BTEC Networking Assessment Guide
BTEC Networking Assessment Guide
Student Name/ID
Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & DistinctionP1 P2 M1 D1
Descripts
Resubmission Feedback:
00148603
Mohamed Indas3Mohamed Thasm
Grade: Assessor Signature: Date:
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades
decisions have been agreed at the assessment board.
Assignment Feedback
Action Plan
Summative feedback
00148603
Mohamed Indas4Mohamed Thasm
Feedback: Student to Assessor
Assessor Date
signature
Student Date
signature
00148603
Mohamed Indas5Mohamed Thasm
Contents
LO1: Examine networking principles and their protocol................................................................2
1.1 Discuss the benefits and constraints of different network types and standards...............2
00148603
Mohamed Indas6Mohamed Thasm
2.1..................................................N e t w o r k
23
2.1.1What is HUB..................................................................................................................23
2.1.2 Router...........................................................................................................................27
1.2.3 Switch...........................................................................................................................29
2.1.8 Server............................................................................................................................36
2.2.2 Compatibility.........................................................................................................46
3.1 VLAN..................................................................................................................................48
3.2 IP Subnetting........................................................................................................................48
3.3 Wireshark.............................................................................................................................49
3.4 FileZilla................................................................................................................................51
3.5 PuTTY.................................................................................................................................51
ACTIVITY 04................................................................................................................................52
00148603
Mohamed Indas7Mohamed Thasm
Figure I Network Type..........................................................................4
Figure II LAN..................................................................................................................................4
Figure III MAN................................................................................................................................6
Figure IV WAN................................................................................................................................7
Figure V WAN.................................................................................................................................7
Figure VI VLAN............................................................................................................................12
Figure VII The TCP/IP model compared with the OSI mode.......................................................17
Figure VIII IP 4..............................................................................................................................22
Figure IX IPV 6.............................................................................................................................23
Figure X HUb................................................................................................................................25
Figure XI Router............................................................................................................................29
Figure XII Switch..........................................................................................................................31
Figure XIII Advantage and disadvantage of Router, hub and switch............................................33
Figure XIV Different between Hub, switch and router.................................................................34
Figure XV Firewall........................................................................................................................35
Figure XVI Proxy Server...............................................................................................................37
Figure XVII Server........................................................................................................................40
Figure XVIII PowerEdge R240 Rack Mount server.....................................................................41
Figure XIXPower Edge R7515 Rack Server.................................................................................42
Figure XX Fusion Server Pro 1288H V5 Rack Server..................................................................43
Figure XXI Colombo branch designing a Visio............................................................................55
Figure XXII Mathura branch.........................................................................................................63
Figure XXIII Networking..............................................................................................................64
00148603
Mohamed Indas8Mohamed Thasm
Table 1Topology Advantage and Disadvantage..................................11
Table 2 TCP/IP Layer Function.....................................................................................................17
Table 3 OSI/TCP/IP Model............................................................................................................18
Table 4 Advantages and disadvantages of FTP.............................................................................20
Table 5Advantages and disadvantages of SMTP...........................................................................21
Table 6 HTTP.................................................................................................................................21
Table 7 Different TCP and UDP....................................................................................................22
Table 8 different between IPv4 And IPv6......................................................................................25
Table 9 Admin department.............................................................................................................58
Table 10 Accounting & finance department..................................................................................60
Table 11 IT department..................................................................................................................61
Table 12 HR Department...............................................................................................................62
Table 13 Customer care.................................................................................................................63
00148603
Mohamed Indas9Mohamed Thasm
LO1: Examine networking principles and
their protocol
1.1 Discuss the benefits and constraints of different network types and standards.
There is different network system type to consider when designing a network for the Matara
Branch,
00148603 1
Mohamed Indas Mohamed Thasm
0
Figure II LAN
Source: Javatpoint.com, 2022,
00148603
Mohamed Indas11Mohamed Thasm
1.1.3 MAN (Metropolitan area network)
A network that links LANs in a city or metropolitan area is known as a MAN. Although wireless
MANs are also available, wired MANs are more common.
00148603 1
Mohamed Indas Mohamed Thasm
2
1.1.4 WAN (Wide area network)
Figure IV WAN
Figure V WAN
(Blogspot.com, 2023)
00148603 1
Mohamed Indas Mohamed Thasm
3
standards, equipment suppliers can only connect
network hardware to certain computers. It would be much more difficult to
connect to systems not using the same set of networking equipment. Standardizing protocols help
ensure that multiple types of devices can connect to multiple network types.
Network topology or network layout is the logical paths where data travels in a computer
network.
Physical Topology.
Logical Topology
Bus Topology - This is one of the most basic networking configurations, where every device
connected uses a single communication cable or line. The other connected devices are
00148603 1
Mohamed Indas Mohamed Thasm
4
unaffected if one connected device fails, but all
other connected nodes may stop working if the shared communication line
(backbone) fails.
Mesh Topology - In this case, a host is linked to one or more hosts. There are two types of mesh
topology: full mesh, in which every host in the network is connected point-to-point, and partial
mesh, in which some hosts are not connected point-to-point to every other host.
**Star Topology - The central hub functions as a single point of failure similar to the Bus
Topology's shared communication line. The only means of communication between hosts is the
hub.
Ring Topology - Each device connected to this network have two neighbors to communicate. All
data travels in a ring, and a failure of that ring will bring the whole network down.
Hybrid Topology - A hybrid topology combines two or more topologies. A prime example of a
hybrid topology is Tree Topology, which combines Bus and Star.
00148603 1
Mohamed Indas Mohamed Thasm
5
1.3.2 Advantages & Disadvantages of
Physical Network Topologies.
A computer network's logical paths by which data is transmitted are referred to as its logical
topology.
Ethernet
The widely used LAN technology known as Ethernet was codified in IEEE 802.3 in
1980. Data collisions are common in networks like Ethernet that share media files.
00148603 1
Mohamed Indas Mohamed Thasm
6
Ethernet use Carrier Sense Multi
Access/Collision Detection (CSMA/CD) technology to detect
collisions
A network interface card with a 48-bit MAC address is an Ethernet connector.
Traditional Ethernet adheres to the 10BASE-T standard. It uses coaxial cable or CAT-5
Twisted pair cable with an RJ45 connector to transmit data at up to 10 Mbps.
Ethernet follows Star Topology with segment length up to 100 meters. All devices are
connected to a Hub/Switch in a Star fashion.
There are some versions of Ethernet based on the transfer speed.
1. Standard Ethernet –10 Mbps (IEEE 802.3)
2. Fast Ethernet –100 Mbps (IEEE 803.2)
3. Giga-Ethernet –1000 Mbps (IEEE 802.3ab & 802.3ah)
LAN - To ensure Gigabit Ethernet (1 Gbps) connections and high-speed communication for
desktops, servers, and printers, implement a wired Ethernet LAN using IEEE 802.3 (Ethernet).
WLAN - For employee and visitor access, set up a wireless network using IEEE 802.11ax (Wi-Fi
6). To address potential security issues, implement strong security measures like WPA3.
TOPOLOGY - Employ a star topology for the LAN, with a central Ethernet switch as the hub.
This setup simplifies management and troubleshooting.
Network Protocol Suit - Use the TCP/IP protocol suite for seamless integration with the internet
and compatibility with various devices.
00148603 1
Mohamed Indas Mohamed Thasm
7
Figure VI VLAN
There is no topology that one can choose as the ideal one. The needs and scale of the network
will thus decide on the best structure for your company. I chose the Start Topology for each
department because the Matara branch has several departments.
Centralized control of network - The control entity for all nodes is a central switch or hub. If
the Switch/Hub is a bottleneck, we can increase its capacity.
Easy Manageability and scalability - Because of the network's centralized management, the
Star Fashion network is simple to manage and scalable. It is very simple to add new computers
or network nodes to the network in the future without affecting network performance.
Easy To maintain - Each host or node in this network is connected by a unique cable, making
configuration easy. If one node fails, it does not affect the entire network. In addition, the star
00148603 1
Mohamed Indas Mohamed Thasm
8
topology has significantly lower downtime
when compared to other topologies because it is straightforward and
troubleshoot.
High performance level - This network performs better than others when compared because
data packets are sent directly to the target node, preventing unnecessary network traffic.
But we need to connect all the department with each other. BUS Topology is ideal for it.
And I use the ring topology for server room because these advantages it has.
A set of guidelines that control how devices communicate over a network is known as a network
protocol suite. The most popular sets of network protocols are,
00148603 1
Mohamed Indas Mohamed Thasm
9
network architecture that is interoperable, robust
and flexible.
1. Reduce complexity
2. Standardizes interface
3. Facilitates modular engineering
4. Ensure interpretable technology
5. Accelerates evolution
6. Simplifies teaching and learning.
The OSI model is a seven-layer architecture. It defines seven layers or levels in a complete
communication system.
1. Physical Layer
2. Datalink Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
00148603 2
Mohamed Indas Mohamed Thasm
0
01.Physical layer
The first and lowest layer in the Open Systems Interconnection (OSI) communications model is
the physical layer. Data is transported using electrical, mechanical, or procedural interfaces by
the physical layer.
02.Datalink Layer
The second layer of the seven-layer OSI model of computer networking is known as the data link
layer or layer 2. This layer serves as the protocol layer that crosses the physical layer to transfer
data between nodes on a network segment.
03.Network Layer
The third layer in the OSI model of computer networks is the network Layer. Transferring
network packets from the source to the destination is its main job. Both the source host and the
destination host are involved.
04.Transport Layer
The transport layer is what? The fourth layer of the Open Systems Interconnection (OSI)
communications model is the transport layer. It is in charge of making sure that data packets are
delivered between sender and receiver accurately and dependably. TCP or User Datagram
Protocol (UDP) are typically used for the transport layer.
05.Session Layer
The session layer is layer 5 in the seven-layer OSI model of computer networking. The
mechanism for initiating, terminating, and managing a session between end-user application
processes is provided by the session layer.
06.Presentation Layer
The presentation layer, which is layer 6 in the seven-layer OSI model of computer networking,
acts as a network's data translator. It is referred to as the syntax layer at times.
07.Application Layer
00148603 2
Mohamed Indas Mohamed Thasm
1
The shared protocols and interface techniques
used by hosts in a communication network are specified by the application
layer, which is actually an abstraction layer. Application Layer aids in synchronizing
communication and identifying communication partners. Users can communicate with other
software programs through this layer.
The TCP/IP Model allows us to determine how a particular computer should be connected to the
internet and how data should be transmitted between them.
Application Represents data to the user and DNS, Telnet, SMTP, POP3,
controls dialogues IMAP, DHCP, HTTP, FTP
00148603 2
Mohamed Indas Mohamed Thasm
2
00148603 2
Mohamed Indas Mohamed Thasm
3
1.5.2 Comparison between OSI Model and
TCP/IP Model
Figure VII The TCP/IP model compared with the OSI mode
OSI stands for Open System Interconnection TP/IP stands for Transmission Control
because it allows any two different systems to Protocol/Internet Protocol. It is named after these
communicate regardless of their architecture. protocols, being part of this model.
OSI model has seven layers. TCP/IP has four layers
This model provides clear distinction between It does not clearly distinguish between services,
services, interfaces and protocols interfaces & protocols.
00148603 2
Mohamed Indas Mohamed Thasm
4
00148603 2
Mohamed Indas Mohamed Thasm
5
1.4.3 TCP/IP Model for Protocols
The TCP/IP protocol is the most suitable choice for the SYNTAX SOLUTION because it is an
open protocol standard, completely free to use, and can be implemented with no relying on
hardware or an operating system that is specific to the device. TCP/IP is ideal to connect because
it is so widely supported.
TCP/IP can be accessed via Ethernet, a DSL link, a dial-up line, an optical network, and
essentially any other physical transmission medium, according to Hasintha NayanajithHND
COM Networking31| standardized high-level protocols for trustworthy, easily accessible user
services. Because of this, I advise using the TCP/IP protocol with the Syntax Solution. Branch in
Matara
All the networks must have a set of rules governing how to communicate and transfer resources
with each other and, this set of rules are simply called Network Protocols.
FTP is used to copy files from one host to another. It created two processes called control process
and data transfer process at both ends. Also, it establishes two connections. One is for data
transfer and another one is for control information. FTP uses port 21 for control connection and
port 20 for the data connection
Advantage Disadvantage
00148603 2
Mohamed Indas Mohamed Thasm
6
Lack of Encryption (in standard FTP)
Widespread Compatibility
easy to use Firewall and NAT issues
00148603 2
Mohamed Indas Mohamed Thasm
7
SMTP – Simple Mail Transfer Protocol
This is the accepted protocol for sending email over the internet in an effective and dependable
manner. Additionally, SMTP is a control-oriented, text-based protocol that also sends
notifications of incoming mail.
Advantage Disadvantage
Widespread Adoption Lack of Security (in standard SMTP)
Delivery Delay
Protocol It is a protocol to use that specifies how the web server and browser will communicate
with one another. HTTP employs TCP port 80 for showing information in websites.
Table 6 HTTP
Advantage Disadvantage
Widespread Compatibility Lack of Encryption (in standard FTP)
00148603 2
Mohamed Indas Mohamed Thasm
8
02.Transport Layer Protocols
IP Internet protocol
Internet Protocol (IP) is a fundamental communication protocol that facilitates the transmission
of data across networks. It's a key component of the Internet and other interconnected networks.
IP is an addressing protocol designed to route information packets from the source to the
00148603 2
Mohamed Indas Mohamed Thasm
9
destination across a network. There are two
main versions of IP currently in use:
1. Address Format: IPv4 addresses (such as 192.168.1.1) are 32-bit numerical labels written in
dotted-decimal notation.
3. Problems: IPv4's constrained address space caused the pool of addresses to run out,
necessitating the development of IPv6.
Figure VIII IP 4
00148603 3
Mohamed Indas Mohamed Thasm
0
2.IPv6 (Internet Protocol version 6):
1.Address Format: 128-bit hexadecimal labels are used for IPv6 addresses
(2001:0db8:85a3:0000:0000:8a2e:0370:7334, for example).
2. Address Space: Provides a far greater address space, enabling practically infinitely many
distinct addresses.
3.Transition: In order to solve the issue of address exhaustion, IPv6 is intended to gradually
replace IPv4.
Figure IX IPV 6
00148603 3
Mohamed Indas Mohamed Thasm
1
Difference between IPv4 and IPv6
Table 8 different between IPv4 And IPv6
IPv4 IPv6
32 Bits IP Address 128 Bits IP Address
Binary Bits are separate by a Dot (.) Binary bits are separate by a colon (:)
Provide 12 fields in the header Provide 8 fields in the header
Numeric Addressing Numeral-based addressing
00148603 3
Mohamed Indas Mohamed Thasm
2
ACTIVITY 02
Below is a list of network devices that can play a role in enabling your organization to transfer
information as securely as possible: Bridges, hubs, NICs, modems (used for analog phone lines)
and repeaters are the earliest types of network devices; they were ubiquitous
Figure X HUb
2.1.1What is HUB
00148603 3
Mohamed Indas Mohamed Thasm
3
A hub is a fundamental networking device used
in local area networks (LANs) to connect multiple devices. A hub's main
function is to expand the physical network by enabling communication between numerous
devices.
00148603 3
Mohamed Indas Mohamed Thasm
4
Bandwidth of Ethernet Hubs.
The speeds that Ethernet hubs support differ. The rated speeds of the original Ethernet hubs were
limited to 10 Mbps. Modern hubs typically have both 10 Mbps and 100 Mbps speeds and can
support up to 100 Mbps.
Active Hub
Passive Hub
Intelligent Hub
Active Hub
A multiport repeater, sometimes referred to as an active hub, is a hub that regenerates the signal
before sending it to every port that is connected. In big networks, this aids in overcoming signal
degradation.
Passive Hub
A passive hub simply serves as a point where connections can be joined together but does not
amplify or regenerate the signal. Signal quality can degrade with each connection in a passive
hub.
Intelligent Hub
An intelligent hub has additional features compared to a basic hub. It may have diagnostic
capabilities, monitoring functions, and possibly some rudimentary filtering capabilities.
However, it is still less sophisticated than a modern switch.
It's crucial to remember that although "hub" and "switch" are sometimes used synonymously in
discussions about networking today, these two devices have different purposes. A switch makes
decisions based on MAC addresses, directing traffic only to the designated device, whereas a hub
broadcasts data to all connected devices.
00148603 3
Mohamed Indas Mohamed Thasm
5
Switches are the recommended option for modern networking configurations because of their
effectiveness, capacity allocated to each port, and capacity to minimize collision domains. You
may run into references to these kinds of hubs if you are maintaining a legacy system or working
with older equipment. However, switches are the default option for modern network design.
00148603 3
Mohamed Indas Mohamed Thasm
6
2.1.2 Router
Figure XI Router
What is Router
A router is a network device that connects different networks together. It operates at the network
layer (Layer 3) of the OSI (Open Systems Interconnection) model and is responsible for
forwarding data packets between networks. Routers play a crucial role in directing data traffic
efficiently across interconnected networks, including local area networks (LANs) and wide area
networks (WANs).
Devices used as Layer 3 Network Gateways are routers. They function as dedicated computers
with I/O interfaces, digital memory, and a processor. An embedded operating system known as
00148603 3
Mohamed Indas Mohamed Thasm
7
Router Firmware, or Cisco International
Operating System, is kept in the router's memory. The router firmware is
capable of running specific applications on them and requires significantly less storage space.
00148603 3
Mohamed Indas Mohamed Thasm
8
1.2.3 Switch
What is Switch
Operating at Layer 2 (data link layer) of the OSI (Open Systems Interconnection) model, a
switch is a type of network device. Its main purpose is to link devices that are connected to the
same local area network (LAN) and to make decisions by using the device's hardware address
(MAC). Switches are more sophisticated than traditional hubs and are frequently used in
contemporary Ethernet networks.
To keep up with the constantly changing needs of contemporary networks, network switch
technology has advanced significantly. These switches, which are the backbone of local area
networks, use a variety of switching techniques, such as cut-through and store-and-forward,
along with shared memory, shared bus, and crossbar switching architectures, to improve
scalability and performance. Unmanaged switches offer ease of use for plug-and-play setups,
00148603 3
Mohamed Indas Mohamed Thasm
9
while managed switches offer advanced features
like network monitoring, VLAN support, and Quality of Service. Switches
with power over Ethernet capabilities can power devices connected to them, and network
segmentation for enhanced security is made possible by VLAN support. Network switches add to
effective packet forwarding by combining Layer 2 and Layer 3 functionality; in addition,
features like spanning tree protocols and link aggregation provide redundancy and prevent loops.
Since
00148603 4
Mohamed Indas Mohamed Thasm
0
2.1.4 Advantage and Disadvantages of Hubs,
Router and switch.
Connect device a within the same Connect devices to network Connect two different networks
network
00148603 4
Mohamed Indas Mohamed Thasm
1
Store MAC Address Store MAC Address
00148603 4
Mohamed Indas Mohamed Thasm
2
2.1.6 Usage of Network Desing SYNTAX
SOLUTION
Switches and routers have been chosen by me, the network consultant at SYNTAX SOLUTION,
to be used in the Matara branch's network design. When necessary, routers are used as gateways
to establish a connection between two department LANs. Each department uses switches to
create a local area network. Furthermore, Switches are precisely aware of a data frame's intended
destination. Therefore, unlike a hub, a 10/100 Mbps switch can dedicate its entire bandwidth to
each of its ports.
01.Firewall
Figure XV Firewall
00148603 4
Mohamed Indas Mohamed Thasm
3
Simplilearn.com, 2023,
A trusted internal network and an untrusted external network, like the Internet, are separated by
firewalls. They use preset security rules to monitor and manage all incoming and outgoing
network traffic. Firewalls defend against a variety of cyberthreats and aid in preventing
unauthorized access.
00148603 4
Mohamed Indas Mohamed Thasm
4
There are two types of firewall policies widely
used.
Allow Policies:
The "Allow" policy's default setting allows all network traffic, barring any that contravenes a
particular security rule.
Operation: The firewall permits communication if the traffic satisfies any of the set rules that
specifically permit it. Permitting the traffic is the default action in the absence of a matching rule.
Benefits: This strategy frequently allows for more latitude in network communication. Usually,
it's simpler to implement at first, particularly in settings where network traffic must be explicitly
permitted.
Deny Policies
Description: Unless specifically permitted by a security rule, all network traffic in a "Deny"
policy is blocked by default.
Operation: The firewall prevents communication if the traffic matches any of the set rules that
expressly forbid it. Denying traffic is the default action in the absence of a matching rule.
Benefits: By default, this method is more restrictive and offers a higher level of security. It
abides by the least privilege principle, permitting only those communications that are absolutely
necessary and preventing all others.
00148603 4
Mohamed Indas Mohamed Thasm
5
02.Proxy Server
Between client devices, such as PCs or smartphones, and other servers, like web servers or other
online resources, a proxy server serves as a middleman. A client sends a request to a proxy
server, which acts as a middleman between the client and the destination server, forwards the
request, gets the response from the destination server, and sends it back to the client. Since it
only speaks with the proxy, the client is ignorant to the direct connection to the destination
server.
An Intrusion Prevention System (IPS) is a real-time security solution that monitors network or
system activities to detect and prevent malicious behavior. It uses signature-based and anomaly-
based detection methods, conducts deep packet inspection, and responds to threats by blocking
or mitigating them. IPS aims to proactively safeguard networks and systems from various cyber
threats, providing a crucial layer of defense in cybersecurity strategies.
00148603 4
Mohamed Indas Mohamed Thasm
6
2.1.8 Server
There are various types of servers, each designed to fulfill specific roles and provide particular
services within a networked environment. Here are some common types of servers:
Web Server: unction: Hosts and serves website content in response to client requests via the
Hypertext Transfer Protocol (HTTP) or its secure variant, HTTPS.
Application Server: Function: Hosts and runs business applications, providing a runtime
environment for application code to execute and deliver services to clients.
Mail server: Function: Manages and transfers emails over a network. It handles the sending,
receiving, and storage of email messages.
FTP Server: Function: Facilitates the transfer of files between computers on a network. Users
can upload and download files using the FTP protocol.
There are several physical varieties of servers, and each is made to fulfill particular needs in
terms of scalability, storage, and performance. The following are a few typical server physical
types:
Tower Sever
00148603 4
Mohamed Indas Mohamed Thasm
7
Rack Mount server
Blade Sever
00148603 4
Mohamed Indas Mohamed Thasm
8
Different Servers Available in Market
The Dell PowerEdge R830 is a 2U rack server with four sockets. It's designed for dense
virtualization deployments and scalable database applications. Here are some of its
specifications:
00148603 4
Mohamed Indas Mohamed Thasm
9
02.PowerEdge R240 Rack Server
Increase performance, ability to scale, and simplify your IT with an entry-level 1U rack server
designed for web hosting and multi-purpose applications
Here are some specifications for the Dell EMC PowerEdge R240:
00148603 5
Mohamed Indas Mohamed Thasm
0
03.PowerEdge R7515 Rack Server
The Dell EMC PowerEdge R7515 is a single-socket 2U server designed to handle workloads like
software-defined storage, virtualization and data analytics.
The Dell EMC PowerEdge R7515 is a single-socket 2U rack server. It's designed to handle
workloads such as:
Software-defined storage
Virtualization
Data analytics
00148603 5
Mohamed Indas Mohamed Thasm
1
04.Fusion Server Pro 1288H V5 Rack Server
This 1U, 2 socket rack server is the Huawei Fusion Server Pro 1288H V5. Processing workloads
produced by cloud computing virtualization, High Performance Computing (HPC), and Big Data
processing is best suited for high density deployment. It reduces overall costs by increasing data
center space utilization and providing superior performance and scalability.
Processor: 4110
Memory: 16GB
Hard drive: 1200GB 10K SAS
Raid card: SR150-M
Power supply: 550W
Here are some places to buy the Fusion Server Pro 1288H V5:
00148603 5
Mohamed Indas Mohamed Thasm
2
In order to choose a server that best suits your
organization's needs, performance standards, and growth goals, you must
take into account a number of important factors. The following are some crucial elements to take
into account when choosing servers
00148603 5
Mohamed Indas Mohamed Thasm
3
So, when choosing servers for Matara branch of
SYNTAX SOLUTION, I have to pay my attention for the following things.
MySQL
CPU: Intel Core or Xeon 3GHz, or Dual Core 2GHz, or equal AMD CPU
Cores: Single, but Dual/Quad Core is recommended
RAM: 4 GB, but 6 GB is recommended
Graphic Accelerators: nVidia or ATI with support of OpenGL 1.5 or higher
Display: 1024×768, 1920×1200 or higher
Windows: Microsoft .NET Framework 4.5.2, Microsoft Visual C++ 2015-2022
Redistributable, Microsoft Windows 11 or Windows Server 2022
Oracle
CPU: Intel Core or AMD Opteron at 2Ghz with Dual Core or faster
RAM: 1 GB minimum, 4 GB recommended
Disk space: 500 MB minimum, 10 GB recommended
Database server: Four or more 3.3 GHz Intel Xeon class or higher processor cores
RAM: 8 GB or more
Tablespace: 100 MB minimum
00148603 5
Mohamed Indas Mohamed Thasm
4
00148603 5
Mohamed Indas Mohamed Thasm
5
2.2 Networking Software
Network managers can deploy, maintain, and track networks with the aid of networking
software. It reveals the inner workings of network administrators, whereas software allows users
to carry out particular tasks. Network software is "Invisible" to end users; its sole purpose is to
seamlessly enable those users' access to network resources.
User Management- User management is a system that controls how people access devices,
software, and services. It involves managing permissions for access and actions, as well as
monitoring usage.
File Management-File management is the process of organizing, storing, and retrieving files. It
can also refer to the process of managing a system that handles digital data.
Server OS
For server to function, server operating system is required. In order to implement DHCP, Mail
Server, and Web Server within the company, we require servers for the SYNTAX SOLUTION
Matara branch network. There are numerous server operating systems available, but for the
Matara Branch of SYSTAX SOLUTION, I have chosen to utilize Microsoft Server 2019.
Active directory
Microsoft uses this technology to manage PCs and other devices connected to a network. It is
one of Windows Server OS's main features. Building and managing domains, users, and objects
within a network is made easier for network administrators by Active Directory. An administrator
could create a group of users and grant them access to particular server folders, for instance. As a
network grows, Active Directory offers a mechanism to arrange a lot of users into logical groups
00148603 5
Mohamed Indas Mohamed Thasm
6
and subgroups while also offering access control
at every level.
2.2.2 Compatibility
The capacity of two systems to function together without requiring changes is known as
compatibility. Software programs that are compatible employ the same data formats. The
interoperability of any two products—hardware and software, same- or different-type products,
or different versions of the same product—is referred to as compatibility. The following should
work together in networking.
Hardware- The term "hardware" in the context of computing refers to the physical
components of a computer system or electronic device. It encompasses all the tangible,
touchable parts that make up a computer or a related system.
Operating System- An operating system (OS) is a crucial software component that
manages computer hardware and provides services for computer programs
Software- software refers to a set of instructions, data, or programs that enable a
computer or electronic device to perform specific tasks
Without these compatibilities, lots of errors can be come. Few of them are,
If you install the server OS without meeting the minimum requirements, the server may crash.
Additionally, if you install some servers without the necessary prerequisites, they won't function
or crash.
Your clients' and servers' different operating systems prevent them from performing some tasks
correctly. Since your switches, routers, and other primary networking equipment are different
models, configuring that
00148603 5
Mohamed Indas Mohamed Thasm
7
Therefore, I have to select compatible devices
as our requirements
00148603 5
Mohamed Indas Mohamed Thasm
8
Chapter 03
3.1 VLAN
It is the networking equivalent of virtualizing PCs. Multiple broadcast domains (LAN segments)
can be connected to a single switch via network virtualization with VLANs on switches. We can
divide a switch into multiple switches by using VLANs. Only on specific hardware that has
virtualization enabled are we using software for this purpose. I set up seven VLANs for the seven
branches of SYNTAX SOLUTION's Matara branch.
3.2 IP Subnetting
In my capacity as the Matara branch's network system designer and advisor, I selected the IP
address 198.168.10.0/24 and divided it into subnets for each department. Depending on how
many users are in each department, I assign an IP address to each one. I set up the VLAN
because it allows me to divide a large number of broadcast domains into several logical subnets.
A group of users who require high security can be added to the VLAN so that external users
outside the VLAN are unable to communicate with them. We can think of VLAN as independent
from users' physical or geographic locations when it comes to the logical classification of users
based on their functions.
00148603 5
Mohamed Indas Mohamed Thasm
9
Departm User VLAN Subnet Net ID Broadca IP Range
ent mask st ID
Admin 55 VLAN /26 192.168.1 192.168.1 192.168.10
Departme 10 0.0 0.63 .1-
nt 192.168.10
.62
Accountin 25 VLAN /27 192.168.1 192.168.1 192.168.10
g & 20 0.64 0.95 .65-
Finance 192.168.10
.94
IT 20 VLAN /27 192.168.1 192.168.1 192.168.10
Departme 30 0.96 0.127 .95-
nt 192.168.10
.126
HR 10 VLAN /28 192.168.1 192.168.1 192.168.10
40 0.128 0.143 .129-
192.168.10
.142
Customer 10 VLAN /28 192.168.1 192.168.1 192.168.10
Care 50 0.144 0.159 .145-
192.168.10
.158
00148603 6
Mohamed Indas Mohamed Thasm
0
I've gone over the various network devices I
used in the Matara branch's network design in the section above on
network devices. I will now talk about the networking software that I need in order to design the
network.
3.3 Wireshark
An open-source network protocol analyzer called Wireshark records and examines data on
computer networks in real time. Numerous protocols are supported, packet contents are decoded
for analysis, and features like live filtering, statistical tools, and export options are offered. For
network troubleshooting, security analysis, and protocol development, Wireshark is
indispensable.
00148603 6
Mohamed Indas Mohamed Thasm
1
3.4 FileZilla
Users can use this open-source tool to move files from a local computer to a remote computer.
Some of FileZilla's features are listed below.
3.5 PuTTY
PuTTY is a free, cross-platform terminal emulator and network file transfer tool widely used for
remote access to systems through protocols like SSH and Telnet. It supports secure connections,
session management, SSH key authentication, and file transfer via SCP and SFTP. PuTTY is
known for its simplicity, versatility, and compatibility with various operating systems, making it
a popular choice for network administrators and developers.
00148603 6
Mohamed Indas Mohamed Thasm
2
ACTIVITY 04
Step 1: First, satisfy the performance, capacity, and network port requirements of the company.
To ascertain their application and future improvement requirements, meet with colleagues from
every division of the film company Syntax Solutions.
In Step 2, design and build the cable arrangement: Because it gives Syntax Solutions a physical
communication path, cabling is a crucial part of network architecture.
Step 3: Examine the network's current functionality. Use network management software and
protocol analyzers to perform the analysis at different points during the workday, such as the
start of shifts and times when there is usually a surge in network traffic, like when complex
engineering data or a heavy workload is being transferred over the network.
Step 4: Gather data from current logical and physical network diagrams to support the
architecture as it stands at Syntax Solutions Company. Determine the network equipment,
switches, LAN uplink bandwidth, wireless access routers, and current standards. Since there are
more A and B buildings, get up-to-date information for the LAN's IP address design, including
virtual LAN details and connection requirements, for the logical design.
Step 5: Select a routing system for the network that facilitates quick convergence and ease of
management and create an IP address that meets expansion requirements.
Thus, using CISCO packet tracer, the author created a network that suited the needs of the
Matara branch of Syntax Solutions based on the network design mentioned above, the
00148603 6
Mohamed Indas Mohamed Thasm
3
procedures, and user feedback. The relevant
supporting documents are included below.
00148603 6
Mohamed Indas Mohamed Thasm
4
Admin
Department
IP Address: 192.168.10.0
Network
192.168.10.0
Address:
Usable Host IP
192.168.10.1- 192.168.10.2
Range:
Broadcast
192.168.10.3
Address:
Total Number of
4
Hosts:
Number of
Table 9 Admin department 2
Usable Hosts:
Binary Subnet
11111111.11111111.11111111.11111100
Mask:
IP Class: C
IP Type: Private
Short: 192.168.10.0/30
IPv4 Mapped
Accounting & Finance
Department
IP Address: 192.168.10.64
IP Class: C
IP Type: Private
00148603 6
Mohamed Indas Mohamed Thasm
6
0xc0a80a40
Hex ID:
in-addr.arpa: 64.10.168.192.in-addr.arpa
IT Department
IP Address: 192.168.10.96
Number of Usable
2
Hosts:
IP Class: C
00148603 6
Mohamed Indas Mohamed Thasm
7
/30
CIDR Notation:
IP Type: Private
in-addr.arpa: 96.10.168.192.in-addr.arpa
Table 11 IT department
HR Department
IP Address: 192.168.10.128
00148603 6
Mohamed Indas Mohamed Thasm
8
Subnet Mask: 255.255.255.252
IP Class: C
IP Type: Private
Short: 192.168.10.128/30
in-addr.arpa: 128.10.168.192.in-addr.arpa
Table 12 HR Department
Customer care
IP Address: 192.168.10.144
00148603 6
Mohamed Indas Mohamed Thasm
9
192.168.10.144
Network Address:
IP Class: C
IP Type: Private
in-addr.arpa: 144.10.168.192.in-addr.arpa
00148603 7
Mohamed Indas Mohamed Thasm
0
2002:c0a8.0a90 :: /48
6to4 Prefix:
00148603 7
Mohamed Indas Mohamed Thasm
1
1.4.2 Mathara Branch
00148603 7
Mohamed Indas Mohamed Thasm
2
Floor network system
00148603 7
Mohamed Indas Mohamed Thasm
3
References
Google.com,2023,www.google.com/url?sa=i&url=https%3A%2F%2Fwww.cloudns.net%2Fblog
%2Fwhat-is-ipv4-everything-you-need-to-know
%2F&psig=AOvVaw3WTab8FtrLSMgdeIzTjU2f&ust=1700313812040000&source=images&cd
=vfe&opi=89978449&ved=0CBIQjRxqFwoTCOC5wteQy4IDFQAAAAAdAAAAABAE.
Accessed 17 Nov. 2023.
00148603 7
Mohamed Indas Mohamed Thasm
4
00148603 7
Mohamed Indas Mohamed Thasm
5
Grading Rubric
P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Assess common networking principles and how protocols enable
the effectiveness of networked systems.
LO 1 & LO2
D1 Evaluate the topology protocol selected for a
given scenario and how it demonstrates the efficient
utilisation of a networking system.
P5
Design a networked system to meet a given
specification.
P6
M3
Analyse user feedback on your designs with the
aim of optimising your design and improving
efficiency.
D2
Critically reflect on the implemented network,
including the design and decisions made to
enhance the system.
LO4 : Implement and diagnose networked systems
P7
Implement a networked system based on a
prepared design.
P8
Document and analyze test results against