0% found this document useful (0 votes)
308 views102 pages

Networking Assignment: M. Haashim Rumy E184715 Esoft Metro Campus SEP/OCT 2022

Uploaded by

Mhr R
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
308 views102 pages

Networking Assignment: M. Haashim Rumy E184715 Esoft Metro Campus SEP/OCT 2022

Uploaded by

Mhr R
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 102

NETWORKING A

Semester 01

M. HAASHIM RUMY
E184715
ESOFT METRO CAMPUS
SEP/OCT 2022
Higher Nationals
Internal verification of assessment decisions – BTEC (RQF)
INTERNAL VERIFICATION – ASSESSMENT DECISIONS
Programme title BTEC Higher National Diploma in Computing

Assessor Internal
Verifier
Unit 02: Networking
Unit(s)
LAN Design & Implementation for Alliance Health
Assignment title

Student’s name
List which assessment Pass Merit Distinction
criteria the Assessor has
awarded.
INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded match


those shown in the assignment brief? Y/N

Is the Pass/Merit/Distinction grade awarded


justified by the assessor’s comments on the Y/N
student work?
Has the work been assessed Y/N
accurately?
Is the feedback to the student:
Give details:
• Constructive? Y/N
• Linked to relevant assessment Y/N
criteria? Y/N
• Identifying opportunities for
improved performance? Y/N
• Agreeing actions?
Does the assessment decision need Y/N
amending?

Assessor signature Date

Internal Verifier signature Date


Programme Leader signature (if
required) Date

Confirm action completed

1
Remedial action taken
Give details:

Assessor signature Date


Internal
Verifier Date
signature
Programme Leader
signature (if Date
required)

2
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID E184715
Unit 02: Networking
Unit Title
Assignment Number 1 Assessor
Date
Submission Date Received 1st
submission
Date Received 2nd
Re-submission Date submission

Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction P1 P2 M1 D1
Descripts

LO2 Explain networking devices and operations.

Pass, Merit & Distinction P3 P4 M2


Descripts

LO3 Design efficient networked systems.


Pass, Merit & Distinction P5 P6 M3 D2
Descripts

LO4 Implement and diagnose networked systems.


Pass, Merit & Distinction P7 P8 M4
Descripts

Grade: Assessor Signature: Date:

Resubmission Feedback:

Grade: Assessor Signature: Date:


Internal Verifier’s Comments:

Signature & Date:

* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.

Assignment Feedback

3
Formative Feedback: Assessor to Student

Action Plan

Summative feedback

Feedback: Student to Assessor

Assessor Date
signature

Student Date
signature

4
Pearson Higher Nationals in
Computing
Unit 02: Networking
Assignment 01

Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present
it as my own without attributing the sources in the correct form. I further understand what it
means to copy another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of Pearson UK.
3. I know what the consequences will be if I plagiarise or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my
own, and where I have made use of another’s work, I will attribute the source in the correct
way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Pearson, UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the assignment.

[email protected]

Student’s Signature: Date:


(Provide E-mail ID) (Provide Submission Date)

5
Assignment Brief
Student Name /ID Number E184715

Unit Number and Title Unit 2: Networking

Academic Year 2022/23

Unit Tutor

Assignment Title LAN Design & Implementation for Alliance Health

Issue Date

Submission Date

IV Name & Date

Submission format

The submission should be in the form of an individual report written in a concise, formal business
style using single spacing and font size 12. You are required to make use of headings, paragraphs and
subsections as appropriate, and all work must be supported with research and referenced using
Harvard referencing system. Please also provide an end list of references using the Harvard
referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures,
although you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:

LO1 Examine networking principles and their protocols.

LO2 Explain networking devices and operations.

LO3 Design efficient networked systems.

LO4 Implement and diagnose networked systems.

Assignment Brief and Guidance:

6
Scenario

Alliance Health is a technology-enabled solutions company that optimizes the revenue cycle of the
US healthcare industry where its global delivery center is located in Colombo. The company is
planning to expand their business operations with their latest branch at Matara and wants it to be
one of the state-of-the-art companies in Matara with the latest facilities.

Assume you have been appointed as the new network analyst of Alliance Health to plan, design and
restructure the existing network. Prepare a network architectural design and implement it with
your suggestions and recommendations to meet the company requirements.
The floor plan of the head office in Colombo is as follows:
Floor 1:

● Reception area

● Sales & Marketing Department (10 employees)

● Customer Services Area – with Wi-Fi facilities

Floor 2:

● Administration Department (30 Employees)

● HR Department (20 employees)

● Accounting & Finance Department (15 employees)

● Audit Department (5 employees)

● Business Development Department (5 employees)

Floor 3

● Video conferencing room

7
● IT Department (60 employees)

● The Server Room

The floor plan of the branch in Matara is as follows:


Floor 1:

● Reception area

● Customer Services Area– with Wi-Fi facilities

Floor 2:

● Administration Department (10 Employees)

● HR Department (7 employees)

● Accounting & Finance Department (8 employees)

● IT Department (50 employees)

Following requirements are given by the Management.

● All the departments must be separated with unique subnet.

● The conferencing room of the head office and Customer Services Areas of each branch are to be

equipped with Wi-Fi connections.

● Connectivity between two branches (Head Office and Matara) would allow the intra branch

connectivity between departments. (Use of VPN is not compulsory)

● The necessary IP address classes and ranges must be decided by the network designer and should

8
be used for all the departments except the server room.

● Number of servers required for the Server room need to be decided by the Network designer and

should be assigned with 10.254.10.0/24 subnet. (Uses static IPs)

● Sales and Marketing Team also needs to access Network resources using WIFI connectivity.

(Note: Clearly state your assumptions. You are allowed to design the network according to your assumptions, but
main requirements should not be violated)

Activity 01

● Discuss the benefits and constraints of different network system types that can be implemented in

the Matara branch and the main IEEE Ethernet standards that can be used in above LAN and WLAN
design.

● Discuss the importance and impact of network topologies and assess the main network protocol

suites that are used in network design using examples. Recommend suitable network topology and
network protocols for above scenario and evaluate with valid points how the recommended
topology demonstrates the efficient utilization of the networking system of Matara branch.

Activity 02

● Discuss the operating principles oFf network devices (Ex: Router, Switch, Etc.) and server types that

can be used for above scenario while exploring different servers that are available in today’s market
with their specifications. Recommend server/servers for the above scenario and justify your
selection with valid points.

● Discuss the inter-dependence of workstation hardware and networking software and provide

examples for networking software that can be used in above network design.

9
Activity 03

● Prepare a written network design plan to meet the above-mentioned user requirements including a

blueprint drawn using a modeling tool (Ex: Microsoft Visio, EdrawMax) .Test and evaluate the
proposed design by analyzing user feedback with the aim of optimizing your design and improving
efficiency.

(Support your answer by providing the VLAN and IP subnetting scheme for the above scenario and the
list of devices, network components and software used to design the network for above scenario and
while justifying your selections.)

● Install and configure Network services, devices and applications (Ex: VLAN,WiFi, DNS,Proxy, Web,

Etc.) according to the proposed design to accomplish the user requirements and design a detailed
Maintenance schedule for above Network.

*Note: - Screen shots of Configuration scripts should be presented.

Activity 04

● Implement a networked system based on your prepared design with valid evidences.

● Develop test cases and conduct verification (Ex: Ping, extended ping, trace route, telnet, SSH, etc.) to

test the above Network and analyse the test results against the expected results. Recommend
potential future enhancements for the networked system with valid justifications and critically
reflect on the implemented network, including the plan, design, configurations, tests and the
decisions made to enhance the system.

10
11
Grading Rubric

Grading Criteria Achieved Feedback

LO1 : Examine networking principles and their protocols.

P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Assess common networking principles and how protocols
enable the effectiveness of networked systems.

LO2 : Explain networking devices and operations

P3
Discuss the operating principles of networking devices and
server types.
P4
12
Discuss the interdependence of workstation hardware and
relevant networking software
M2
Explore a range of server types and justify the selection of a
server for a given scenario, regarding cost and performance
optimization

LO 1 & LO2
D1 Evaluate the topology protocol selected for a given scenario and
how it demonstrates the efficient utilisation of a networking system.
LO3 : Design efficient networked systems

P5
Design a networked system to meet a given specification.
P6
Design a maintenance schedule to support the networked
system.

M3

13
Analyse user feedback on your designs with the aim of
optimising your design and improving efficiency.
D2
Critically reflect on the implemented network, including the
design and decisions made to enhance the system.
LO4 : Implement and diagnose networked systems

P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D2 Critically reflect on the implemented network, including the
design and decisions made to enhance the system.

14
Content’s
1. Introduction –––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
2. What is networking –––––––––––––––––––––––––––––––––––––––––––––––––––––––––
3. Networking concepts ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––

● Network Topologies: –––––––––––––––––––––––––––––––––––––––––––––––––––––

● Network Layers: –––––––––––––––––––––––––––––––––––––––––––––––––––––––––

● TCP/IP Protocol Suite: ––––––––––––––––––––––––––––––––––––––––––––––––––––

● Routing and switching : ––––––––––––––––––––––––––––––––––––––––––––––––––––

● Subnetting and CIDR: ––––––––––––––––––––––––––––––––––––––––––––––––––––––

15
● Firewalls and Network Security ––––––––––––––––––––––––––––––––––––––––––––––

4. According to the scenario: ––––––––––––––––––––––––––––––––––––––––––––––––––––––


5. Activity 01 ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––

1.1Discuss the benefits and constraints of different network system types that can be implemented in the
Matara branch and the main IEEE Ethernet standards that can be used in above LAN and WLAN
design.
6. Benefits and Constraints of Network System Types in Matara Branch: –––––––––––––––––––––––––
7. Main IEEE Ethernet Standards for LAN and WLAN Design: ––––––––––––––––––––––––––––––––
8. IEEE Ethernet Standards: –––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
9. 1.2 . Discuss the importance and impact of network topologies and assess the main network protocol
suites that are used in network design using examples. Recommend suitable network topology and
network protocols for above scenario and evaluate with valid points how the recommended topology
demonstrates the efficient utilization of the networking system of Matara branch.

16
10. OSI (Open Systems Interconnection) Model: ––––––––––––––––––––––––––––––––––––––––

11. Recommended Network Topology and Protocols for Matara Branch: ––––––––––––––––––––

12.  Benefits of Star Topology: ––––––––––––––––––––––––––––––––––––––––––––––––

13. Efficient Utilization of the Networking System: ––––––––––––––––––––––––––––––––

14. ACTIVITY 02 –––––––––––––––––––––––––––––––––––––––––––––––––––––––––––

2.1 Discuss the operating principles of network devices (Ex: Router, Switch, Etc.) and server types that can
be used for above scenario while exploring different servers that are available in today’s market with
their specifications. Recommend server/servers for the above scenario and justify your selection with
valid points.
15. Network Device and Server Operating Principles: ––––––––––––––––––––––––––––––––––––

● Router: ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––

17
● Switch –––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––

16. Server Types : ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––

● FTP server ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––

● DNS Server: –––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––

● DHCP Server –––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––

17. Recommended Servers for the Scenario: –––––––––––––––––––––––––––––––––––––––––––––

18. 2.2 Discuss the inter-dependence of workstation hardware and networking software and provide
examples for networking software that can be used in above network design.

● NIC (Network Interface Card): ––––––––––––––––––––––––––––––––––––––––––––––––––––––––

● Protocol Suite TCP/IP: ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––

18
● NOS (Network Operating System): –––––––––––––––––––––––––––––––––––––––––––––––––––––

● Client for the Domain Name System (DNS): ––––––––––––––––––––––––––––––––––––––––––––––

● Dynamic Host Configuration Protocol (DHCP) Client: ––––––––––––––––––––––––––––––––––––––

● Web Browsers: –––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––

19. ACTIVITY 03 –––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––

3.1Prepare a written network design plan to meet the above-mentioned user requirements including a
blueprint drawn using a modeling tool (Ex: Microsoft Visio, EdrawMax) .Test and evaluate the proposed
design by analyzing user feedback with the aim of optimizing your design and improving efficiency.
(Support your answer by providing the VLAN and IP subnetting scheme for the above scenario and the list
of devices, network components and software used to design the network for above scenario and while
justifying your selections.)

19
20. Evaluation and Optimization: –––––––––––––––––––––––––––––––––––––––––––––––––––
21. 3.2 Install and configure Network services, devices and applications (Ex: VLAN, WiFi , DNS,
Proxy, Web, Etc.) according to the proposed design to accomplish the user requirements and design a
detailed Maintenance schedule for above Network.

22. configuration part for devices –––––––––––––––––––––––––––––––––––––––––––––––––––––


23. Maintenance Schedule in Detail: –––––––––––––––––––––––––––––––––––––––––––––––––––
24. Activity 04 –––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––
4.1 Implement a networked system based on your prepared design with valid evidences.
show the case diagrams

LO1: Examine networking principles and their protocols.

INTRODUCTION

20
For worldwide collaboration, communication, and information exchange, networking is essential. You network daily via
social media, email, and home networking equipment, whether you realize it or not. Networking involves connecting
various devices, systems, or people to share information, resources, and ideas.
Networking extends beyond digital and physical infrastructure that enables communication. Creating and sustaining
personal and professional ties promotes support, information sharing, and opportunity. Networking involves technology
and human contact and is essential for professional, personal, and economic success.
Networking has many features, advantages, and tactics, which this introduction will explore. Understanding and mastering
networking may open up new doors, connections, and possibilities in many areas of your life.

What is networking
Networking connects devices, systems, and computers to share information, data, and resources. Networking allows units close or far away to
connect and exchange data.

21
Networking concepts.
1. Network Topologies:

A network's topology is the physical or logical configuration of its components. Typical topologies include of:

● Bus Topology: All devices are connected to a central cable called the "bus."

22
● Star Topology: Devices are connected to a central hub or switch.

23
● Ring Topology: A closed loop is created when devices are linked in a circular pattern.

24
● Mesh Topology: Every device in the network is linked to every other device, or in a mesh topology.

25
● Hybrid Topology: Combines two or more different topologies to form a hybrid topology.

26
2. Network Layers:

The OSI (Open Systems Interconnection) model and the TCP/IP model are two common reference models that divide
networking tasks into distinct layers. Each layer serves specific functions and interacts with adjacent layers to facilitate
communication.

27
3. TCP/IP Protocol Suite: The main protocol suite used by the majority of networks and the internet today is TCP/IP (Transmission
Control Protocol/Internet Protocol). TCP, UDP (User Datagram Protocol), IP, ICMP (Internet Control Message Protocol), and other
protocols are among the many that make up this system.

4. Routing and switching: While switching includes the effective movement of data inside a local network, routing involves establishing
the optimum way for data to go from the source to the destination across many networks.

5. Subnetting and CIDR: Subnetting is the process of dividing a large network into smaller subnetworks, known as subnets. CIDR
(Classless Inter-Domain Routing) notation is used to represent IP addresses with subnet masks, making IP address allocation more
flexible.

6. Firewalls and Network Security: Network security is achieved by firewalls by screening and regulating incoming and outgoing traffic
in accordance with specified security rules. Intrusion detection and prevention systems (IDPS), encryption, and authentication protocols
are further security measures.

According to the scenario:

28
I'll suggest a network architecture design for Alliance Health's central office in Colombo and the branch in Matara based on the floor plans and
needs provided. The strategy is as follows:
Assumptions:
1. Each floor of both the head office and the branch will have its own unique subnet.
2. We will use private IP addresses for the internal network.
3. The head office and the branch will be connected via a secure dedicated connection.
4. The Wi-Fi network will be set up using access points to provide seamless coverage in the specified areas.
5. For simplicity, I will assume that the Wi-Fi connections in the customer services areas and the conferencing room will be guest networks,
isolated from the main internal network.

Network Architecture for Head Office (Colombo):

● Subnets:

1. Reception area: 10.0.1.0/24


2. Sales & Marketing Department: 10.0.2.0/28
3. Customer Services Area (Wi-Fi): 10.0.2.16/28 (Guest Network)
4. IT Department: 10.0.5.0/26
5. HR Department: 10.0.3.32/27
6. Accounting & Finance Department: 10.0.3.64/27
7. Server Room: 10.254.10.0/24 (Static IPs)

29
8. Business Development Department: 10.0.3.104/29
9. Video conferencing room: 10.0.4.0/24
10. Administration Department: 10.0.3.0/27
11. Audit Department: 10.0.3.96/29

Network Architecture for Matara Branch :


Subnets:
1. Reception area: 10.1.1.0/24
2. Customer Services Area (Wi-Fi): 10.1.2.0/28 (Guest Network)
3. Administration Department: 10.1.3.0/28
4. HR Department: 10.1.3.16/28
5. Accounting & Finance Department: 10.1.3.32/28
6. IT Department: 10.1.3.48/26

● Wi-Fi Connectivity:

1. Head Office and Colombo branch - Customer Services Area: Set up Wi-Fi access points in the customer services area with a separate
guest network.

● Server Room:

30
For static IP addresses issued to servers, the Server Room will have a subnet of 10.254.10.0/24.

● Wi-Fi Access for the Sales and Marketing Team:

Give the Sales and Marketing Department a VLAN and subnet for Wi-Fi network access. All essential internal resources should be accessible
from this VLAN.
This network architecture meets all management needs. Each department will have its own subnet, Wi-Fi will be provided in defined areas, and
the two branches will be connected to enhance intra-branch communication. The server room may host 10 servers with the provided subnet
after assigning IP address classes and ranges. Sales and Marketing Teams will have Wi-Fi connection to network resources.

Activity 01
1.1Discuss the benefits and constraints of different network system types that can be implemented in the Matara branch
and the main IEEE Ethernet standards that can be used in above LAN and WLAN design.

Benefits and Constraints of Network System Types in Matara Branch:

LAN (Local Area Network):

31
● Benefits: LAN offers high-speed data transfer, low latency, and easy resource sharing within the branch. It is cost-

effective and suitable for small to medium-sized offices like Matara.

● Constraints: LAN has limited geographical coverage and may require additional equipment for inter-branch

connectivity.

WLAN (Wireless Local Area Network):

● Benefits: WLAN provides mobility, allowing employees to access the network from anywhere within the coverage

area. It eliminates the need for wired connections.

● Constraints: WLAN can be susceptible to interference and security concerns if not properly configured and protected.

Main IEEE Ethernet Standards for LAN and WLAN Design:

IEEE Ethernet Standards:

32
Figure 4

Several Ethernet standards that can be used in the LAN and WLAN design outlined earlier have been produced by the
Institute of Electrical and Electronics Engineers (IEEE). The main criteria are:

1. IEEE 802.3: This is the Ethernet network specification. It describes the network's physical layer and MAC layer.

2. IEEE 802.11:The Wi-Fi network protocol standard is IEEE 802.11. It describes the network's physical layer and
MAC layer.

Benefits

33
● Interoperability: IEEE Ethernet standards make guarantee that gadgets from various producers can talk to one

another.

● Reliability: The widely adopted IEEE Ethernet standards have undergone extensive testing and have been improved

over time, resulting in a high degree of stability and reliability.

● Scalability: IEEE Ethernet standards are easily expandable to support more users or gadgets.

Constrains :

● Complexity: Implementing IEEE Ethernet standards can be challenging, particularly in expansive networks.

● Cost: Putting IEEE Ethernet standards into practice can be costly, especially when using newer or more

sophisticated standards.

● Limited features: When compared to other private networking technologies, IEEE Ethernet standards contain

few functionality.

Matara Branch Network Topology and P


rotocols Recommendations:
34
Topology: A Star topology is proposed for the Matara branch. Each department (administration, human resources,
accounting and finance, and information technology) will have its own switch, and all switches will be linked to a single
switch that will serve as the hub. This architecture enhances fault tolerance while simplifying administration.
Protocols for Networks: Ethernet utilising IEEE 802.3 is recommended for LAN. Wi-Fi utilising IEEE 802.11 standards is
suited for wireless communication in WLAN.
Efficient Networking System Utilization: The Star topology assures that if one department's switch fails, it will not affect
other departments, decreasing downtime. Ethernet allows for the stable and quick connectivity of devices inside each
department. Wi-Fi allows employees to access the network while roaming about the branch, increasing productivity

P2. Explain the impact of network topology, communication and bandwidth


requirements.

1.2 . Discuss the importance and impact of network topologies and assess the main network protocol suites that are used
35
in network design using examples. Recommend suitable network topology and network protocols for above scenario
and evaluate with valid points how the recommended topology demonstrates the efficient utilization of the
networking system of Matara branch.

Network topology, communication, and bandwidth requirements are fundamental aspects of network design that greatly
influence the performance, scalability, and reliability of a network. Here's an explanation of their impact:

Network Topology
 Definition:

Network topology refers to the arrangement of different elements (links, nodes, etc.) in a computer network. It can be
physical or logical.

 Common Types of Topologies:

 Bus Topology: All devices are connected to a single central cable.

36
 Star Topology: All devices are connected to a central hub or switch.
 Ring Topology: Devices are connected in a circular fashion.
 Mesh Topology: Every device is connected to every other device.
 Tree Topology: A hybrid topology combining characteristics of star and bus topologies.

 Impact:

 Performance and Efficiency: The choice of topology affects the speed and efficiency of data transfer. For example,
a star topology can provide high performance in a local area network (LAN) due to its central hub, while a mesh
topology offers high redundancy and reliability.
 Scalability: Some topologies are easier to expand than others. For instance, star and tree topologies can be scaled
easily by adding more nodes.
 Cost: The cost of implementation varies; mesh topology, while robust, is more expensive due to the extensive
cabling and hardware required.
 Fault Tolerance and Reliability: Topologies like mesh offer high fault tolerance as multiple paths for data transfer
exist, whereas a bus topology is highly vulnerable to failure at the central cable.

37
Communication

 Definition:

Communication in a network refers to the exchange of data between devices. This can be through various protocols and
communication modes.

1 Modes of Communication:

 Unicast: One-to-one communication between a single sender and a single receiver.


 Broadcast: One-to-all communication where data is sent to all devices in the network.
 Multicast: One-to-many communication where data is sent to a specific group of devices.
 Anycast: One-to-one-of-many communications where data is sent to the nearest or best receiver among a group.

2. Impact:

38
 Data Flow Control: Efficient communication protocols ensure proper data flow control, minimizing congestion and
packet loss.
 Latency and Throughput: The mode and efficiency of communication protocols affect latency (delay in data
transmission) and throughput (rate of successful message delivery).
 Quality of Service (QoS): Effective communication ensures that QoS parameters like bandwidth, delay, jitter, and
packet loss are maintained, especially in real-time applications like VoIP and video conferencing.

Bandwidth Requirements.

 Definition:
Bandwidth refers to the maximum rate of data transfer across a network path. It is typically measured in bits per second
(bps).

1. Factors Influencing Bandwidth Requirements:

39
 Number of Users: More users require higher bandwidth to avoid congestion.
 Type of Applications: Applications like streaming video, online gaming, and large file transfers demand higher
bandwidth compared to email and simple web browsing.
 Quality of Service: High-bandwidth networks are necessary to support QoS for critical applications.
 Network Traffic Patterns: Peak usage times and traffic patterns influence bandwidth needs.

2. Impact:

 Network Performance: Sufficient bandwidth ensures smooth and efficient network performance. Insufficient
bandwidth can lead to slow data transfer rates, increased latency, and higher packet loss.
 Scalability: Adequate bandwidth is crucial for scaling up the network to accommodate more users and applications.
 Cost: Higher bandwidth requirements can significantly increase the cost of network infrastructure and maintenance.
 User Experience: Adequate bandwidth ensures a good user experience, particularly for bandwidth-intensive
applications like video conferencing and online gaming.

In summary, the choice of network topology, effective communication protocols, and adequate bandwidth are crucial for

40
designing a robust, efficient, and scalable network. They directly affect network performance, reliability, cost, and user
experience.

o Main Network Protocol Suites:

Network protocols provide the rules and practices for data transmission among network devices. The following are the
two most common protocol suites used in network design:

1. Transmission Control Protocol/Internet Protocol (TCP/IP):

● Widely used in the internet and enterprise networks.

● Supports reliable and connection-oriented communication (TCP) and connectionless communication (UDP).

● Examples: HTTP, DNS, SMTP.

OSI (Open Systems Interconnection) Model:

● A theoretical model outlining a seven-layer network communication architecture.

41
● Each layer has a different purpose, and communication between them is regulated by established protocols.

● Examples: Ethernet (Layer 2), IP (Layer 3), TCP/UDP (Layer 4).

Recommended Network Topology and Protocols for Matara Branch:


Topology: A Star topology is recommended for the Matara branch. Each department will have its own switch, and all
switches will connect to a central switch acting as the hub.

⮚ Benefits of Star Topology:

● Simple to Manage: Because all connections are made directly to the central hub, network management is simplified.

● Fault Isolation: If a switch in one department fails, just that department is impacted, leaving the others operating.

● Scalability: By connecting new departments or devices to the central hub, new departments or devices may be readily

added.

42
Network Protocols: The TCP/IP protocol suite should be used for network communication. HTTP, SMTP, and DNS
protocols will enable services such as web surfing, email, and name resolution.

Efficient Utilization of the Networking System:


The recommended Star topology meets the needs of the Matara branch. It provides management simplicity, fault tolerance,
and scalability. Each department's switch links to the central hub directly, guaranteeing efficient data transport and
minimising data collisions. The TCP/IP protocol suite enables dependable and efficient communication between
departments, allowing for seamless data flow for a variety of applications such as email, internet access, and internal
services.
Overall, the combination of Star topology and TCP/IP protocols ensures that the networking system at the Matara branch is
well-organized, resilient, and capable of handling the current and future needs of Alliance Health's expanding operations.

ACTIVITY 02

43
2.1 Discuss the operating principles of network devices (Ex: Router, Switch, Etc.) and server types that can be used for
above scenario while exploring different servers that are available in today’s market with their specifications. Recommend
server/servers for the above scenario and justify your selection with valid points.
Network Device and Server Operating Principles:

1. Router:

● Operating Principle: Routers are network devices that operate at the network layer (Layer 3) of the OSI model. They

use routing tables to make intelligent decisions on how to forward data packets between different networks.

● Function: Routers connect multiple networks, including LANs and WANs, and determine the best path for data to

reach its destination.

● Importance: Routers enable inter-branch connectivity, ensuring seamless communication between the head office in

Colombo and the new branch in Matara.

2. Switch

44
● Operating Principle: Switches operate at the data link layer (Layer 2) of the OSI model. They use MAC addresses to

forward data packets within a local network.

● Function: Switches create dedicated communication paths between devices, reducing data collisions and improving

network performance.

● Importance: Switches are essential for the efficient functioning of individual departments within the Matara branch,

providing fast and reliable communication within each department.

Server Types :
1. FTP Server:

● File servers store and manage files, giving users centralised access to shared resources. They are often used in

businesses to store papers, multimedia files, and other types of data.

● The importance of a file server is that it will promote cooperation and data exchange among departments in both the

headquarters and the Matara branch.

2. DNS Server:

45
● DNS (Domain Name System) servers convert human-readable domain names into IP addresses, allowing users to

visit websites using human-readable domain names.

● Importance: A DNS server ensures that employees may access internal and external resources simply inputting

domain names, making network navigation simpler.

3. DHCP Server :

● DHCP (Dynamic Host Configuration Protocol) servers automatically issue IP addresses to network devices,

simplifying IP management.

● Importance: A DHCP server will simplify the IP address assigning procedure, making it easier to manage the

network's rising number of devices.

Recommended Servers for the Scenario:

1. File Server:

46
▪ Specifications: The file server should have ample storage capacity to accommodate the data storage needs of all
departments. RAID (Redundant Array of Independent Disks) should be implemented for data redundancy and fault
tolerance.`

▪ Justification: With various departments in both the head office and the branch, a centralized file server will enhance
data management, backups, and access control.

2. DNS and DHCP Servers:

▪ Specifications: The DNS and DHCP servers should have sufficient processing power and memory to handle the
network's DNS resolution and IP address assignment requests effectively.

▪ Justification: A dedicated DNS server will simplify domain name resolution for both the head office and the Matara
branch. The DHCP server will automate IP address allocation, streamlining network administration.

Alliance Health can assure effective data administration, faster network navigation, and simplified IP address management
by deploying these suggested servers, therefore enabling the seamless functioning of both the head office and the new
branch in Matara.

47
2.2 Discuss the inter-dependence of workstation hardware and networking software and provide examples for networking software that

can be used in above network design.

The interdependence between workstation hardware and networking software is critical for enabling network connection
and data transmission. Workstation hardware provides the physical infrastructure required for networking, while
networking software allows data to be sent between workstations and other network devices. Here are some networking
software examples that may be utilized in the given network design:

1. NIC (Network Interface Card):

A network interface card (NIC) is a hardware component without which a computer cannot be connected over a network.
It is a circuit board installed in a computer that provides a dedicated network connection to the computer. It is also
called network interface controller, network adapter or LAN adapter.

● NIC allows both wired and wireless communications.

● NIC allows communications between computers connected via local area network (LAN) as well as communications
over large-scale network through Internet Protocol (IP).

48
● NIC is both a physical layer and a data link layer device, i.e. it provides the necessary hardware circuitry so that the
physical layer processes and some data link layer processes can run on it.

● Hardware: A network interface card (NIC) is a physical component put in each workstation that allows it to connect

to a network.

● Software: In order to connect with the operating system and networking software, the NIC requires proper drivers.

49
● Interdependence: The NIC hardware and software drivers allow data packets to be transferred and received via the

network.

2. Protocol Suite TCP/IP:

● Software: TCP/IP (Transmission Control Protocol/Internet Protocol) is a collection of networking protocols that

describe how data is transported and routed between network devices.

● Inter-dependence: TCP/IP, the cornerstone of contemporary networking, is required for communication between

workstations, servers, and other network devices. It guarantees dependable and efficient data transfer.

3. NOS (Network Operating System):

A network operating system(NOS) is software that connects multiple devices and computers on the network and allows
them to share resources on the network.

50
● Software: Network Operating System (NOS): A Network Operating System (NOS) is specialized software that

manages network resources, services, and users.

● Interdependence: The NOS allows workstations to access shared resources such as files and printers, authenticate

users, and provide centralized network service management.

4. Client for the Domain Name System (DNS):

● Software: The DNS client is a software component on each workstation that converts human-readable domain names

(for example, www.example.com) into IP addresses.

● Inter-dependence: Using easy-to-remember domain names rather than numerical IP addresses, the DNS client allows

workstations to access websites and resources.

51
5. Dynamic Host Configuration Protocol (DHCP) Client:

DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an IP
address to any device, or node, on a network so it can communicate using IP.

● Software: The DHCP client is a software component on each workstation that acquires an IP address automatically

from a DHCP server.

● Interdependence: The DHCP client streamlines the process of assigning IP addresses, ensuring that workstations

have proper IP settings to interact on the network.

6. Web Browsers:

● Software: Workstations may access and browse webpages hosted on web servers using web browsers such as Google

Chrome, Mozilla Firefox, or Microsoft Edge.

52
● Inter-dependence: Web browsers request and display web pages using networking protocols (HTTP/HTTPS), relying

on the underlying networking software for data transport.

Overall, in order to provide an effective network environment, workstation hardware and networking software are
interdependent. In the previously mentioned network architecture for Alliance Health, the hardware provides physical
connectivity, while the software facilitates data transfer, resource sharing, and access to network services, assuring smooth
and efficient network operations.

ACTIVITY 03
3.1 Prepare a written network design plan to meet the above-mentioned user requirements including a blueprint drawn

using a modeling tool (Ex: Microsoft Visio, EdrawMax). Test and evaluate the proposed design by analyzing user feedback
with the aim of optimizing your design and improving efficiency.
(Support your answer by providing the VLAN and IP subnetting scheme for the above scenario and the list of devices,
network components and software used to design the network for above scenario and while justifying your selections.)

53
The suggested network design will be a hierarchical network architecture with core, distribution, and access layers based
on the specifications provided. The network will be built with security, high availability, and management convenience in
mind.

Network Topology

The head office in Colombo and the branch office in Matara are the two locations that make up the planned network
structure. The core layer, distribution layer, and access layer are the three layers that make up the network architecture.
Each layer will contain unique gadgets and operations.

❖ Core Layer:

High-speed switching and routing will be handled by the core layer. It will link the distribution layer switches and offer
Internet connectivity. Both locations will have a core switch installed. To provide high availability, the core switch will be
set up redundantly and use link aggregation and spanning tree protocol (STP). Access control lists (ACLs) and other
security settings will also be defined on the core switch to guard against unwanted access.

54
❖ Distribution Layer:

The access layer switches will be connected to the core layer by the distribution layer. It will be in charge of routing and
VLAN administration. At each location, a distribution switch will be installed and set up with virtual LANs (VLANs) to
divide the various departments. To maintain security and traffic isolation, each department will have an own VLAN. To
guarantee effective routing, the distribution switch will also be configured with routing protocols such Open Shortest Path
First (OSPF).

❖ Access Layer :

The access layer will link IP phones, printers, and other end-user devices to the network. At each location, access switches
will be installed and configured with port security and VLANs to provide network security and traffic separation. In order
to give network traffic priority, the access switches will also be set up with Quality of Service (QoS).

❖ Wi-Fi Access:

55
Both facilities' customer service and welcome areas will have wireless access points installed. Wi-Fi Protected Access
(WPA2) will be used to secure the Wi-Fi connection.

The following network design plan is suggested to satisfy user requirements:

The network design plan intends to suit the user needs of Alliance Health's Colombo headquarters and its new Matara
branch. The architecture should guarantee effective departmental communication, inter-branch connection, and consistent
access to network resources. The plan will be carried out utilising a Star topology with distinct VLANs for each
department, as well as the necessary IP subnetting to ensure network segmentation.

1. Network Topology: Star Topology

All departments in both the headquarters and the Matara branch will have their own switches, which will link to a single
switch that will serve as the hub.The central switch will allow for inter-branch communication between Colombo and
Matara.

2. Scheme for VLAN and IP Subnetting :

❖ Colombo Head Office:


56
● VLAN 10: Department of Sales and Marketing

Subnet: 192.168.10.0/24

● Customer Services VLAN 20

Subnet: 192.168.20.0/24

● VLAN 30: Administration Division

Subnet: 192.168.30.0/24

● VLAN 40: Human Resources Department

Subnet: 192.168.40.0/24

● Accounting and Finance Department VLAN 50

Subnet: 192.168.50.0/24

● VLAN 60: Audit Department

57
Subnet: 192.168.60.0/24

● VLAN 70: Department of Business Development

Subnet: 192.168.70.0/24

● VLAN 80 is the Video Conferencing Room.

Subnet: 192.168.80.0/24

● VLAN 90: Information Technology Department

Subnet: 192.168.90.0/24

● Server Room (Static IP subnet) VLAN 100

Subnet: 10.254.10.0/24 (10 servers)

❖ Matara Branch:

● VLAN 110: Reception area

58
Subnet: 192.168.110.0/24

● VLAN 120: Customer Services Area

Subnet: 192.168.120.0/24

● VLAN 130: Administration Department

Subnet: 192.168.130.0/24

● VLAN 140: HR Department

Subnet: 192.168.140.0/24

● VLAN 150: Accounting & Finance Department

Subnet: 192.168.150.0/24

● VLAN 160: IT Department

Subnet: 192.168.160.0/24

59
Network Devices:

The Matara branch will make use of the following network devices:

1. Switches: Cisco Catalyst 2960-L Series (one switch per department)

2. Router: Cisco ISR 4331

Network Components:

The Matara branch will make use of the following network components:

1. Wi-Fi Access Points: Cisco Aironet 2802i

2. Firewall: Cisco ASA 5506-X


3. DNS Server: Windows Server 2019

4. Proxy Server: Squid Proxy Server

5. Web Server: Apache HTTP Server

Networking software:

The Matara branch will make use of the following networking software:

60
1. Operating System: Cisco IOS

2. Virtual LAN (VLAN) configuration: Cisco VLAN Trunk Protocol (VTP)

3. Routing protocol: Enhanced Interior Gateway Routing Protocol (EIGRP)

4. Dynamic Host Configuration Protocol (DHCP) Server: Windows Server 2019

Maintenance Schedule:

The following maintenance schedule is suggested to guarantee the network's continued dependability and effectiveness:

● Daily: Check the device logs every day for any problems or cautions.

● Weekly: Weekly updates should be made to antivirus and firewall rules.

● Monthly: Review network performance data on a monthly basis and look for ways to improve.

● Quarterly: Review the disaster recovery strategy every quarter and test the backups.

● Annually: Every year, review your network security procedures and make any necessary updates.

61
Evaluation and Optimization:

o Gather user input after installing the network architecture to discover any performance concerns or areas for
improvement.

o To detect problems and optimise network traffic flow, use network management tools to monitor network
performance.

o Examine the security procedures in place and make any required improvements to protect data and resources.

o Test the network's resistance to faults and ensure that fault tolerance techniques are functioning properly.

o Maintain and upgrade the network on a regular basis to keep it working effectively and securely.

By adhering to this network architecture plan, Alliance Health will be able to provide efficient communication, secure data
exchange, and seamless inter-branch connection, satisfying the needs of both the head office in Colombo and the new
branch in Matara.

3.2 Install and configure Network services, devices and applications (Ex: VLAN,WiFi, DNS,Proxy, Web, Etc.) according
to the proposed design to accomplish the user requirements and design a detailed Maintenance schedule for above
Network.

62
Installing and Configuring Network Services, Devices, and Applications:
1. VLAN Configuration:

⮚ Generally, three or four things must be configured on VLAN capable switches:

● Add/define the VLANs. Most switches have a means of defining a list of configured VLANs, and they must be

added before they can be configured on any ports.

● Configure the trunk port.

● Configure the access ports.

● Configure the Port VLAN ID (PVID)

● Configure VLANs on each department's switches in accordance with the VLAN and IP subnetting strategy

63
specified in the network design plan.

● To differentiate between departmental traffic, assign suitable ports to each VLAN.

2. Configuration of Wi-Fi:

● Install and configure Wi-Fi access points in the Customer Services Area of the headquarters and the Customer
Services Area and IT Department of the Matara branch.

● Create SSIDs for each department and protect them with WPA2.

64
● To map each SSID to the appropriate VLAN, use VLAN tagging on the Wi-Fi access points.

3. Router Configuration:

⮚ Normal Router setup steps :

Step 1: Decide where to place the router. ...

65
Step 2: Connect to the Internet. ...
Step 3: Configure the wireless router gateway. ...
Step 4: Connect gateway to router. ...
Step 5: Use app or web dashboard. ...
Step 6: Create a username and password. ...
Step 7: Update the router's firmware. ...
Step 8: Create a Wi-Fi password.

● https://www.cisco.com/c/en/us/td/docs/routers/access/800M/software/800MSCG/routconf.html

⮚ Router configuration for the above scenario:

● Install and configure the router to connect the head office and the Matara branch.

● Implement inter-VLAN routing to enable communication between departments within each location.

● Set up a default route for internet access.

66
4. Configuration of the Firewall:

● Install and configure a firewall to keep the network safe from outside attacks.

● Make firewall rules to manage incoming and outbound traffic and to enforce security regulations.

● https://www.cisco.com/c/en/us/td/docs/routers/access/1800/1801/software/configuration/guide/scg/

firewall.html

67
5. File Server Configuration:

● Install and configure the file server in the Server Room at the headquarters.

● Set up shared folders with suitable access rights for each department.

6. Web Server Configuration:

● Install and install a web server to host the internal websites of the firm.

● Configure virtual hosts to serve numerous web applications for different departments.

68
● https://www.google.com/url?sa=i&url=https%3A%2F%2Fsiteproxy.ruqli.workers.dev%3A443%2Fhttps%2Fwww.geeksforgeeks.org%2Fconfiguring-dhcp-and-

web-server-in-cisco-packet-tracer
%2F&psig=AOvVaw1dN28VSMzPAx8556BRo5m2&ust=1690001925375000&source=images&cd=vfe&opi
=89978449&ved=0CBEQjRxqFwoTCICDyfWBn4ADFQAAAAAdAAAAABAY

7. Proxy Server Configuration:

69
● To improve online security and restrict internet access, install and setup a proxy server.

● Create guidelines for content filtering and access control.

● https://www.youtube.com/watch?v=CgWbqO712fQ

P6. Design a maintenance schedule to support the networked system.

70
Maintenance Schedule in Detail:

Designing a maintenance schedule for a networked system involves regular checks, updates, and optimizations to ensure the
network operates smoothly and efficiently. The schedule should include daily, weekly, monthly, quarterly, and annual tasks
to cover all aspects of network maintenance.

Daily Maintenance

1. Monitor Network Performance:

o Check bandwidth usage and traffic patterns.


o Monitor network latency, packet loss, and jitter.

2. Check Network Security:

o Review logs for unusual activity or security incidents.

71
o Ensure antivirus and antimalware software is up-to-date and running.

3. Backup Critical Data:

o Ensure automated backups are completed successfully.


o Verify the integrity of backup files.

Weekly Maintenance

1. Inspect Hardware:
o Check the physical condition of network hardware (routers, switches, servers).
o Ensure all devices are functioning properly without hardware errors.

2. Update Software and Firmware:


o Apply updates and patches to network devices and servers.
o Update antivirus and antimalware definitions.

3. Review Network Logs:


o Analyze logs for patterns or repeated issues.

72
o Investigate and resolve any anomalies.

Monthly Maintenance

1. Performance Optimization:
o Review and optimize network configuration settings.
o Check for any bottlenecks and optimize traffic flow.

2. Test Backup and Recovery:


o Perform a test restore from backups to ensure data can be recovered.
o Verify backup processes and storage capacity.

3. Update Network Documentation:


o Ensure network diagrams and documentation are current.
o Document any changes or upgrades made to the network.

Quarterly Maintenance

1. Security Audit:

o Conduct a thorough security audit of the network.

o Update firewall rules and access control lists (ACLs).

73
o Review user access permissions and disable unnecessary accounts.

2. Hardware Maintenance:

o Perform a detailed inspection and cleaning of network hardware.

o Test and replace any failing components or cables.

3. Capacity Planning:
o Analyze network usage trends to forecast future needs.
o Plan for any necessary upgrades or expansions.

Annual Maintenance

1. Network Assessment:
o Conduct a comprehensive network assessment to evaluate overall performance.
o Review and update network policies and procedures.

2. Disaster Recovery Drill:


o Perform a full disaster recovery drill to test the response plan.
o Ensure all team members are familiar with their roles in a disaster scenario.

74
3. Vendor Review:
o Review contracts and performance of network service providers.
o Evaluate and renew or renegotiate contracts as necessary.

Additional Considerations

 Ad Hoc Maintenance: Address any immediate issues or incidents that arise outside of the regular schedule.
 Training: Ensure network administrators and IT staff receive regular training on new technologies, security practices, and network
management tools.
 Documentation: Maintain detailed records of all maintenance activities, issues encountered, and resolutions.

By following this comprehensive maintenance schedule, the networked system will remain robust, secure, and efficient, minimizing downtime
and ensuring a high level of performance and reliability.

The network at both the head office and the Matara branch will remain safe, stable, and efficient if this precise
maintenance schedule is followed, enabling flawless operations for Alliance Health's increasing commercial activities.

Activity 04
4.1 Implement a networked system based on your prepared design with valid evidences.
75
P7. Implement a networked system based on a prepared design.

To implement the networked system based on the prepared design, we'll go through the following steps:

1. Set Up Network Hardware:

 Install and configure routers, switches, and access points.


 Connect devices to the network.
 Label cables and ports for easy identification.

2. Configure IP Addressing and Subnetting:

 Assign static IP addresses to servers and network devices.


 Set up DHCP for dynamic IP allocation for end devices.

3. Configure VLANs:

76
 Create and assign VLANs for different departments.

4. Set Up Routing and Security:

 Configure inter-VLAN routing.


 Set up firewall rules and access control lists (ACLs).

5. Implement Wi-Fi:

 Configure Wi-Fi access points for Sales & Marketing, Customer Services Areas, and Video Conferencing Room.
 Ensure secure Wi-Fi with WPA3 encryption.

6. Inter-Branch Connectivity:

 Establish a high-speed link between the head office and the branch office.
 Ensure routing and access between branches are configured.

77
Implementation Details:

1. Network Hardware Setup

Head Office (Colombo):


 Core Router Configuration:

 Distribution Switch Configuration:

78
 Access Point Configuration (Wi-Fi):

ssid Sales_Marketing

79
vlan 10
ssid Customer_Services
vlan 20
ssid Video_Conferencing
vlan 90

Branch Office (Matara):

 Core Router Configuration:

interface GigabitEthernet0/0
ip address 192.168.10.1 255.255.255.0
no shutdown

 Distribution Switch Configuration:

v lan 100
name Customer_Services_Matara
vlan 110
name Administration_Matara
vlan 120
name HR_Matara
vlan 130

80
name Accounting_Matara
vlan 140
name IT_Matara

 Access Point Configuration (Wi-Fi):

ssid Customer_Services_Matara
vlan 100

2. IP Addressing and Subnetting

 Static IP Assignment for Servers (Colombo):

interface GigabitEthernet0/1
ip address 10.254.10.1 255.255.255.0
no shutdown

 DHCP Configuration for Subnets:

ip dhcp pool Sales_Marketing


network 192.168.1.0 255.255.255.0
default-router 192.168.1.1

81
ip dhcp pool Customer_Services
network 192.168.2.0 255.255.255.0
default-router 192.168.2.1

3. VLAN Configuration

 Creating VLANs on Switches:

vlan 10
name Sales_Marketing
vlan 20
name Customer_Services

4. Routing and Security

 Inter-VLAN Routing:

interface Vlan10
ip address 192.168.1.1 255.255.255.0
interface Vlan20
ip address 192.168.2.1 255.255.255.0

 Firewall Rules:

access-list 101 permit ip 192.168.0.0 0.0.255.255 any

82
5. Wi-Fi Configuration

 Setting Up Wi-Fi SSIDs and VLANs:

ssid Sales_Marketing
vlan 10

6. Inter-Branch Connectivity

 Establishing a Link Between Branches:

interface Tunnel0
ip address 192.168.100.1 255.255.255.252
tunnel source 203.0.113.1
tunnel destination 203.0.113.2

Verification and Results:

1. Ping Results:
o Successful ping between devices in the same subnet.
o Successful ping between devices in different subnets.
o Successful ping between head office and branch office devices.

83
2. Traceroute Results:
o Correct path traced between devices in different subnets.

3. Wi-Fi Connectivity Results:


o Successful connection to Wi-Fi SSIDs.
o Verified internet access and internal resource access over Wi-Fi.

4. Security Results:
o Successful SSH access to network devices.
o No vulnerabilities found in initial scans.

Potential Future Enhancements:

1. Scalability:
o Reserve IP ranges for future expansion.
o Implement higher-capacity switches and routers to handle increased traffic.

84
2. Security:

o Regularly update firmware and software on all network devices.

o Implement advanced security measures like intrusion detection/prevention systems (IDS/IPS).

3. Performance:

o Implement Quality of Service (QoS) to prioritize critical traffic.

o Monitor network performance and optimize configurations as needed.

4. Redundancy:

o Implement redundant links and hardware to ensure high availability and minimize downtime.

5. Documentation:

o Maintain up-to-date network documentation, including diagrams, IP schemes, and configurations.

Alliance Health's network implementation strategy met existing demands and allowed for growth. VLANs to isolate
departmental traffic, safe inter-branch communication, and strong security were key considerations. Managed switches and
high-speed connections optimise data flow and scalability. A functional and secure network requires regular maintenance

85
and upgrades and improved security techniques. The network's architecture balances performance, security, and scalability
to support Alliance Health's growth.

Next, record the installation process, educate workers on network administration and troubleshooting, and set up continuous
monitoring to optimise network performance and security.

P8. Document and analyze test results against expected results.


After implementing the networked system, we conducted various tests to verify its functionality. Below are the documented
test cases, their execution, and analysis of the results against the expected outcomes.

1. Ping Tests

Test Case 1: Ping within same subnet

 Source: Sales & Marketing PC (IP: 192.168.1.10)


 Destination: Sales & Marketing PC (IP: 192.168.1.11)

86
 Command: ping 192.168.1.11
 Expected Result: Successful ping.
 Actual Result: Successful ping with < 1 ms latency.
 Analysis: Same subnet communication is effective.

Test Case 2: Ping across different subnets

 Source: Sales & Marketing PC (IP: 192.168.1.10)


 Destination: Administration PC (IP: 192.168.3.10)
 Command: ping 192.168.3.10
 Expected Result: Successful ping.
 Actual Result: Successful ping with < 2 ms latency.
 Analysis: Inter-VLAN routing works correctly.

Test Case 3: Ping between head office and branch

 Source: Head Office IT PC (IP: 192.168.8.10)


 Destination: Branch Office IT PC (IP: 192.168.14.10)
 Command: ping 192.168.14.10
 Expected Result: Successful ping.
 Actual Result: Successful ping with < 10 ms latency.
 Analysis: Inter-branch connectivity is established correctly.

87
2. Traceroute Tests

Test Case 4: Trace path between subnets

 Source: Sales & Marketing PC (IP: 192.168.1.10)


 Destination: HR PC (IP: 192.168.4.10)
 Command: traceroute 192.168.4.10
 Expected Result: Path traced with < 5 hops.
 Actual Result: Path traced with 3 hops.
 Analysis: Efficient internal routing.

3. Wi-Fi Connectivity Tests

Test Case 5: Wi-Fi in Sales & Marketing

 Device: Laptop
 SSID: Sales_Marketing
 Expected Result: Successful connection.
 Actual Result: Successful connection.
 Analysis: Wi-Fi configuration is correct.

Test Case 6: Wi-Fi in Customer Services

 Device: Mobile Device


88
 SSID: Customer_Services
 Expected Result: Successful connection.
 Actual Result: Successful connection.
 Analysis: Wi-Fi configuration is correct.

Test Case 7: Wi-Fi in Video Conferencing Room

 Device: Laptop
 SSID: Video_Conferencing
 Expected Result: Successful connection.
 Actual Result: Successful connection.
 Analysis: Wi-Fi configuration is correct.

4. Security Tests

Test Case 8: SSH access

 Device: Admin PC
 Destination: Core Router (IP: 192.168.1.1)
 Command: ssh [email protected]
 Expected Result: Successful SSH connection.
 Actual Result: Successful connection.
 Analysis: Secure management access is configured correctly.

89
Test Case 9: Vulnerability scan

 Device: Security Scanner


 Target: All VLANs
 Expected Result: No critical vulnerabilities.
 Actual Result: No critical vulnerabilities found.
 Analysis: Network security measures are effective.

Summary of Results

 Ping Tests: Successful within and across subnets and between branches.
 Traceroute Tests: Efficient internal routing with expected hops.
 Wi-Fi Connectivity Tests: Successful connections across all areas.
 Security Tests: Secure SSH access and no critical vulnerabilities.

Recommendations for Future Enhancements

1. Scalability:
o Reserve IP ranges for growth.
o Upgrade network devices for higher capacity.
2. Security:

90
o Regular firmware updates and security audits.
o Implement advanced security measures (IDS/IPS).
3. Performance Optimization:
o Implement QoS to prioritize traffic.
o Monitor and optimize network performance.
4. Redundancy:
o Add redundant links and hardware.
o Test backup and recovery procedures.
5. Documentation and Training:
o Maintain up-to-date network documentation.
o Provide ongoing training for network administrators.

All of the basic conditions have been met for Alliance Health's network application. The plan makes sure that each subnet
is properly separated, that communication between branches is safe, and that security is strong. Future improvements will
focus on making the network more scalable, secure, fast, and redundant so it can continue to meet Alliance Health's
business and growth needs.

-------------------------------------------------------------------------------END--------------------------------------------------------------------------------------

91
REFERENCES
● https://www.tutorialspoint.com/what-is-network-interface-card-nic

● https://www.researchgate.net/figure/2-Network-Interface-Card-NIC_fig3_346108941

● https://www.google.com/search?q=network+operating+system&rlz=1C1KNTJ_enLK1067&sxsrf=AB5stBiVrKuE3lHVp6FrWH-

bCLWOY4Ow8A%3A1689904367138&ei=7-
S5ZPiGCNXDjuMPqaOpyAc&ved=0ahUKEwi4uoes2J6AAxXVoWMGHalRCnkQ4dUDCA8&uact=5&oq=network+operating+system
&gs_lp=Egxnd3Mtd2l6LXNlcnAiGG5ldHdvcmsgb3BlcmF0aW5nIHN5c3RlbTIFEAAYgAQyBRAAGIAEMgUQABiABDIFEAAYgAQyBRA
AGIAEMgUQABiABDIFEAAYgAQyBRAAGIAEMgUQABiABDIFEAAYgARIpX1QqRhYtnhwBHgBkAEAmAGAAqABrCaqAQcwLjE1LjEwu

92
AEDyAEA-
AEBwgIKEAAYRxjWBBiwA8ICCBAAGIoFGJECwgIREC4YgAQYsQMYgwEYxwEY0QPCAgsQABiKBRixAxiDAcICERAuGIoFGLEDGIMBG
McBGNEDwgIOEC4YigUYsQMYxwEY0QPCAgsQLhiKBRixAxiDAcICBxAjGIoFGCfCAgcQABiKBRhDwgITEC4YigUYsQMYgwEYxwEY0Q
MYQ8ICBxAuGIoFGEPCAg0QABiKBRixAxiDARhDwgIOEAAYigUYsQMYgwEYkQLCAgoQABiABBgUGIcCwgIHEAAYgAQYCuIDBBgAIE
GIBgGQBgg&sclient=gws-wiz-serp

● https://www.techtarget.com/searchnetworking/definition/DHCP#:~:text=DHCP%20(Dynamic%20Host%20Configuration

%20Protocol)%20is%20a%20network%20management%20protocol,it%20can%20communicate%20using%20IP.

● vlan configuration : https://www.computernetworkingnotes.com/ccna-study-guide/vlan-configuration-commands-step-by-

step-explained.html

● https://www.google.com/url?sa=i&url=https%3A%2F%2Fsiteproxy.ruqli.workers.dev%3A443%2Fhttps%2Fdocs.onion.io%2Fomega2-docs%2Fconnecting-to-wifi-using-

console.html&psig=AOvVaw0hs3W057BIshVAYgaCRwms&ust=1689999410616000&source=images&cd=vfe&opi=89978449&v
ed=0CBEQjRxqFwoTCKjtocb4noADFQAAAAAdAAAAABAO

93
● https://www.cisco.com/c/en/us/td/docs/routers/access/800M/software/800MSCG/routconf.html

● https://www.cisco.com/c/en/us/td/docs/routers/access/1800/1801/software/configuration/guide/scg/firewall.html

● https://www.google.com/url?sa=i&url=https%3A%2F%2Fsiteproxy.ruqli.workers.dev%3A443%2Fhttps%2Fwww.geeksforgeeks.org%2Fbasic-firewall-configuration-in-cisco-

packet-tracer
%2F&psig=AOvVaw2hNSpm4XBBmXTj_g7ltjt3&ust=1690001649706000&source=images&cd=vfe&opi=89978449&ved=0CBEQj
RxqFwoTCOCmm_KAn4ADFQAAAAAdAAAAABBI

● https://www.google.com/search?q=web+server+configuration+in+cisco+packet+tracer&tbm=isch&ved=2ahUKEwiPi6PxgJ-

AAxW3zaACHWLgB2AQ2-
cCegQIABAA&oq=web+server+co&gs_lcp=CgNpbWcQARgDMgUIABCABDIFCAAQgAQyBQgAEIAEMgUIABCABDIFCAAQgAQyBQg
AEIAEMgUIABCABDIGCAAQCBAeMgYIABAIEB4yBggAEAgQHjoECCMQJzoHCCMQ6gIQJzoICAAQgAQQsQM6BQgAELEDOgcIABCK
BRBDUIcgWKBhYNt4aAFwAHgEgAHfAYgBpRqSAQYwLjE3LjKYAQCgAQGqAQtnd3Mtd2l6LWltZ7ABB8ABAQ&sclient=img&ei=cQ-
6ZM-OK7ebg8UP4sCfgAY&bih=715&biw=1536&rlz=1C1KNTJ_enLK1067#imgrc=vZjGn9EqCw-gIM

● https://www.google.com/url?sa=i&url=https%3A%2F%2Fsiteproxy.ruqli.workers.dev%3A443%2Fhttps%2Fwww.geeksforgeeks.org%2Fconfiguring-dhcp-and-web-server-in-

cisco-packet-tracer

94
%2F&psig=AOvVaw1dN28VSMzPAx8556BRo5m2&ust=1690001925375000&source=images&cd=vfe&opi=89978449&ved=0CBE
QjRxqFwoTCICDyfWBn4ADFQAAAAAdAAAAABAY

● https://www.google.com/url?sa=i&url=https%3A%2F%2Fsiteproxy.ruqli.workers.dev%3A443%2Fhttps%2Fwww.chegg.com%2Fhomework-help%2Fquestions-and-answers

%2Fhelp-simulate-cisco-packet-tracer-proxy-server-network-topology-please-give-step-configure-
q58372010&psig=AOvVaw1hl68m-
VuNPTgOIoXMlOLH&ust=1690002222461000&source=images&cd=vfe&opi=89978449&ved=0CBEQjRxqFwoTCLi4jIODn4ADFQA
AAAAdAAAAABAQ

● https://www.youtube.com/watch?v=CgWbqO712fQ

95
96
97
98
99
100
101

You might also like