needed for
selection of accessories
3. Design a networked system to meet a given specification
4. Provide the IP address allocation table for the redesigned network.
5. Install & configure network services and applications of your choice.
6. Conduct a test and evaluate the design to meet the requirements and analyse
user feedback.
7. Suggest a maintenance schedule to support the networked system.

Activity 03
1. Implement a networked system based on your prepared design.
2. Conduct verification with e.g. Ping, extended ping, trace route, telnet, SSH,
etc.
3. Record the test results and analyze these against expected results.
4. Investigate what functionalities would allow the system to support device
growth and the addition of communication devices.

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 10


K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 11
Grading Rubric

Grading Criteria Achieved Feedback

LO1 : Examine networking principles and their protocols.

P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Compare common networking principles and how protocols
enable the effectiveness of networked systems.

LO2 : Explain networking devices and operations

P3
Discuss the operating principles of networking devices and
server types.

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 12


P4
Discuss the inter-dependence of workstation hardware with
relevant networking software.

M2
Explore a range of server types and justify the selection of a
server, considering a given scenario regarding cost and
performance optimization.

LO 1 & LO2
D1
Considering a given scenario, identify the topology protocol
selected for the efficient utilisation of a networking system.

LO3 : Design efficient networked systems

P5
Design a networked system to meet a given specification.
P6
Test and evaluate the design to meet the requirements and
analyze user feedback.
M3

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 13


Install and configure network services and applications on your
choice.
D2
Design a maintenance schedule to support the networked
system.
LO4 : Implement and diagnose networked systems

P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D3
Use critical reflection to evaluate own work and justify valid
conclusions.

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 14


Acknowledgement
I would like to thanks for our lecture Mr. Prasad Thissera and our coordinator Mr.
Theekshana Gunathilake. And also I would like to thank my parents and all of my friends
who gave hand to make this subject assignment in a successful way.

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 15


Table of Contents
Activity 01................................................................................................................................ 23

1. Overview of report ........................................................................................................ 23

1.1. About Enclave Films and Vivid Zone Company................................................... 23

1.2. Suggested Network ................................................................................................ 24

1.3. Resource Requirements ......................................................................................... 26

1.4. Time Schedule ....................................................................................................... 26

1.5. Requirement Budget .............................................................................................. 27

2. An explanation: ............................................................................................................. 28

2.1. What is a network? ................................................................................................... 28

2.2. What is a protocol? ................................................................................................ 33

2.3. What is network topology? .................................................................................... 37

2.4. Operating principles of networking devices .......................................................... 43

Activity 02................................................................................................................................ 54

1. Prepare a written plan of how you are going to design a Local Area Network including
a blueprint of your LAN. ..................................................................................................... 54

1.1. Planning the Land Area Network (LAN) .............................................................. 54

2. Justify the security requirements and quality of services needed for selection of
accessories............................................................................................................................ 56

2.1. What is network security? ..................................................................................... 56

2.2. Quality of Service Requirement ............................................................................ 58

3. Design a networked system to meet a given specification ........................................... 61

4. Provide the IP address allocation table for the redesigned network. ............................ 62

4.1. Building A - Vividzone ......................................................................................... 62

4.2. Building B – Enclave Films................................................................................... 62

5. Install & configure network services and applications of your choice. ........................ 63

5.1. Activity 01 ............................................................................................................. 63

5.2. Activity 02 ............................................................................................................. 78

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 16


6. Conduct a test and evaluate the design to meet the requirements and analyse user
feedback. .............................................................................................................................. 95

6.1. What is user feedback form? ................................................................................. 95

7. Suggest a maintenance schedule to support the networked system. ........................... 102

7.1. Why maintain schedule to support the networked system? ................................. 102

7.2. Maintain Schedule ............................................................................................... 102

Activity 03.............................................................................................................................. 104

11. Implement a networked system based on your prepared design. ............................ 104

1.1. Newly activated network ..................................................................................... 104

2. Conduct verification with e.g. Ping, extended ping, trace route, telnet, SSH, etc. ..... 105

2.1. Check internal connectivity of Enclave Films ..................................................... 105

2.2. Check external connectivity of Enclave Films .................................................... 107

2.3. Check internal connectivity of Vivid Zone ......................................................... 110

2.4. Check external connectivity Vivid Zone ............................................................. 112

3. Record the test results and analyze these against expected results. ............................ 115

3.1. Test case .............................................................................................................. 115

4. Investigate what functionalities would allow the system to support device growth and
the addition of communication devices. ............................................................................ 116

4.1. Possibility to add more switches and computers. ................................................ 116

4.2. Existence of more subnet works already for future purposes. ............................. 117

4.3. Unallocated Wi-Fi area for building „B‟ ............................................................. 118

4.4. Taking action to add new services to the client computer ................................... 118

Gantt chart .............................................................................................................................. 119

Bibliography........................................................................................................................... 120

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 17


List of Figures
Figure 1: Project Plan Schedule ............................................................................................... 26
Figure 2: LAN (18No) ............................................................................................................. 29
Figure 3: MAN (Fairhurst, 2001) ............................................................................................. 30
Figure 4: WAN (omnisecu)...................................................................................................... 31
Figure 5: VPN (18No1)............................................................................................................ 32
Figure 6: Bus Topology (18Oc) ............................................................................................... 38
Figure 7: Ring Topology (18Oc2) ........................................................................................... 39
Figure 8: Mesh Topology (18Oc3) .......................................................................................... 40
Figure 9: Star Topology (18Oc1) ............................................................................................. 41
Figure 10: Tree Topology ........................................................................................................ 42
Figure 11: File Server (19Ja) ................................................................................................... 47
Figure 12: Print Server (19Ja5) ................................................................................................ 48
Figure 13: Database Server (19Ja1) ......................................................................................... 48
Figure 14: FTP Server (19Ja2) ................................................................................................. 49
Figure 15: DNS Server (19Ja3) ................................................................................................ 50
Figure 16: DHCP Server (19Ja4) ............................................................................................. 50
Figure 17: Proxy Server (20Oc) ............................................................................................... 51
Figure 18: Network Diagram ................................................................................................... 61
Figure 19: Open VMware workstation .................................................................................... 63
Figure 20: Click the configuration type ................................................................................... 64
Figure 21: Guest Operating System Installation ...................................................................... 64
Figure 22: Select OS ................................................................................................................ 65
Figure 23: Change name .......................................................................................................... 65
Figure 24: Specify Disk Capacity ............................................................................................ 66
Figure 25: Ready to Create ...................................................................................................... 66
Figure 26: Power on ................................................................................................................. 67
Figure 27: Loading the Virtual Machine.................................................................................. 67
Figure 28: Choose the Language ............................................................................................. 68
Figure 29: Install now .............................................................................................................. 68
Figure 30: Setup starting .......................................................................................................... 69
Figure 31: Select Windows Server OS in Virtual Machine ..................................................... 69
Figure 32: Licence terms.......................................................................................................... 70

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 18


Figure 33: Select OS type ........................................................................................................ 70
Figure 34: Select or create drive .............................................................................................. 71
Figure 35: Installing windows.................................................................................................. 71
Figure 36: Create the username and password ......................................................................... 72
Figure 37: Enter the Password ................................................................................................. 72
Figure 38: Appear .................................................................................................................... 73
Figure 39: Control Penal .......................................................................................................... 73
Figure 40: Network and Internet .............................................................................................. 74
Figure 41: Network and Sharing .............................................................................................. 74
Figure 42: Network Connection ............................................................................................... 75
Figure 43: Right click and click properties .............................................................................. 75
Figure 44: Properties ................................................................................................................ 76
Figure 45: Following IP address .............................................................................................. 76
Figure 46: Following DNS server address ............................................................................... 77
Figure 47: Guest operating system installation ........................................................................ 78
Figure 48: Select OS ................................................................................................................ 79
Figure 49: Change name .......................................................................................................... 79
Figure 50: Specify Disk Capacity ............................................................................................ 80
Figure 51: Ready to Create ...................................................................................................... 80
Figure 52: Power on ................................................................................................................. 81
Figure 53: Loading ................................................................................................................... 81
Figure 54: Open OS ................................................................................................................. 82
Figure 55: Choosing Language ................................................................................................ 82
Figure 56: Install now .............................................................................................................. 83
Figure 57: Licence term ........................................................................................................... 83
Figure 58: Select Type ............................................................................................................. 84
Figure 59: Select drive ............................................................................................................. 84
Figure 60: Waiting to Install .................................................................................................... 85
Figure 61: Product key ............................................................................................................. 85
Figure 62: Choose account ....................................................................................................... 86
Figure 63: Set password ........................................................................................................... 86
Figure 64: Give product key .................................................................................................... 87
Figure 65: Improve windows ................................................................................................... 87
Figure 66: Time zone ............................................................................................................... 88

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 19


Figure 67: Select Location ....................................................................................................... 88
Figure 68: Waiting ................................................................................................................... 89
Figure 69: Running .................................................................................................................. 89
Figure 70: Adjust ..................................................................................................................... 90
Figure 71: Network and Sharing Center .................................................................................. 90
Figure 72: Connect ................................................................................................................... 91
Figure 73: Right click .............................................................................................................. 91
Figure 74: Properties ................................................................................................................ 92
Figure 75: Call the Network..................................................................................................... 92
Figure 76: Change .................................................................................................................... 93
Figure 77: Change domain ....................................................................................................... 93
Figure 78: Domain Change ...................................................................................................... 94
Figure 79: User Feedback Form 1............................................................................................ 97
Figure 80: User Feedback Form 2............................................................................................ 99
Figure 81: User Feedback Form 3.......................................................................................... 101
Figure 82: Zero point loss ...................................................................................................... 105
Figure 83: Zero point loss ...................................................................................................... 105
Figure 84: Zero point loss ...................................................................................................... 106
Figure 85: Zero point loss ...................................................................................................... 106
Figure 86: Zero point loss ...................................................................................................... 107
Figure 87: No connection between 192.168.1.7 to 192.168.1.3 ............................................ 107
Figure 88: No connection between 192.168.1.10 to 192.168.1.35 ........................................ 108
Figure 89: No connection between 192.168.1.1 to 192.168.1.38 .......................................... 108
Figure 90: No connection between 192.168.1.12 to 192.168.1.40 ........................................ 109
Figure 91: No connection between 192.168.1.5 to 192.168.1.45 .......................................... 109
Figure 92: Zero with loss ....................................................................................................... 110
Figure 93: Zero point loss ...................................................................................................... 110
Figure 94: Zero point loss ...................................................................................................... 111
Figure 95: Zero point loss ...................................................................................................... 111
Figure 96: Zero point loss ...................................................................................................... 112
Figure 97: No connection between 192.168.1.45 to 192.168.1.1 .......................................... 112
Figure 98: No connection between 192.168.1.7 to 192.168.1.3 ............................................ 113
Figure 99: No connection between 192.168.1.41 to 192.168.1.10 ........................................ 113
Figure 100: No connection between 192.168.1.41 to 192.168.1.8 ........................................ 114

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 20


Figure 101: Network Diagram ............................................................................................... 116

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 21


List of Tables
Table 1: Requirement Budget .................................................................................................. 27
Table 2: Quality of Service Requirements ............................................................................... 58
Table 3: Building A Network................................................................................................... 62
Table 4: Building B Network ................................................................................................... 62
Table 5: Maintain Schedule to support the networked system .............................................. 103
Table 6: Test Cases ................................................................................................................ 115
Table 7: Routing..................................................................................................................... 117

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 22


Activity 01

1. Overview of report

1.1. About Enclave Films and Vivid Zone Company

Enclave Films also found that the company‟s network facilities were not at a strong level.
Vivid Zone appears to be assisting Enclave Films or building B, in the administration, sales,
accounting and management of the building. If we look at the activities of these two
institutions, most of the work is done by Building B. In other words, Enclave Films‟
resources are in short supply, and all of its resources are in the A building, Vivid Zone.

However, the special feature here is that Enclave Films is planning to bring all their staff and
resources together in one building, considering the future of the company. That being said,
when I was able to get adjoining office space for Building A or Vivid Zone, I realized that
these two companies would be staying in the same building as a group. Then there is a
reception and customer area in Building A.

As far as the network of this institution is concerned, it appears that the branch networking of
this institution has been done without proper planning. The Ethernet connection between the
two offices is low and it looks like there will be an Ethernet connection between the two
buildings. In fact, it appears to be connected from one building to another. This network plan
seems to be a flat network plan with minimal redundancy.

As mentioned earlier, the film company's network was not up to par. If they are considered as
criteria:
 Disruption of data traffic
 Here are some suggestions on how to look or get an appointment for Vivid Zone
networks. The film industry network expects a fast and reliable connection.
 Expect access to superior networks with redundant links and technology.
 There is a strong need for wireless network access in the building. They hope that this
will make their work easier. That is, it was meant for laptop managers.
 Expect Quality of service support for video applications.

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 23


 They expect high network reliability with network monitoring as well as security.

The above are the points that Enclave Films hopes to further enhance its network. These
factors will help keep the organization‟s network strong in the future. This will enhance the
future of the company with its high technology, high network connectivity, high security and
high reliability. It will also facilitate the work of the managers of the organization. By the
criteria, I mentioned earlier, I could guarantee for sure that this is a good path for the
development of the institution.

1.2. Suggested Network

The Management expects to enhance the network based on following major criteria:

 Separate the network into VLANs


Enclave Films and Vivid Zone also have 26 computers. Of these, 12 are in A building and 14
are in B building. Therefore, I assume IP addresses for the network and 255.255.255.240 new
subnet masks. Using the above subnet masks, up to 14 hosts can be connected in one network
based on the IP address. Meanwhile, 16 networks can be created using 14 hosts. Similarly, all
parts of building A and building B can be allocated above the IP address. Building A can use
an IP range of 192.168.1.1 to 192.168.1.14, while the other building can use an IP range of
192.168.1.17 to 192.168.1.30.

 Data traffic expected to increase by 80%


The best method for data traffic, which is expected to increase by 80%, is to reduce data
usage. Unwanted data travels through cables, which can cause a number of interruptions to
systems. Using server computers can reduce this data traffic. Then unwanted websites cannot
be used and the client can block all unwanted websites immediately. Then data usage will
decrease and data traffic will decrease.

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 24


 Possibly consider connecting directly to the Vivid Zone network; must be a fast
and reliable connection
 High network availability with redundant links and technology

 Wireless network access at Building B


I think we need a wireless access point for the convenience of laptop project managers.

 QoS to support video applications


I decide to get the best software for this. By using the best software development company,
the company has the ability to build the best software including the above.

 High network reliability with network monitoring and security


I decided what would be the most standard protocol and standard network for this matter.
This requires using the best monitoring software to monitor the most reliable and secure
software, such as the Cisco router.

Available Network
In total, Enclave Films and Vivid Zone have a network of 12 personal computers, 04 printers,
09 high performance computers and 05 office personal computers.

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 25


1.3. Resource Requirements

Hardware Requirements
 Server Computer
 Cisco Router
 Cisco Switches
 Wireless Access Point
 Cat5e Cable
 Fibre-optic cable
 Modem

Software Requirements
 Firewall
 Network Operating System
 Client Operating System

1.4. Time Schedule

Figure 1: Project Plan Schedule

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 26


1.5. Requirement Budget

Description Amount

Labour charges 10,000


Tool charges 270,000
Transport charges 4,500
Network Developer charges 100,000
Network Administrator charges 45,000
Visiting 2,000

Total Amount 431,500


Table 1: Requirement Budget

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 27


2. An explanation:

2.1. What is a network?

A network is a collection of computers, servers, mainframes, network devices, peripherals, or


other devices connected to one another to allow the sharing of data. An example of a network
is the Internet, which connects millions of people all over the world. To the right is an
example image of a home network with multiple computers and other network devices all
connected. (computerhope.com, 2020)

A network consists of two or more computers connected together for sharing. Uses a network
to transfer data to hardware such as printers, fax machines, and scanners. There are
advantages to sharing expensive software and databases, such as communicating from one
computer to another. There are also disadvantages. Network disadvantages include hardware
costs, viruses spreading easily, slow working computers, and networking job costs (network
managers, network administrators). A network can be connected via computer cables,
telephone lines, radio waves, satellites or infrared light beams.

Available types of network


The network makes a few points in consideration of different factors to consider, according to
the biographical area, the purpose of the network, the network scope, architecture of the
network are few of ways of divide. It is mainly types of networks are some of the facts
consists.
 LAN (Land Area Network)
 MAN (Metropolitan Area Network)
 WAN (Wide Area Network)
 VPN (Virtual Private Network)

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 28


 Land Area Network (LAN)
A local area network (LAN) is a relatively small area network of computers. Often the
network is a single room and is limited to one building or group of buildings (for example,
their own organization and other branches of that organization). However, one can connect
this network to a computer at any distance. Operates in several other buildings to connect
computers, including some communication networks, including most buildings. As a
network, as a bus, each computer connects to two neighbouring computers as the main
channel that connects a closed circuit to a node or secondary channel branch structure, and
each computer connects directly to a centralized computer.

Figure 2: LAN (18No)

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 29


 Metropolitan Area Network (MAN)
The Metropolitan Local Area Network (MAN) is an interconnected network of users in a
larger geographical area or computer area than the WAN network. This application can be
used to establish high-speed internet connections for other network services such as DSL /
ADSL and cable TV, and to connect any network to one large network. There are several
interconnections for regional road networks. The end use, sometimes called networking. This
is similar to a LAN network. It is a whole city or a university. MANs are made up of multiple
network connections. Thus, MANs are smaller than LANs, but larger than a large area
network (WAN). Man network is very efficient through high-speed carriers like fibre optic
cable.

Figure 3: MAN (Fairhurst, 2001)

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 30


 Wide Area Network (WAN)
A wide area network (WAN) is a geographically expanding private network that
interconnects with multiple local area networks (LANs). A business can use WAN
headquarters, branches, presets, cloud services, and more. A wide area network (WAN)
includes several different geographic locations with different geographical locations. It is
difficult for a small and medium-sized company to find a small cable (excluding a medium
service provider) in two different countries. Network service providers (also known as ISPs)
provide connectivity solutions for the Wide Area Network (WAN).

Figure 4: WAN (omnisecu)

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 31


 Virtual Private Network (VPN)
Virtual Private Network (VPN) is a public telecommunications infrastructure that provides
secure access to their network, over the Internet, remote offices or individual users. Ensures
that sensitive data is securely transmitted over an encrypted connection. Unauthorized
persons allow the user to listen to traffic and work remotely. VPN technology is widely used
in the corporate environment. VPN is actually considered a private network.

With a VPN, people‟s Internet traffic travels through the Internet in a private Internet
encrypted tunnel. Anyone can access the destination until the VPN tunnel is completed.

Figure 5: VPN (18No1)

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 32


2.2. What is a protocol?

In some cases, an access method, the protocol is a standard that can be referred to as a data
transfer system. Local Area Network, Internet, Intranet, etc. Each protocol has a formatting
method for formatting data. After it was sent after the data compression or how the data looks
wrong to check.

Successful network should follow the transmission of data. On the specific rules and
regulations that have been designed for efficiency for computer-based programming language
similar protocols. Transmission protocols and standards for data communications, providing
detailed information about the process. The protocol is, in other words, a need for a mutually
acceptable and enforceable set of rules for the exchange of information for both ends of the
communication network. Computer networks are the communications between the different
communications systems. Any organization is possible to send or receive information.
However, the two companies could not be sent to the bit stream, and each one can be
expected to understand them.

Enclave Films organization the protocol types of work for which they are used:
 TCP/IP (Transmission Control Protocol / Internet Protocol)
This protocol should be mandatory in every organization. It is possible for one computer to
connect to another and exchange data. This protocol enables all branches of the organization
to be connected. Since this protocol runs parallel to the Internet Protocol, you can also access
the Internet through this. This protocol is the OSI (Open Systems Interconnection) Layer
Streaming Protocol, which is used for messaging, transporting, and connecting to remote
computers over networks and the Internet. However, the information of their organization can
be exchanged only within that institution.

TCP ensures that the data is kept at the correct destination. Before the data is transmitted, a
connection is created between the TCP source and the destination, and this communication
continues until it is activated. This TCP/IP protocol can be connected to the server via an
Ethernet cable and to a computer via a branch server.

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 33


 FTP (File Transfer Protocol)
File Transfer Protocol (FTP) is the standard Internet protocol for transmitting files between
two or more computers over the Internet over a TCP/IP connection. This will open a dialog
with clients asking them to download a file. The active mode of FTP sessions remains active.
Active mode, after starting a server session via command channel request, begins to transfer
data back to the server. Simultaneously, the client uses the console to send the information
the client needs to open the database instead. Since all server packages are boot mode,
firewalls and network address conversion (NAT) work well through the gateway. (Rouse,
File Transfer Protocol (FTP))

There is a file transfer protocol for TCP/IP connections. The FTP protocol often works with
the Internet. Files can be transferred wirelessly to another person‟s computer via their
computer. Specifically, this protocol is used to send emails as well as transfer files from
Google Drive when needed. Email and Google lead the organization, both internally and
externally. For example, this protocol would be very important for a company to share a
document or video from another organization to meet a need.

 SMTP (Simple Mail Transfer Protocol)


Email is one of the most sought after services in the Internet. Mail users use SMTP as a
transfer method. SMTP is a push protocol used to send mail, and POP (Post Office Protocol)
or IMAP (Internet Message Access Protocol) is used to receive messages from the user.
SMTP travels through the user's email and web. Works closely with that mail agent to send a
message sent by someone to another person's correct email address. Once you have entered
that correct email address, it will immediately send its email to the relevant destination.

Enclave Films is working closely with film companies and Vivid Zone to share this file via
email. This is mostly used for file sharing. The protocol used to transfer large files such as
multimedia files, and communicating through these, side learning is a difficult task.

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 34


 HTTP (Hypertext Transfer Protocol)
The Hypertext Transfer Protocol (HTTP) is an application-level protocol for distribution,
collaboration, and high-definition media information systems. It has been the basis for data
communication on the World Wide Web (www) since the 1990s. Exchange of information
between clients and servers and hypertext documents will be the name of HTTP. Hypertext is
the structure that uses logical connections or hyperlinks between the nodes contained in the
URL.

Enclave Films organization the company website, videos and images to communicate is
essential. Release protocols URL (Uniform Resource Locator) can be integrated through
lateral learning should be replaced, such as burn YouTube. In this protocol, the file can be
uploaded and downloaded. In addition, ends with any organization can see the information in
the world, to include employee unreformed HTTP Protocol.

 Hypertext Transfer Protocol Secure (HTTPS)


Typical HTTP stabilization applications use HTTPS Protected Socket Layer (SSL) or
Transport Layer Protection (TLS) as the substrate. HTTPS is encrypted and returns web
pages as well as requests. The HTTPS protocol is enhanced by Netscape, and HTTPS in
Chrome, Firefox, Opera, and Safari browsers do not support poor performance or some
algorithms. In addition, HTTPS moves securely between the server and the server data.

Enclave Films standpoint HTTPS primarily designed to protect information, billing system or
SSL encryption is encrypted TLS, sensitive data and transactions for the unsecured HTTP
protocol to protect the unprotected hacker protection. Collaborates with the HTTPS
Certification Authority to evaluate the security certification of corporate websites.

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 35


 POP3 (Post Office Protocol)
The Protocol Office Protocol (POP) is a TCP/IP connection between emails from remote
clients that transfers server servers to local e-mail application-layered Internet protocols. The
user has already approved several different authentication methods to provide different levels
of security to prevent misuse of access to the POP3 email address. POP3 is provided by many
long distance mechanisms. POPs are challenge/response protocols used by the MD5 hash
functionality to prevent reactive attacks and share secrets.

Enclave Films requires this protocol to maintain remote connections. This was meant
specifically for other branches or overseas branches. This draft will be emailed in a
transaction similar to the transaction in writing. If the Enclave Films film company does not
send it, it will be automatically deleted.

Including benefits:
 Strong Business Relationships - Networking is about sharing. It helps each other build
trust and reach goals. Being in touch with your contacts regularly and finding
opportunities to support them can help strengthen the relationship.
 Get fresh ideas - Sharing information about challenges, experiences and objectives is a
major advantage of networking. For it allows for a new understanding that is otherwise
unexpected. Similarly, presenting useful ideas for a relationship is a great way to build the
reputation of an innovative thinker.
 Advance your Career - Seeing and Focusing is an essential part of networking that is
essential in building a career. Regular participation in professional and social events helps
to get to know your face. Providing useful information or tips to people in need can help
build your reputation as a knowledgeable, trusted and supportive person.
 Build Confidence - Constantly meet new people, build invaluable social skills and self-
confidence that you can take with you anywhere, effectively stepping out of the comfort
zone.
 Developing Long Term Personal Relationships - Of course, the point of networking is
to develop and nurture professional relationships, but some strong and long-lasting
friendships are borne out of work relationships.
(Michael Page team, 2018)

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 36


The impact of network topology, communication and bandwidth requirements

2.3. What is network topology?

Each local area network (LAN) is essential for the on-going maintenance of important nodes.
The implementation of regional network of nodes, Computers, routers and other data may be
included. This is the concept of the network topology. Network topology is the basic
understanding needed to understand its various sub categories. Such connections require the
use of any organization in order to make their tasks easier. It is important to maintain the
connection in that it is important to connect one computer to another computer with network
cables. It is interconnected with each other and different nodes. Alternatively, the data
transfer between the nodes can be described as how the network topology. Network topology
communications network elements setting. Command and control network topology radio
networks, such as various types of industrial sectors and a network of buses can be used for
processing information to telecommunications networks.

There are two types of network topology:


1. Logical topology
2. Physical topology

1. Logical Topology
A network‟s logical topology can also be referred to as its signal topology. This type of
topology is not interested in how devices on the network are connected but how they
communicate with each other. Logical topologies are created by the network protocols on
NICs that determine the movement of data on the physical topology.
 Bus topology
 Ring topology

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 37


 Bus Topology
All categories all use the same bus. Bus network topology is an essential component of LAN
network Ethernet connectivity. It serves as the cable that connects all the devices in the
network. Bus topology, however, is easier to use than most common small networks. If there
is any damage to the connection wires, the network will fail. Simply put, the whole network
will be inactive. This network topology is a very simple connection. Each note computer
communicates with other devices through the device.

Figure 6: Bus Topology (18Oc)

Communications:
This technology includes a bus as a main cable with small cables that connect computers.
This type of topographic network is like a classroom where everyone hears a conversation
and goes everywhere until they reach their destination.

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 38


 Ring Topology
Ring topology is a network configuration that builds a circular data path through device
connections. As each network device is connected to another location, the ring layer, such as
a round dot, is called a ringer network. It moves from one computer to the last, from one
device to another. Data can travel in the same direction in most ring locations. The others are
clearly pointed out. Each node travels from node to node so that each process handles each
packet. This type of topology is more efficient and heavier than bus topology.

Figure 7: Ring Topology (18Oc2)

Communications:
Ring network topology, nodes are connected to the rings or loop. Send data around the ring,
and it will be sent to a computer system to another until they reach a destination.

2. Physical Topology
The physical layout device on a network. Every LAN has a topology, or the way that the
devices on a network are arranged and how they communicate with each other. The way that
the workstations are connected to the through the actual cables that transmitted data the
physical structure of the network is called the physical topology.
 Mesh Topology
 Star Topology
 Tree Topology

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 39


 Mesh Topology
Most networking allows you to independently organize something called radio requests as a
remote space. This reactive protocol uses some features of a reactive router. Not only does it
serve a destination and data source on a direct basis, it also acts as a plastic. It is widely used
for wireless network site science. Every node, computer, and other device is connected to a
network parameter. Each node not only moves its own numbers but also transfers data from
other nodes. In fact, this network topology connects with all other nodes in the network. This
type of window is extra expensive because it contains extras, as it is not often used on
computer networks. It is often used in wireless networks.

Figure 8: Mesh Topology (18Oc3)

Communications:
A network topology with a grid does not have a focal point, and instead, each node is
connected to at least one node, or usually more than one. Each node has the ability to send
and receive messages to other nodes. The node acts as a relay, sending a message to its final
destination. (bbc)

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 40


 Star Topology
Star Database is one of the network settings. Nuclear backup is all network nodes that act as
interconnected central switches. Every host or computer will be connected to the central hub.
The green snake and the original terminal are also known as the server. If the host is to
communicate with a node-centric node, it sends the message to the central message and the
central server redirects their messages to the various nodes. Thus, they form a star-like atom.
Star Database is one of the network settings. In this setup, all network devices connected to a
network device, hub, switch, or computer act as the network device server.

Figure 9: Star Topology (18Oc1)

Communications:
The information received from one computer is sent to the address server via nodes. In this
sense, the node (i.e. the device on which it is based) controls the entire network. Computers
are usually connected to a UTP-cable (unbroken twisted pair cable). (Sivaranjith, 2018)

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 41


 Tree Topology
Tree stabilization is a specific structure of connecting elements such as tree branches. For
example, treetops are often used to organize information in the database or data of a corporate
computer network organization. Tree Topography Network Node Bush has replaced static
topography with full static underlying science. Static tree topology is a hierarchy of at least
three levels, including network topology. Tree topology appreciates their resolution and
approach to troubleshooting. One topology bus connected to a public station bus, we see the
bass work accessory cable. Once you understand the network settings, you can better
understand the tree statics.

Figure 10: Tree Topology

Communication:
This topology consists of a group of interconnected star circuits. Bus and star topography are
hybrids, and the baseline connecting star topography is called the trunk. Tree topography is
easier than any single bus and single star proposals to further expand any network.
(Sivaranjith, 2018)

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 42


2.4. Operating principles of networking devices

1. Networking Devices
Computer networking devices are called by various names such as networking devices,
network hardware, network devices. However, not all names are the same but have different
purposes. If you look at different devices, they work in different layers of computer networks.
The different layers of a computer network are like different regions of a computer network
with specific functions, also known as „network protocols‟.

For example: A LAN cable aims to connect a computer to a local area network, while a Wi-
Fi router aims to send and receive data between one person and another person's Internet
connection. Similarly, we can think of other network devices that serve different purposes.

Different Networking Devices


 Hub
A network hub is a networking device. It is used to connect all network cables to one place. It
also uses a network hub for data exchange. Data is transferred to packets on a computer
network. Therefore, when a host sends a data packet to a network hub, the hub copies the data
packet to all its ports. Similarly, the packet states that all ports know the data and the port the
packet refers to.

However, due to its functional mechanism, a hub is not so safe and secure. Moreover,
copying data packets on all interfaces or ports is slower and more congested.

 Switch
Like a hub, a switch also works on the LAN layer, but a switch can be said to be more
intelligent than a hub. The hub only performs the function of forwarding data, 'filtering and
forwarding' with a switch, which is the most intelligent way of dealing with data packets.

Therefore, when a packet is received from one interface of the switch, it filters the packet and
sends it only to the interface of the desired receiver. For these purposes, a switch maintains a
CAM (Content Addressable Memory) table that contains the system configuration and

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 43


memory. The CAM table is also known as the forward table or forward information base
(FIB).

 Modem
A modem is an interesting network device in everyday life. The man's house can be
connected to the internet via a wire. There are different types of wires for that. This wire is
used to carry our internet data to the outside internet world.

However, computer data or binary 1s and 0s of digital data generated by the way the other
hand, the wire analog signal while the modem comes.

 Router
A router is a network device that is responsible for switching from one network to another.
These two networks can be a public network or a private company network. You can think of
a router as a traffic cop directing different network traffic in different directions.

 Bridge
If a router connects two different types of networks, a bridge connects two sub-networks as
part of the same network. You can think of two different labs or two different floors
connected by a bridge.

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 44


 Repeater
A repeater is an electronic device that amplifies the signal it receives. In other words, it can
be thought of as a device that receives a repetitive signal and transmits it at a higher level or
higher power, thereby covering a greater distance over the signal.

For example, in a university campus, the dormitory ISP line may be farther away than the
main college coming from. If the university authority wants to pull a wire between the
dormitories and the main campus, they will have to reuse it. Because of the large distance,
there are limits to the distance that different types of cables can carry data.

(Shekhar, 2016)

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 45


2. Server Types
What is computer server?
A network server is a variety of programs shared by network users from the main store.
Multiple operating systems can run several programs simultaneously on a single computer. A
type of computer or device manages network resources.

You must store at least 100 GB of hard disk space to store video, pictures, music, software or
any other file. So a cable connection is used to connect the computers together.

There are few types of computer server for Enclave Films


 File Server
 Print Server
 Database Server
 FTP Server
 DNS Server
 DHCP Server
 Proxy Server

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 46


 File Server
A file server is a server that is stored with a repository and accesses the server's repository as
an interface to other computers on the network. This means that the files are stored in the
archive and are for most files on the network. (Fischer, 2018)

In client/server architecture, a file server is a computerized database for managing and


managing files that can access other files on the same network. A file server can be
transferred from a floppy disk or other external storage device to a file server without the
physical transfer of files. Refer to the file server processes required to activate the file transfer
program or mechanism. Such programs often use the Internet File Transfer Protocol (FTP)

Figure 11: File Server (19Ja)

 Print Server
A print server is software that manages the requests of printers, network devices, or
computers. End users and network administrators will provide print queue status information.
Print servers are used in large enterprise and small or home office (SOHO) networks. Enclave
Films can manage multiple printers on a single computer that serves as the organization's
print server. There are printers for each department of the organization that connect the
switch from the computer to the server.

If a printer wants to connect several personal computers or share a printer on a network, it


usually requires a device called a print server. Often a printed server is just a computer with a
number of computers distributed on the network and must be a dedicated device for a
network device. It can be connected to a number of printers.

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 47


Figure 12: Print Server (19Ja5)

 Database Server
A database server is a device that retrieves data from a database and returns it to other service
providers' computer systems. Users can access query data using a query language specific to
the query language. Enclave Films uses a database server to store data. In particular, the SQL
database system will be functional within the organization.

Usually some organizations use file data server. However, a database server is more efficient
than a file server is. All databases are managed by the database server. Any type of computer
database can be used as a server.

Figure 13: Database Server (19Ja1)

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 48


 FTP Server
FTP is the file transfer protocol. It is divided into two computer files/folders. Enclave Films
in particular has a state-of-the-art FTP server. Allows safe transfer of files when transferring
files.

Enabling an FTP server requires a TCP/IP network, based on the use of specialized servers
with more FTP servers. The FTP server is disabled so that connections can always be made
between servers. The FTP server is an important part of the FTP format and helps to share
files over the Internet. This server is especially important for downloading movies produced
by Enclave Films through Vivid Zone‟s websites.

Figure 14: FTP Server (19Ja2)

 DNS Server
DNS is a system that circulates within the hierarchy of clients on which DNS is created. A
DNS server is a computer that can connect to any registered DNS. It is an index of domain
names and IP addresses, and when applied, you can say the IP address of the current
relationship with the domain name. If it does not know, it will try to find it from other DNS
servers. When you type your domain name into your browser, any browser, such as Chrome
or Firefox, will try to tell the domain server the IP address of this domain and the DNS
server.

The DNS server is a critical part of the DNS (Domain Name System) infrastructure. Without
DNS servers, the Internet would not work properly. It stores their hostname and IP address,
and is used by the web address or device to check the queries for access to another network
system. Also known as, the server name, the DNS server is actually useful.

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 49


Figure 15: DNS Server (19Ja3)

 DHCP Server
DHCP is a network management tool for Transmission Control Platform (TCP) and Internet
Protocol (IP). There are two Internet Protocols used to connect devices and the TCP / IP
Protocol, the main Internet access point.

The primary function of DHCP is to automatically manage and configure IP addresses on the
network and not to send them to individual users‟ individual IP addresses. However, it is
more powerful and uses the default gateway, domain name server (DNS) and subnet mask to
find out how to install network devices. The DHCP server is somewhat self-explanatory. It is
a DHCP server that is configured to configure devices and other network information
connected to the network address with an IP address.

Figure 16: DHCP Server (19Ja4)

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 50


 Proxy Server
A proxy server is a specialized computer or software system that acts on a computer that acts
as an intermediary between endpoint devices such as a computer. This is another server
where a user or client is requesting a service. A proxy server can exist on the same machine
as a firewall server. Alternatively, it could be on a separate server that makes requests
through the firewall. (Rouse, proxy server)

Usually, when searching for a website name, the Internet Service Provider (ISP) will make a
request on your behalf, linking it to the real IP address. Your online requests will then be
reactivated when you use a proxy. The advantage of a proxy server is that it can serve all its
users. While using a proxy, your Internet request goes from your computer to your ISP
provider. But then sent to the proxy server and then to the website. If one or more websites
are frequently requested, these may be in the proxy cache, which may improve the user
response time. Proxy uses the IP address of your choice in a setting similar to your actual IP
address.

Figure 17: Proxy Server (20Oc)

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 51


3. Networking Software
Networking software powers the majority of current software, business, and other large
organizations. Content sharing between a large number of users and devices not only
enhances the ability to efficiently organize communication and security, but also helps
everyone involved reach their potential in their workplace. When installing networks,
network software is used to allow administrators to quickly customize or configure large
frame elements as needed. A closer look at modern networking software shows how these
programs work. (Cockerham, 2018)

Networking software for Enclave Films


 Firewall
A firewall is a set of specific devices and specific network security measures that determine
whether traffic is allowed or blocked and monitors the access network. They set up an
unreliable barrier that can interfere with the security and control of external networks such as
the Internet and internal networks.

Network Address Translation (NAT) is commonly used to activate networks.

 Client Operating System


A server operating system is specifically designed to run on servers. The client desktop
operates the operating system and various mobile devices in the system. This system only
changes from one central server to one user.

Helps to establish server roles such as server operating systems, web server, mail server, file
server, database server, application server and print server. Popular server operating systems
include the SUSE Linux server for Windows Server, Mac OS X Server, and Red Hat
Enterprise Linux (RHL) and Linux variants.

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 52


 Network Operating System (NOS)
In short, NOS stands for Network Operating System. Network Operating System (NOS) is
multicomputer communication software that allows you to share files and hardware devices.

The first network operating system was released in 1983 by Novell NetWare. NetWare was
released by other network operating systems. Includes examples of other network operating
systems, such as Windows 2000, Microsoft Windows XP, and Linux.

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 53


Activity 02

1. Prepare a written plan of how you are going to design a Local Area Network
including a blueprint of your LAN.

1.1. Planning the Land Area Network (LAN)

 Building A - Vivid Zone


Vivid Zone‟s main branch has also laid an underground cable to connect its network to other
branches. All the data obtained by the branches of this institution will be transferred to one
server. Vivid Zone will also have 12 PCs and 2 printers. The building will also house general
offices and managers, including reception, accounts, and administration. This Vivid Zone is
Building A, which also has a customer area. The building is located on the same premises as
Vivid Zone and the film company, and the films produced by the film company will be
downloaded through Vivid Zone‟s websites. Movies produced by this film company will
require a very fast LAN network to download via Vivid Zone‟s websites. A high speed
networking cable must be cabled to speed up this network.

 Building B - Enclave Films


The main branch of Enclave Films has also laid an underground cable to connect its network
to other branches. The various branches of the institute will carry out various functions. The
Enclave Films will have 09 high performance workshops, 5 PCs and 2 printers. This building
provides networking for product kits, media development and storage. The Enclave Films
Company Building B is a film production area. The building is located on the same premises
as Vivid Zone and the film company, and films produced by the film company are
downloaded through Vivid Zone‟s websites. Downloading movies produced by this film
company through Vivid Zone‟s websites requires a very fast LAN network and a high-speed
network cable to speed up this network.

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 54


However, Enclave Films‟ branch network has grown without proper planning, and the LAN
cabling of both Vivid Zone and Enclave Films is Cat5e Ethernet. Enclave Films, however,
will connect to a wireless network access. It is also planned to increase the link-local address
to IPv6 to connect with other branches. Here fibre-optic cables are used for this networking
so that it can be easily connected to other branches. The maximum length of this cable is 10
to 70 km (this varies depending on the type of fibre). Depending on the type of fibre optic
cable used here, the data rates can range from 100 Mbit/s to 10,000 Mbit/s and it can easily
transfer data to other branches.

Looking at these two offices, here are a few things to help strengthen the network design
here.
 Both buildings are located on the same premises.
 LAN cabling in both offices Cat5e Ethernet
 Office Complex Having an Ethernet connection between the two buildings
 The web team is located in the same building.
 When adjoining office space is available for the Vivid Zone building, these groups
stay together.

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 55


2. Justify the security requirements and quality of services needed for selection of
accessories

2.1. What is network security?

Network security is a broad topic with multiple layers of access. The data connection layer,
network layer and application layer can be addressed. Related issues are: Packet invasion and
encryption, routing tables with IP packets and their updated version, and host-level errors
occurred in the data connection layer, network layer, and application, respectively.

The TCP/IP protocol is used globally regardless of the organization‟s security-specific


organizations. This means that the TCP/IP protocol may be embedded. This will create a need
to ensure all-round security for an organization‟s network. The role of the network
administrator had to be expanded to increase the overall security of the network. He must
ensure that all parts of this network are adequately protected and that adequate security
measures are enforced within a TCP/IP network.
(Thakur)

Fundamental of security requirements:


 Keep patches and updates current - Cybercriminals exploit insecurities in operating
systems, software applications, web browsers and browser plug-ins when administrators
are careless about applying patches and updates.
 Use strong passwords - At the moment, most users do not know how to write their
passwords in the post-logs used on their monitor. However, there is more to keeping
passwords safe than invisible. The definition of a strong password is difficult for humans
as well as computers to identify and will use a combination of numbers and letters of at
least 6 characters or more.
 Secure your VPN - Data encryption and identity verification are especially important for
securing a VPN. Hackers can exploit any open network connection to infiltrate their
network. Moreover, data is especially vulnerable when traveling over the Internet.
Review the documentation for your server and VPN software to make sure it uses the

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 56


strongest possible protocols for encryption and verification. It is also a good idea to use a
firewall to separate the VPN network from the rest of the network.
 Actively manage user access privileges - Inappropriate user access privileges pose a
significant security threat. Managing employee access to critical data on a continuous
basis should not be neglected. For example, when an employee changes jobs, make sure
the IT department is notified so that their access privileges can be changed to suit the
duties of the new position.
 Clean up inactive accounts - Hackers disguise their activities by using dormant accounts
that were once assigned to contractors and former employees. The HP / Ponemon Institute
report reveals that companies in the survey do a good job of deleting accounts when an
employee resigns or is fired. There is software available to clean up inactive accounts on
large networks with many users.

(Berry)

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 57


2.2. Quality of Service Requirement

Quality of service (QoS) requirements is technical specifications that specify the system
quality of features such as performance, availability, scalability, and serviceability. QoS
requirements are driven by business needs specified in the business requirements.
System quality Description
Performance Measure response time and output relative to user load conditions.
Availability A measure of the amount of resources and services a system's end users
can access, often expressed as system overtime.
Scalability Ability to add capacity (and users) to a system deployed over time. Scale
usually involves adding resources to the system, but changes in
deployment architecture should not be necessary.
Security A complex collection of factors that describe the integrity of a system and
its users. Security includes user authentication and authorization, data
security, and secure access to a deployed system.
Latent capacity The ability of a system to load an extraordinary maximum load without
additional resources. Cryptic capacity is a factor in the attributes of
availability, functionality and scale.
Serviceability Ease of maintaining a deployed system, including system monitoring,
troubleshooting, and hardware and software component upgrades.
Table 2: Quality of Service Requirements

(docs.oracle.com, 2010)

Performance
Looking the Enclave Films organization networking efficiency it seems that very high speed
networking is expected.
 Data traffic here is expected to increase by 80%
 Limiting its time speed for video applications to a certain period
 Wireless network access for laptop project managers
 A fast network to connect directly to the Vividzone network

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 58


Availability
 Connect directly to Vivid Zone using a fast network
 Facilitate the tasks of laptop project managers
 The existence of high reliability network
 Achieving their goals in a very short time

Scalability
Scale is the ability to add capacity to a system and assist in loading the system with existing
users or an additional user base. The scale usually requires the addition of resources, but does
not require a change in deployment architecture design or loss of service due to the time
taken to collect additional resources.
 Working to add fibre-optic cables to the network. (These cables can be connected to a
branch at least 10 km away.)
 Data transfer speeds range from 100 Mbit/s to 10,000 Mbit/s.

Security
Security is a complex topic that involves all levels of a deployed system. It is the
responsibility of the authorities to ensure the security of the computer hardware and software
of the organization, especially to ensure security for any organization‟s computer.
 Protecting yourself from the clutches of hackers
 Ability to minimize damage caused by various viruses
 High productivity and reliability
 Software security

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 59


Latent Capacity
Cryptic capacity is the ability to handle extraordinary maximum loads without adding
resources. Normally, do not specify QoS requirements directly in cryptographic capacity.
However, the quality of this system is a factor in the system's existing, functionality, and
scale capability.
 Fibre-optic cables for the network can connect from 10 to 70 km depending on its
fibre.
 As mentioned earlier, data traffic speeds range from 100 Mbit/s to 10,000 Mbit/s.
 Crossing a number of data cables in less time.

Serviceability
Serviceability is the ease of maintaining a deployed system, including system monitoring,
troubleshooting, adding and removing users from the system, and upgrading hardware and
software components.
 If hackers catch a system, reset it.
 System speed
 Internet facilities
 When an employee of the organization leaves, the employee‟s account is also
removed from the system.
 In case of any damage to the branch branches or network cables connected internally
by the company, the cable should be removed.

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 60


3. Design a networked system to meet a given specification

Figure 18: Network Diagram

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 61


4. Provide the IP address allocation table for the redesigned network.

4.1. Building A - Vividzone

Services No. IP Range Network Wi-Fi / Network Other


of Topology Ethernet Components Equipment
Host
Reception 1 192.168.1.1/12

General office 3 192.168.1.2/12


Physical
and Managers 192.168.1.4/12 Ethernet Switch 1 Printer 1
(Star
Accounts 5 192.168.1.5/12 (Cat5e) Server 1 Printer 2
topology)
192.168.1.9/12
Administration 3 192.168.1.10/12
192.168.1.12/12
Table 3: Building A Network

4.2. Building B – Enclave Films

Service No. IP Range Network Wi-Fi / Network Other


of Topology Ethernet Components Equipment
Host
Production 5 192.168.1.13/12 Physical Ethernet
192.168.1.17/12 (Star (Fibre Switch 1
Printer 1
topology) optic)
Printer 2
Media 9 192.168.1.18/12 Physical Ethernet
Router 1
192.168.1.27/12 (Star (Fibre Switch 2
topology) optic)
Table 4: Building B Network

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 62


5. Install & configure network services and applications of your choice.

5.1. Activity 01

Following activities will be discussed here:

 Windows Server 2012 operating system is installed to the correct IP address settings.
 Figure the primary domain for enclavefilms.com
 Add a computer server to the appropriate IP addresses with domain settings.
 Check whether configuration works as expected.

Install the Windows Server 2012 using VMware workstation

 Step 01
Open the VMware workstation and click the “Create a New Virtual Machine”.

Figure 19: Open VMware workstation

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 63


 Step 02
Click radio button tick the “(Typically) recommended” and click the “Next” button.

Figure 20: Click the configuration type

 Step 03
After the open in “Guest Operating System Installation” module, click on “Installer disc
image file (iso):” and click the “Browse…” button. After the click on “I will install the
operating system later” and click the “Next” button.

Figure 21: Guest Operating System Installation

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 64


 Step 04
After the module, select the combo box in to “Windows Server 2012”.

Figure 22: Select OS

 Step 05
After the module, “Name the Virtual Machine” and select text box change the name.

Figure 23: Change name

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 65


 Step 06
After the module, come to “Specify disk capacity” and give the “Maximum disk size (GB)”.
In addition, click the “Next” button.

Figure 24: Specify Disk Capacity

 Step 07
After the came to “Ready to Create Virtual Machine” and click the “Finish” button.

Figure 25: Ready to Create

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 66


 Step 08
Click the “Power on this virtual machine”.

Figure 26: Power on

 Step 09
After the module, and come to loading the virtual machine.

Figure 27: Loading the Virtual Machine

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 67


 Step 10
Running the virtual machine, choosing the languages and click the “Next” button.

Figure 28: Choose the Language

 Step 11
Click the “Install now” button.

Figure 29: Install now

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 68


 Step 12

Setup is starting

Figure 30: Setup starting

 Step 13

Select operating system

Figure 31: Select Windows Server OS in Virtual Machine

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 69


 Step 14

After the come “Licence term” module and click the “I accept the licence terms”.

Figure 32: Licence terms

 Step 15

Select the “Upgrade: Install Windows and keep files, settings, and application”.

Figure 33: Select OS type

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 70


 Step 16

Select or create a drive for the Operating System.

Figure 34: Select or create drive

 Step 17

Waiting to installing windows

Figure 35: Installing windows

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 71


 Step 18

Create the username and password

Figure 36: Create the username and password

 Step 19

Type the password and enter the server

Figure 37: Enter the Password

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 72


 Step 20

Appear the dashboard

Figure 38: Appear

 Step 21

Open the “Control Penal”.

Figure 39: Control Penal

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 73


 Step 22

Go to “Network and Internet”.

Figure 40: Network and Internet

 Step 23

After the click and come to “Network and Sharing Center”.

Figure 41: Network and Sharing

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 74


 Step 24

Click the network connection.

Figure 42: Network Connection

 Step 25

Right click and select the “Properties”.

Figure 43: Right click and click properties

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 75


 Step 26

Open properties and click the “Internet Protocol Version 4 (TCP/IPv4)”.

Figure 44: Properties

 Step 27

Click the “Use the following IP address”.

Figure 45: Following IP address

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 76


 Step 28

Click the “Use the following DNS server address”.

Figure 46: Following DNS server address

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 77


5.2. Activity 02

Following activities will be discussed here:

 Windows 7 operating system is installed to the correct IP address settings.


 Figure the primary domain for enclavefilms.com
 Add a client computer to the domain with appropriate IP address settings.
 Check whether configuration works as expected.

Install the Windows 7 using VMware workstation

 Step 01

After the open in “Guest Operating System Installation” module, click on “Installer disc
image file (iso):” and click the “Browse…” button. After the click on “I will install the
operating system later” and click the “Next” button.

Figure 47: Guest operating system installation

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 78


 Step 02

After the module, click combo box and select “Windows 7” operating system.

Figure 48: Select OS

 Step 03

After the module, change “Virtual machine name:” and click “Browse….” Button.

Figure 49: Change name

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 79


 Step 04

After the open in “Guest Operating System Installation” module, click on “Installer disc
image file (iso):” and click the “Browse…” button. After the click on “I will install the
operating system later” and click the “Next” button.

Figure 50: Specify Disk Capacity

 Step 05

After the module, come to “Ready to Create Virtual Machine” and click the “Finish” button.

Figure 51: Ready to Create

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 80


 Step 06

Click the “Power on this virtual machine”.

Figure 52: Power on

 Step 07

Loading the virtual machine.

Figure 53: Loading

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 81


 Step 08

Open the OS.

Figure 54: Open OS

 Step 09

Choose the language and click “Next” button.

Figure 55: Choosing Language

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 82


 Step 10

Click the “Install now” button.

Figure 56: Install now

 Step 11

After the come “Licence term” module and click the “I accept the licence terms”.

Figure 57: Licence term

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 83


 Step 12

Select the “Upgrade: Install Windows and keep files, settings, and application”.

Figure 58: Select Type

 Step 13

Select or create a drive for the Operating System.

Figure 59: Select drive

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 84


 Step 14

Waiting for windows 7 install

Figure 60: Waiting to Install

 Step 15

Give the windows product key or click the “Skip” button.

Figure 61: Product key

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 85


 Step 16

Type the user name and computer name.

Figure 62: Choose account

 Step 17

Set the account password and click the “Next” button.

Figure 63: Set password

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 86


 Step 18

Give the product key and click the “Next” button. Alternatively, click the “Skip” button.

Figure 64: Give product key

 Step 19

Click the “Use recommended settings”.

Figure 65: Improve windows

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 87


 Step 20

Set the time zone, date and time. In addition, after the click “Next” button.

Figure 66: Time zone

 Step 21

Select current location.

Figure 67: Select Location

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 88


 Step 22

Waiting for “Windows finalizing your settings”.

Figure 68: Waiting

 Step 23

Running windows 7

Figure 69: Running

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 89


 Step 24

Adjust computer setting

Figure 70: Adjust

 Step 25

Click the “Network and Sharing Center”.

Figure 71: Network and Sharing Center

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 90


 Step 26

View the basic network information and set up connection.

Figure 72: Connect

 Step 27

Right click the “Properties”.

Figure 73: Right click

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 91


 Step 28

Select “Internet Protocol Version 4 (TCP/IPv4)” combo and click the “Properties” button.

Figure 74: Properties

 Step 29

After the display properties, click the “Use the following IP address” and enter the “IP
address” and “Subnet mask” call the network.

Figure 75: Call the Network

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 92


 Step 30

System properties and click the “Change” button.

Figure 76: Change

 Step 31

Change domain and click the “Ok” button.

Figure 77: Change domain

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 93


 Step 32

Windows Security module on change domain user name and password. In addition, after the
click on “Ok” button.

Figure 78: Domain Change

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 94


6. Conduct a test and evaluate the design to meet the requirements and analyse user
feedback.

6.1. What is user feedback form?

A customer feedback form is a way to get feedback from users on corporate products,
services and businesses. The purpose of these forms is to provide a better understanding of
the overall customer experience of their business.

User requirements

 Good bandwidth to transfer data


 Prevent unauthorized access
 Block unnecessary website
 Troubleshooting is less
 Easy to administrate
 Different user account an subnet mask for Enclave films and Vivid Zone network
 Virus protection
 Stability of network speed
 Internet

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 95


User Feedback Form 01

USER FEEDBACK FORM

Employee Number : 2
Employee Name : Senesh Akmeemana
Position : Network 01

1. Does the system response fast?


Poor (2-3 min)[ ] Average (1-2 min)[x] Fast (Less than 1 min)[ ]

2. Does the network solution provide data and resource solution?


Yes [x] No [ ]

3. How fast in accessing a shared folder?


Poor (2-3 min)[ ] Average (1-2 min)[x] Fast (Less than 1 min)[ ]

4. What do you think about the security of the system?


Poor [ ] Satisfied [ ] Excellent [x]

5. In communication with order branches was easier?


Yes [x] No [ ]

6. Does the system cater all your requirements?


Yes [ ] Up to certain extent [x] No [ ]

7. How do you rate the overall performance of the system?


0 1 2 3 4 5
Poor Excellent

8. Are you satisfied with the Wi-Fi?


Yes [x] No [ ]

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 96


9. How do you rate the overall performance of the system?
0 1 2 3 4 5
Poor Excellent

10. What do you recommended for feature improvements?

I have not feature improvements

Figure 79: User Feedback Form 1

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 97


User Feedback Form 2
USER FEEDBACK FORM

Employee Number : 5
Employee Name : Bumith Withana
Position : Network 04

1. Does the system response fast?


Poor (2-3 min)[ ] Average (1-2 min)[ ] Fast (Less than 1 min)[x]

2. Does the network solution provide data and resource solution?


Yes [x] No [ ]

3. How fast in accessing a shared folder?


Poor (2-3 min)[ ] Average (1-2 min)[ ] Fast (Less than 1 min)[x]

4. What do you think about the security of the system?


Poor [ ] Satisfied [ ] Excellent [x]

5. In communication with order branches was easier?


Yes [x] No [ ]

6. Does the system cater all your requirements?


Yes [ ] Up to certain extent [ ] No [x]

7. How do you rate the overall performance of the system?


0 1 2 3 4 5
Poor Excellent

8. Are you satisfied with the Wi-Fi?


Yes [x] No [ ]

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 98


9. How do you rate the overall performance of the system?
0 1 2 3 4 5
Poor Excellent

10. What do you recommended for feature improvements?

I have not feature improvements

Figure 80: User Feedback Form 2

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 99


User Feedback Form 3
USER FEEDBACK FORM

Employee Number : 3
Employee Name : Ruwindya Pathirana
Position : Network 05

1. Does the system response fast?


Poor (2-3 min)[ ] Average (1-2 min)[ ] Fast (Less than 1 min)[x]

2. Does the network solution provide data and resource solution?


Yes [x] No [ ]

3. How fast in accessing a shared folder?


Poor (2-3 min)[ ] Average (1-2 min)[ ] Fast (Less than 1 min)[x]

4. What do you think about the security of the system?


Poor [ ] Satisfied [ ] Excellent [x]

5. In communication with order branches was easier?


Yes [x] No [ ]

6. Does the system cater all your requirements?


Yes [ ] Up to certain extent [ ] No [x]

7. How do you rate the overall performance of the system?


0 1 2 3 4 5
Poor Excellent

8. Are you satisfied with the Wi-Fi?


Yes [x] No [ ]

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 100


9. How do you rate the overall performance of the system?
0 1 2 3 4 5
Poor Excellent

10. What do you recommended for feature improvements?

I have not feature improvements

Figure 81: User Feedback Form 3

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 101


7. Suggest a maintenance schedule to support the networked system.

7.1. Why maintain schedule to support the networked system?

Data is the most important thing for any organization. In a network system, data is
transmitted from one person's computer to another over the network. If this type of network
suddenly crashes, the entire system will crash. If their network is not properly maintained or
protected, it can lead to data loss and vulnerability by hackers. It should have a maintenance
schedule and keep it high performance. Security improves the efficiency of the system and
improves network productivity. This will prevent unwanted and unauthorized access to the
network. Therefore, the most important thing for a network is a maintenance schedule.
Moreover, maintain a more important schedule for the resources allocated to achieve network
objectives.

7.2. Maintain Schedule


Task Regular date Completion Need of
Task
No. and time (Yes / No) Requirements
1. Clean temporary file on Saturday at Yes Change cable
computer 4.00pm Change NIC
2. Check the connectivity of Monday at Yes
cable 11.45am
3. Clean temporary file and Monday at Yes
unnecessary files inside the 5.20pm
server
4. Update server virus guard Daily at 6.00pm Yes
daily
5. Backup server and data Daily at 5.00pm Yes
daily
6. Update server user account At once a Yes
and password month
7. Update firewall At once a week Yes

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 102


8. Update proxy server At once a Yes
month
9. Check subnet work At once a week Yes
10. Check Wi-Fi router and At once a Yes
switches month
Table 5: Maintain Schedule to support the networked system

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 103


Activity 03

11. Implement a networked system based on your prepared design.

1.1. Newly activated network

In the case of the new network implemented above, the end result is a pre-structure of the
functionality. The network team will explain how to activate this network. Task 02 identifies
the blue print, network diagrams, and VLSM math, server installation, and IP routing table.

 Step 01: Select the most suitable Ethernet version

1000BaseT and Purchase Cat5e cables have been identified as the most suitable Ethernet
network.

 Step 02: Buy accessories

On top of the modern network that was activated, I had to buy a few computer network
devices that already had other network devices. These will be many Cisco products in the
devices mentioned above. It also has unbranded accessories. Before buying as a network
engineer in a network team, pay attention to the quality of brands, features and accessories.

 02 Cisco Switch (Port 24)

 Wireless Access Prowling

 Server computer

 Cat5e wire and RJ45 connectors and cable covers

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 104


2. Conduct verification with e.g. Ping, extended ping, trace route, telnet, SSH, etc.

2.1. Check internal connectivity of Enclave Films

Figure 82: Zero point loss

Figure 83: Zero point loss

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 105


Figure 84: Zero point loss

Figure 85: Zero point loss

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 106


Figure 86: Zero point loss

2.2. Check external connectivity of Enclave Films

Figure 87: No connection between 192.168.1.7 to 192.168.1.3

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 107


Figure 88: No connection between 192.168.1.10 to 192.168.1.35

Figure 89: No connection between 192.168.1.1 to 192.168.1.38

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 108


Figure 90: No connection between 192.168.1.12 to 192.168.1.40

Figure 91: No connection between 192.168.1.5 to 192.168.1.45

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 109


2.3. Check internal connectivity of Vivid Zone

Figure 92: Zero with loss

Figure 93: Zero point loss

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 110


Figure 94: Zero point loss

Figure 95: Zero point loss

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 111


Figure 96: Zero point loss

2.4. Check external connectivity Vivid Zone

Figure 97: No connection between 192.168.1.45 to 192.168.1.1

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 112


Figure 98: No connection between 192.168.1.7 to 192.168.1.3

Figure 99: No connection between 192.168.1.41 to 192.168.1.10

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 113


Figure 100: No connection between 192.168.1.41 to 192.168.1.8

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 114


3. Record the test results and analyze these against expected results.

3.1. Test case


Test Testing Description Why of Expected Actual results
No. checking results (Pass / Fail)

1. Check Internet Open Google Visited Pass


browser and google.lk
search

2. Check Bandwidth Search the Speed above Pass


Google and 100Mbps
check speed

3. Check subnet mask Ping to other Separated Pass


computer subnet work

4. Check server OS Go to services Working Pass


properly

5. Check active directory Go to role and Working Pass


domain service features properly

6. Check firewall Go to role and Working Pass


features properly

7. Check proxy servers Go to role and Working Pass


features properly

8. Check virus guard Go to role and Working Pass


features properly

Table 6: Test Cases

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 115


4. Investigate what functionalities would allow the system to support device growth
and the addition of communication devices.

When considering an enabled network diagram, it is important for a network operator to


know what activities allow the system to grow and add communication devices. The
following can be considered as the main activities of that growing network.

1. Possibility to add more switches and computers.

2. Existence of more subnet works already for future purposes.

3. Unallocated Wi-Fi area for building „B‟

4. Taking action to add new services to the client computer.

4.1. Possibility to add more switches and computers.

Considering the diagram of the activated network, there is still the possibility of adding more
switches and computers as per the requirement of the company. There is no limit to the
number of computers that can be added to this network and any number of computers can be
deployed.

Figure 101: Network Diagram

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 116


4.2. Existence of more subnet works already for future purposes.

As mentioned in Activity 2, the network team activates the routing table with the new subnet
mask and assigns IP ranger to the subnet. No less than 30 computers with six sub-networks,
no need to change full IP ranges, and can be subdivided from the prepared table.

Network Network Usable IP Broadcast IP Assign Sub Net


No. Address Rank For Network

1. 192.168.1.0 192.168.1.1 192.168.1.31 Enclave 255.255.255.224


Films
192.168.1.30
2. 192.168.1.32 192.168.1.33 192.168.1.63 Vivid 255.255.255.224
Zone
192.168.1.62
3. 192.168.1.64 192.168.1.65 192.168.1.95 Future 255.255.255.224
Purpose
192.168.1.94
4. 192.168.1.96 192.168.1.97 192.168.1.127 Future 255.255.255.224
Purpose
192.168.1.126
5. 192.168.1.128 192.168.1.129 192.168.1.159 Future 255.255.255.224
Purpose
192.168.1.158
6. 192.168.1.160 192.168.1.161 192.168.1.191 Future 255.255.255.224
Purpose
192.168.1.190
7. 192.168.1.192 192.168.1.193 192.168.1.223 Future 255.255.255.224
Purpose
192.168.1.222
8. 192.168.1.224 192.168.1.225 192.168.1.255 Future 255.255.255.224
Purpose
192.168.1.254
Table 7: Routing

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 117


4.3. Unallocated Wi-Fi area for building ‘B’

Enclave Films will need a very fast Wi-Fi facility. This makes the work of the organization
easier.

4.4. Taking action to add new services to the client computer

It also has a server computer in the network enabled above. Meanwhile, Microsoft Windows
Server 2012 has been installed as an operating system. Through the 2012 server where
ADDS, Firewall, Proxy server and anti-virus protectors are installed and configured.
However, if you want to add more features, you can add and configure as needed.

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 118


Gantt chart

2020 October 15 – October 23


Description
15 16 17 18 19 20 21 22 23 24

Activity 01 - Examine
networking principles and
their protocols. In
addition, Explain
networking devices and
operations.

Designing the network

Activity 02 - Design
efficient networked
systems.

Activity 03 - Implement
and diagnose networked
systems.

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 119


Bibliography

1. (n.d.). Retrieved October 16, 2020, from


https://www.google.com/search?q=what+is+the+bus+topology&source=lnms&tbm=isch
&sa=X&ved=0ahUKEwipuPrilpzeAhXHfn0KHY4HBMwQ_AUIDigB&biw=1366&bih
=654#imgrc=FWEZX0cK03eZQM:
2. (n.d.). Retrieved October 16, 2020, from
https://www.google.com/search?q=ring+topology&source=lnms&tbm=isch&sa=X&ved=
0ahUKEwieqKjLop7eAhXHxLwKHcGIAUAQ_AUIDigB&biw=1366&bih=654#imgrc
=NoGejTnETobeTM:
3. (n.d.). Retrieved October 16, 2020, from
https://www.google.com/search?q=mesh+topology&source=lnms&tbm=isch&sa=X&ved
=0ahUKEwj3zqK8rZ7eAhXKbbwKHdOZBwIQ_AUIDigB&biw=1366&bih=654#imgrc
=UjG8fG5lpRwkNM:
4. (n.d.). Retrieved October 16, 2020, from
https://www.google.com/search?q=what+is+the+star+topology&source=lnms&tbm=isch
&sa=X&ved=0ahUKEwjMx-
qCnpzeAhVKPI8KHdVFAosQ_AUIDigB&biw=1366&bih=654#imgrc=lsjPExUt0DWd
wM:
5. (n.d.). Retrieved October 17, 2020, from
https://www.google.com/search?q=file+server&source=lnms&tbm=isch&sa=X&ved=0ah
UKEwjTxcvO59DfAhXOXn0KHQnTBQYQ_AUIDigB&biw=1366&bih=654#imgrc=M
zJqB0MpzVrWRM:
6. (n.d.). Retrieved October 17, 2020, from
https://www.google.com/search?q=print+server&source=lnms&tbm=isch&sa=X&ved=0
ahUKEwiulZPXrujfAhUKbbwKHfH6DmkQ_AUIDigB&biw=1366&bih=654#imgrc=dh
lv3DPiOFETdM:
7. (n.d.). Retrieved October 10, 2020, from
https://www.google.com/search?q=database+server&source=lnms&tbm=isch&sa=X&ve
d=0ahUKEwjv7vuh9dDfAhUXWX0KHa1cDSgQ_AUIDigB&biw=1366&bih=654#imgr
c=auNUpSloNhMgPM:
8. (n.d.). Retrieved October 17, 2020, from
https://www.google.com/search?q=ftp+server&source=lnms&tbm=isch&sa=X&ved=0ah

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 120


9. UKEwjGm_H1_9DfAhXGV30KHazWACIQ_AUIDigB&biw=1366&bih=654#imgrc=G
nfkWov1woy2VM:
10. (n.d.). Retrieved October 17, 2020, from
https://www.google.com/search?q=dns+server&source=lnms&tbm=isch&sa=X&ved=0a
hUKEwivvdvi3tHfAhWDfLwKHYV5DlYQ_AUIDigB&biw=1366&bih=654#imgrc=yV
RxgaDIDsMX3M:
11. (n.d.). Retrieved October 17, 2020, from
https://www.google.com/search?q=dhcp+server&source=lnms&tbm=isch&sa=X&ved=0
ahUKEwjrhriBr9PfAhXFbbwKHVPoBUoQ_AUIDigB&biw=1366&bih=654#imgrc=5as
aBwVWVvqtAM:
12. (n.d.). Retrieved October 21, 2020, from
https://www.google.com/search?q=lan+network+using+switch&source=lnms&tbm=isch
&sa=X&ved=0ahUKEwi1v8uStr_eAhUFQI8KHTeEBLgQ_AUIEigB&biw=1366&bih=
654#imgrc=f1mRWUdU6A5AWM:
13. (n.d.). Retrieved October 21, 2020, from
https://www.google.com/search?q=vpn+network+diagram&source=lnms&tbm=isch&sa=
X&ved=0ahUKEwiNtq-
8yr_eAhWCp48KHWDCDywQ_AUIEigB&biw=1366&bih=654#imgrc=0tYn8SZ7zCoe
dM:
14. (n.d.). Retrieved October 23, 2020, from
https://www.google.com/search?q=proxy+server&sxsrf=ALeKk03LRsh-
ASEQeD0GcwAlypf-
OSOKcw:1603452633263&source=lnms&tbm=isch&sa=X&ved=2ahUKEwjrmvrEzsrsA
hWYcn0KHfF_B_8Q_AUoAXoECA8QAw&biw=1366&bih=625#imgrc=X_qkdfKBsoe
6iM
15. bbc. (n.d.). Communication. Retrieved October 17, 2020, from
https://www.bbc.co.uk/bitesize/guides/z7mxh39/revision/9
16. Berry, M. (n.d.). Network Security: Top 5 Fundamentals. Retrieved October 18, 2020,
from itmanagerdaily.com: http://www.itmanagerdaily.com/network-security-
fundamentals/
17. Cockerham, R. (2018, September 24). What Is Networking Software? Retrieved October
18, 2020, from techwalla.com: https://www.techwalla.com/articles/what-is-networking-
software

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 121


18. computerhope.com. (2020, February 02). Network. Retrieved October 21, 2020, from
Computer Hope: https://www.computerhope.com/jargon/n/network.htm
19. docs.oracle.com. (2010). Quality of Service Requirements. Retrieved October 19, 2020,
from docs.oracle.com: https://docs.oracle.com/cd/E19636-01/819-2326/gaxqg/index.html
20. Fairhurst, G. (2001). Metropolitan Area Networks (MANs). Retrieved October 21, 2020,
from https://erg.abdn.ac.uk/users/gorry/course/intro-pages/man.html
21. Fischer, P. (2018). What is a file server? Retrieved October 17, 2020, from
https://www.quora.com/What-is-a-file-server
22. Michael Page team. (2018, November 05). Top 11 benefits of networking. Retrieved
October 16, 2020, from michaelpage: https://www.michaelpage.com.au/advice/career-
advice/career-progression/benefits-networking
23. omnisecu. (n.d.). Local Area Network (LAN), and Wide Area Network (WAN). Retrieved
October 21, 2020, from http://www.omnisecu.com/basic-networking/lan-and-wan-local-
area-network-and-wide-area-network.php
24. Rouse, M. (n.d.). File Transfer Protocol (FTP). Retrieved December 02, 2018, from
https://searchenterprisewan.techtarget.com/definition/File-Transfer-Protocol
25. Rouse, M. (n.d.). proxy server. Retrieved October 23, 2020, from WhatIs.com:
https://whatis.techtarget.com/definition/proxy-
server#:~:text=A%20proxy%20server%20is%20a,client%20is%20requesting%20a%20se
rvice.
26. Shekhar, A. (2016, March 30). Different Networking Devices And Hardware Types —
Hub, Switch, Router, Modem, Bridge, Repeater. Retrieved October 17, 2020, from
fossbytes: https://fossbytes.com/networking-devices-and-hardware-types/
27. Sivaranjith. (2018, November 17). Communication network topology. Retrieved October
17, 2020, from automationforum.co: https://automationforum.co/communication-
network-topology/
28. Thakur, D. (n.d.). What is Network Security? Explain Basic Requirements of Network
Security. Retrieved October 18, 2020, from ecomputernotes.com:
https://ecomputernotes.com/computernetworkingnotes/security/requirements-of-network-
security

K. A. Damith Sriyantha Karunathilake Unit 02-Networking Page 122

You might also like