0% found this document useful (0 votes)
30 views61 pages

New Assignment On Networking

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views61 pages

New Assignment On Networking

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

lOMoARcPSD|43957031

New Assignment On Networking

Network Management (Kathmandu Institute of Technology)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])
lOMoARcPSD|43957031

Scenario :
Enclave Films is an eminent movie company which composes movies and delivers
high quality video to make it download through VividZone company website. The
original movie company management has decided to consolidate the contract with
VividZone by adding more efficient staff and appliances.

Enclave Films is in building B and the web team is positioned in the same building
while majority of the administration, sales, accounts and management functions are
supported in building A. Both buildings are located in the same premises. Movie
company plans to aggregate all their staff and resources in one building. Therefore
when adjacent office space becomes available in building A, these groups will be
accommodated together. Building A has a reception and a customer area as well.

About the Network

The branch network of Enclave Films has grown without proper planning. The LAN
cabling in both offices is Cat5e Ethernet. The office complex provides an Ethernet
link between the two buildings.

The current network is a flat network design with minimal redundancy. A small
wireless LAN is used occasionally by few project managers with laptops and the
guests at Building B.

a) Building A - general office and managers, including reception, accounts, and


administration. It consists of 12 PCs and 02 printers.
b) Building B - production suites and provides networking for the media development
and storage. It consists of 09 high-performance workstations, 05 office PCs, and 02
printers.

The Management expects to enhance the network based on following major


criteria:

a) Separate the network into VLANs.


b) Data traffic expected to increase by 80%
c) Possibly consider connecting directly to the VividZone network; must be a fast and
reliable connection
d) High network availability with redundant links and technology
e) Wireless network access at Building B
f) QoS to support video applications
g) High network reliability with network monitoring and security

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Activity 01
You are newly recruited as a Network Engineer by the movie company to redesign
the network.
You need to produce a report for the company that includes the following:

1. An an overview of your report.


2. An explanation of;
networking principles, protocols and devices, including benefits
and constraints of networked solutions
the impact of network topology, communication and bandwidth
requirements, effectiveness of networking systems
operating principles of networking devices and server types and
networking software

Activity 02

1. Prepare a written plan of how you are going to design a Local Area
Network including a blueprint of your LAN.
2. Justify the security requirements and quality of services needed for
selection of accessories
3. Design a networked system to meet a given specification
4. Provide the IP address allocation table for the redesigned network.
5. Install & configure network services and applications of your choice.
6. Conduct a test and evaluate the design to meet the requirements and
analyse user feedback.
7. Suggest a maintenance schedule to support the networked system.

Activity 03
1. Implement a networked system based on your prepared design.
2. Conduct verification with e.g. Ping, extended ping, trace route, telnet, SSH,
etc.
3. Record the test results and analyze these against expected results.
4. Investigate what functionalities would allow the system to support device
growth and the addition of communication devices.

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Grading Rubric

Grading Criteria Achieved Feedback

LO1 : Examine networking principles and their protocols.

P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Compare common networking principles and how protocols
enable the effectiveness of networked systems.

LO2 : Explain networking devices and operations

P3
Discuss the operating principles of networking devices and
server types.

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

P4
Discuss the inter-dependence of workstation hardware with
relevant networking software.

M2
Explore a range of server types and justify the selection of a
server, considering a given scenario regarding cost and
performance optimization.

LO1&LO2
D1
Considering a given scenario, identify the topology protocol
selected for the efficient utilisation of a networking system.

LO3 : Design efficient networked systems

P5
Design a networked system to meet a given specification.
P6
Test and evaluate the design to meet the requirements and
analyze user feedback.
M3

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Install and configure network services and applications on your


choice.
D2
Design a maintenance schedule to support the networked
system.
LO4 : Implement and diagnose networked systems

P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D3
Use critical reflection to evaluate own work and justify valid
conclusions.

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

ENCLAVE FILMS
Network Implantation report

By -: W.G.L.A. Maduranga
COL/A-062270
Unit 02
HND /Com / B-84

February 22, 2019

Page 15 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Acknowledgement
I would like to express my special thanks of gratitude to my lecturer Mr. Ilham for giving
me great help and guidance for complete this assignment. I also would like to thank my
parents and friends for helping me and encouraging me to complete this assignment within
the limited time.
Thank you.

Page 16 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Table of Contents
Acknowledgement............................................................................................................................... 16
Introduction......................................................................................................................................... 19
Activity 01........................................................................................................................................... 20
1.2) What is a network?................................................................................................................... 20
1.2.1) Network Principles................................................................................................................ 20
1.2.2) Advantages and disadvantages of computer network............................................................ 21
1.2.3) Network Models.................................................................................................................... 21
The OSI Reference Model........................................................................................................... 21
TCP / IP Model............................................................................................................................ 23
1.2.4) Networking Protocols............................................................................................................ 25
Different types of protocols used in networking.......................................................................... 25
1.2.5) Networking Devices.............................................................................................................. 27
Repeaters..................................................................................................................................... 27
Hub.............................................................................................................................................. 27
Switch.......................................................................................................................................... 27
Network Bridge........................................................................................................................... 28
Routers........................................................................................................................................ 28
Access Point................................................................................................................................ 28
Cables.......................................................................................................................................... 28
1.2.6) Networking Software............................................................................................................ 30
Network Operating systems......................................................................................................... 30
Network Management System..................................................................................................... 31
1.2.7) Network Topologies.............................................................................................................. 34
Bus Topology.............................................................................................................................. 34
Ring Topology............................................................................................................................. 35
Star Topology.............................................................................................................................. 36
Tree Topology............................................................................................................................. 36
1.2.8) Data Communication............................................................................................................ 37
Data Communication Modes....................................................................................................... 37
1.2.9) Bandwidth............................................................................................................................. 38
1.2.10) Network Types.................................................................................................................... 38
Local Area Network (LAN)......................................................................................................... 38
Metropolitan area network (MAN).............................................................................................. 38

Page 17 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Wide Area Network (WAN) .................................................................................................... 39


1.2.11) Server Types .................................................................................................................... 39
Web Servers ............................................................................................................................ 39
Proxy Servers .......................................................................................................................... 39
File Servers.............................................................................................................................. 39
Mail Servers ............................................................................................................................ 39
Database Servers ..................................................................................................................... 40
1.2.12) Common servers on the market ........................................................................................ 40
Comparison between three servers from the list ........................................................................ 40
Activity 02 ...................................................................................................................................... 41
2.1) Network Design for Enclave Films Company ....................................................................... 41
2.2) Selection of accessories ........................................................................................................ 42
Firewall ................................................................................................................................... 42
2.3) Network of the Enclave Films Company ............................................................................... 43
2.4) IP Allocation table ................................................................................................................ 43
2.5) IP configuration to the PCs ................................................................................................... 44
2.6) Testing after allocating IPs ................................................................................................... 47
2.7) Maintenance schedule ........................................................................................................... 50
Activity 3 ........................................................................................................................................ 51
3.1) VLAN configuration............................................................................................................. 51
Router Configuration ............................................................................................................... 51
Switch Configuration ............................................................................................................... 54
(3.2 & 3.3) Connection tests after configuring VLANs ................................................................. 58
Ping tests ................................................................................................................................. 58
Trace route tests ....................................................................................................................... 61
3.4) Future recommendations ...................................................................................................... 63
Network Security ..................................................................................................................... 64
Network Traffic ....................................................................................................................... 64
Feedback analysis ........................................................................................................................ 65
References....................................................................................................................................... 66

Page 18 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Introduction
Computer networking technology, which came up with the advent of Information Technology
over past few decades has become an imperative thing for us today. From a small organization
to multimillion organizations are using computer networks today because of its efficiency.
Nowadays networking knowledge is necessary to work in the ICT field.
Enclave Films is a company, which produces and provides downloadable high quality videos
through VividZone company website. With the decision of the company to reinforce the
contract with VividZone. They wanted to add more efficient staff and equipment. The company
has two buildings with separate departments. Therefore, the management need to enhance the
company network based on different standards. Those standards and some basics about
computer networking are described in this report with examples and descriptions.

Page 19 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Activity 01
1.2) What is a network?

A computer network is simply a collection of two or more computers. Other devices, such as
printers, servers, switches, and routers can also use on a computer network. Main purpose of a
computer network is communication and data transfer. In addition, you can share resources,
such as printers and scanners with others in the network ([Link], 2018).

1.2.1) Network Principles

A computer network must be, transparent for the users also it must be powerful and practical.
After implementing a network, it should produce a true networking experience in quality,
control, safety and speed. Those principles that has mentioned above helps network designers to
do their work clear and easy. All the above principles can divide into three. They are…
1. Performance
2. Reliability
3. Security.

1) Performance

Performance can mainly measure using transit time and response time it can also measure
using number of users, efficiency of software and capability of connected hardware.

2) Reliability

The reliability of a network can measured using the network failing frequency. If a network
is failing frequently that means, it is not a reliability connection.

3) Security

Security is the most important characteristic of networks. It refers to the protection of data
and resources from unauthorized access and usage. While communicating or sharing data

Page 20 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

with others data should go through several network layers and if someone wants to stole
your valuable data it should be easy within the network. So the network security must
strongly considered while designing the network ([Link], n.d.).

1.2.2) Advantages and disadvantages of computer


network
(Lombardo, n.d.)

1.2.3) Network Models


Advantages Disadvantages
Increases communication and Lack of independence.
information accessibility.
It allows for easier sharing of It makes security difficulties.
resources.
Easy to share files. Increase the impact of computer
viruses and malware
Increases cost efficiency. High technical skills are required to
handle the network
Increases storage capacity. It's very expensive to set up the
network

For communication and transferring data between two or more devices required a
systematic approach. This approach allows users to communicate and transmit data from an
efficient and regular route. These approaches known as computer network models. It is a
conceptual model, which helps to understanding and designing a flexible network
architecture. Network models are liable for exchanging data respectively and for setting up
a connection between sender and the receiver.
There are two major models in computer networks. The entire data communication process
depends on them (Upreti, n.d.).

The OSI Reference Model

Page 21 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

8The International Organization for the Standardization (ISO) developed the OSI (Open
System Interconnection) module in 1984. The OSI model is a general purpose-networking
model, which should responsible for establishing an open relationship between all
communications equipment around the world. The OSI model runs without using a protocol
because of that reason this model allows any different system without considering about
their architectures. The OSI model has a layered architecture it makes easy to communicate
data because of its pre-defined functionalities and structure.

Layer 7 • Application Layer

Upper • Presentation Layer


layers Layer 6

Layer 5 • Session Layer

• Transport Layer
Network independent Layer 4

Layer 3 • Network Layer

Lower • Data Link Layer


layers Layer 2

Layer 1 • Physical Layer

Figure 1: OSI Layers (Source: Authors own figure)

1. The Physical Layer

The physical layer coordinates the functions necessary to transmit the bit flow through a
physical medium.

2. Data Link Layer

Page 22 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Data link layer is the second most layer in OSI model. This layer has to synchronize the data
flow, deal with transmission errors search for errors and provide a well-defined interface to
the next layer.

3. Network Layer

Responsible for establishing data communication link to deliver packets from original
source to destination. In addition, this layer can understand IP addresses and also routing is
another important thing that is operating under this layer.

4. Transport Layer

This layer also known as network independent layer is responsible for providing end-to-end
communication over a network, and it provides reliable or unreliable services. This layer is
the interface between software and hardware.

5. Session Layer

This layer provides appropriate sessions between users and entities, where user interacts
such as login sessions in online banking. This session is also responsible for discovering and
transmission of data through the exact connection.

6. Presentation Layer

Processing of data such as formatting and encryption / decryption for the above application
layer

7. Application Layer

This layer provides network services to end user applications. It directly interact with user
and software applications by providing user interface (Mitchell, 2018).

TCP / IP Model

Page 23 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

The TCP/IP stands for Transmission Control Protocol/Internet Protocol. Department of


Defense (DOD) developed this model in 1960. It is like a brief version of OSI Model.
Unlike seven layers in OSI Model, TCP/IP only consists of four layers.

4 Application
3 Transport

2 Internet

1 Network Access

Figure 2: TCP/IP layers (Source: Authors Own Figure)

01. Network Access Layer

This layer is a combination of the physical and data link layers of OSI model. It controls the
media and hardware devices. Mapping IP addresses to MAC addresses is an important part
of this layer.
02. Internet Layer

This layer is like the OSI’s Network layer. It is responsible for transmitting data over the
entire network.
03. Transport Layer

This layer is similar to the transport layer of the OSI model. It has the responsibility to
transmitting data from the source to destination without errors.
04. Application Layer

This layer corresponds to Application, Presentation and Session Layer in the OSI model. It
controls the node-to-node communication and user interface.

TCP/IP vs OSI Model

TCP/IP OSI
There are four layers in TCP / IP. The OSI has seven layers

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

TCP / IP does not have very severe OSI has severe restrictions
restrictions
Follow a horizontal approach Follow the vertical access.
TCP/IP developed protocols first OSI created models first
(Chauhan and Jain, n.d.)

1.2.4) Networking Protocols


Protocol is a rule that controls communication between computers in a network. These rules
control the following features: method of accessing, physical topologies, cabling methods
and data transmission speed ([Link], n.d.).

Table 1: OSI model and TCP/IP Model associated with network protocols
OSI Model TCP/IP Common Protocols
Application DNS, HTTP, POP3, FTP, SNMP, DHCP,
Presentation Application SMTP…
Session
Transport Transport TCP, UDP
Network Internet IP, ARP, ICMP
Data Link
Network Access Ethernet
Physical
([Link], n.d.)

Different types of protocols used in networking


Ethernet
Internet Protocol (IP)
Address Resolution Protocol (ARP)
Internet Control Message Protocol (ICMP)
Transmission Control Protocol (TCP)
User Datagram Protocol (UDP)
Domain Name Service (DNS)
Hyper Text Transfer Protocol (HTTP)

Page 25 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Post Office Protocol (POP3)


File Transfer Protocol (FTP)
Simple Network Management Protocol (SNMP)
Dynamic Host Configuration Protocol (DHCP)
Simple Mail Transfer Protocol (SMTP)

I. Domain Name Service (DNS)

DNS helps to find websites for Internet users and network devices by converting hostnames
into numeric IP address (NS1, n.d.).
II. Transmission Control Protocol (TCP)

TCP used for communication across the network. The TCP is breaking down the data into
small packets before sending it to the destination.
III. Internet Protocol (IP)

IP is working with TCP. IP addresses data packets to the desired destination and show
different routes until the data packets reach to the destination. IP also have the responsible
for making sure the packets transmitted to the correct address.
IV. Hyper Text Transfer Protocol (HTTP)

HTTP based on the client server architecture. It used to create a connection between the web
server and client also it shows the Information on web pages.
V. File Transfer Protocol (FTP)

FTP is primarily use to transfer files to different networks. There can be many kinds of files
such as text files, image files, etc. This file transfer method is faster than other methods.
VI. Simple Mail Transfer Protocol (SMTP)

This protocol manages the mail transmission over the internet. It is working on the
application layer (Thakur, n.d.).
VII. Ethernet

Ethernet is very important in Local Area Networks. It transmits data as digital packets. If any
computer needs to use this protocol, there must be an Ethernet Network Interface Card (NIC).

Page 26 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

1.2.5) Networking Devices


Apart from computers and wires there are many other special devices using in networking.
Those devices known as network devices or else networking hardware, they are physical
devices, which used for setting up a network and many other network related things such as
strengthening signals, web surfing and file sharing etc. Some of the common network
devices are as follows.

Repeaters

Hub

Switch

Network Bridge

Router

Access Point

Cables

Repeaters
Repeater is an electronic device that used to amplify the signals. It retransmits the incoming
signals at a higher power to cover more distance.

Hub
The Hub connects several computer network devices simultaneously. A hub can also act like
a repeater. In the family of network, connecting devices hub is the simplest device because
it combines LAN components with identical protocols. A hub can work with both analog
and digital data. Hubs are not capable of doing packet filtering or IP addressing. They can
only broadcast the data packets among the entire network.

Switch
Switches usually have more intelligent than Hubs. It is a multiport device, which can used
to improve the efficiency of a network. It maintains limited routing information about the
devices inside the network. We use switches to connect devices like PCs, Routers, printers
etc… In general, Switches are able to read the mac addresses of receiving packets then it
use those addresses to transmit data to the exact destination.

Page 27 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])
lOMoARcPSD|43957031

Network Bridge
Bridges used to connect two or more networks together. The main function of the bridges in
networking is storing and distributing data frames among the all segments that connected to
the bridge. It use mac addresses to transfer data to the desired destination. Now a day’s
people do not use bridges instead of that people use switches, which also known as
“multiport bridges” because of their functionality.

Routers
Routers help to send packets to their destinations by routing through interconnected network
devices. Routers are intelligent devices and they store more information about their
interconnected networks. Routers can configure to use packet filters, firewalls, and access
control lists.
Routers can used to separate internal networks into two or more subnetworks. It also can
connect to other routers internally. It establish communication by maintaining tables on
destinations and local connections. Routers are the first defensive line of a network. They
must be configure to limit the traffic approved by the network administrators.

Access Point
An Access Point (AP) can be either a wired or a wireless connection. Generally, it stands for
a wireless device. It can operate as a bridge by connecting wired network to wireless
devices or else it can work as a router by transmitting data from one AP to another. Wireless
AP (WAP) is a device, which has a receiver and transmitter used to create Wireless LAN
(WLAN).
Each AP is limited to its range of transmission. The actual transmission range depends on the
wireless standard, obstacles and environment between the user and the AP (Melnick, 2019).

Cables
Even with the advantages of wireless technology, many of our computer networks are still
rely on cables to transfer data. Network cables have several types of standards, which
designed for specific purposes (Mitchell, 2018).

Page 28 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Coaxial Cables
This was invented in 1880s and it is a standard for 10 Mbps Ethernet cables. The coaxial
cable is a cable with a tubular insulation layer around an internal conductor apart from that
tubular insulation layer the cable also surrounded by a tubular conducting shield. Both
insulation layer and conducting shield share a geometric axis. Many coaxial cables has an
insulating rubber outer.

Figure 3: coaxial cable (Source: FS Official, 2014)

Twisted Pair Cables


This emerged in the 1990s as the preeminent cable standard for Ethernet. This was starting
with category 3 (CAT3) with a speed of 10 Mbps and in later Editions like CAT5, CAT5e,
and CAT6 etc… now we have very higher speeds up to 10 Gbps.
The Ethernet twisted pair cables are using eight wires and they were twisted in pairs to
decrease the outer interference. Twisted pair cables have two primary types; they are
Shielded Twisted Pair (STP) and Unshielded Twisted Pair (UTP). Today we are mostly
using UTP wires because of its lower cost (Mitchell, 2018).

Figure 4: Shielded and Unshielded Twisted pair cables (Source: [Link], 2016).
Page 29 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Fiber Optics
Instead of using metal wires to transmit data through the network, now we can use fiber optic
network cables. Fiber optics are made of fiber/glass also, it has a rubber outer. Fiber optics uses
light beams to transmit data rather than using electrical signals. Because the light can travel in
an ultra-high speed and it does not weaken over the distance. Fiber cables can run for kilometers
with 10 Mbps to 100 Gbps or more transmission speed (Official, 2014).

Figure 5: Fiber Optic Cable (Source: [Link], n.d.)

1.2.6) Networking Software


Nowadays most of the corporations, businesses and large organizations are powered by
networking Software. It improves the efficiency of content sharing, security and
communication. In addition, it helps network administrators to monitor, customize or
modify components of a larger framework as required.
Networking Software is primarily use for network administration. If it is used correctly, it
cannot be accessed or else seen by the end users. Instead of acting as a tool that end users
can use, networking software makes it easier for end users actions.
After installing networking software in a hardware framework, it becomes a Software
Defined Networking or SDN. Network administrators install an SDN controller to engage
with end user devices (Cockerham, 2015).

Network Operating systems


A network Operating System (NOS) means specially designed operating system for
connecting computers and other networking devices into a local area network. NOS
simultaneously manages various requests (inputs) in parallel. It also provides the security
required in a multi-user environment ([Link], n.d.). Some popular network operating
systems are described below.

Page 30 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Microsoft Windows Server OS

Microsoft Windows Server OS is a series of operating systems, which was develop to


provide an extensive administrative control of a network. It was first developed in early
1980s. Windows server OS’s can run applications faster on machines with several
processors because of the symmetric multiprocessing feature in its architecture.
By now windows server include Active directory, which use to manage user data, resources
and security of a network.

Figure 6: Windows Server OS releases (source: Margaret Rouse, 2017)

Linux Server
Linux server is a powerful version of Linux open source operating systems. It has designed
to meet the most efficient requirements of business applications such as database
management and web services, network and system administration.
Because of their stability, security and flexibility advantages Linux servers are frequently
selected among other servers. Major Linux server operating systems are Cent OS, Debian,
Ubuntu Server, Slackware, and Gentoo (Beal, n.d.).

Network Management System


After implementing a network, monitoring is the most important thing. In that case, network
engineers use network management systems (NMS) to manage independent components in
a network. An NMS can be an application or set of applications. By using, an NMS makes it
easier to monitor, configure, identify, update and troubleshoot the network (Rouse, 2018).

Page 31 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

WhatsUp Gold
WhatsUP Gold is a network management System/ tool, which maintains a continuous status
report on the health of all connected hardware. It has a function called Autodiscovery so the
user has no need to hesitate about entering hardware details manually. There are many more
functions such as network mapping, Network Performance Monitoring, Server Monitoring,
Alerts, Wireless Network Monitoring, Cloud & Storage Monitoring and more (COOPER,
2018).

Figure 7: WhatsUp Gold Screenshot (Source: ([Link], n.d.))

Nagios
Nagios is an open source network-monitoring tool that was designed to run on Linux base
Operating Systems either it designed to run on Linux other OSes like Windows and UNIX
can be monitored using it. Nagios can monitor Disk usage, processor load, memory usage,
log files and ongoing processes etc… In addition to that, it can monitor common network
protocols such as SMTP, POP3, and HTTP etc…
Ethan Galastad developed this in 1999 and originally known as NetSaint. After that, it has
refined by many others as an Open source project (Rouse, 2018).
Page 32 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Figure 8: Nagios User Interface (source: (Sean Garrity, 2017))

Microsoft SCOM (System Center Operations Manager)


SCOM is a part of Microsoft System Center Suit of enterprise management software. It
configures, distributes, manages and monitors all the services and operations of many systems
through a management Console. SCOM is a monitoring tool, which used to check the status of
Servers, OSes, System Services, applications and Hardware etc…(Rouse, 2018).

Page 33 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Figure 9: SCOM Dashboard (Source :( Kevin Greene, 2018))

1.2.7) Network Topologies


A network is like a maze. It is very confusing and very hard to understand without an advanced
knowledge in networking. To implement a network a network engineer should use several
cables, routers, switches and many other components so it is impossible to do such a thing
without a proper design. That is where the network topologies comes in to the play, Network
topology is simply the structure or else the virtual shape of a network in another way it is the
arrangement of nodes and other network devices. When implementing a network it is necessary
to identify the best topology for the network. There are few different types of network
topologies. Some of them are as follows (Shepherd, 2018) (Mitchell, 2019).
Bus Topology
Ring Topology
Star Topology
Tree Topology

Bus Topology
In the bus topology there is a main cable which is connected to all other devices. The main cable
or else the backbone of the network works like a shared transmission medium. it is easy to
setting up a network like this, it needs only few cables than other topologies. It has a very

Page 34 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

simple structure. But there are also some cons in these networks if the backbone fails entire
network is fail and if there are too many devices it will decrease the efficiency and the speed
of the network ([Link], n.d.) (Mitchell, 2019).

Figure 10: Bus Topology (source :( Emperor Boost, 2019))

Ring Topology
Ring topology, forms like a ring by connecting each computer to another like that it goes around
by connecting each other and finally the last computer is connecting to the first one. That means
each computer has two neighbor computers directly connected to it and the rest is indirectly
connecting to it through the directly connected computers. In this kind of networks, the
transmission network is not affected by high traffic so the efficiency of the network is higher
than tree topology. This one is also cheap to establish. All the data packets in the network is
travelling through the network in same direction. Failure of a cable or a pc can fail the whole
network. It is hard to troubleshoot and adding or removing new computers interrupts the whole
network (Mitchell, 2019) (Shepherd, 2018) ([Link], n.d.).

Figure 11: Ring Topology (Source: (Logical ring topology, 2019))

Page 35 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Star Topology
This is the most famous and widely using topology most of the users are familiar with this.
In this topology, all networking devices are connecting to a central point such as a router or
a switch. All the components in the network is directly connect to the central point and
indirectly connect with each other through it. Every device has their own connection to the
central point; the central point can act as a repeater for wider networks. Central point or any
other component can upgrade easily and easy to implement. It is easy to identify the issues
of the network and because of the dedicated lines, failure of a computer or else a cable can’t
affect to the whole network. Higher implementation cost and the failure of the central point
can fail the whole network are some disadvantages not only that but also the performance is
rely on the central point so it should be capable to handle higher amount of data
([Link], n.d.) (Mitchell, 2019).

Figure 12: Star Topology (Source: (Davie and Peterson, 2012))

Tree Topology
Tree topology is a combination of bus and star topologies. It connects multiple star networks
together using a bus network. Central point of every star network is connecting to the bus
network directly. It is easy to troubleshoot and maintain the network; easy to expand the
network are some of the key advantages of the bus topology. Heavy cabling cost and hard to
maintain with more devices are some major disadvantages ([Link], n.d.).

Page 36 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Figure 13: Tree Topology (Source: (Network-Design-Engineer, 2011))

1.2.8) Data Communication


Data communication refers to the sharing data from one place to another. Sending an E-mail
and making a call using a phone is good examples for data communications. There are five
parties involve in data communication they are…
Source – Data sending device
Transmission Medium – Physical data transmission path to the receiver.
Receiver – Data receiving device.
Message – Data to be communicated
Protocols – A set of rules agreed by the communication equipment (THAKUR, n.d.).

Data Communication Modes


When it comes to data communication between two devices there are three modes can be
explained.
a. Simplex

Communication is happening to only one direction. Receiver cannot communicate back to the
sender. E.g. Radio and TV Broadcasting
b. Half Duplex

The communication can happen between the both sides but not in the same time.
Page 37 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

E.g. Walkie-Talkie
c.

Full Duplex

Both sides can communicate with each other at the same time (Alkuun, n.d.). E.g.
Telephone.

1.2.9) Bandwidth
In computing bandwidth is another word for data transfer rate. In general the volume of data
per unit of time that can transmit through a communication media. For example, a higher
bandwidth connection can transmit data much faster than a lower bandwidth connection.
Therefore, in simple terms bandwidth is a unit that can use to measure the speed of a
connection. Bandwidth measured by using bits per second (bps) (Fisher, 2019).

1.2.10) Network Types


With the growth of computer technology and internet, a number of different network types
have come into the field. It is very difficult to identify them because of their similarities. We
can categorize them by considering their purposes and their sizes. Among all the network
types, main types are listed as below.

Local Area Network (LAN)


A LAN can be established using minimum of two computers to thousands of networking
devices. It is also the most common and simplest network type. LANs mainly established
using guided media but it can also be established using unguided media. It used to create
networks in a building or a single site such as a small organization. LANs are very cheap to
implement because it needs comparatively cheaper hardware like hubs/ switches, Ethernet
cables etc… These type of a network is mostly using for sharing files or resources such as
printers.

Metropolitan area network (MAN)


A metropolitan area network is a comparatively larger network than LAN. This type of
networks implemented in a small religion like college or an entire city. A MAN can formed
by connecting some LANs with each other.

Page 38 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])
lOMoARcPSD|43957031

Wide Area Network (WAN)

Wide area networks are implementing on very large territories like a province or a country.
A single WAN can contain many separate LANs or MANs. These type of networks are
working with low speed comparing to LANs. The best example for a WAN is the internet. It
connects all the separate small networks together (Bourgeois, 2016).

1.2.11) Server Types


There are many types of servers to perform several kinds of tasks according to the needs of
the users and network engineers. A server is generally looks like a computer, but it is the
Software, which controls, organize and conduct services or resources. A server cannot
accomplish any task other than their server task. One powerful PC can physically work as a
residence to various software servers. There are many types of servers in our use among
them the most common and popular server types are described below.

Web Servers
A web server is simply a PC, which runs with the software that allows the PC to host a web
site.

Proxy Servers
Proxy Servers are used, for browsing needs, getting better looks and sharing he connections.
These servers can be found with the programs like web browsers.

File Servers
File servers or else FTP servers facilitates users to store data and share them across the
network securely. It also provides security, controls the transfers and organize the files.

Mail Servers
This type of servers are used to share and store emails through the networks. Mail servers
are using protocols such as SMPT, IMAP and POP3 to send and receive emails.

Page 39 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Database Servers
Database server is simply a server that facilitates database services such as data
management, data analysis, storage, archiving and many other tasks ([Link], n.d.)
([Link], n.d.).

1.2.12) Common servers on the market


A server is not like a single user computer. A single server has many customers depending
on it. In general, servers are running on all the time. Even though we can use normal
workstation as a server because of the above reasons, we should use a workstation specially
designed for working as a server. In that case, there are many kinds of servers in the market.
The most common ones are described below.
Dell PowerEdge T20 [barebones]
Lenovo ThinkServer TS150
HP ProLiant ML350 G9 5U
Supermicro SuperWorkstation 5039A-IL
Fujitsu Primergy TX1310 M1
Asus TS500

Comparison between three servers from the list


Model Dell PowerEdge T20 Lenovo ThinkServer HP ProLiant ML350 G9
[barebones] TS140 5U

CPU
Intel Xeon E3-1200 v6 Intel Xeon E5-2603 v3
Intel Pentium G3220
RAM
Up to 64GB 8GB
4GB
Graphics
Intel HD Graphics P630 Matrox G200
Intel HD Graphics
Storage
No drives included No drives included
No drives included
Connectivity Up to 12 x USB ports (4
6 x USB 3.0, serial, video,
x USB 3.0), 2 x
2 x Gigabit Ethernet
DisplayPort, VGA, 4 x Gigabit Ethernet
| Dimensions (W x D x
serial, 2 x PS2, Gigabit
H): 44.4 x 58.3 x 17.3cm
Ethernet

(Athow, 2019)
Page 40 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Activity 02
2.1) Network Design for Enclave Films Company

Figure 14: The network blueprint of enclave films (Source: Authors own figure)

The blueprint description

The above blueprint was designed for the Enclave Films Company. Switch A in the figure
14 is the switch for building A and Switch B is for the building B. Both buildings are using
star topology and they are interconnected using a crossover cable.
Building A has twelve PCs and two printers while building B has nine high performance
PCs, five PCs and two printers. PCs in the building A has separated into five sections while
building B has two. Also the building B has an access point which is dedicated for the
guests and the few project managers with laptops.
The Switch B is connecting to a router through the Switch A and the router is connecting to a
firewall for controlling data traffic. Whole network is connecting to the internet and the server
trough the firewall so it is easy to handle access to the server and internet using firewall.

Page 41 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

2.2) Selection of accessories


When choosing accessories for the network we have to consider many factors because the
whole network is depending on the accessories we use. To make a network reliable and
effective network engineers should choose the appropriate accessories for the network.
There are few factors, which we can commonly consider while selecting devices. They are,

Affordability

Brand

Expandability

Maintenance and support for the devices.

When selecting devices for a network the above factors are the general factors, which
should be concerned. Apart from that when selecting a router, server or else firewall the
network engineers must check for the security of the devices. When speaking about the
network security the firewall has the main responsibility for that.

Firewall
Briefly speaking a firewall in networking is a program, which monitors all the incoming and
outgoing requests and prevent disallowed access to and from the network based on
prearranged set of rules (Greene and Butler, 2019).

Basic tasks of Firewalls


Protection of the
resources Verify access
Network traffic control
Acting as a mediator

In today, a firewall is not enough for the network security a network must consist with an
anti-virus software.

Anti-Virus Software
An anti-virus software is a computer program, which specially designed for detecting and
taking actions against the computer viruses, worms and other harmful software. When using
an anti-virus software it should be up to date so it can work against the new malwares.

Page 42 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

2.3) Network of the Enclave Films Company

Figure 15: Designed network-using Cisco (source: Authors own figure)

The designed network for the Enclave Films Company is in the above Figure. In there I
have used a PC to display each department.

2.4) IP Allocation table


Department Allocated IP RANGE Subnet mask
Admin [Link] to [Link] [Link]
Sales [Link] to [Link] [Link]
Accounting [Link] to [Link] [Link]
Reception [Link] to [Link] [Link]
Management [Link] to [Link] [Link]
Production [Link] to [Link] [Link]
Web team [Link] to [Link] [Link]

In the above IP allocation table, each department is allocated with 32 IP addresses. From the
allocated IP addresses, first and last IP addresses are not usable because the first IP is Network
IP, the last IP is Broadcast IP, and another IP address must reserved for the Gateway IP.

Page 43 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

2.5) IP configuration to the PCs


IP configuration for a Pc in Admin Department.

Figure 16: IP Configuration in Admin Department (Source: Authors own figure)

IP configuration for a Pc in Sales Department.

Page 44 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Figure 17: IP Configuration in Sales Department (Source: Authors own figure)

IP configuration for a Pc in Accounting Department.

Figure 18: IP Configuration in Accounting Department (Source: Authors own figure)

IP configuration for a Pc in Reception Department.

Page 45 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Figure 19: IP Configuration in Reception Department (Source: Authors own figure)

IP configuration for a Pc in Management Department.

Figure 20: IP Configuration in Management Department (Source: Authors own figure)

IP configuration for a Pc in Production Department.

Page 46 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Figure 21: IP Configuration in Production Department (Source: Authors own figure)

IP configuration for a Pc in WEB Department.

Figure 22: IP Configuration in WEB Department (Source: Authors own figure)

2.6) Testing after allocating IPs


After allocating IP addresses to the PCs, we should check the connections by running a ping test
before configure the VLANs. By doing that we can make sure that, our IP allocations are

Page 47 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

working properly. Because we are using a Subnet of [Link] for allocating IPs, the
separated IP ranges are not capable of communicating with other IP ranges. If the Separated
IP ranges can communicate with each other without configuring VLANs, there must be an
error. For testing that, we have run a ping test in randomly selected PCs before configuring
the VLANs. The test results are attached below.
Ping test results between a printer and the Admin Department, which are in the same IP
range and Two PCs in Admin and Accounting Department, which are not in the same IP
range before Configuring VLANs.

Figure 23: Pre Ping test results (source: Authors own figure)

Page 48 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Another two Ping Tests between Accounting and Web Department and Accounting and
Production Department. Before the configuration of VLANs.

Figure 24: Pre Ping test results 2 (source: Authors own figure)

As it shows in the above test results the separated IP ranges are not communicate between
each other while devices in the Same IP range does. Considering that, we can make a
conclusion that our IP allocation had done properly.

Page 49 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

2.7) Maintenance schedule


After implementing a network. It is very important to make a maintenance schedule to check
and maintain the network devices, connections and many other physical and systematic
things frequently. By following a well-organized maintenance schedule, we can save lots of
money and time because the possibility of happening an emergency is very low.
Frequency
Person in
Description charge
Daily Weekly Monthly Other

Checking For OS  N/W Manager


updates

Antivirus updates  N/W Manager

Driver Updates  N/W Manager

Checking uptimes of  N/W Manager


devices

Checking Connections Randomly N/W Engineer

Troubleshooting As required N/W Engineer

Checking Security logs  N/W Admin

Configuring firewall  N/W Admin

Device Cleanup Thrice a year Whole IT Staff

Capacity of the HDDs  N/W Admin

Network updates As required N/W Engineer

Checking and
removing unnecessary  N/W Admin
user Accounts

Page 50 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Activity 3

3.1) VLAN configuration


As the first steps, we have designed the physical network and after that, we allocated IP ranges
to every department. The purpose of allocating IP ranges to the departments is for the future
needs. Such as if, the company want to isolate a department from other departments or else if
they want to restrict internet access for a department etc…To allocate IP ranges, we used the
subnet as [Link] so now we have to connect every department together using VLANs.
Configuration of the VLANs has briefly described below with the Screenshots.

Router Configuration
As the first steps, we have opened the IOS command line of the router we used a cisco 2811
router for our network. After opening the IOS command line, we should first enable the
privilege mode, to do that we use “en” command. Then to see the router properties we used
the command “sh run”. From the properties, we should identify the port that we used to
connect the router and switch.

Figure 25: VLAN Router configuration 1 (Source: Authors Own Figure)

Page 51 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Figure 26: VLAN Router configuration 2 (Source: Authors Own Figure)

In the figure 26, the highlighted ‘Interface FastEthernet 0/0’ is the port that we used to
connect the router and switch.
After finding the port to configure the router we should enter to the Configure mode to do
that we used the command “conf t” then to create VLANs we use the following commands
by only changing the VLAN number in the End.
1. Select the port using “Interface FastEthernet 0/0”
2. Create the VLANs using “Interface FastEthernet 0/0.<< VLAN Number>>”
3. To encapsulate the VLANs “encapsulation dot1Q << VLAN Number>>”
4. Then as the final step of creating VLANs in the router, we should provide a Gateway
IP addresses for every VLAN. When providing IPs to the gateway we must make sure
that the IP and the Subnet we are providing is in the range of the department where we
going to use the VLAN. We used the following command for our first VLAN.
“IP address [Link] [Link]”

Page 52 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Figure 27: VLAN Router configuration 3 (Source: Authors Own Figure)

After that for changing the state of the Port from Shutdown to No shutdown, we used the
following commands.
1. Select the port using “Interface FastEthernet 0/0”
2. Then type “no shutdown” to change the state.

Page 53 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Figure 28: VLAN Router configuration 4 (Source: Authors Own Figure)

Switch Configuration

SWITCH A (Switch0)
As we did in the router first Open the IOS command line in the Switch then “en” to enable
the privilege mode. If needed use the “sh run” command to see the switch properties. After
that use “conf t” to enter the configure mode. Then as the first thing select the port which
you connected your router by using “Interface FastEthernet 0/<<port>>” and change the
switchport mode into trunk for allowing all the VLANs to communicate through that port
by using “switchport mode trunk”.

Page 54 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Figure 29: VLAN Switch0 configuration 1 (Source: Authors Own Figure)

Then change the Switchport mode of the port into trunk, which connects the other Switch.

Figure 30: VLAN Switch0 configuration 2 (Source: Authors Own Figure)

Then as the next step select, the ports that connects the PCs to the switch using “Interface
FastEthernet 0/<<port>>” command, and change their switchport mode into access using
“switchport mode access” command. After that, add them into the VLANs according to
the IP allocations by using this command “switchport access vlan << VLAN Number>>”.

Page 55 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Figure 31: VLAN Switch0 configuration 3 (Source: Authors Own Figure)

After that, the next step is to configure the switch B (Switch1). Before that, we should add
the other VLANs into the switch A (Switch0) because the switch B is connecting to the
router through the Switch A. Therefore, the departments, which connects to the Switch B,
cannot interconnect with the other VLANs unless we add them into the VLAN database of
the Switch A. to do that we used the following commands.
To enter the VLAN Database mode “vlan database”.
To Add VLAN 60 and name it to Production “vlan 60 name Production”.
To Add VLAN 70 and name it to Web “vlan 70 name Web”.

Page 56 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Figure 32: Adding VLANs to VLAN DB (Source: Authors own figure)

Switch B (Switch1)
Same as the Switch A we use “en” to enable privilege mode and “conf t” to enter configure
mode as the first step.
Then we changed the Switchport mode of the port into trunk, which connects the other
Switch. By changing the switchport mode into trunk on both ports in both switches let all
the VLANs to communicate through that port.

Figure 33: VLAN Switch1 configuration 1 (Source: Authors Own Figure)

Page 57 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Then we select and add the ports that connects PCs and other devices into VLANs. The
method and the commands are same as the Switch A.

Figure 34: VLAN Switch1 configuration 2 (Source: Authors Own Figure)

(3.2 & 3.3) Connection tests after configuring VLANs


After configuring VLANs, it is necessary to check the connections to verify that the
configuration has done properly. For doing that we simply use ping test, extended ping test,
trace route etc. Before conducting those verification tests, we first create a form of expected
results so we can evaluate that the connections are working as we except.

Ping tests
Test Case Ping Tests from Admin department to other departments
Description Testing all the departments whether they are pinging or not
Department IP
Admin [Link]
Sales [Link]
Accounting [Link]
Reception [Link]

Page 58 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Management [Link]
Production [Link] Tested by W.G.L.A. Maduranga

Web [Link] Tested Date 22nd February 2019

Expected and actual results

Test Data Expected Result Actual result Status


Ping - [Link] Ping successfully Ping successfully PASS
Ping - [Link] Ping successfully Ping successfully PASS
Ping - [Link] Ping successfully Ping successfully PASS
Ping - [Link] Ping successfully Ping successfully PASS
Ping - [Link] Ping successfully Ping successfully PASS
Ping - [Link] Ping successfully Ping successfully PASS
Ping - [Link] Ping successfully Ping successfully PASS

Page 59 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Figure 35: Pinging Test from one VLAN to others 1 (Source: Authors own figure)

Page 60 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Figure 36: Pinging Test from one VLAN to others 2 (Source: Authors own figure)

Trace route tests


Test Case Trace route test from production department to other departments

Page 61 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Description To test that the data is travelling through the configured route
Department IP
Admin [Link]
Sales [Link]
Accounting [Link]
Reception [Link]
Management [Link]
Production [Link] Tested by W.G.L.A. Maduranga

Web [Link] Tested Date 22nd February 2019

Expected and actual results

Test Data Expected Result Actual result Status


Tracert - [Link] Tracert successfully Tracert successfully PASS
Tracert - [Link] Tracert successfully Tracert successfully PASS
Tracert - [Link] Tracert successfully Tracert successfully PASS
Tracert - [Link] Tracert successfully Tracert successfully PASS
Tracert - [Link] Tracert successfully Tracert successfully PASS
Tracert - [Link] Tracert successfully Tracert successfully PASS
Tracert - [Link] Tracert successfully Tracert successfully PASS

Page 62 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01
Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])
lOMoARcPSD|43957031

Figure 37: trace route from one VLAN to others 1 (Source: Authors own figure)

3.4) Future recommendations

Page 63 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Network Security
Network security is the most challenging section in the ICT field. In a network, the access to
the network must manage well. Today we are using firewalls for that but with the
improvements of the field a normal firewall will not be enough to do that. If the company
needs more security for their network. A Next Generation Firewall can recommend for that.

Next Generation Firewall (NGFW)


As it says, literally this is the next generation of the firewalls. The NGFW is a part of the
third Generation of firewall technology. The NGFW can be a hardware device or else a
Software. Whatever it is… these firewalls are not just firewalls they have the filtering
functionalities of many other network devices such as Deep Packet inspection, integrated
intrusion prevention systems (IPS) etc… It also increase the regular firewall capabilities like
Network Address Translation (NAT), Port Address Translation (PAT) and VPN.

Network Traffic
When the company is growing up, the management or admin may need to add more devices
to the company network. Even though the above implemented network can handle much
more network traffic than the present situation. It may cause some delays in the network.
Therefore, the network cables can replaced with higher bandwidth cables such as CAT 6
Ethernet cables for PCs and fiber optics for other main connections such as Crossover cable
which connects the switches and the cable which connects router to the switch A etc…

NOTE: If the company needs to replace the cables with fiber optics, some other network
devices may need to upgrade.

Page 64 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Feedback analysis
After implementing and configuring the whole network a feedback, form had given to 34
employees in the company who uses the network. We were able to collect 30 properly filled
forms from the employees.
Analysis of the properly filled feedback forms are in the table below.
1 – Very bad
2 – Bad
3 – Moderate
3 – Good
5 – Very Good
[Link] Question 1 2 3 4 5
1 Speed of the network - 3 5 15 7
2 Protection of the firewall 1 2 6 12 9
3 Data sharing through the network - 4 9 11 6
4 What do you think of the network - - 7 13 10
hardware?
5 Security level of the network - 4 5 16 5
6 Design of the network 2 1 8 11 8
7 Internet access in the network 3 5 6 9 8
8 Software used in the network - 2 5 8 15
9 Maintenance of the network 1 1 6 13 9
10 Your personal valuation about the network 2 2 7 7 12

Table 2: Feedback analysis (source: Authors own work)

Following graph is for illustrating the above valuations which we received from the network
users in the company. Considering the results of feedback forms majority of the network
users are satisfied with the implemented network and network related things.

Page 65 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Chart Title
18

16

14

12

10

0
[Link] 1 [Link] 2 [Link] 3 [Link] 4 [Link] 5 [Link] 6 [Link] 7 [Link] 8 [Link] 9 [Link] 10

Very Bad Bad Moderate Good Very Good

Figure 38: Feedback analysis Chart (Source: Authors own figure)

References
[Link]. (n.d.). Networking Protocols. [Online] Available at:
[Link]
[Accessed 17 Feb. 2019].
[Link]. (2018). What is a Network? [Online] Available at:
[Link] [Accessed 13 Feb. 2019].
[Link]. (n.d.). Introduction To Computer Networks | Studytonight. [Online]
Available at: [Link]
networks [Accessed 13 Feb. 2019].
Lombardo, C. (n.d.). 14 Main Advantages and Disadvantages of Computer Networking |
Green Garage. [Online] [Link]. Available at: [Link]
main-advantages-and-disadvantages-of-computer-networking [Accessed 13 Feb. 2019].
Upreti, G. (n.d.). Computer Network Models | Computer Networks Tutorial | Minigranth.
[Online] [Link]. Available at: [Link]
tutorial/computer-network-models/ [Accessed 13 Feb. 2019].
Mitchell, B. (2018). The OSI Model Explained in Easy Steps. [Online] Lifewire. Available
at: [Link] [Accessed 14 Feb.
2019].
Page 66 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Chauhan, A. and Jain, P. (n.d.). Computer Network | TCP/IP Model - GeeksforGeeks.


[Online] GeeksforGeeks. Available at: [Link]
tcpip-model/ [Accessed 15 Feb. 2019].
[Link]. (n.d.). Chapter 2: Protocol. [Online] Available at:
[Link] [Accessed 15 Feb. 2019].
Thakur, D. (n.d.). What is protocol? and its types - Definition. [Online]
[Link]. Available at:
[Link]
[Accessed 15 Feb. 2019].
NS1. (n.d.). DNS Protocol Explained. [Online] Available at: [Link]
protocol [Accessed 15 Feb. 2019].
Melnick, J. (2019). Network Devices Explained. [Online] [Link]. Available at:
[Link] [Accessed 15 Feb. 2019].
Mitchell, B. (2018). A Beginner's Guide to Network Cables. [Online] Lifewire. Available
at: [Link] [Accessed 15 Feb.
2019].
Official, F. (2014). Types of Network Cables and Network Cable Connectors | FS
(Fiberstore). [Online] FS (Fiberstore). Available at: [Link]
[Link] [Accessed 15 Feb. 2019]. FS
Official (2014). coaxial cable construction.. [Image] Available at:
[Link]
[Accessed 15 Feb. 2019].
[Link] (2016). Cat6a-shielded-vs.-unshielded. [image] Available at:
[Link]
[Link] [Accessed 15 Feb. 2019].
[Link] (n.d.). fiber optic cable. [Image] Available at: [Link]
[Link]/fiber-optic-cable-4 [Accessed 15
Feb. 2019].
Cockerham, R. (2015). what-is-networking-software. [Online] techwalla. Available at:
[Link] [Accessed 16 Feb. 2019].
[Link]. (n.d.). What is a network operating system (NOS)?. [Online] Available at:
[Link] [Accessed 16 Feb. 2019].
Margaret Rouse (2017). A timeline of Windows Server OS versions. [Image] Available at:
[Link]
operating-system [Accessed 16 Feb. 2019].
Beal, V. (n.d.). What is Linux server? Webopedia Definition. [Online] [Link].
Available at: [Link] [Accessed 16 Feb.
2019].
Rouse, M. (2018). What is network management system? - Definition from [Link].
[Online] SearchNetworking. Available at:
[Link] [Accessed
16 Feb. 2019].
COOPER, S. (2018). WhatsUp Gold Tool Review. [Online] Comparitech. Available at:
[Link] [Accessed 16 Feb.
2019].
[Link] (n.d.). WhatsUp Gold. [Image] Available at: [Link]
management-software/a/whatsup-gold/ [Accessed 16 Feb. 2019].

Page 67 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])


lOMoARcPSD|43957031

Rouse, M. (2018). What is Nagios? - Definition from [Link]. [Online]


SearchITOperations. Available at:
[Link] [Accessed 16 Feb. 2019].
Rouse, M. (2018). What is Microsoft SCOM (System Center Operations Manager)? -
Definition from [Link]. [Online] SearchWindowsServer. Available at:
[Link]
Operations-Manager-Microsoft-SCOM [Accessed 16 Feb. 2019].
Kevin Greene (2018). Monitoring network devices using SCOM. [Image] Available at:
[Link] [Accessed 16 Feb. 2019].
Mitchell, B. (2019). Exploring Computer Network Topologies Like Bus, Ring, and Star.
[Online] Lifewire. Available at: [Link]
817884 [Accessed 16 Feb. 2019].
Shepherd, A. (2018). What is network topology?. [Online] IT PRO. Available at:
[Link] [Accessed 16
Feb. 2019].
Emperor Boost (2019). bus topology. [Image] Available at:
[Link] [Accessed 17 Feb.
2019].
Logical ring topology. (2019). [Image] Available at:
[Link] [Accessed 17 Feb. 2019].
Davie, B. and Peterson, L. (2012). A switch provides a star topology. [Image] Available at:
[Link] [Accessed 17 Feb. 2019].
Network-Design-Engineer. (2011). [Image] Available at:
[Link] [Accessed 20
Feb. 2019].
Alkuun, S. (n.d.). COMPUTER NETWORKS AND DATA COMMUNICATION. [Online]
[Link]. Available at: [Link]
[Accessed 17 Feb. 2019].
Fisher, T. (2019). Definition of Bandwidth and How to Tell How Much You Have. [Online]
Lifewire. Available at: [Link] [Accessed 17
Feb. 2019].
Bourgeois, S. (2016). 11 Types of Networks Explained: VPN, LAN & More. [Online]
[Link]. Available at: [Link]
networks-explained-vpn-lan-more [Accessed 17 Feb. 2019].
[Link]. (n.d.). Types of servers | [Link]. [Online] Available at:
[Link] [Accessed 18 Feb. 2019].
[Link]. (n.d.). Types of Network Server. [Online] Available at:
[Link] [Accessed 18 Feb. 2019].
Athow, D. (2019). Best small business servers of 2019. [Online] TechRadar. Available at:
[Link] [Accessed 18 Feb. 2019].
Greene, T. and Butler, B. (2019). What is a firewall? How they work and how they fit into
enterprise security. [Online] Network World. Available at:
[Link]
[Link] [Accessed 18 Feb. 2019].

Page 68 of 68
W.G.L.A. Maduranga Unit 02
COL/A-062270 Assignment 01

Downloaded by MUHAMMADABDULLAH RANA (muhammadabdullahrana912@[Link])

You might also like