Networking Assignment: M. Haashim Rumy E184715 Esoft Metro Campus SEP/OCT 2022
Networking Assignment: M. Haashim Rumy E184715 Esoft Metro Campus SEP/OCT 2022
Semester 01
M. HAASHIM RUMY
E184715
ESOFT METRO CAMPUS
SEP/OCT 2022
Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)
INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Programme title BTEC Higher National Diploma in Computing
Assessor Internal
Verifier
Unit 02: Networking
Unit(s)
LAN Design & Implementation for Alliance Health
Assignment title
Student’s name
List which assessment Pass Merit Distinction
criteria the Assessor has
awarded.
INTERNAL VERIFIER CHECKLIST
1
Remedial action taken
Give details:
2
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID E184715
Unit 02: Networking
Unit Title
Assignment Number 1 Assessor
Date
Submission Date Received 1st
submission
Date Received 2nd
Re-submission Date submission
Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction P1 P2 M1 D1
Descripts
Resubmission Feedback:
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.
Assignment Feedback
3
Formative Feedback: Assessor to Student
Action Plan
Summative feedback
Assessor Date
signature
Student Date
signature
4
Pearson Higher Nationals in
Computing
Unit 02: Networking
Assignment 01
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present
it as my own without attributing the sources in the correct form. I further understand what it
means to copy another’s work.
5
Assignment Brief
Student Name /ID Number E184715
Unit Tutor
Issue Date
Submission Date
Submission format
The submission should be in the form of an individual report written in a concise, formal business
style using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using
Harvard referencing system. Please also provide an end list of references using the Harvard
referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures,
although you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:
6
Scenario
Alliance Health is a technology-enabled solutions company that optimizes the revenue cycle of the
US healthcare industry where its global delivery center is located in Colombo. The company is
planning to expand their business operations with their latest branch at Matara and wants it to be
one of the state-of-the-art companies in Matara with the latest facilities.
Assume you have been appointed as the new network analyst of Alliance Health to plan, design and
restructure the existing network. Prepare a network architectural design and implement it with
your suggestions and recommendations to meet the company requirements.
The floor plan of the head office in Colombo is as follows:
Floor 1:
● Reception area
Floor 2:
Floor 3
7
● IT Department (60 employees)
● Reception area
Floor 2:
● HR Department (7 employees)
● The conferencing room of the head office and Customer Services Areas of each branch are to be
● Connectivity between two branches (Head Office and Matara) would allow the intra branch
● The necessary IP address classes and ranges must be decided by the network designer and should
8
be used for all the departments except the server room.
● Number of servers required for the Server room need to be decided by the Network designer and
● Sales and Marketing Team also needs to access Network resources using WIFI connectivity.
(Note: Clearly state your assumptions. You are allowed to design the network according to your assumptions, but
main requirements should not be violated)
Activity 01
● Discuss the benefits and constraints of different network system types that can be implemented in
the Matara branch and the main IEEE Ethernet standards that can be used in above LAN and WLAN
design.
● Discuss the importance and impact of network topologies and assess the main network protocol
suites that are used in network design using examples. Recommend suitable network topology and
network protocols for above scenario and evaluate with valid points how the recommended
topology demonstrates the efficient utilization of the networking system of Matara branch.
Activity 02
● Discuss the operating principles oFf network devices (Ex: Router, Switch, Etc.) and server types that
can be used for above scenario while exploring different servers that are available in today’s market
with their specifications. Recommend server/servers for the above scenario and justify your
selection with valid points.
● Discuss the inter-dependence of workstation hardware and networking software and provide
examples for networking software that can be used in above network design.
9
Activity 03
● Prepare a written network design plan to meet the above-mentioned user requirements including a
blueprint drawn using a modeling tool (Ex: Microsoft Visio, EdrawMax) .Test and evaluate the
proposed design by analyzing user feedback with the aim of optimizing your design and improving
efficiency.
(Support your answer by providing the VLAN and IP subnetting scheme for the above scenario and the
list of devices, network components and software used to design the network for above scenario and
while justifying your selections.)
● Install and configure Network services, devices and applications (Ex: VLAN,WiFi, DNS,Proxy, Web,
Etc.) according to the proposed design to accomplish the user requirements and design a detailed
Maintenance schedule for above Network.
Activity 04
● Implement a networked system based on your prepared design with valid evidences.
● Develop test cases and conduct verification (Ex: Ping, extended ping, trace route, telnet, SSH, etc.) to
test the above Network and analyse the test results against the expected results. Recommend
potential future enhancements for the networked system with valid justifications and critically
reflect on the implemented network, including the plan, design, configurations, tests and the
decisions made to enhance the system.
10
11
Grading Rubric
P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Assess common networking principles and how protocols
enable the effectiveness of networked systems.
P3
Discuss the operating principles of networking devices and
server types.
P4
12
Discuss the interdependence of workstation hardware and
relevant networking software
M2
Explore a range of server types and justify the selection of a
server for a given scenario, regarding cost and performance
optimization
LO 1 & LO2
D1 Evaluate the topology protocol selected for a given scenario and
how it demonstrates the efficient utilisation of a networking system.
LO3 : Design efficient networked systems
P5
Design a networked system to meet a given specification.
P6
Design a maintenance schedule to support the networked
system.
M3
13
Analyse user feedback on your designs with the aim of
optimising your design and improving efficiency.
D2
Critically reflect on the implemented network, including the
design and decisions made to enhance the system.
LO4 : Implement and diagnose networked systems
P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D2 Critically reflect on the implemented network, including the
design and decisions made to enhance the system.
14
Content’s
1. Introduction –––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
2. What is networking –––––––––––––––––––––––––––––––––––––––––––––––––––––––––
3. Networking concepts ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
15
● Firewalls and Network Security ––––––––––––––––––––––––––––––––––––––––––––––
1.1Discuss the benefits and constraints of different network system types that can be implemented in the
Matara branch and the main IEEE Ethernet standards that can be used in above LAN and WLAN
design.
6. Benefits and Constraints of Network System Types in Matara Branch: –––––––––––––––––––––––––
7. Main IEEE Ethernet Standards for LAN and WLAN Design: ––––––––––––––––––––––––––––––––
8. IEEE Ethernet Standards: –––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
9. 1.2 . Discuss the importance and impact of network topologies and assess the main network protocol
suites that are used in network design using examples. Recommend suitable network topology and
network protocols for above scenario and evaluate with valid points how the recommended topology
demonstrates the efficient utilization of the networking system of Matara branch.
16
10. OSI (Open Systems Interconnection) Model: ––––––––––––––––––––––––––––––––––––––––
11. Recommended Network Topology and Protocols for Matara Branch: ––––––––––––––––––––
2.1 Discuss the operating principles of network devices (Ex: Router, Switch, Etc.) and server types that can
be used for above scenario while exploring different servers that are available in today’s market with
their specifications. Recommend server/servers for the above scenario and justify your selection with
valid points.
15. Network Device and Server Operating Principles: ––––––––––––––––––––––––––––––––––––
● Router: ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
17
● Switch –––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
18. 2.2 Discuss the inter-dependence of workstation hardware and networking software and provide
examples for networking software that can be used in above network design.
18
● NOS (Network Operating System): –––––––––––––––––––––––––––––––––––––––––––––––––––––
3.1Prepare a written network design plan to meet the above-mentioned user requirements including a
blueprint drawn using a modeling tool (Ex: Microsoft Visio, EdrawMax) .Test and evaluate the proposed
design by analyzing user feedback with the aim of optimizing your design and improving efficiency.
(Support your answer by providing the VLAN and IP subnetting scheme for the above scenario and the list
of devices, network components and software used to design the network for above scenario and while
justifying your selections.)
19
20. Evaluation and Optimization: –––––––––––––––––––––––––––––––––––––––––––––––––––
21. 3.2 Install and configure Network services, devices and applications (Ex: VLAN, WiFi , DNS,
Proxy, Web, Etc.) according to the proposed design to accomplish the user requirements and design a
detailed Maintenance schedule for above Network.
INTRODUCTION
20
For worldwide collaboration, communication, and information exchange, networking is essential. You network daily via
social media, email, and home networking equipment, whether you realize it or not. Networking involves connecting
various devices, systems, or people to share information, resources, and ideas.
Networking extends beyond digital and physical infrastructure that enables communication. Creating and sustaining
personal and professional ties promotes support, information sharing, and opportunity. Networking involves technology
and human contact and is essential for professional, personal, and economic success.
Networking has many features, advantages, and tactics, which this introduction will explore. Understanding and mastering
networking may open up new doors, connections, and possibilities in many areas of your life.
What is networking
Networking connects devices, systems, and computers to share information, data, and resources. Networking allows units close or far away to
connect and exchange data.
21
Networking concepts.
1. Network Topologies:
A network's topology is the physical or logical configuration of its components. Typical topologies include of:
● Bus Topology: All devices are connected to a central cable called the "bus."
22
● Star Topology: Devices are connected to a central hub or switch.
23
● Ring Topology: A closed loop is created when devices are linked in a circular pattern.
24
● Mesh Topology: Every device in the network is linked to every other device, or in a mesh topology.
25
● Hybrid Topology: Combines two or more different topologies to form a hybrid topology.
26
2. Network Layers:
The OSI (Open Systems Interconnection) model and the TCP/IP model are two common reference models that divide
networking tasks into distinct layers. Each layer serves specific functions and interacts with adjacent layers to facilitate
communication.
27
3. TCP/IP Protocol Suite: The main protocol suite used by the majority of networks and the internet today is TCP/IP (Transmission
Control Protocol/Internet Protocol). TCP, UDP (User Datagram Protocol), IP, ICMP (Internet Control Message Protocol), and other
protocols are among the many that make up this system.
4. Routing and switching: While switching includes the effective movement of data inside a local network, routing involves establishing
the optimum way for data to go from the source to the destination across many networks.
5. Subnetting and CIDR: Subnetting is the process of dividing a large network into smaller subnetworks, known as subnets. CIDR
(Classless Inter-Domain Routing) notation is used to represent IP addresses with subnet masks, making IP address allocation more
flexible.
6. Firewalls and Network Security: Network security is achieved by firewalls by screening and regulating incoming and outgoing traffic
in accordance with specified security rules. Intrusion detection and prevention systems (IDPS), encryption, and authentication protocols
are further security measures.
28
I'll suggest a network architecture design for Alliance Health's central office in Colombo and the branch in Matara based on the floor plans and
needs provided. The strategy is as follows:
Assumptions:
1. Each floor of both the head office and the branch will have its own unique subnet.
2. We will use private IP addresses for the internal network.
3. The head office and the branch will be connected via a secure dedicated connection.
4. The Wi-Fi network will be set up using access points to provide seamless coverage in the specified areas.
5. For simplicity, I will assume that the Wi-Fi connections in the customer services areas and the conferencing room will be guest networks,
isolated from the main internal network.
● Subnets:
29
8. Business Development Department: 10.0.3.104/29
9. Video conferencing room: 10.0.4.0/24
10. Administration Department: 10.0.3.0/27
11. Audit Department: 10.0.3.96/29
● Wi-Fi Connectivity:
1. Head Office and Colombo branch - Customer Services Area: Set up Wi-Fi access points in the customer services area with a separate
guest network.
● Server Room:
30
For static IP addresses issued to servers, the Server Room will have a subnet of 10.254.10.0/24.
Give the Sales and Marketing Department a VLAN and subnet for Wi-Fi network access. All essential internal resources should be accessible
from this VLAN.
This network architecture meets all management needs. Each department will have its own subnet, Wi-Fi will be provided in defined areas, and
the two branches will be connected to enhance intra-branch communication. The server room may host 10 servers with the provided subnet
after assigning IP address classes and ranges. Sales and Marketing Teams will have Wi-Fi connection to network resources.
Activity 01
1.1Discuss the benefits and constraints of different network system types that can be implemented in the Matara branch
and the main IEEE Ethernet standards that can be used in above LAN and WLAN design.
31
● Benefits: LAN offers high-speed data transfer, low latency, and easy resource sharing within the branch. It is cost-
● Constraints: LAN has limited geographical coverage and may require additional equipment for inter-branch
connectivity.
● Benefits: WLAN provides mobility, allowing employees to access the network from anywhere within the coverage
● Constraints: WLAN can be susceptible to interference and security concerns if not properly configured and protected.
32
Figure 4
Several Ethernet standards that can be used in the LAN and WLAN design outlined earlier have been produced by the
Institute of Electrical and Electronics Engineers (IEEE). The main criteria are:
1. IEEE 802.3: This is the Ethernet network specification. It describes the network's physical layer and MAC layer.
2. IEEE 802.11:The Wi-Fi network protocol standard is IEEE 802.11. It describes the network's physical layer and
MAC layer.
Benefits
33
● Interoperability: IEEE Ethernet standards make guarantee that gadgets from various producers can talk to one
another.
● Reliability: The widely adopted IEEE Ethernet standards have undergone extensive testing and have been improved
● Scalability: IEEE Ethernet standards are easily expandable to support more users or gadgets.
Constrains :
● Complexity: Implementing IEEE Ethernet standards can be challenging, particularly in expansive networks.
● Cost: Putting IEEE Ethernet standards into practice can be costly, especially when using newer or more
sophisticated standards.
● Limited features: When compared to other private networking technologies, IEEE Ethernet standards contain
few functionality.
1.2 . Discuss the importance and impact of network topologies and assess the main network protocol suites that are used
35
in network design using examples. Recommend suitable network topology and network protocols for above scenario
and evaluate with valid points how the recommended topology demonstrates the efficient utilization of the
networking system of Matara branch.
Network topology, communication, and bandwidth requirements are fundamental aspects of network design that greatly
influence the performance, scalability, and reliability of a network. Here's an explanation of their impact:
Network Topology
Definition:
Network topology refers to the arrangement of different elements (links, nodes, etc.) in a computer network. It can be
physical or logical.
36
Star Topology: All devices are connected to a central hub or switch.
Ring Topology: Devices are connected in a circular fashion.
Mesh Topology: Every device is connected to every other device.
Tree Topology: A hybrid topology combining characteristics of star and bus topologies.
Impact:
Performance and Efficiency: The choice of topology affects the speed and efficiency of data transfer. For example,
a star topology can provide high performance in a local area network (LAN) due to its central hub, while a mesh
topology offers high redundancy and reliability.
Scalability: Some topologies are easier to expand than others. For instance, star and tree topologies can be scaled
easily by adding more nodes.
Cost: The cost of implementation varies; mesh topology, while robust, is more expensive due to the extensive
cabling and hardware required.
Fault Tolerance and Reliability: Topologies like mesh offer high fault tolerance as multiple paths for data transfer
exist, whereas a bus topology is highly vulnerable to failure at the central cable.
37
Communication
Definition:
Communication in a network refers to the exchange of data between devices. This can be through various protocols and
communication modes.
1 Modes of Communication:
2. Impact:
38
Data Flow Control: Efficient communication protocols ensure proper data flow control, minimizing congestion and
packet loss.
Latency and Throughput: The mode and efficiency of communication protocols affect latency (delay in data
transmission) and throughput (rate of successful message delivery).
Quality of Service (QoS): Effective communication ensures that QoS parameters like bandwidth, delay, jitter, and
packet loss are maintained, especially in real-time applications like VoIP and video conferencing.
Bandwidth Requirements.
Definition:
Bandwidth refers to the maximum rate of data transfer across a network path. It is typically measured in bits per second
(bps).
39
Number of Users: More users require higher bandwidth to avoid congestion.
Type of Applications: Applications like streaming video, online gaming, and large file transfers demand higher
bandwidth compared to email and simple web browsing.
Quality of Service: High-bandwidth networks are necessary to support QoS for critical applications.
Network Traffic Patterns: Peak usage times and traffic patterns influence bandwidth needs.
2. Impact:
Network Performance: Sufficient bandwidth ensures smooth and efficient network performance. Insufficient
bandwidth can lead to slow data transfer rates, increased latency, and higher packet loss.
Scalability: Adequate bandwidth is crucial for scaling up the network to accommodate more users and applications.
Cost: Higher bandwidth requirements can significantly increase the cost of network infrastructure and maintenance.
User Experience: Adequate bandwidth ensures a good user experience, particularly for bandwidth-intensive
applications like video conferencing and online gaming.
In summary, the choice of network topology, effective communication protocols, and adequate bandwidth are crucial for
40
designing a robust, efficient, and scalable network. They directly affect network performance, reliability, cost, and user
experience.
Network protocols provide the rules and practices for data transmission among network devices. The following are the
two most common protocol suites used in network design:
● Supports reliable and connection-oriented communication (TCP) and connectionless communication (UDP).
41
● Each layer has a different purpose, and communication between them is regulated by established protocols.
● Simple to Manage: Because all connections are made directly to the central hub, network management is simplified.
● Fault Isolation: If a switch in one department fails, just that department is impacted, leaving the others operating.
● Scalability: By connecting new departments or devices to the central hub, new departments or devices may be readily
added.
42
Network Protocols: The TCP/IP protocol suite should be used for network communication. HTTP, SMTP, and DNS
protocols will enable services such as web surfing, email, and name resolution.
ACTIVITY 02
43
2.1 Discuss the operating principles of network devices (Ex: Router, Switch, Etc.) and server types that can be used for
above scenario while exploring different servers that are available in today’s market with their specifications. Recommend
server/servers for the above scenario and justify your selection with valid points.
Network Device and Server Operating Principles:
1. Router:
● Operating Principle: Routers are network devices that operate at the network layer (Layer 3) of the OSI model. They
use routing tables to make intelligent decisions on how to forward data packets between different networks.
● Function: Routers connect multiple networks, including LANs and WANs, and determine the best path for data to
● Importance: Routers enable inter-branch connectivity, ensuring seamless communication between the head office in
2. Switch
44
● Operating Principle: Switches operate at the data link layer (Layer 2) of the OSI model. They use MAC addresses to
● Function: Switches create dedicated communication paths between devices, reducing data collisions and improving
network performance.
● Importance: Switches are essential for the efficient functioning of individual departments within the Matara branch,
Server Types :
1. FTP Server:
● File servers store and manage files, giving users centralised access to shared resources. They are often used in
● The importance of a file server is that it will promote cooperation and data exchange among departments in both the
2. DNS Server:
45
● DNS (Domain Name System) servers convert human-readable domain names into IP addresses, allowing users to
● Importance: A DNS server ensures that employees may access internal and external resources simply inputting
3. DHCP Server :
● DHCP (Dynamic Host Configuration Protocol) servers automatically issue IP addresses to network devices,
simplifying IP management.
● Importance: A DHCP server will simplify the IP address assigning procedure, making it easier to manage the
1. File Server:
46
▪ Specifications: The file server should have ample storage capacity to accommodate the data storage needs of all
departments. RAID (Redundant Array of Independent Disks) should be implemented for data redundancy and fault
tolerance.`
▪ Justification: With various departments in both the head office and the branch, a centralized file server will enhance
data management, backups, and access control.
▪ Specifications: The DNS and DHCP servers should have sufficient processing power and memory to handle the
network's DNS resolution and IP address assignment requests effectively.
▪ Justification: A dedicated DNS server will simplify domain name resolution for both the head office and the Matara
branch. The DHCP server will automate IP address allocation, streamlining network administration.
Alliance Health can assure effective data administration, faster network navigation, and simplified IP address management
by deploying these suggested servers, therefore enabling the seamless functioning of both the head office and the new
branch in Matara.
47
2.2 Discuss the inter-dependence of workstation hardware and networking software and provide examples for networking software that
The interdependence between workstation hardware and networking software is critical for enabling network connection
and data transmission. Workstation hardware provides the physical infrastructure required for networking, while
networking software allows data to be sent between workstations and other network devices. Here are some networking
software examples that may be utilized in the given network design:
A network interface card (NIC) is a hardware component without which a computer cannot be connected over a network.
It is a circuit board installed in a computer that provides a dedicated network connection to the computer. It is also
called network interface controller, network adapter or LAN adapter.
● NIC allows communications between computers connected via local area network (LAN) as well as communications
over large-scale network through Internet Protocol (IP).
48
● NIC is both a physical layer and a data link layer device, i.e. it provides the necessary hardware circuitry so that the
physical layer processes and some data link layer processes can run on it.
● Hardware: A network interface card (NIC) is a physical component put in each workstation that allows it to connect
to a network.
● Software: In order to connect with the operating system and networking software, the NIC requires proper drivers.
49
● Interdependence: The NIC hardware and software drivers allow data packets to be transferred and received via the
network.
● Software: TCP/IP (Transmission Control Protocol/Internet Protocol) is a collection of networking protocols that
● Inter-dependence: TCP/IP, the cornerstone of contemporary networking, is required for communication between
workstations, servers, and other network devices. It guarantees dependable and efficient data transfer.
A network operating system(NOS) is software that connects multiple devices and computers on the network and allows
them to share resources on the network.
50
● Software: Network Operating System (NOS): A Network Operating System (NOS) is specialized software that
● Interdependence: The NOS allows workstations to access shared resources such as files and printers, authenticate
● Software: The DNS client is a software component on each workstation that converts human-readable domain names
● Inter-dependence: Using easy-to-remember domain names rather than numerical IP addresses, the DNS client allows
51
5. Dynamic Host Configuration Protocol (DHCP) Client:
DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an IP
address to any device, or node, on a network so it can communicate using IP.
● Software: The DHCP client is a software component on each workstation that acquires an IP address automatically
● Interdependence: The DHCP client streamlines the process of assigning IP addresses, ensuring that workstations
6. Web Browsers:
● Software: Workstations may access and browse webpages hosted on web servers using web browsers such as Google
52
● Inter-dependence: Web browsers request and display web pages using networking protocols (HTTP/HTTPS), relying
Overall, in order to provide an effective network environment, workstation hardware and networking software are
interdependent. In the previously mentioned network architecture for Alliance Health, the hardware provides physical
connectivity, while the software facilitates data transfer, resource sharing, and access to network services, assuring smooth
and efficient network operations.
ACTIVITY 03
3.1 Prepare a written network design plan to meet the above-mentioned user requirements including a blueprint drawn
using a modeling tool (Ex: Microsoft Visio, EdrawMax). Test and evaluate the proposed design by analyzing user feedback
with the aim of optimizing your design and improving efficiency.
(Support your answer by providing the VLAN and IP subnetting scheme for the above scenario and the list of devices,
network components and software used to design the network for above scenario and while justifying your selections.)
53
The suggested network design will be a hierarchical network architecture with core, distribution, and access layers based
on the specifications provided. The network will be built with security, high availability, and management convenience in
mind.
Network Topology
The head office in Colombo and the branch office in Matara are the two locations that make up the planned network
structure. The core layer, distribution layer, and access layer are the three layers that make up the network architecture.
Each layer will contain unique gadgets and operations.
❖ Core Layer:
High-speed switching and routing will be handled by the core layer. It will link the distribution layer switches and offer
Internet connectivity. Both locations will have a core switch installed. To provide high availability, the core switch will be
set up redundantly and use link aggregation and spanning tree protocol (STP). Access control lists (ACLs) and other
security settings will also be defined on the core switch to guard against unwanted access.
54
❖ Distribution Layer:
The access layer switches will be connected to the core layer by the distribution layer. It will be in charge of routing and
VLAN administration. At each location, a distribution switch will be installed and set up with virtual LANs (VLANs) to
divide the various departments. To maintain security and traffic isolation, each department will have an own VLAN. To
guarantee effective routing, the distribution switch will also be configured with routing protocols such Open Shortest Path
First (OSPF).
❖ Access Layer :
The access layer will link IP phones, printers, and other end-user devices to the network. At each location, access switches
will be installed and configured with port security and VLANs to provide network security and traffic separation. In order
to give network traffic priority, the access switches will also be set up with Quality of Service (QoS).
❖ Wi-Fi Access:
55
Both facilities' customer service and welcome areas will have wireless access points installed. Wi-Fi Protected Access
(WPA2) will be used to secure the Wi-Fi connection.
The network design plan intends to suit the user needs of Alliance Health's Colombo headquarters and its new Matara
branch. The architecture should guarantee effective departmental communication, inter-branch connection, and consistent
access to network resources. The plan will be carried out utilising a Star topology with distinct VLANs for each
department, as well as the necessary IP subnetting to ensure network segmentation.
All departments in both the headquarters and the Matara branch will have their own switches, which will link to a single
switch that will serve as the hub.The central switch will allow for inter-branch communication between Colombo and
Matara.
Subnet: 192.168.10.0/24
Subnet: 192.168.20.0/24
Subnet: 192.168.30.0/24
Subnet: 192.168.40.0/24
Subnet: 192.168.50.0/24
57
Subnet: 192.168.60.0/24
Subnet: 192.168.70.0/24
Subnet: 192.168.80.0/24
Subnet: 192.168.90.0/24
❖ Matara Branch:
58
Subnet: 192.168.110.0/24
Subnet: 192.168.120.0/24
Subnet: 192.168.130.0/24
Subnet: 192.168.140.0/24
Subnet: 192.168.150.0/24
Subnet: 192.168.160.0/24
59
Network Devices:
The Matara branch will make use of the following network devices:
Network Components:
The Matara branch will make use of the following network components:
Networking software:
The Matara branch will make use of the following networking software:
60
1. Operating System: Cisco IOS
Maintenance Schedule:
The following maintenance schedule is suggested to guarantee the network's continued dependability and effectiveness:
● Daily: Check the device logs every day for any problems or cautions.
● Monthly: Review network performance data on a monthly basis and look for ways to improve.
● Quarterly: Review the disaster recovery strategy every quarter and test the backups.
● Annually: Every year, review your network security procedures and make any necessary updates.
61
Evaluation and Optimization:
o Gather user input after installing the network architecture to discover any performance concerns or areas for
improvement.
o To detect problems and optimise network traffic flow, use network management tools to monitor network
performance.
o Examine the security procedures in place and make any required improvements to protect data and resources.
o Test the network's resistance to faults and ensure that fault tolerance techniques are functioning properly.
o Maintain and upgrade the network on a regular basis to keep it working effectively and securely.
By adhering to this network architecture plan, Alliance Health will be able to provide efficient communication, secure data
exchange, and seamless inter-branch connection, satisfying the needs of both the head office in Colombo and the new
branch in Matara.
3.2 Install and configure Network services, devices and applications (Ex: VLAN,WiFi, DNS,Proxy, Web, Etc.) according
to the proposed design to accomplish the user requirements and design a detailed Maintenance schedule for above
Network.
62
Installing and Configuring Network Services, Devices, and Applications:
1. VLAN Configuration:
● Add/define the VLANs. Most switches have a means of defining a list of configured VLANs, and they must be
● Configure VLANs on each department's switches in accordance with the VLAN and IP subnetting strategy
63
specified in the network design plan.
2. Configuration of Wi-Fi:
● Install and configure Wi-Fi access points in the Customer Services Area of the headquarters and the Customer
Services Area and IT Department of the Matara branch.
● Create SSIDs for each department and protect them with WPA2.
64
● To map each SSID to the appropriate VLAN, use VLAN tagging on the Wi-Fi access points.
3. Router Configuration:
65
Step 2: Connect to the Internet. ...
Step 3: Configure the wireless router gateway. ...
Step 4: Connect gateway to router. ...
Step 5: Use app or web dashboard. ...
Step 6: Create a username and password. ...
Step 7: Update the router's firmware. ...
Step 8: Create a Wi-Fi password.
● https://www.cisco.com/c/en/us/td/docs/routers/access/800M/software/800MSCG/routconf.html
● Install and configure the router to connect the head office and the Matara branch.
● Implement inter-VLAN routing to enable communication between departments within each location.
66
4. Configuration of the Firewall:
● Install and configure a firewall to keep the network safe from outside attacks.
● Make firewall rules to manage incoming and outbound traffic and to enforce security regulations.
● https://www.cisco.com/c/en/us/td/docs/routers/access/1800/1801/software/configuration/guide/scg/
firewall.html
67
5. File Server Configuration:
● Install and configure the file server in the Server Room at the headquarters.
● Set up shared folders with suitable access rights for each department.
● Install and install a web server to host the internal websites of the firm.
● Configure virtual hosts to serve numerous web applications for different departments.
68
● https://www.google.com/url?sa=i&url=https%3A%2F%2Fsiteproxy.ruqli.workers.dev%3A443%2Fhttps%2Fwww.geeksforgeeks.org%2Fconfiguring-dhcp-and-
web-server-in-cisco-packet-tracer
%2F&psig=AOvVaw1dN28VSMzPAx8556BRo5m2&ust=1690001925375000&source=images&cd=vfe&opi
=89978449&ved=0CBEQjRxqFwoTCICDyfWBn4ADFQAAAAAdAAAAABAY
69
● To improve online security and restrict internet access, install and setup a proxy server.
● https://www.youtube.com/watch?v=CgWbqO712fQ
70
Maintenance Schedule in Detail:
Designing a maintenance schedule for a networked system involves regular checks, updates, and optimizations to ensure the
network operates smoothly and efficiently. The schedule should include daily, weekly, monthly, quarterly, and annual tasks
to cover all aspects of network maintenance.
Daily Maintenance
71
o Ensure antivirus and antimalware software is up-to-date and running.
Weekly Maintenance
1. Inspect Hardware:
o Check the physical condition of network hardware (routers, switches, servers).
o Ensure all devices are functioning properly without hardware errors.
72
o Investigate and resolve any anomalies.
Monthly Maintenance
1. Performance Optimization:
o Review and optimize network configuration settings.
o Check for any bottlenecks and optimize traffic flow.
Quarterly Maintenance
1. Security Audit:
73
o Review user access permissions and disable unnecessary accounts.
2. Hardware Maintenance:
3. Capacity Planning:
o Analyze network usage trends to forecast future needs.
o Plan for any necessary upgrades or expansions.
Annual Maintenance
1. Network Assessment:
o Conduct a comprehensive network assessment to evaluate overall performance.
o Review and update network policies and procedures.
74
3. Vendor Review:
o Review contracts and performance of network service providers.
o Evaluate and renew or renegotiate contracts as necessary.
Additional Considerations
Ad Hoc Maintenance: Address any immediate issues or incidents that arise outside of the regular schedule.
Training: Ensure network administrators and IT staff receive regular training on new technologies, security practices, and network
management tools.
Documentation: Maintain detailed records of all maintenance activities, issues encountered, and resolutions.
By following this comprehensive maintenance schedule, the networked system will remain robust, secure, and efficient, minimizing downtime
and ensuring a high level of performance and reliability.
The network at both the head office and the Matara branch will remain safe, stable, and efficient if this precise
maintenance schedule is followed, enabling flawless operations for Alliance Health's increasing commercial activities.
Activity 04
4.1 Implement a networked system based on your prepared design with valid evidences.
75
P7. Implement a networked system based on a prepared design.
To implement the networked system based on the prepared design, we'll go through the following steps:
3. Configure VLANs:
76
Create and assign VLANs for different departments.
5. Implement Wi-Fi:
Configure Wi-Fi access points for Sales & Marketing, Customer Services Areas, and Video Conferencing Room.
Ensure secure Wi-Fi with WPA3 encryption.
6. Inter-Branch Connectivity:
Establish a high-speed link between the head office and the branch office.
Ensure routing and access between branches are configured.
77
Implementation Details:
78
Access Point Configuration (Wi-Fi):
ssid Sales_Marketing
79
vlan 10
ssid Customer_Services
vlan 20
ssid Video_Conferencing
vlan 90
interface GigabitEthernet0/0
ip address 192.168.10.1 255.255.255.0
no shutdown
v lan 100
name Customer_Services_Matara
vlan 110
name Administration_Matara
vlan 120
name HR_Matara
vlan 130
80
name Accounting_Matara
vlan 140
name IT_Matara
ssid Customer_Services_Matara
vlan 100
interface GigabitEthernet0/1
ip address 10.254.10.1 255.255.255.0
no shutdown
81
ip dhcp pool Customer_Services
network 192.168.2.0 255.255.255.0
default-router 192.168.2.1
3. VLAN Configuration
vlan 10
name Sales_Marketing
vlan 20
name Customer_Services
Inter-VLAN Routing:
interface Vlan10
ip address 192.168.1.1 255.255.255.0
interface Vlan20
ip address 192.168.2.1 255.255.255.0
Firewall Rules:
82
5. Wi-Fi Configuration
ssid Sales_Marketing
vlan 10
6. Inter-Branch Connectivity
interface Tunnel0
ip address 192.168.100.1 255.255.255.252
tunnel source 203.0.113.1
tunnel destination 203.0.113.2
1. Ping Results:
o Successful ping between devices in the same subnet.
o Successful ping between devices in different subnets.
o Successful ping between head office and branch office devices.
83
2. Traceroute Results:
o Correct path traced between devices in different subnets.
4. Security Results:
o Successful SSH access to network devices.
o No vulnerabilities found in initial scans.
1. Scalability:
o Reserve IP ranges for future expansion.
o Implement higher-capacity switches and routers to handle increased traffic.
84
2. Security:
3. Performance:
4. Redundancy:
o Implement redundant links and hardware to ensure high availability and minimize downtime.
5. Documentation:
Alliance Health's network implementation strategy met existing demands and allowed for growth. VLANs to isolate
departmental traffic, safe inter-branch communication, and strong security were key considerations. Managed switches and
high-speed connections optimise data flow and scalability. A functional and secure network requires regular maintenance
85
and upgrades and improved security techniques. The network's architecture balances performance, security, and scalability
to support Alliance Health's growth.
Next, record the installation process, educate workers on network administration and troubleshooting, and set up continuous
monitoring to optimise network performance and security.
1. Ping Tests
86
Command: ping 192.168.1.11
Expected Result: Successful ping.
Actual Result: Successful ping with < 1 ms latency.
Analysis: Same subnet communication is effective.
87
2. Traceroute Tests
Device: Laptop
SSID: Sales_Marketing
Expected Result: Successful connection.
Actual Result: Successful connection.
Analysis: Wi-Fi configuration is correct.
Device: Laptop
SSID: Video_Conferencing
Expected Result: Successful connection.
Actual Result: Successful connection.
Analysis: Wi-Fi configuration is correct.
4. Security Tests
Device: Admin PC
Destination: Core Router (IP: 192.168.1.1)
Command: ssh [email protected]
Expected Result: Successful SSH connection.
Actual Result: Successful connection.
Analysis: Secure management access is configured correctly.
89
Test Case 9: Vulnerability scan
Summary of Results
Ping Tests: Successful within and across subnets and between branches.
Traceroute Tests: Efficient internal routing with expected hops.
Wi-Fi Connectivity Tests: Successful connections across all areas.
Security Tests: Secure SSH access and no critical vulnerabilities.
1. Scalability:
o Reserve IP ranges for growth.
o Upgrade network devices for higher capacity.
2. Security:
90
o Regular firmware updates and security audits.
o Implement advanced security measures (IDS/IPS).
3. Performance Optimization:
o Implement QoS to prioritize traffic.
o Monitor and optimize network performance.
4. Redundancy:
o Add redundant links and hardware.
o Test backup and recovery procedures.
5. Documentation and Training:
o Maintain up-to-date network documentation.
o Provide ongoing training for network administrators.
All of the basic conditions have been met for Alliance Health's network application. The plan makes sure that each subnet
is properly separated, that communication between branches is safe, and that security is strong. Future improvements will
focus on making the network more scalable, secure, fast, and redundant so it can continue to meet Alliance Health's
business and growth needs.
-------------------------------------------------------------------------------END--------------------------------------------------------------------------------------
91
REFERENCES
● https://www.tutorialspoint.com/what-is-network-interface-card-nic
● https://www.researchgate.net/figure/2-Network-Interface-Card-NIC_fig3_346108941
● https://www.google.com/search?q=network+operating+system&rlz=1C1KNTJ_enLK1067&sxsrf=AB5stBiVrKuE3lHVp6FrWH-
bCLWOY4Ow8A%3A1689904367138&ei=7-
S5ZPiGCNXDjuMPqaOpyAc&ved=0ahUKEwi4uoes2J6AAxXVoWMGHalRCnkQ4dUDCA8&uact=5&oq=network+operating+system
&gs_lp=Egxnd3Mtd2l6LXNlcnAiGG5ldHdvcmsgb3BlcmF0aW5nIHN5c3RlbTIFEAAYgAQyBRAAGIAEMgUQABiABDIFEAAYgAQyBRA
AGIAEMgUQABiABDIFEAAYgAQyBRAAGIAEMgUQABiABDIFEAAYgARIpX1QqRhYtnhwBHgBkAEAmAGAAqABrCaqAQcwLjE1LjEwu
92
AEDyAEA-
AEBwgIKEAAYRxjWBBiwA8ICCBAAGIoFGJECwgIREC4YgAQYsQMYgwEYxwEY0QPCAgsQABiKBRixAxiDAcICERAuGIoFGLEDGIMBG
McBGNEDwgIOEC4YigUYsQMYxwEY0QPCAgsQLhiKBRixAxiDAcICBxAjGIoFGCfCAgcQABiKBRhDwgITEC4YigUYsQMYgwEYxwEY0Q
MYQ8ICBxAuGIoFGEPCAg0QABiKBRixAxiDARhDwgIOEAAYigUYsQMYgwEYkQLCAgoQABiABBgUGIcCwgIHEAAYgAQYCuIDBBgAIE
GIBgGQBgg&sclient=gws-wiz-serp
● https://www.techtarget.com/searchnetworking/definition/DHCP#:~:text=DHCP%20(Dynamic%20Host%20Configuration
%20Protocol)%20is%20a%20network%20management%20protocol,it%20can%20communicate%20using%20IP.
step-explained.html
● https://www.google.com/url?sa=i&url=https%3A%2F%2Fsiteproxy.ruqli.workers.dev%3A443%2Fhttps%2Fdocs.onion.io%2Fomega2-docs%2Fconnecting-to-wifi-using-
console.html&psig=AOvVaw0hs3W057BIshVAYgaCRwms&ust=1689999410616000&source=images&cd=vfe&opi=89978449&v
ed=0CBEQjRxqFwoTCKjtocb4noADFQAAAAAdAAAAABAO
93
● https://www.cisco.com/c/en/us/td/docs/routers/access/800M/software/800MSCG/routconf.html
● https://www.cisco.com/c/en/us/td/docs/routers/access/1800/1801/software/configuration/guide/scg/firewall.html
● https://www.google.com/url?sa=i&url=https%3A%2F%2Fsiteproxy.ruqli.workers.dev%3A443%2Fhttps%2Fwww.geeksforgeeks.org%2Fbasic-firewall-configuration-in-cisco-
packet-tracer
%2F&psig=AOvVaw2hNSpm4XBBmXTj_g7ltjt3&ust=1690001649706000&source=images&cd=vfe&opi=89978449&ved=0CBEQj
RxqFwoTCOCmm_KAn4ADFQAAAAAdAAAAABBI
● https://www.google.com/search?q=web+server+configuration+in+cisco+packet+tracer&tbm=isch&ved=2ahUKEwiPi6PxgJ-
AAxW3zaACHWLgB2AQ2-
cCegQIABAA&oq=web+server+co&gs_lcp=CgNpbWcQARgDMgUIABCABDIFCAAQgAQyBQgAEIAEMgUIABCABDIFCAAQgAQyBQg
AEIAEMgUIABCABDIGCAAQCBAeMgYIABAIEB4yBggAEAgQHjoECCMQJzoHCCMQ6gIQJzoICAAQgAQQsQM6BQgAELEDOgcIABCK
BRBDUIcgWKBhYNt4aAFwAHgEgAHfAYgBpRqSAQYwLjE3LjKYAQCgAQGqAQtnd3Mtd2l6LWltZ7ABB8ABAQ&sclient=img&ei=cQ-
6ZM-OK7ebg8UP4sCfgAY&bih=715&biw=1536&rlz=1C1KNTJ_enLK1067#imgrc=vZjGn9EqCw-gIM
● https://www.google.com/url?sa=i&url=https%3A%2F%2Fsiteproxy.ruqli.workers.dev%3A443%2Fhttps%2Fwww.geeksforgeeks.org%2Fconfiguring-dhcp-and-web-server-in-
cisco-packet-tracer
94
%2F&psig=AOvVaw1dN28VSMzPAx8556BRo5m2&ust=1690001925375000&source=images&cd=vfe&opi=89978449&ved=0CBE
QjRxqFwoTCICDyfWBn4ADFQAAAAAdAAAAABAY
● https://www.google.com/url?sa=i&url=https%3A%2F%2Fsiteproxy.ruqli.workers.dev%3A443%2Fhttps%2Fwww.chegg.com%2Fhomework-help%2Fquestions-and-answers
%2Fhelp-simulate-cisco-packet-tracer-proxy-server-network-topology-please-give-step-configure-
q58372010&psig=AOvVaw1hl68m-
VuNPTgOIoXMlOLH&ust=1690002222461000&source=images&cd=vfe&opi=89978449&ved=0CBEQjRxqFwoTCLi4jIODn4ADFQA
AAAAdAAAAABAQ
● https://www.youtube.com/watch?v=CgWbqO712fQ
95
96
97
98
99
100
101