New Assignment On Networking
New Assignment On Networking
Scenario :
Enclave Films is an eminent movie company which composes movies and delivers
high quality video to make it download through VividZone company website. The
original movie company management has decided to consolidate the contract with
VividZone by adding more efficient staff and appliances.
Enclave Films is in building B and the web team is positioned in the same building
while majority of the administration, sales, accounts and management functions are
supported in building A. Both buildings are located in the same premises. Movie
company plans to aggregate all their staff and resources in one building. Therefore
when adjacent office space becomes available in building A, these groups will be
accommodated together. Building A has a reception and a customer area as well.
The branch network of Enclave Films has grown without proper planning. The LAN
cabling in both offices is Cat5e Ethernet. The office complex provides an Ethernet
link between the two buildings.
The current network is a flat network design with minimal redundancy. A small
wireless LAN is used occasionally by few project managers with laptops and the
guests at Building B.
Activity 01
You are newly recruited as a Network Engineer by the movie company to redesign
the network.
You need to produce a report for the company that includes the following:
Activity 02
1. Prepare a written plan of how you are going to design a Local Area
Network including a blueprint of your LAN.
2. Justify the security requirements and quality of services needed for
selection of accessories
3. Design a networked system to meet a given specification
4. Provide the IP address allocation table for the redesigned network.
5. Install & configure network services and applications of your choice.
6. Conduct a test and evaluate the design to meet the requirements and
analyse user feedback.
7. Suggest a maintenance schedule to support the networked system.
Activity 03
1. Implement a networked system based on your prepared design.
2. Conduct verification with e.g. Ping, extended ping, trace route, telnet, SSH,
etc.
3. Record the test results and analyze these against expected results.
4. Investigate what functionalities would allow the system to support device
growth and the addition of communication devices.
Grading Rubric
P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Compare common networking principles and how protocols
enable the effectiveness of networked systems.
P3
Discuss the operating principles of networking devices and
server types.
P4
Discuss the inter-dependence of workstation hardware with
relevant networking software.
M2
Explore a range of server types and justify the selection of a
server, considering a given scenario regarding cost and
performance optimization.
LO1&LO2
D1
Considering a given scenario, identify the topology protocol
selected for the efficient utilisation of a networking system.
P5
Design a networked system to meet a given specification.
P6
Test and evaluate the design to meet the requirements and
analyze user feedback.
M3
P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D3
Use critical reflection to evaluate own work and justify valid
conclusions.
ENCLAVE FILMS
Network Implantation report
By -: W.G.L.A. Maduranga
COL/A-062270
Unit 02
HND /Com / B-84
Page 15 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Acknowledgement
I would like to express my special thanks of gratitude to my lecturer Mr. Ilham for giving
me great help and guidance for complete this assignment. I also would like to thank my
parents and friends for helping me and encouraging me to complete this assignment within
the limited time.
Thank you.
Page 16 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Table of Contents
Acknowledgement............................................................................................................................... 16
Introduction......................................................................................................................................... 19
Activity 01........................................................................................................................................... 20
1.2) What is a network?................................................................................................................... 20
1.2.1) Network Principles................................................................................................................ 20
1.2.2) Advantages and disadvantages of computer network............................................................ 21
1.2.3) Network Models.................................................................................................................... 21
The OSI Reference Model........................................................................................................... 21
TCP / IP Model............................................................................................................................ 23
1.2.4) Networking Protocols............................................................................................................ 25
Different types of protocols used in networking.......................................................................... 25
1.2.5) Networking Devices.............................................................................................................. 27
Repeaters..................................................................................................................................... 27
Hub.............................................................................................................................................. 27
Switch.......................................................................................................................................... 27
Network Bridge........................................................................................................................... 28
Routers........................................................................................................................................ 28
Access Point................................................................................................................................ 28
Cables.......................................................................................................................................... 28
1.2.6) Networking Software............................................................................................................ 30
Network Operating systems......................................................................................................... 30
Network Management System..................................................................................................... 31
1.2.7) Network Topologies.............................................................................................................. 34
Bus Topology.............................................................................................................................. 34
Ring Topology............................................................................................................................. 35
Star Topology.............................................................................................................................. 36
Tree Topology............................................................................................................................. 36
1.2.8) Data Communication............................................................................................................ 37
Data Communication Modes....................................................................................................... 37
1.2.9) Bandwidth............................................................................................................................. 38
1.2.10) Network Types.................................................................................................................... 38
Local Area Network (LAN)......................................................................................................... 38
Metropolitan area network (MAN).............................................................................................. 38
Page 17 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Page 18 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Introduction
Computer networking technology, which came up with the advent of Information Technology
over past few decades has become an imperative thing for us today. From a small organization
to multimillion organizations are using computer networks today because of its efficiency.
Nowadays networking knowledge is necessary to work in the ICT field.
Enclave Films is a company, which produces and provides downloadable high quality videos
through VividZone company website. With the decision of the company to reinforce the
contract with VividZone. They wanted to add more efficient staff and equipment. The company
has two buildings with separate departments. Therefore, the management need to enhance the
company network based on different standards. Those standards and some basics about
computer networking are described in this report with examples and descriptions.
Page 19 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Activity 01
1.2) What is a network?
A computer network is simply a collection of two or more computers. Other devices, such as
printers, servers, switches, and routers can also use on a computer network. Main purpose of a
computer network is communication and data transfer. In addition, you can share resources,
such as printers and scanners with others in the network ([Link], 2018).
A computer network must be, transparent for the users also it must be powerful and practical.
After implementing a network, it should produce a true networking experience in quality,
control, safety and speed. Those principles that has mentioned above helps network designers to
do their work clear and easy. All the above principles can divide into three. They are…
1. Performance
2. Reliability
3. Security.
1) Performance
Performance can mainly measure using transit time and response time it can also measure
using number of users, efficiency of software and capability of connected hardware.
2) Reliability
The reliability of a network can measured using the network failing frequency. If a network
is failing frequently that means, it is not a reliability connection.
3) Security
Security is the most important characteristic of networks. It refers to the protection of data
and resources from unauthorized access and usage. While communicating or sharing data
Page 20 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
with others data should go through several network layers and if someone wants to stole
your valuable data it should be easy within the network. So the network security must
strongly considered while designing the network ([Link], n.d.).
For communication and transferring data between two or more devices required a
systematic approach. This approach allows users to communicate and transmit data from an
efficient and regular route. These approaches known as computer network models. It is a
conceptual model, which helps to understanding and designing a flexible network
architecture. Network models are liable for exchanging data respectively and for setting up
a connection between sender and the receiver.
There are two major models in computer networks. The entire data communication process
depends on them (Upreti, n.d.).
Page 21 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
8The International Organization for the Standardization (ISO) developed the OSI (Open
System Interconnection) module in 1984. The OSI model is a general purpose-networking
model, which should responsible for establishing an open relationship between all
communications equipment around the world. The OSI model runs without using a protocol
because of that reason this model allows any different system without considering about
their architectures. The OSI model has a layered architecture it makes easy to communicate
data because of its pre-defined functionalities and structure.
• Transport Layer
Network independent Layer 4
The physical layer coordinates the functions necessary to transmit the bit flow through a
physical medium.
Page 22 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Data link layer is the second most layer in OSI model. This layer has to synchronize the data
flow, deal with transmission errors search for errors and provide a well-defined interface to
the next layer.
3. Network Layer
Responsible for establishing data communication link to deliver packets from original
source to destination. In addition, this layer can understand IP addresses and also routing is
another important thing that is operating under this layer.
4. Transport Layer
This layer also known as network independent layer is responsible for providing end-to-end
communication over a network, and it provides reliable or unreliable services. This layer is
the interface between software and hardware.
5. Session Layer
This layer provides appropriate sessions between users and entities, where user interacts
such as login sessions in online banking. This session is also responsible for discovering and
transmission of data through the exact connection.
6. Presentation Layer
Processing of data such as formatting and encryption / decryption for the above application
layer
7. Application Layer
This layer provides network services to end user applications. It directly interact with user
and software applications by providing user interface (Mitchell, 2018).
TCP / IP Model
Page 23 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
4 Application
3 Transport
2 Internet
1 Network Access
This layer is a combination of the physical and data link layers of OSI model. It controls the
media and hardware devices. Mapping IP addresses to MAC addresses is an important part
of this layer.
02. Internet Layer
This layer is like the OSI’s Network layer. It is responsible for transmitting data over the
entire network.
03. Transport Layer
This layer is similar to the transport layer of the OSI model. It has the responsibility to
transmitting data from the source to destination without errors.
04. Application Layer
This layer corresponds to Application, Presentation and Session Layer in the OSI model. It
controls the node-to-node communication and user interface.
TCP/IP OSI
There are four layers in TCP / IP. The OSI has seven layers
TCP / IP does not have very severe OSI has severe restrictions
restrictions
Follow a horizontal approach Follow the vertical access.
TCP/IP developed protocols first OSI created models first
(Chauhan and Jain, n.d.)
Table 1: OSI model and TCP/IP Model associated with network protocols
OSI Model TCP/IP Common Protocols
Application DNS, HTTP, POP3, FTP, SNMP, DHCP,
Presentation Application SMTP…
Session
Transport Transport TCP, UDP
Network Internet IP, ARP, ICMP
Data Link
Network Access Ethernet
Physical
([Link], n.d.)
Page 25 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
DNS helps to find websites for Internet users and network devices by converting hostnames
into numeric IP address (NS1, n.d.).
II. Transmission Control Protocol (TCP)
TCP used for communication across the network. The TCP is breaking down the data into
small packets before sending it to the destination.
III. Internet Protocol (IP)
IP is working with TCP. IP addresses data packets to the desired destination and show
different routes until the data packets reach to the destination. IP also have the responsible
for making sure the packets transmitted to the correct address.
IV. Hyper Text Transfer Protocol (HTTP)
HTTP based on the client server architecture. It used to create a connection between the web
server and client also it shows the Information on web pages.
V. File Transfer Protocol (FTP)
FTP is primarily use to transfer files to different networks. There can be many kinds of files
such as text files, image files, etc. This file transfer method is faster than other methods.
VI. Simple Mail Transfer Protocol (SMTP)
This protocol manages the mail transmission over the internet. It is working on the
application layer (Thakur, n.d.).
VII. Ethernet
Ethernet is very important in Local Area Networks. It transmits data as digital packets. If any
computer needs to use this protocol, there must be an Ethernet Network Interface Card (NIC).
Page 26 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Repeaters
Repeater is an electronic device that used to amplify the signals. It retransmits the incoming
signals at a higher power to cover more distance.
Hub
The Hub connects several computer network devices simultaneously. A hub can also act like
a repeater. In the family of network, connecting devices hub is the simplest device because
it combines LAN components with identical protocols. A hub can work with both analog
and digital data. Hubs are not capable of doing packet filtering or IP addressing. They can
only broadcast the data packets among the entire network.
Switch
Switches usually have more intelligent than Hubs. It is a multiport device, which can used
to improve the efficiency of a network. It maintains limited routing information about the
devices inside the network. We use switches to connect devices like PCs, Routers, printers
etc… In general, Switches are able to read the mac addresses of receiving packets then it
use those addresses to transmit data to the exact destination.
Page 27 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])
lOMoARcPSD|43957031
Network Bridge
Bridges used to connect two or more networks together. The main function of the bridges in
networking is storing and distributing data frames among the all segments that connected to
the bridge. It use mac addresses to transfer data to the desired destination. Now a day’s
people do not use bridges instead of that people use switches, which also known as
“multiport bridges” because of their functionality.
Routers
Routers help to send packets to their destinations by routing through interconnected network
devices. Routers are intelligent devices and they store more information about their
interconnected networks. Routers can configure to use packet filters, firewalls, and access
control lists.
Routers can used to separate internal networks into two or more subnetworks. It also can
connect to other routers internally. It establish communication by maintaining tables on
destinations and local connections. Routers are the first defensive line of a network. They
must be configure to limit the traffic approved by the network administrators.
Access Point
An Access Point (AP) can be either a wired or a wireless connection. Generally, it stands for
a wireless device. It can operate as a bridge by connecting wired network to wireless
devices or else it can work as a router by transmitting data from one AP to another. Wireless
AP (WAP) is a device, which has a receiver and transmitter used to create Wireless LAN
(WLAN).
Each AP is limited to its range of transmission. The actual transmission range depends on the
wireless standard, obstacles and environment between the user and the AP (Melnick, 2019).
Cables
Even with the advantages of wireless technology, many of our computer networks are still
rely on cables to transfer data. Network cables have several types of standards, which
designed for specific purposes (Mitchell, 2018).
Page 28 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Coaxial Cables
This was invented in 1880s and it is a standard for 10 Mbps Ethernet cables. The coaxial
cable is a cable with a tubular insulation layer around an internal conductor apart from that
tubular insulation layer the cable also surrounded by a tubular conducting shield. Both
insulation layer and conducting shield share a geometric axis. Many coaxial cables has an
insulating rubber outer.
Figure 4: Shielded and Unshielded Twisted pair cables (Source: [Link], 2016).
Page 29 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Fiber Optics
Instead of using metal wires to transmit data through the network, now we can use fiber optic
network cables. Fiber optics are made of fiber/glass also, it has a rubber outer. Fiber optics uses
light beams to transmit data rather than using electrical signals. Because the light can travel in
an ultra-high speed and it does not weaken over the distance. Fiber cables can run for kilometers
with 10 Mbps to 100 Gbps or more transmission speed (Official, 2014).
Page 30 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Linux Server
Linux server is a powerful version of Linux open source operating systems. It has designed
to meet the most efficient requirements of business applications such as database
management and web services, network and system administration.
Because of their stability, security and flexibility advantages Linux servers are frequently
selected among other servers. Major Linux server operating systems are Cent OS, Debian,
Ubuntu Server, Slackware, and Gentoo (Beal, n.d.).
Page 31 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
WhatsUp Gold
WhatsUP Gold is a network management System/ tool, which maintains a continuous status
report on the health of all connected hardware. It has a function called Autodiscovery so the
user has no need to hesitate about entering hardware details manually. There are many more
functions such as network mapping, Network Performance Monitoring, Server Monitoring,
Alerts, Wireless Network Monitoring, Cloud & Storage Monitoring and more (COOPER,
2018).
Nagios
Nagios is an open source network-monitoring tool that was designed to run on Linux base
Operating Systems either it designed to run on Linux other OSes like Windows and UNIX
can be monitored using it. Nagios can monitor Disk usage, processor load, memory usage,
log files and ongoing processes etc… In addition to that, it can monitor common network
protocols such as SMTP, POP3, and HTTP etc…
Ethan Galastad developed this in 1999 and originally known as NetSaint. After that, it has
refined by many others as an Open source project (Rouse, 2018).
Page 32 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Page 33 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Bus Topology
In the bus topology there is a main cable which is connected to all other devices. The main cable
or else the backbone of the network works like a shared transmission medium. it is easy to
setting up a network like this, it needs only few cables than other topologies. It has a very
Page 34 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
simple structure. But there are also some cons in these networks if the backbone fails entire
network is fail and if there are too many devices it will decrease the efficiency and the speed
of the network ([Link], n.d.) (Mitchell, 2019).
Ring Topology
Ring topology, forms like a ring by connecting each computer to another like that it goes around
by connecting each other and finally the last computer is connecting to the first one. That means
each computer has two neighbor computers directly connected to it and the rest is indirectly
connecting to it through the directly connected computers. In this kind of networks, the
transmission network is not affected by high traffic so the efficiency of the network is higher
than tree topology. This one is also cheap to establish. All the data packets in the network is
travelling through the network in same direction. Failure of a cable or a pc can fail the whole
network. It is hard to troubleshoot and adding or removing new computers interrupts the whole
network (Mitchell, 2019) (Shepherd, 2018) ([Link], n.d.).
Page 35 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Star Topology
This is the most famous and widely using topology most of the users are familiar with this.
In this topology, all networking devices are connecting to a central point such as a router or
a switch. All the components in the network is directly connect to the central point and
indirectly connect with each other through it. Every device has their own connection to the
central point; the central point can act as a repeater for wider networks. Central point or any
other component can upgrade easily and easy to implement. It is easy to identify the issues
of the network and because of the dedicated lines, failure of a computer or else a cable can’t
affect to the whole network. Higher implementation cost and the failure of the central point
can fail the whole network are some disadvantages not only that but also the performance is
rely on the central point so it should be capable to handle higher amount of data
([Link], n.d.) (Mitchell, 2019).
Tree Topology
Tree topology is a combination of bus and star topologies. It connects multiple star networks
together using a bus network. Central point of every star network is connecting to the bus
network directly. It is easy to troubleshoot and maintain the network; easy to expand the
network are some of the key advantages of the bus topology. Heavy cabling cost and hard to
maintain with more devices are some major disadvantages ([Link], n.d.).
Page 36 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Communication is happening to only one direction. Receiver cannot communicate back to the
sender. E.g. Radio and TV Broadcasting
b. Half Duplex
The communication can happen between the both sides but not in the same time.
Page 37 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
E.g. Walkie-Talkie
c.
Full Duplex
Both sides can communicate with each other at the same time (Alkuun, n.d.). E.g.
Telephone.
1.2.9) Bandwidth
In computing bandwidth is another word for data transfer rate. In general the volume of data
per unit of time that can transmit through a communication media. For example, a higher
bandwidth connection can transmit data much faster than a lower bandwidth connection.
Therefore, in simple terms bandwidth is a unit that can use to measure the speed of a
connection. Bandwidth measured by using bits per second (bps) (Fisher, 2019).
Page 38 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])
lOMoARcPSD|43957031
Wide area networks are implementing on very large territories like a province or a country.
A single WAN can contain many separate LANs or MANs. These type of networks are
working with low speed comparing to LANs. The best example for a WAN is the internet. It
connects all the separate small networks together (Bourgeois, 2016).
Web Servers
A web server is simply a PC, which runs with the software that allows the PC to host a web
site.
Proxy Servers
Proxy Servers are used, for browsing needs, getting better looks and sharing he connections.
These servers can be found with the programs like web browsers.
File Servers
File servers or else FTP servers facilitates users to store data and share them across the
network securely. It also provides security, controls the transfers and organize the files.
Mail Servers
This type of servers are used to share and store emails through the networks. Mail servers
are using protocols such as SMPT, IMAP and POP3 to send and receive emails.
Page 39 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Database Servers
Database server is simply a server that facilitates database services such as data
management, data analysis, storage, archiving and many other tasks ([Link], n.d.)
([Link], n.d.).
CPU
Intel Xeon E3-1200 v6 Intel Xeon E5-2603 v3
Intel Pentium G3220
RAM
Up to 64GB 8GB
4GB
Graphics
Intel HD Graphics P630 Matrox G200
Intel HD Graphics
Storage
No drives included No drives included
No drives included
Connectivity Up to 12 x USB ports (4
6 x USB 3.0, serial, video,
x USB 3.0), 2 x
2 x Gigabit Ethernet
DisplayPort, VGA, 4 x Gigabit Ethernet
| Dimensions (W x D x
serial, 2 x PS2, Gigabit
H): 44.4 x 58.3 x 17.3cm
Ethernet
(Athow, 2019)
Page 40 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Activity 02
2.1) Network Design for Enclave Films Company
Figure 14: The network blueprint of enclave films (Source: Authors own figure)
The above blueprint was designed for the Enclave Films Company. Switch A in the figure
14 is the switch for building A and Switch B is for the building B. Both buildings are using
star topology and they are interconnected using a crossover cable.
Building A has twelve PCs and two printers while building B has nine high performance
PCs, five PCs and two printers. PCs in the building A has separated into five sections while
building B has two. Also the building B has an access point which is dedicated for the
guests and the few project managers with laptops.
The Switch B is connecting to a router through the Switch A and the router is connecting to a
firewall for controlling data traffic. Whole network is connecting to the internet and the server
trough the firewall so it is easy to handle access to the server and internet using firewall.
Page 41 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
When selecting devices for a network the above factors are the general factors, which
should be concerned. Apart from that when selecting a router, server or else firewall the
network engineers must check for the security of the devices. When speaking about the
network security the firewall has the main responsibility for that.
Firewall
Briefly speaking a firewall in networking is a program, which monitors all the incoming and
outgoing requests and prevent disallowed access to and from the network based on
prearranged set of rules (Greene and Butler, 2019).
In today, a firewall is not enough for the network security a network must consist with an
anti-virus software.
Anti-Virus Software
An anti-virus software is a computer program, which specially designed for detecting and
taking actions against the computer viruses, worms and other harmful software. When using
an anti-virus software it should be up to date so it can work against the new malwares.
Page 42 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
The designed network for the Enclave Films Company is in the above Figure. In there I
have used a PC to display each department.
In the above IP allocation table, each department is allocated with 32 IP addresses. From the
allocated IP addresses, first and last IP addresses are not usable because the first IP is Network
IP, the last IP is Broadcast IP, and another IP address must reserved for the Gateway IP.
Page 43 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Page 44 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Page 45 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Page 46 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Page 47 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
working properly. Because we are using a Subnet of [Link] for allocating IPs, the
separated IP ranges are not capable of communicating with other IP ranges. If the Separated
IP ranges can communicate with each other without configuring VLANs, there must be an
error. For testing that, we have run a ping test in randomly selected PCs before configuring
the VLANs. The test results are attached below.
Ping test results between a printer and the Admin Department, which are in the same IP
range and Two PCs in Admin and Accounting Department, which are not in the same IP
range before Configuring VLANs.
Figure 23: Pre Ping test results (source: Authors own figure)
Page 48 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Another two Ping Tests between Accounting and Web Department and Accounting and
Production Department. Before the configuration of VLANs.
Figure 24: Pre Ping test results 2 (source: Authors own figure)
As it shows in the above test results the separated IP ranges are not communicate between
each other while devices in the Same IP range does. Considering that, we can make a
conclusion that our IP allocation had done properly.
Page 49 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Checking and
removing unnecessary N/W Admin
user Accounts
Page 50 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Activity 3
Router Configuration
As the first steps, we have opened the IOS command line of the router we used a cisco 2811
router for our network. After opening the IOS command line, we should first enable the
privilege mode, to do that we use “en” command. Then to see the router properties we used
the command “sh run”. From the properties, we should identify the port that we used to
connect the router and switch.
Page 51 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
In the figure 26, the highlighted ‘Interface FastEthernet 0/0’ is the port that we used to
connect the router and switch.
After finding the port to configure the router we should enter to the Configure mode to do
that we used the command “conf t” then to create VLANs we use the following commands
by only changing the VLAN number in the End.
1. Select the port using “Interface FastEthernet 0/0”
2. Create the VLANs using “Interface FastEthernet 0/0.<< VLAN Number>>”
3. To encapsulate the VLANs “encapsulation dot1Q << VLAN Number>>”
4. Then as the final step of creating VLANs in the router, we should provide a Gateway
IP addresses for every VLAN. When providing IPs to the gateway we must make sure
that the IP and the Subnet we are providing is in the range of the department where we
going to use the VLAN. We used the following command for our first VLAN.
“IP address [Link] [Link]”
Page 52 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
After that for changing the state of the Port from Shutdown to No shutdown, we used the
following commands.
1. Select the port using “Interface FastEthernet 0/0”
2. Then type “no shutdown” to change the state.
Page 53 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Switch Configuration
SWITCH A (Switch0)
As we did in the router first Open the IOS command line in the Switch then “en” to enable
the privilege mode. If needed use the “sh run” command to see the switch properties. After
that use “conf t” to enter the configure mode. Then as the first thing select the port which
you connected your router by using “Interface FastEthernet 0/<<port>>” and change the
switchport mode into trunk for allowing all the VLANs to communicate through that port
by using “switchport mode trunk”.
Page 54 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Then change the Switchport mode of the port into trunk, which connects the other Switch.
Then as the next step select, the ports that connects the PCs to the switch using “Interface
FastEthernet 0/<<port>>” command, and change their switchport mode into access using
“switchport mode access” command. After that, add them into the VLANs according to
the IP allocations by using this command “switchport access vlan << VLAN Number>>”.
Page 55 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
After that, the next step is to configure the switch B (Switch1). Before that, we should add
the other VLANs into the switch A (Switch0) because the switch B is connecting to the
router through the Switch A. Therefore, the departments, which connects to the Switch B,
cannot interconnect with the other VLANs unless we add them into the VLAN database of
the Switch A. to do that we used the following commands.
To enter the VLAN Database mode “vlan database”.
To Add VLAN 60 and name it to Production “vlan 60 name Production”.
To Add VLAN 70 and name it to Web “vlan 70 name Web”.
Page 56 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Switch B (Switch1)
Same as the Switch A we use “en” to enable privilege mode and “conf t” to enter configure
mode as the first step.
Then we changed the Switchport mode of the port into trunk, which connects the other
Switch. By changing the switchport mode into trunk on both ports in both switches let all
the VLANs to communicate through that port.
Page 57 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Then we select and add the ports that connects PCs and other devices into VLANs. The
method and the commands are same as the Switch A.
Ping tests
Test Case Ping Tests from Admin department to other departments
Description Testing all the departments whether they are pinging or not
Department IP
Admin [Link]
Sales [Link]
Accounting [Link]
Reception [Link]
Page 58 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Management [Link]
Production [Link] Tested by W.G.L.A. Maduranga
Page 59 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Figure 35: Pinging Test from one VLAN to others 1 (Source: Authors own figure)
Page 60 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Figure 36: Pinging Test from one VLAN to others 2 (Source: Authors own figure)
Page 61 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Description To test that the data is travelling through the configured route
Department IP
Admin [Link]
Sales [Link]
Accounting [Link]
Reception [Link]
Management [Link]
Production [Link] Tested by W.G.L.A. Maduranga
Page 62 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])
lOMoARcPSD|43957031
Figure 37: trace route from one VLAN to others 1 (Source: Authors own figure)
Page 63 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Network Security
Network security is the most challenging section in the ICT field. In a network, the access to
the network must manage well. Today we are using firewalls for that but with the
improvements of the field a normal firewall will not be enough to do that. If the company
needs more security for their network. A Next Generation Firewall can recommend for that.
Network Traffic
When the company is growing up, the management or admin may need to add more devices
to the company network. Even though the above implemented network can handle much
more network traffic than the present situation. It may cause some delays in the network.
Therefore, the network cables can replaced with higher bandwidth cables such as CAT 6
Ethernet cables for PCs and fiber optics for other main connections such as Crossover cable
which connects the switches and the cable which connects router to the switch A etc…
NOTE: If the company needs to replace the cables with fiber optics, some other network
devices may need to upgrade.
Page 64 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Feedback analysis
After implementing and configuring the whole network a feedback, form had given to 34
employees in the company who uses the network. We were able to collect 30 properly filled
forms from the employees.
Analysis of the properly filled feedback forms are in the table below.
1 – Very bad
2 – Bad
3 – Moderate
3 – Good
5 – Very Good
[Link] Question 1 2 3 4 5
1 Speed of the network - 3 5 15 7
2 Protection of the firewall 1 2 6 12 9
3 Data sharing through the network - 4 9 11 6
4 What do you think of the network - - 7 13 10
hardware?
5 Security level of the network - 4 5 16 5
6 Design of the network 2 1 8 11 8
7 Internet access in the network 3 5 6 9 8
8 Software used in the network - 2 5 8 15
9 Maintenance of the network 1 1 6 13 9
10 Your personal valuation about the network 2 2 7 7 12
Following graph is for illustrating the above valuations which we received from the network
users in the company. Considering the results of feedback forms majority of the network
users are satisfied with the implemented network and network related things.
Page 65 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Chart Title
18
16
14
12
10
0
[Link] 1 [Link] 2 [Link] 3 [Link] 4 [Link] 5 [Link] 6 [Link] 7 [Link] 8 [Link] 9 [Link] 10
References
[Link]. (n.d.). Networking Protocols. [Online] Available at:
[Link]
[Accessed 17 Feb. 2019].
[Link]. (2018). What is a Network? [Online] Available at:
[Link] [Accessed 13 Feb. 2019].
[Link]. (n.d.). Introduction To Computer Networks | Studytonight. [Online]
Available at: [Link]
networks [Accessed 13 Feb. 2019].
Lombardo, C. (n.d.). 14 Main Advantages and Disadvantages of Computer Networking |
Green Garage. [Online] [Link]. Available at: [Link]
main-advantages-and-disadvantages-of-computer-networking [Accessed 13 Feb. 2019].
Upreti, G. (n.d.). Computer Network Models | Computer Networks Tutorial | Minigranth.
[Online] [Link]. Available at: [Link]
tutorial/computer-network-models/ [Accessed 13 Feb. 2019].
Mitchell, B. (2018). The OSI Model Explained in Easy Steps. [Online] Lifewire. Available
at: [Link] [Accessed 14 Feb.
2019].
Page 66 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Page 67 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Page 68 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01