0% found this document useful (0 votes)
191 views90 pages

1151-1647580999324-Unit 02 Networking - Reworded - 2021

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
191 views90 pages

1151-1647580999324-Unit 02 Networking - Reworded - 2021

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Higher Nationals

Internal verification of assessment decisions – BTEC (RQF)

INTERNAL VERIFICATION – ASSESSMENT DECISIONS


Programme title BTEC Higher National Diploma in Computing

Assessor Mr. Anjana De Silva Internal Verifier

Unit 02: Networking


Unit(s)
LAN Design & Implementation for SYNTAX SOLUTIONS
Assignment title

Student’s name D.G. Nimanthika Prasadani Rathnaweera

List which assessment criteria Pass Merit Distinction


the Assessor has awarded.

INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded match


those shown in the assignment brief? Y/N
Is the Pass/Merit/Distinction grade awarded
justified by the assessor’s comments on the
student work? Y/N

Has the work been assessed


Y/N
accurately?
Is the feedback to the student:
Give details:
• Constructive? Y/N
• Linked to relevant assessment criteria? Y/N
• Identifying opportunities for Y/N
improved performance?
• Agreeing actions? Y/N
Does the assessment decision need
Y/N
amending?

Assessor signature Date

Internal Verifier signature Date


Programme Leader signature (if required)
Date

Confirm action completed


Remedial action taken
Give details:

1
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
Assessor signature Date

Internal Verifier
Date
signature
Programme Leader
Date
signature (if required)

2
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
Higher Nationals - Summative Assignment Feedback Form

Student Name/ID D.G. Nimanthika Prasadani Rathnaweera

Unit 02: Networking


Unit Title

Assignment Number 1 Assessor

28/10/2022 Date Received


Submission Date
1st submission
Date Received 2nd
Re-submission Date
submission

Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction P1 P2 M1
Descripts

LO2 Explain networking devices and operations.


Pass, Merit & Distinction P3 P4 M2 D1
Descripts

LO3 Design efficient networked systems.


Pass, Merit & Distinction P5 P6 M3 D2
Descripts

LO4 Implement and diagnose networked systems.


Pass, Merit & Distinction P7 P8 M4 D3
Descripts

Grade: Assessor Signature: Date:

Resubmission Feedback:

Grade: Assessor Signature: Date:

Internal Verifier’s Comments:

Signature & Date:

3
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades
decisions have been agreed at the assessment board.

Assignment Feedback
Formative Feedback: Assessor to Student

Action Plan

Summative feedback

Feedback: Student to Assessor

4
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
Assessor signature Date

Student signature Date

Pearson Higher Nationals in


Computing
Unit 02: Networking
Assignment 01

5
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
General Guidelines

1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom, right margins and 1.25” for the left margin of each page.

Word Processing Rules

1. The font size should be 12 point and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.

6
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.

Important Points:

1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body
except for the before mentioned compulsory information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and
a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course

7
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct form. I further understand what it means to copy
another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of Pearson UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my
own, and where I have made use of another’s work, I will attribute the source in the correct
way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Pearson, UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.

E160593@esoft.academy 23/08/2022

Student’s Signature: Date:


(Provide E-mail ID) (Provide Submission Date)

8
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
9
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
Higher National Diploma in Computing

Assignment Brief

Student Name /ID Number D.G. Nimanthika Prasadani Rathnaweera/E160593

Unit Number and Title Unit 2: Networking

Academic Year 2021/22

Unit Tutor Mr. Anjana De Silva

Assignment Title LAN Design & Implementation for SYNTAX SOLUTIONS

Issue Date 23/08/2022

Submission Date 28/10/2022

IV Name & Date

Submission format

The submission should be in the form of an individual report written in a concise, formal business style using single
spacing and font size 12. You are required to make use of headings, paragraphs and subsections as appropriate, and all
work must be supported with research and referenced using Harvard referencing system. Please also provide an end list of
references using the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures, although you will not be
penalised for exceeding the total word limit.
Unit Learning Outcomes:

LO1 Examine networking principles and their protocols.

LO2 Explain networking devices and operations.

LO3 Design efficient networked systems.

LO4 Implement and diagnose networked systems.

Assignment Brief and Guidance:

Scenario
10
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
SYNTAX SOLUTIONS is a privately owned, well-known Software company located in Colombo. The Management of
SYNTAX SOLUTIONS has purchased a 3-story building in the heart of Matara. They are planning to make it one of the
state-of-the-art companies in Matara with the latest facilities.

It is expected to have nearly 150 employees in Matara branch.

Department Number of Users

Customer Care 10

Sales and Marketing 20

Finance 25

Legal 5

HR 10

Developers 55

Network Team 5

Server Room Servers +ISP connections

Following requirements are given by the Management.


 A ll th e depa rt men ts must be s eparated w ith unique subnet and shou ld n ot
commu nic ate with each ot her unless there is a special requirement .

 19 2.168 .1 0.0/24 is giv en and sh ou ld be used for a ll t he depa rt men ts exce pt the
server room. IP s should assig n us ing DHCP .

 ERP and CRM Sys tems ne ed t o be imp le men ted in M ata ra b ra nch in loca l
servers.

 Number of s ervers required f or the Server room need to b e decide d by t he


Netw ork desig ner and sh ould be assig ned w ith 10 .2 54.1.0/24 sub net. (Use s
s tati c IPs )

 High level of redundancy is expec ted in ne twork desig n t o elim ina te sing le poin t
of fa ilures an d t ra ffi c b ott le nec ks.

11
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
 Sales and Mark eti ng Team ne ed to access Netw ork resou rce s us ing WIFI
connec ti vity.

 Proper methods for networking monitoring and troubles hooti ng need to be


e stab lish ed .

 A ll p ossible network s ecurity mec han isms sh ou ld be im pleme nte d.

Assu me you hav e bee n app ointe d as the ne w netw ork consultan t of S YNTA X S OL UTIONS .
P re pare a ne twork a rch it ectu ra l desig n and im pleme nt it w ith your sugge sti ons an d
recomme nda ti on s to meet th e compa ny re quire me nt s.

(Note: Clearly state your assumpti ons. You ar e allowed to design the network
accor ding to your assumpti ons, but main requirements should not be violated)

Acti vity 01
 D isc uss t he bene fi ts an d constraints of d iff e re nt netw ork sy ste m type s that can
be im pleme nted in the Mata ra bra nch an d the main IEE E Eth ernet sta nda rd s tha t
can be used in ab ove LA N and WLAN de sign.

 D isc uss the im porta nce an d im pact of ne twork topologies an d net work prot ocol
suites wh ile com parin g the main netw ork topologies and ne twork prot ocol suite s
th at are u sed in netw ork desig n using exam ples. Rec om mend suitab le net work
t opologies an d n etw ork prot ocol su ite s for above sc ena rio and justi fy you r answer
w ith va lid point s.

Acti vity 02
 Discu ss t he op erati n g prin ciples of net work devices (E x: Rou ter, Sw itch , E tc.) and
se rve r typ es tha t can be u sed for abov e sc ena rio wh ile explorin g d iff e re nt se rve rs
that are availa ble in today ’s marke t w ith the ir sp ecifi cati ons. Recomme nd
se rve r/se rv ers for the ab ove sce nario and ju sti f y y ou r selecti on with valid p oint s.

12
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
 Discu ss t he inte r- depe nde nce of worksta ti on hardwa re wit h net work in g soft w are
and p rovide ex amp le s for ne twork in g soft ware t hat can be used in ab ove netw ork
desig n.

Acti vity 03
 P r e p a r e a w r i tt e n n e tw o r k d e si gn p lan t o m e e t th e ab o v e - m e n ti o n e d u se r r e q u ir e m e n ts
in c lu d in g a b lu e p r in t d r aw n u s in g a m o d e l in g to o l . (E x: Mi cr o s o ft V i si o , E d r a wM ax ) .
Su p p o r t y o u r an sw e r b y p r o v id in g t h e V LA N an d IP su b n e tti n g s ch e m e f o r t h e ab o ve
sc e n a r io an d t h e l is t o f d e v ic e s , n e t wo r k c o m p o n e n t s an d s o ft wa r e u se d to d e si gn t h e
n e t wo r k f o r ab o ve s ce n ar i o an d wh ile ju s ti f yin g y o u r se le c ti o n s .

 T e s t an d e va lu a te t h e p r o p o se d d e si gn to m e e t t h e r e q u ir e m e n t s an d an al ys e u se r f e e d b a ck
b y u sin g a Us e r f e e d b a ck f o r m .

 Install an d confi g ure Netw ork se rv ice s, de vic es and app lica ti on s (Ex : VLA N, DHCP,
DNS ,P roxy , Web , Etc. ) accord in g t o the prop osed desig n to accom plish the user
re qu ireme nt s an d desig n a deta iled M ainte nance sc hedu le for ab ove Net work .

* Note: - Screen shots of Confi gurati on scripts should be pres ented.

Acti vity 04
 Imp le ment a netw orke d sy ste m ba sed on your prepa re d de sign w ith valid evidenc e
and recomme nd p ote nti al fut ure enh ance ment s for the ne twork ed system wit h va lid
ju sti fi c ati ons to your re com men dati ons. Use criti ca l re fl ecti on to criti ca lly eva lu ate
the design , pla n, con fi gu ra ti on , and te sti n g of y our ne twork while ju sti f ying w ith
valid conclusions.

 Deve lop te st cases and con duct verifi c ati on (Ex: P ing , exten ded ping, t race rou te ,
telne t, SSH , etc. ) to test the abov e Netw ork and ana ly se the te st resu lt s against the
expec ted resu lt s.

13
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
14
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
Grading Rubric

Grading Criteria Achieved Feedback

LO1 : Examine networking principles and their protocols.

P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Compare common networking principles and how protocols
enable the effectiveness of networked systems.

LO2 : Explain networking devices and operations

P3
Discuss the operating principles of networking devices and
server types.
P4

15
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
Discuss the inter-dependence of workstation hardware with
relevant networking software.

M2
Explore a range of server types and justify the selection of a
server, considering a given scenario regarding cost and
performance optimization.

LO 1 & LO2
D1 Critically evaluate the topology protocol selected for a given scenario to
demonstrate the efficient utilization of a networking system.
LO3 : Design efficient networked systems

P5
Design a networked system to meet a given specification.
P6
Test and evaluate the design to meet the requirements and
analyze user feedback.
M3
Install and configure network services and applications on your
choice.

16
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
D2
Design a maintenance schedule to support the networked
system.
LO4 : Implement and diagnose networked systems

P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D3
Use critical reflection to evaluate own work and justify valid
conclusions.

17
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
ACKNOWLEDGEMENT
The author would like to acknowledge and give warmest thank to the tutor Mr. Anjana de silva who guide in this assignment.
The author would also like to give special thanks to family members for their continuous support and understanding. And the
classmates who helped to finish this assignment successfully.

18
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
INTRODUCTION
SYNTAX SOLUTIONS is a privately owned, well-known Software company located in Colombo. The Management of SYNTAX
SOLUTIONS has purchased a 3-story building in the heart of Matara. They are planning to make it one of the state-of-the-art companies in
Matara with the latest facilities. So, this assignment is to create a suitable system for Matara branch according to the requirements given by
the Management.

19
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
Content
Acknowledgement.............................................................................................................................................................................................................................................19
Introduction.......................................................................................................................................................................................................................................................20
List of Figures.....................................................................................................................................................................................................................................................25
List of Tables......................................................................................................................................................................................................................................................27
Activity 01..........................................................................................................................................................................................................................................................28
What is a computer network?.......................................................................................................................................................................................................................28
Network system types...................................................................................................................................................................................................................................28
LAN – Local Area Network.........................................................................................................................................................................................................................29
WAN- Wide Area Network.........................................................................................................................................................................................................................30
MAN – Metropolitan Area Network..........................................................................................................................................................................................................32
Network Standards........................................................................................................................................................................................................................................34
IEEE Ethernet standards............................................................................................................................................................................................................................35
Network Topologies.......................................................................................................................................................................................................................................37
Logical Topology........................................................................................................................................................................................................................................37
Ethernet, Fast ethernet, Giga ethernet.................................................................................................................................................................................................37
VLAN (Virtual local area network).........................................................................................................................................................................................................39
Physical Topology......................................................................................................................................................................................................................................40
Bus Topology.........................................................................................................................................................................................................................................41
Mesh Topology......................................................................................................................................................................................................................................41
Tree Topology........................................................................................................................................................................................................................................42
Star Topology.........................................................................................................................................................................................................................................43

20
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
Ring Topology........................................................................................................................................................................................................................................45
Hybrid Topology.....................................................................................................................................................................................................................................46
Network protocols.........................................................................................................................................................................................................................................48
Application layer Network Protocols.........................................................................................................................................................................................................48
FTP – File Transfer Protocol...................................................................................................................................................................................................................49
SMTP – Simple Mail Transfer Protocol..................................................................................................................................................................................................50
Telnet.....................................................................................................................................................................................................................................................50
DHCP – Dynamic Host configuration Protocol......................................................................................................................................................................................51
HTTP -Hyper Text Transfer Protocol......................................................................................................................................................................................................51
HTTPS – Hyper Text Transfer Protocol Secure......................................................................................................................................................................................52
IP – Internet Protocol............................................................................................................................................................................................................................52
Transport layer Network Protocols...........................................................................................................................................................................................................53
TCP (Transport User Protocol)...............................................................................................................................................................................................................53
UDP (User Datagram Protocol)..............................................................................................................................................................................................................54
Activity 02..........................................................................................................................................................................................................................................................55
Hardware Devices..........................................................................................................................................................................................................................................55
Network Devices........................................................................................................................................................................................................................................55
Hub.........................................................................................................................................................................................................................................................55
Switch....................................................................................................................................................................................................................................................56
Repeater................................................................................................................................................................................................................................................57
Bridge.....................................................................................................................................................................................................................................................59
Gateway.................................................................................................................................................................................................................................................60
Router....................................................................................................................................................................................................................................................61
Modem..................................................................................................................................................................................................................................................62

21
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
Network Software......................................................................................................................................................................................................................................66
Anti-Virus...............................................................................................................................................................................................................................................66
Firewalls.................................................................................................................................................................................................................................................66
Servers...........................................................................................................................................................................................................................................................67
 Web server.......................................................................................................................................................................................................................................67
 File server.........................................................................................................................................................................................................................................68
 Mail server.......................................................................................................................................................................................................................................68
 Database server...............................................................................................................................................................................................................................68
 Proxy server-....................................................................................................................................................................................................................................68
The servers available in today’s market....................................................................................................................................................................................................68
ACTIVITY 03........................................................................................................................................................................................................................................................72
The blueprint of the SYNTAX SOLUTIONS Company..............................................................................................................................................................................72
Configuring network system..........................................................................................................................................................................................................................78
Creating VLANs..........................................................................................................................................................................................................................................78
Assigned ports to VLANs............................................................................................................................................................................................................................78
Configure the switch..................................................................................................................................................................................................................................80
Configure the router..................................................................................................................................................................................................................................81
Configure DHCP.........................................................................................................................................................................................................................................81
PDU test.....................................................................................................................................................................................................................................................84
Testing configurations...................................................................................................................................................................................................................................84
Testing Ip configuration from DHCP server from PC at HR VLAN..............................................................................................................................................................84
Activity 04..........................................................................................................................................................................................................................................................86
PING command..........................................................................................................................................................................................................................................86
Extend PING command..............................................................................................................................................................................................................................87

22
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
TRACENT command...................................................................................................................................................................................................................................87
Feedback forms.............................................................................................................................................................................................................................................88

23
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
LIST OF FIGURES
Figure 1:Local Area Network System.................................................................................................................................................................................................................30
Figure 2:Wide Area Network.............................................................................................................................................................................................................................31
Figure 3:Metropolitan Area Network................................................................................................................................................................................................................33
Figure 4:VLAN....................................................................................................................................................................................................................................................39
Figure 5:bus topology........................................................................................................................................................................................................................................41
Figure 6:Mesh Topology....................................................................................................................................................................................................................................42
Figure 7:tree topology.......................................................................................................................................................................................................................................43
Figure 8:star topology........................................................................................................................................................................................................................................44
Figure 9:ring topology........................................................................................................................................................................................................................................45
Figure 10:Hybrid topology.................................................................................................................................................................................................................................46
Figure 11:Hub....................................................................................................................................................................................................................................................56
Figure 12:Types of switches..............................................................................................................................................................................................................................57
Figure 13:repeater.............................................................................................................................................................................................................................................58
Figure 14:The process of repeater....................................................................................................................................................................................................................59
Figure 15:Bridge.................................................................................................................................................................................................................................................60
Figure 16:Gateway.............................................................................................................................................................................................................................................61
Figure 17:Router................................................................................................................................................................................................................................................62
Figure 18:Modem..............................................................................................................................................................................................................................................63
Figure 19:The process of modem......................................................................................................................................................................................................................64
Figure 20:Transmit data using modem and router...........................................................................................................................................................................................65
Figure 21:Firewall..............................................................................................................................................................................................................................................67
Figure 22:Blueprint of the system.................................................................................................................................................................................................................73
Figure 23:Syntax Solutions company sample system created by using cisco packet tracer.............................................................................................................................77
Figure 24:configuring main switch....................................................................................................................................................................................................................80
Figure 25:trunking ports in MAin switch...........................................................................................................................................................................................................80
Figure 26:configuring router..............................................................................................................................................................................................................................81
Figure 27:DHCP configuration...........................................................................................................................................................................................................................83
Figure 28:Assigned subinterfaces......................................................................................................................................................................................................................84
Figure 29:PDu test.............................................................................................................................................................................................................................................84
Figure 30:PING command..................................................................................................................................................................................................................................86

24
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
Figure 31:Extend ping command.......................................................................................................................................................................................................................87
Figure 32:tracent command..............................................................................................................................................................................................................................88
Figure 33:feedbackforms...................................................................................................................................................................................................................................89

25
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
LIST OF TABLES
Table 1:Advantages and disadvantages of Local area network........................................................................................................................................................................30
Table 2:Advantages and disadvantages of Wide Area Network.......................................................................................................................................................................32
Table 3:Advantages and Disadvantages of Metropolitan Area Network..........................................................................................................................................................34
Table 4: IEEE Standards.....................................................................................................................................................................................................................................36
Table 5:Comparison of ethernet, fast ethernet & giga ethernet......................................................................................................................................................................38
Table 6:Advantages and disadvantages of FTP.................................................................................................................................................................................................49
Table 7:Advantages and Disadvantages of SMTP..............................................................................................................................................................................................50
Table 8:Advantages and disadvantages of DHCP..............................................................................................................................................................................................51
Table 9 :Advantagess and disadvantages of HTTPS..........................................................................................................................................................................................52
Table 10:advantages and disadvantages of TCP...............................................................................................................................................................................................54
Table 11:Comparing modem and router...........................................................................................................................................................................................................65
Table 12:Servers available in today's market....................................................................................................................................................................................................71
Table 13:IP addressing and VLAN configuration...............................................................................................................................................................................................76

26
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
ACTIVITY 01

WHAT IS A COMPUTER NETWORK?

Computer network is a system that connects two or more computing devices for the purpose of exchanging and sharing information
through cables and computers. That can be done over physical and wireless technologies.

NETWORK SYSTEM TYPES


Networks are classified in different types based on purpose and size. Following are some different network system types.

 LAN – Local Area Network


 WLAN – Wireless Local Area Network
 MAN– Metropolitan Area Network
 WAN– Wide Area Network
 CAN– Campus Area Network
 SAN–Storage Area Network
 PAN–Personal Area Network
 VPN–Virtual Private Network

27
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
LAN – LOCAL AREA NETWORK
LAN is used for connecting two or more personal computers through a communication medium such as twisted pair, coaxial cable,
etc... A local area network can be spans in a small area. It is less costly as it is built with inexpensive hardware such as hubs, network
adapters and ethernet cables. LAN is secure than other system types because it can’t be accessed from outside. In local area network the data
is transferred at an extremely faster rate.

(Services, 2022)

28
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
FIGURE 1:LOCAL AREA NETWORK SYSTEM

Advantages Disadvantages
Can use a single internet connection If a server hard disk is not properly secured
by the LAN administrator, unauthorized
users can access important data
Can share files with one another and print Every LAN user’s personal data file could
to shared printers check and see by the LAN administrator
The data is transferred at an extremely Problems such as software installation,
faster rate and easy to manage data program faults or hardware failure or cable
disturbances can occur
Since data is stored on the stored on the Covers limited areas
server computer data security is high
TABLE 1:ADVANTAGES AND DISADVANTAGES OF LOCAL AREA NETWORK

(Jahejo, 2022)

WAN- W IDE AREA NETWORK

WAN is used to cover a very large geographical area such as country, continent, or it may be covering even the world. Wide
area network can transfer data and information to a long distance. Wide area network is a collection of local area networks and the other
networks which can communicate one another.

29
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
FIGURE 2:WIDE AREA NETWORK

30
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
Advantages Disadvantages
Can communicate with countries/islands It costs a lot of money to set up
easily
Users can get updated files and data from Many devices are connected to each other,
servers in seconds making them vulnerable of cyber attacks
As WAN covers a large geographical area, Due to the lack of proper power supply in
all branches of business offices located in remote areas, frequent disconnection
different locations can communicate over problems can occur
WAN without effort

TABLE 2:ADVANTAGES AND DISADVANTAGES OF WIDE AREA NETWORK

(Services, 2022)

MAN – METROPOLITAN AREA NETWORK

A Metropolitan Area Network is a computer network that connects computers within a single large city/town or any large area
with multiple buildings.

31
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
FIGURE 3:METROPOLITAN AREA NETWORK

Advantages Disadvantages
In some installations, multiple users can If the MAN gets bigger, it becomes difficult
access the same high-speed internet to manage due to security issues
High -security level than WAN In MAN additional cables are required to
connect two LAN

32
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
MAN uses fiber optics so files can be To setup MAN it requires technical people
transferred faster that can correctly setup MAN
TABLE 3:ADVANTAGES AND DISADVANTAGES OF METROPOLITAN AREA NETWORK

(Rehman, 2022)

According to the given scenario, SYNTAX SOLUTIONS software company you can install LAN network system in
Matara branch and WAN network system to connect with Colombo branch.

NETWORK STANDARDS

Network standards are standards used to ensure that the devices, equipment, and software that given networking are fit for
their intended purpose. Simply defined, a document developed to provide technical requirements and guidelines.

Following are some official organizations that publish regulated standards.

 International Standards Organization (ISO)


 International Telecommunication Union (ITU)

33
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
 Institute of Electronics and Electronical Engineering (IEEE)
 American National Standards Institute (ANSI)
 Internet Engineering Task Force (IETF)
 Electronic Industries Association (EIA)
 World Wide Web Consortium (W3C)

IEEE ETHERNET STANDARDS

Ethernet is defined in several IEEE (Institute of Electrical and Electronics Engineers) 802.3 standards. This set of
networking standards is used to ensure that devices/cables developed by individual manufacturers are compatible with networking
technologies.
Following are some IEEE standards which we can use in installing local area network system.

IEEE standards description


IEEE 802.1 Standards for LAN bridging and
management and remote media access
control (MAC) bridging
IEEE 802.6 Standards for information exchange
between systems

34
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
IEEE 802.7 Standards for broadband LAN cabling
IEEE 802.10 Standards for LAN security
implementations
IEEE 802.11 Wireless networking – “Wi-Fi”
IEEE 802.15.1 Bluetooth
IEEE 802.15.4 Wireless sensor/ control networks –
“ZigBee”

TABLE 4: IEEE STANDARDS

(Network standards and devices, 2022)

Benefits:
 make sure that the network connectivity and management are easier.
 Being able to easily connect components over the network.
 Easily exchange data

Constraints:
 Occur international problem.
 All companies and manufactures must follow the standards instead of developing new techniques

35
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
NETWORK TOPOLOGIES

The arrangement in which computer systems or network devices are connected to each other is called network topology. A
network topology is used to describes variety of network concepts.

There are 2 main types of Topologies

1.Logical Topology

2.Physical Topology

LOGICAL TOPOLOGY
Logical topology explains how data is transferred in the network (communication path). For example, how data move from
switches and routers.

E THERNET , F AST ETHERNET , G IGA ETHERNET


Ethernet is a system which is used to connect the multiple systems to develop a LAN (Local Area Network) system. Ethernet topology can
use two physical topologies that are the bus and the star topology . Fast Ethernet and Gigabit Ethernet, both are used to accomplish this
purpose. But some differences arise on the matter of coverage, speed, and configuration.

Ethernet Fast ethernet Giga ethernet


speed 10MBPS 100 MBPS 1000 MBPS
IEEE standard 802.3 802.3u 802.3z

36
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
Maximum distance 100 m 2000m 5000m
can reach
versions 10BASE5, 100BASE-Tx, 10GBASE-T,
10BASE2, 10BASE- 100BASE-Fx, 10GBASE-R,
F, 10BASE-T 100BASE-T4 10GBASE-X and
10GBASE-W

TABLE 5:COMPARISON OF ETHERNET, FAST ETHERNET & GIGA ETHERNET

 Gigabit Ethernet is 10 times faster than Fast Ethernet, so using Gigabit Ethernet is easier and more efficient than Fast Ethernet.
 Due to more bit transfer speed and higher bandwidth, Gigabit Ethernet results in better performance than Fast Ethernet.
 Gigabit Ethernet is more expensive than Fast Ethernet. and as well as when upgrading, it is very expensive and complex to upgrade
Gigabit Ethernet from Fast Ethernet. upgrade Fast Ethernet from Standard Ethernet is easy and cost effective
 Configuration problems in Gigabit Ethernet are more complex than Fast Ethernet.
 Gigabit Ethernet can cover a larger area than Fast Ethernet
 Faster Ethernet can run on both optical fiber cable and twisted pair cable. But Gigabit Ethernet runs on twisted pair cable, optical
fiber or shielded balanced copper cable.
 The ports of Gigabit Ethernet cost four times the price per port of Fast Ethernet.
 Gigabit Ethernet requires specifically designed network devices that can support the standard 1000Mbps data rate. Fast Ethernet
requires no specific network devices

37
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
 If you need the more bandwidth, then Gigabit Ethernet will provide you the more bandwidth at the best possible frequency as
compared to the Fast Ethernet.
(Fast Ethernet vs. Gigabit Ethernet: What's the Difference? | ComNet, 2022)

VLAN (V IRTUAL LOCAL AREA NETWORK )


VLAN allows increase security measures and decrease network latency. A VLAN is a collection of devices or network nodes on one or more
LAN segments that can communicate with each other (communicate with one another as if they made up a single LAN). Here one
department local area network system is separated from each other by a bridge, router, or switch. Here single broadcast domain divide into
multiple broadcast domains. Host in one VLAN cannot exchange data packets to a host in another.

FIGURE 4:VLAN

38
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
Recommendation:
As per the given requirements in SYNTX SOLUTIONS company, there may be high security, so there you can use VLAN because
it is more protective than other logical topologies. And as well as the company has purchased a 3-story building the topology have able to
cover the whole building so fast ethernet also can recommend choosing.

PHYSICAL TOPOLOGY
Physical topology is how the devices are interconnected with wires and cables.

Some examples for physical network topology.

▪ Bus Topology
▪ Mesh Topology
▪ Tree Topology
▪ Star Topology
▪ Ring Topology
▪ Hybrid Topology

39
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
B US T OPOLOGY
Here one computer acts as a server and the connection is linear and a single cable is used to connect all the nodes.
The main disadvantage is that if the man cable fails, the entire system is affected

FIGURE 5:BUS TOPOLOGY

M ESH T OPOLOGY
Here point to point connection is established with each system. In mesh topology one host is connected to one or multiple hosts.

The implementation is complex but there is no traffic problem in this topology.

40
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
FIGURE 6:MESH TOPOLOGY

T REE T OPOLOGY

Here, all the nodes are connected through a root node. Since the topology
is connected in a hierarchical way, it is called hierarchical topology.
The main disadvantage here is that when one node fails, the entire
network is affected.

41
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
FIGURE 7:TREE TOPOLOGY

S TAR T OPOLOGY
Here all the computers are connected to each other through a common point.

The star topology systems are easy to install and cheap.

each device on the network has its own cable that connects to a switch or hub. If one computer fails, the others work without
interrupted. And troubleshooting is easy.

42
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
FIGURE 8:STAR TOPOLOGY

43
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
R ING T OPOLOGY
All devices are connected to each other in a ring and messages travel in the direction of a ring. Here if one device has to transmit data to
a device that is behind it on the ring, it will have to go to every other device before it reaches its destination.

Here if one computer fails, it affects the entire network system. Troubleshooting is difficult in this topology.

FIGURE 9:RING TOPOLOGY

44
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
H YBRID T OPOLOGY

Since more than two topologies are interconnected here, any standard topology is not isolated here. The topology design here is
complex. To install this topology system cost is high.

FIGURE 10:HYBRID TOPOLOGY

(Topology, 2022)

(Regan, Regan and profile, 2022)

45
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
Recommendation:

As per the given requirements there should be high security level so you can choose star topology as the physical topology. Choosing star
topology, you can get more benefits than other topologies. If you consider about the speed, there is high speed in star topology than hybrid
and ring topologies. If consider about reliability, unlike other topologies in star topology if one connection or device fails then all the others
will still be working and hence the network stays stable. Unlike the mesh topology, hybrid topology and tree topology, star topology setup is
less expensive since each device /node only needs one I/O port which connects with the hub via single link.

Network models

ISO OSI Model TCP/IP Model

46
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
Applicatin

Presentation

Session
OSI Model

Transport

Network

Data link

Physical

DIAGRAM 1:OSI SEVEN LAYERS

NETWORK PROTOCOLS
APPLICATION LAYER NETWORK PROTOCOLS
In networking, a protocol is a set of rules for formatting and processing data between two or more devices.

In networking there many types of protocols. Following is some of them.

 FTP – File Transfer Protocol


 SSH – Secure Shell
 SMTP – Simple Mail Transfer Protocol

47
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
 Telnet
 DNS- Domain Name Service
 HTTP -Hyper Text Transfer Protocol
 HTTPS – Secure Hyper Text Transfer Protocol
 DHCP -Dynamic Host Configuration Protocol
 ICMP
 IP – Internet Protocol

FTP – F ILE T RANSFER P ROTOCOL


This protocol is used to send files from one device to another user under user command. Both text and binary files are recommended.
FTP uses a client-server architecture.

Advantages Disadvantages
Can share large files and multiple Lack of security
directories at the same time
If an error occurs during file transfer, it can Lack of encryption capabilities
be resumed
Can recover lost data, files which had
transferred
TABLE 6:ADVANTAGES AND DISADVANTAGES OF FTP

48
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
SMTP – S IMPLE M AIL T RANSFER P ROTOCOL
SMTP is a protocol used to send email. Using SMTP, a client can transfer an email to another client on the same network. SMTP is a text
based, application level, connection-oriented protocol. POP & IMAP are used to retrieve outgoing mail

Advantages Disadvantages
Easy to install Some firewalls were able to block the ports
which are used with SMTP
Can connect to any system without a Back-and-forth conversations between
restriction servers can delay the delivery of a message

No user development is required

TABLE 7:ADVANTAGES AND DISADVANTAGES OF SMTP

T ELNET
Telnet is a protocol that enables a user to communicate with a remote device. Telnet is mostly used by network administrators to
access and manage remote devices. To access a remote device, a network admin needs to enter the IP or hostname of the remote
device, after which they will be presented with a virtual terminal that can interact with the host.

49
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
DHCP – D YNAMIC H OST CONFIGURATION P ROTOCOL
DHCP is a communication protocol which we can use to transfer Ip addresses from one place to another place in a small time. Here
the networks admins were able to distribute Ip addresses through a central point. And, if the device is plugged in a different place in
the network, then the new IP address will be sent automatically to the device. DHCP works on a client-server model.

Advantages Disadvantages
Can save time Trouble in setting up
Centralized management of IP addresses. As the Ip addresses change over time,
computers with DHCP cannot be used as
servers
Can reduce the total number of required IP
addresses
Can recover IP addresses that are no longer
used
TABLE 8:ADVANTAGES AND DISADVANTAGES OF DHCP

HTTP -H YPER T EXT T RANSFER P ROTOCOL


HTTP is a protocol that is used for distributing, collaborative, and hypermedia information systems. here the web browser acts as the
client. Data like text and images can be shared over the World Wide Web using HTTP. HTTP use TCP (Transmission control
protocol) to send and receive data packet over the web.

50
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
HTTP is a stateless protocol which means the client and server are only aware of each other while the connection between them is
interacting. After the end of the connection, both the client and the server doesn't know each other.

Advantages Disadvantages
Memory usage and CPU usage are low. Not secure
Errors can be reported without a connection. Hackers can hack easily
network traffic is less

TABLE 9 :ADVANTAGESS AND DISADVANTAGES OF HTTPS

HTTPS – H YPER T EXT T RANSFER P ROTOCOL S ECURE


HTTPS is an extension of HTTP. It is used for secure browsing.

IP – I NTERNET P ROTOCOL
Internet protocol is used to deliver data packets from one point to their real destination. That is why every device that connects to the
Internet has an IP address.
market, which has been increasingly used on the public internet since 2006.
Ip addresses are unique.

51
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
There are 2 version of IP:
1.IPv4
-An IP address is a 32-bit address
-The 32-bit IP address is broken up into 4 octets
-An octet is a set of 8 bits
-The address space is 232, or 4,294,967,296
2.IPv6
-There 5 classes in Ip address
Class A, Class B, Class C-provide unicast addresses
Class D -used for multicasting.
Class E - reserved for testing & some mysterious future use

The first version of IP (Internet Protocol) was IPv4. After IPv4, IPv6 came into the.

TRANSPORT LAYER NETWORK PROTOCOLS


The types in transport layer protocol.

 TCP – Transmission Control Protocol


 UDP – User Diagram Protocol

TCP (T RANSPORT U SER P ROTOCOL )

52
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
TCP is a connection-oriented protocol, as it requires a connection to be established between applications before data transfer. Before
transmitting data, TCP creates a connection between the source and destination node and keeps it live until the communication is
active.

Advantages Disadvantages
Break large data into smaller packets to cannot be used for broadcast and
transfer easily multicast connections.
Ensure that data reaches the destination
without duplicate on the time
TABLE 10:ADVANTAGES AND DISADVANTAGES OF TCP

UDP (U SER D ATAGRAM P ROTOCOL )


UDP is a connection-less, unreliable protocol. There is no reliability, flow control, or error recovery functions like TCP.UDP is used
where the TCP can’t transfer data.

(ManageEngine, 2022)

Recommendation:

According to the given requirements of the company DHCP should be include because the company advised to assign Ips using DHCP. The
main branch of this company is situated in Colombo so there should be FTP to transfer files. And there need SMTP because different

53
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
department message transfer is unable due to VLAN, so the need of transferring messaging among separate hosts can be full filled by this
protocol. As well as there should be TCP to break large data into smaller packets.

ACTIVITY 02
HARDWARE DEVICES
A hardware device is a device which plays a major role in a computer system as a physical or tangible device

NETWORK DEVICES
Network devices are the physical devices that are used to communicate data with hardware on a computer network.

Following is some network device types which we are used in day-to-day life.

 Hub
 Repeater
 Switch
 Router
 Bridge
 Gateway
 Modem

H UB

54
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
Hubs connect two or more computer networking devices together. A hub is the simplest network connecting devices because it
connects LAN components. A hub can be used with both digital and analog data. Hubs send data packets to all connected devices.
Hubs work in the physical layer.
There are 3 types of hubs.
1.Passive
2.Active
3.Intelligent

FIGURE 11:HUB

S WITCH
Switch is a multiport networking device which is used in local area network. Switches can read the hardware addresses of incoming
packets to transmitting to the appropriate destination. It can transmit multiple packets at the same time. Ethernet switch devices is
commonly used on home networks to connect multiple devices like hubs, routers. Switch does not transfer signal.
A switch can have 96 ports.
There are 2 types of switches.

55
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
1.Managed switches
2.Unmanaged switches

FIGURE 12:TYPES OF SWITCHES

 What is the difference between hub and a switch?


The security level of switches is higher than hubs
Can program the switch, but can’t program the hub

56
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
R EPEATER
the repeater is an electronic device that amplifies the signal it receives. the repeater can retransmit the receiving signal at a higher
level / higher power .so the signal can cover longer distances, more than 100 meters for standard LAN cables. Repeaters work on the
Physical layer.

FIGURE 13:REPEATER

57
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
FIGURE 14:THE PROCESS OF REPEATER

B RIDGE
Bridges are used to connect two or more hosts or network segments together. As an example, connects two local-area networks
(LANs). They use hardware Media Access Control (MAC) addresses for transferring frames. Bridges are used to divide larger
networks into smaller sections. Bridges can be either simple or multiple port.

58
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
FIGURE 15:BRIDGE

G ATEWAY
Gateways normally work at the Transport and Session layers of the OSI model Gateway consists of software which allows dissimilar
networks to communicate.

59
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
FIGURE 16:GATEWAY

(Explained, 2022)

R OUTER
Routers help network devices transmit packets to their destinations by charting a path. Routers store information about the networks they
are connected to. Routers are also used to channel service data from LAN framing to WAN framing. This is necessary because LAN and
WAN use different network protocols. Routers are also used to divide internal networks into two or more subnets.
There may be,
Router routes/transmit the data packets with the defined IP address from one network to another or within a network. It does it by
providing a local IP address to each device over the internet; it ensures the right destination so that data reach the right place rather than
lost within the network.
There are many types of routers.
a) Wired router
b) Wireless routers
c) Edge routers
d) Virtual routers

60
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
FIGURE 17:ROUTER

M ODEM
Modems are used to transmit digital signals over analog telephone lines. Simply a modem is a device that modulates or demodulates
the signal. The reason to use the modem for an internet connection is that both the internet and the computer take two different
signals. It means that the internet sends the analog signal, but the computer system can only understand the digital signal. So, we need
a device that can convert an analog signal to a digital signal and vice versa. To do this, we need a modem.
There are various types of modems based on data transmission and how it is installed. Following is some of them.
a) External modem
b) Internal modem
c) Wireless modem

61
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
d) Cable modem
e) Satellite modem

Figure 18:Modem

62
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
FIGURE 19:THE PROCESS OF MODEM

What is the difference between router and modem?

Modem Router
Operating Layer of OSI on the data link on the physical, datalink, and
model. network layers
Security transmits the data without provides complete security
any authentication; hence it with passwords and checks
is not secure. each data packet before
transmitting it over a given
network.
Cable Used RJ45 to connect with router, RJ45 cable is used.
and RJ11 to connect with a
telephone line.

63
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
Placed placed between the telephone placed between the modem
line and computer or router. and other networking
devices.
Number of connected devices can directly be connected to can connect to multiple
only one device that can be network devices using
either a PC or a router. ethernet cable or Wi-Fi.
TABLE 11:COMPARING MODEM AND ROUTER

FIGURE 20:TRANSMIT DATA USING MODEM AND ROUTER

(Modem vs. Router | Difference between Modem and Router - javatpoint, 2022)

64
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
NETWORK SOFTWARE
Networking software is a foundational element for any network. It helps administrators deploy, manage
and monitor a network.
Following is some most using network software.
A NTI -V IRUS
Antivirus software is a type of program designed and developed to protect computers from malware like viruses, computer worms, spyware,
botnets, rootkits, keyloggers and such. Antivirus programs function to scan, detect and remove viruses from your computer. There are many
versions and types of anti-virus programs that are on the market. However, the prime objective of any antivirus program is to protect
computers and remove viruses once detected.

F IREWALLS

A firewall is security system used in private network to prevent unauthorized access. Every information entering into and leaving from the
network is monitoring by firewall. Each message and block the access that do not meet the specified security is examined by it. Security is
the protection for the data stored in a computer that cannot be read by any other individuals without authorizing (login).

 So, it prevents the data from hackers and virus when connected to network.

()

65
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
FIGURE 21:FIREWALL

SERVERS
A server is a computer device that can provide a service to another computer program and its user over a local area network or the Internet.
In the client/server programming model, a server program awaits and fulfills requests from client programs, which might be running in the
same, or other computers.

Types of servers according to their purpose:


 WEB SERVER-a computer program that serves requested HTML pages or files. In this case, a web browser acts as the client.

66
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
 FILE SERVER-a computer responsible for the central storage and management of data files so that other computers on the same network
can access them.
 MAIL SERVER -an application that receives incoming emails from local users -- people within the same domain -- and remote senders
and forwards outgoing emails for delivery.
 DATABASE SERVER -this server is responsible for hosting one or more databases. Client applications perform database queries that
retrieve data from or write data to the database that is hosted on the server.
 PROXY SERVER -software that acts as an intermediary between an endpoint device, such as a computer, and another server from which a
user or client is requesting a service.

(What is a Server? - Definition from WhatIs.com, 2022)

THE SERVERS AVAILABLE IN TODAY’S MARKET


Dell PowerEdge R440 Server Dell POWEREDGE R7425 HPE ProLiant DL380 Gen10 server
Processor Up to two 2nd Generation Intel® Up to 2x AMD EPYC™ Intel® Xeon® Scalable 8100/8200 series Intel®
Xeon® Scalable processors, up to 24 processors, up to 32 cores per Xeon® Scalable 6100/6200 series Intel® Xeon®
cores per processor processor Scalable
5100/5200 series Intel® Xeon® Scalable
4100/4200 series Intel® Xeon® Scalable
3100/3200 series
Processor core available 4 to 28 core, depending
on model
Memory 16 DDR4 DIMM slots, Supports 32 DDR4 DIMM slots, 24 DIMM slots, 3.0 TB with 128 GB DDR4,

67
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
RDIMM /LRDIMM, speeds up to Supports RDIMM, LRDIMM depending on processor model
2666MT/s, 1TB max 6.0 TB with HPE 512GB 2666 Persistent Memory
Kit, depending on processor model
Storage Internal Controllers: PERC H330, Intel® chipset SATA 1 HPE Smart Array S100i and/or 1 HPE Smart
controllers H730p, H740p, HBA330 controller (6Gb/s) Array P408i-a and/or 1 HPE Smart Array P816i-a
Boot Optimized Storage System: HW with 8 SATA ports plus and/or 1
RAID 2 x M.2 + Internal USB + dedicated port for an optical HPE Smart Array E208i-a, depending on model
Internal Dual SD Module drive. Intel RSTe software
External PERC (RAID): H840 RAID 0,1,5,10.
12Gbps PERC9 or 10 series, PCIe Intel RSTe (vROC) software
PERC x8 slot RAID 0,1,10 option
(motherboard activation key)
for M.2 NVMe PCIe
SSDs on 1st Dell Ultra-Speed
Drive Quad x16 card
or Duo x8 card (RAID 0,1)
and for 2 x front FlexBay
M.2/U.2 NVMe PCIe SSDs
(RAID 0,1) or front
FlexBay NVMe PCIe SSDs
RAID 0,10 can span 2 Ultra-
Speed Drive Quad

68
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
x16 cards (APOS) but they
cannot contain the
Operating System boot drive
Customer kit available for
Intel RSTe (vROC)
motherboard activation key
for NVMe RAID
support
Power Titanium 750W, Platinum 495W,
supplies 750W, 1600W, 1100W,
and 2000W
336-380DC 1100W addition for China
and Japan only
I/O & Ports Network daughter card options 6 – USB 3.1 Gen 1 Type A
4 x 1GE or 2 x 10GE + 2 x 1GE or 4 x 1 – Serial
10GE or 2 x 25GE 2 – RJ45 Network
Front ports: VGA, 2 x USB 2.0, 2 – PS2
dedicated iDRAC Direct Micro-USB 1 –Audio Line out
Rear Ports: VGA, Serial, 2 x USB 3.0, 1– Audio Line in/Microphone
dedicated iDRAC network port.
Video Card: VGA
Riser Options: Up to 8 x Gen3 slots; up

69
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
to 6 x 16 lanes

TABLE 12:SERVERS AVAILABLE IN TODAY'S MARKET

(PowerEdge R440 Rack Server | Dell USA, 2022)

(2022)

(HPE ProLiant DL380 Gen10 Server User Guide, 2022)

Recommendation:
So, according to the features install Dell PowerEdge R440 Server is more suitable for Matara branch. Because it has a high memory
storage and it has TPM 1.2/2.0 optional, cryptographically signed firmware, Silicon Root of Trust as security. and as well as you can
supply powers as Titanium 750W, Platinum 495W, 750W, 1600W, 1100W, and 2000W,336-380DC 1100W. So highly recommend the
Dell PowerEdge R440 Server for the Matara branch.

70
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
ACTIVITY 03
THE BLUEPRINT OF THE SYNTAX SOLUTIONS COMPANY

71
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
FIGURE 22:BLUEPRINT OF THE SYSTEM

The above plan of SYNTAX SOLUTIONS company has one switch. That switch is connected to the three buildings and each
department. And every department’s PCs are connected to that switch except the server department and sales and marketing
department PCs. Sales and marketing department PCs connected to a wireless router assigned to that department according to the
given requirements. Those PCs are connected to the wireless router and that wireless router is connected to the switch. Main switch is
connected to the router which works as the main router in Matara branch. Server room’s servers are connected to the main router
which connected to the main switch. The main router is connected to the Colombo branch through a firewall software. Firewall
software is use for the high security.

Floor Department VLAN Configuration


Customer care VLAN ID:101
First floor VLAN name: Customer care
Required users:10
Network: 192.168.10.19

72
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
Subnet mask: 255.255.255.240
Network team VLAN ID:102
VLAN name: Networking
Required users:5
Network: 192.168.10.1
Subnet mask: 255.255.255.248
Server room VLAN ID:103
VLAN name: Servers
Required users: Servers+ISP
Connections
HR VLAN ID:201
Second Floor VLAN name: HR
Required users:10
Network: 192.168.10.36
Subnet mask: 255.255.255.240
Developers VLAN ID:202
VLAN name: Developers
Required users:55
Network:192.168.10.135
Subnet mask: 255.255.255.192
Legal VLAN ID:301

73
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
Third Floor VLAN name: Legal
Required users:5
Network: 192.168.10.10
Subnet mask: 255.255.255.248
Sales and marketing VLAN ID:303
VLAN name: Sales
Required users:20
Network: 192.168.10.100
Subnet mask:255.255.255.224
Finance VLAN ID:302
VLAN name: Finance
Required users:25
Network: 192.168.10.66
Subnet mask:255.255.255.224
TABLE 13:IP ADDRESSING AND VLAN CONFIGURATION

74
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
FIGURE 23:SYNTAX SOLUTIONS COMPANY SAMPLE SYSTEM CREATED BY USING CISCO PACKET TRACER

75
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
CONFIGURING NETWORK SYSTEM
CREATING VLAN S

FIGURE23:CREATING VLANS

ASSIGNED PORTS TO VLAN S

76
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
. FIGURE 24:THE PORTS ASSIGNED TO VLANS

77
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
CONFIGURE THE SWITCH

FIGURE 24:CONFIGURING MAIN SWITCH

FIGURE 25:TRUNKING PORTS IN MAIN SWITCH

78
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
CONFIGURE THE ROUTER

FIGURE 26:CONFIGURING ROUTER

CONFIGURE DHCP

79
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
80
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
FIGURE 27:DHCP CONFIGURATION

81
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
FIGURE 28:ASSIGNED SUBINTERFACES

PDU TEST

FIGURE 29:PDU TEST

TESTING CONFIGURATIONS
TESTING IP CONFIGURATION FROM DHCP SERVER FROM PC AT HR VLAN

Expected result: Obtain Ip address through DHCP server

Actual result: Successfully obtained Ip address through DHCP server

82
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
83
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
ACTIVITY 04
PING COMMAND

FIGURE 30:PING COMMAND

84
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
EXTEND PING COMMAND

FIGURE 31:EXTEND PING COMMAND

TRACENT COMMAND

85
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
FIGURE 32:TRACENT COMMAND

FEEDBACK FORMS

FIGURE 33:FEEDBACKFORMS

86
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
87
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
88
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
REFERENCES
1. Services, P., 2022. What is a LAN? Local Area Network. [online] Cisco. Available at: <https://www.cisco.com/c/en/us/products/switches/what-is-a-lan-local-area-
network.html> [Accessed 13 October 2022].

2. Jahejo, A., 2022. Local Area Network | Advantages and Disadvantages of LAN. [online] Computer Network Topology. Available at:
<https://computernetworktopology.com/local-area-network/> [Accessed 13 October 2022].

3. Services, P., 2022. What Is a WAN? Wide-Area Network. [online] Cisco. Available at: <https://www.cisco.com/c/en/us/products/switches/what-is-a-wan-wide-area-
network.html> [Accessed 13 October 2022].

4. Rehman, J., 2022. Advantages and disadvantages of metropolitan area network (MAN). [online] IT Release. Available at:
<https://www.itrelease.com/2018/09/advantages-and-disadvantages-of-metropolitan-area-network-man/> [Accessed 13 October 2022].

5. Medium. 2022. Network standards and devices. [online] Available at: <https://medium.com/@alan6arley/network-standards-and-devices-1bf99da95b05> [Accessed
13 October 2022].

6. Comnet.net. 2022. Fast Ethernet vs. Gigabit Ethernet: What's the Difference? | ComNet. [online] Available at: <https://www.comnet.net/about/news/fast-ethernet-
vs-gagabit-ethernet> [Accessed 13 October 2022].

7. Topology, P., 2022. Physical Topology | Learn Top 7 Useful Types Of Physical Topology. [online] EDUCBA. Available at: <https://www.educba.com/physical-
topology/> [Accessed 13 October 2022].

8. Regan, B., Regan, B. and profile, V., 2022. Network topologies. [online] Skynetbregan.blogspot.com. Available at:
<http://skynetbregan.blogspot.com/2015/01/network-topologies.html> [Accessed 13 October 2022].

9. ManageEngine, c., 2022. Network Monitoring Software by ManageEngine OpManager. [online] ManageEngine OpManager. Available at:
<https://www.manageengine.com/network-monitoring/network-protocols.html> [Accessed 13 October 2022].

89
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01
10. Explained, N., 2022. Network Devices Explained. [online] Blog.netwrix.com. Available at: <https://blog.netwrix.com/2019/01/08/network-devices-explained/>
[Accessed 13 October 2022].

11.www.javatpoint.com. 2022. Modem vs. Router | Difference between Modem and Router - javatpoint. [online] Available at: <https://www.javatpoint.com/modem-
vs-router> [Accessed 13 October 2022].

12.Firewall (no date) Firewall ~. Available at: http://venkatsps.blogspot.com/2016/11/firewall.html (Accessed: October 22, 2022).

13. WhatIs.com. 2022. What is a Server? - Definition from WhatIs.com. [online] Available at: <https://www.techtarget.com/whatis/definition/server> [Accessed 13
October 2022].

14. Dell. 2022. PowerEdge R440 Rack Server | Dell USA. [online] Available at: <https://www.dell.com/en-us/shop/dell-poweredge-servers/poweredge-r440-rack-
server/spd/poweredge-r440/pe_r440_tm_vi_vp_sb> [Accessed 14 October 2022].

15 I.dell.com. 2022. [online] Available at: <https://i.dell.com/sites/doccontent/shared-content/data-sheets/en/Documents/Precision-7920-Tower-Spec-Sheet.pdf>


[Accessed 14 October 2022].

16. PSNow. 2022. HPE ProLiant DL380 Gen10 Server User Guide. [online] Available at: <https://www.hpe.com/psnow/doc/a00019109en_us> [Accessed 14 October
2022].

90
D.G. Nimanthika Prasadani Rathnaweera-Networking- Assignment 01

You might also like