0% found this document useful (0 votes)
67 views80 pages

BTEC Networking Assessment Guide

Uploaded by

MIM Thamseer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views80 pages

BTEC Networking Assessment Guide

Uploaded by

MIM Thamseer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Higher Nationals

Internal verification of assessment decisions – BTEC (RQF)

INTERNAL VERIFICATION – ASSESSMENT DECISIONS


Programme title BTEC Higher National Diploma in Computing

Assessor Internal Verifier

Unit(s) Unit 02: Networking

Assignment title LAN Design & Implementation

Student’s name MIM Thamseer

List which assessment criteria Pass Merit Distinction


the Assessor has awarded.

INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded match


those shown in the assignment brief? Y/N

Is the Pass/Merit/Distinction grade awarded


justified by the assessor’s comments on the Y/N
student work?

Has the work been assessed Y/N


accurately?
Is the feedback to the student:
Give details:
• Constructive? Y/N
• Linked to relevant assessment criteria? Y/N
Y/N
• Identifying opportunities for
improved performance?
Y/N
• Agreeing actions?
Does the assessment decision need Y/N
amending?
Assessor signature Date

Internal Verifier signature Date

Programme Leader signature (if required) Date

Confirm action completed


Remedial action taken
Give details:

Assessor signature Date

Internal Verifier Date


signature
Programme Leader Date
signature (if required)
Higher Nationals - Summative
Assignment Feedback Form

Student Name/ID

Unit Title Unit 02: Networking

Assignment Number 1 Assessor

Submission Date Date Received


1st submission

Re-submission Date Date Received 2nd


submission

Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & DistinctionP1 P2 M1 D1
Descripts

LO2 Explain networking devices and operations.

Pass, Merit & DistinctionP3 P4 M2


Descripts

LO3 Design efficient networked systems.


Pass, Merit & DistinctionP5 P6 M3 D2
Descripts

LO4 Implement and diagnose networked systems.


Pass, Merit & DistinctionP7 P8 M4
Descripts

Grade: Assessor Signature: Date:

Resubmission Feedback:

00148603
Mohamed Indas3Mohamed Thasm
Grade: Assessor Signature: Date:

Internal Verifier’s Comments:

Signature & Date:

* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades
decisions have been agreed at the assessment board.

Assignment Feedback

Formative Feedback: Assessor to Student

Action Plan

Summative feedback

00148603
Mohamed Indas4Mohamed Thasm
Feedback: Student to Assessor

Assessor Date
signature

Student Date
signature

00148603
Mohamed Indas5Mohamed Thasm
Contents
LO1: Examine networking principles and their protocol................................................................2

1.1 Discuss the benefits and constraints of different network types and standards...............2

1.1.1 Networking Type.....................................................................................................2

1.1.2 LAN (Local area Network).............................................................................................2

1.1.3 MAN (Metropolitan area network).................................................................................4

1.1.4 WAN (Wide area network).............................................................................................5

1.1 IEEE Ethernet Standards.................................................................................................5

1.2.1 IEEE 802 Standards........................................................................................................5

1.2.3 Usage of IEEE Standards................................................................................................6

1.2 Network Topologies.........................................................................................................6

1.3.1 Physical Topology...........................................................................................................6

1.3.2 Advantages & Disadvantages of Physical Network Topologies.....................................8

1.2.3 Logical Topology.....................................................................................................8

1.3 Recommendation for Matara Branch...............................................................................9

1.5 Virtual LAN...........................................................................................................................9

1.4.1 usage of Network Topologies.......................................................................................10

1.4 Network protocol suites.................................................................................................11

1.5.1 ISO OSI Model.............................................................................................................11

1.5.1 TCP/IP Model...............................................................................................................14

1.5.2 Comparison between OSI Model and TCP/IP Model...................................................15

1.4.3 TCP/IP Model for Protocols..................................................................................16

1.5 Network Protocols.........................................................................................................16

LO2: Explain networking devices and operations.........................................................................23

00148603
Mohamed Indas6Mohamed Thasm
2.1..................................................N e t w o r k
23

2.1.1What is HUB..................................................................................................................23

2.1.2 Router...........................................................................................................................27

1.2.3 Switch...........................................................................................................................29

2.1.4 Advantage and Disadvantages of Hubs, Router and switch.........................................31

2.1.5 Different Between Hub, Switch and Router.................................................................31

2.1.6 Usage of Network Desing SYNTAX SOLUTION.......................................................33

2.1.7 Network Security..........................................................................................................33

2.1.8 Server............................................................................................................................36

2.2 Networking Software.....................................................................................................45

2.2.1 Networking Software.............................................................................................45

2.2.2 Compatibility.........................................................................................................46

L03 Design of Networked System.................................................................................................48

3.1 VLAN..................................................................................................................................48

3.2 IP Subnetting........................................................................................................................48

3.3 Wireshark.............................................................................................................................49

3.4 FileZilla................................................................................................................................51

3.5 PuTTY.................................................................................................................................51

ACTIVITY 04................................................................................................................................52

Implement and diagnose networked systems................................................................................52

4.1 Network Implementation.........................................................................................................52

1.4.1 Colombo branch............................................................................................................53

1.4.2 Mathara Branch............................................................................................................61

00148603
Mohamed Indas7Mohamed Thasm
Figure I Network Type..........................................................................4
Figure II LAN..................................................................................................................................4
Figure III MAN................................................................................................................................6
Figure IV WAN................................................................................................................................7
Figure V WAN.................................................................................................................................7
Figure VI VLAN............................................................................................................................12
Figure VII The TCP/IP model compared with the OSI mode.......................................................17
Figure VIII IP 4..............................................................................................................................22
Figure IX IPV 6.............................................................................................................................23
Figure X HUb................................................................................................................................25
Figure XI Router............................................................................................................................29
Figure XII Switch..........................................................................................................................31
Figure XIII Advantage and disadvantage of Router, hub and switch............................................33
Figure XIV Different between Hub, switch and router.................................................................34
Figure XV Firewall........................................................................................................................35
Figure XVI Proxy Server...............................................................................................................37
Figure XVII Server........................................................................................................................40
Figure XVIII PowerEdge R240 Rack Mount server.....................................................................41
Figure XIXPower Edge R7515 Rack Server.................................................................................42
Figure XX Fusion Server Pro 1288H V5 Rack Server..................................................................43
Figure XXI Colombo branch designing a Visio............................................................................55
Figure XXII Mathura branch.........................................................................................................63
Figure XXIII Networking..............................................................................................................64

00148603
Mohamed Indas8Mohamed Thasm
Table 1Topology Advantage and Disadvantage..................................11
Table 2 TCP/IP Layer Function.....................................................................................................17
Table 3 OSI/TCP/IP Model............................................................................................................18
Table 4 Advantages and disadvantages of FTP.............................................................................20
Table 5Advantages and disadvantages of SMTP...........................................................................21
Table 6 HTTP.................................................................................................................................21
Table 7 Different TCP and UDP....................................................................................................22
Table 8 different between IPv4 And IPv6......................................................................................25
Table 9 Admin department.............................................................................................................58
Table 10 Accounting & finance department..................................................................................60
Table 11 IT department..................................................................................................................61
Table 12 HR Department...............................................................................................................62
Table 13 Customer care.................................................................................................................63

00148603
Mohamed Indas9Mohamed Thasm
LO1: Examine networking principles and
their protocol

1.1 Discuss the benefits and constraints of different network types and standards.

1.1.1 Networking Type

There is different network system type to consider when designing a network for the Matara
Branch,

Figure I Network Type

(Source - Redirect Notice.” Google.com, 2019)

1.1.2 LAN (Local area Network)


Devices can be connected using LANs if they are located in a specific area. High-speed
communication, minimal latency, and simplicity of management are advantages. Examples of
constraints include the need for physical cabling and scalability restrictions for big companies.

00148603 1
Mohamed Indas Mohamed Thasm
0

Figure II LAN
Source: Javatpoint.com, 2022,

00148603
Mohamed Indas11Mohamed Thasm
1.1.3 MAN (Metropolitan area network)

A network that links LANs in a city or metropolitan area is known as a MAN. Although wireless
MANs are also available, wired MANs are more common.

Figure III MAN

(Source: Blogspot.com, 2022)

00148603 1
Mohamed Indas Mohamed Thasm
2
1.1.4 WAN (Wide area network)

Geographically separated locations are connected by WANs. Scalability and long-distance


connection are advantages. Higher expenses and more difficult management are constraints.

Figure IV WAN
Figure V WAN

(Blogspot.com, 2023)

1.1 IEEE Ethernet Standards.

IEEE is an international organization responsible for developing and providing networking


technology specification for worldwide usage. It works only on innovation, education and
standardization in the field of electrical and electronic development

1.2.1 IEEE 802 Standards


The IEEE 802 standards help ensure that internet services and technologies follow a set of
recommended procedures, so that network devices can all work together. Without these

00148603 1
Mohamed Indas Mohamed Thasm
3
standards, equipment suppliers can only connect
network hardware to certain computers. It would be much more difficult to
connect to systems not using the same set of networking equipment. Standardizing protocols help
ensure that multiple types of devices can connect to multiple network types.

Some of the best-known IEEE 802 Standards are,

 IEEE 802.1 (LAN/MAN)


 IEEE 802.3 (Ethernet)
 IEEE 802.5 (Token Ring)
 IEEE 802.11 (Wireless LAN)

1.2.3 Usage of IEEE Standards


As the network consultant of SYNTAX SOLUTION, I decided to use LAN (IEEE 802) for
design the interior network design of Matara branch. For that, I want to use LAN cabling system
(IEEE 802.7), Fiber Optics connection (IEEE 802.8), Giga-Ethernet (IEEE 802.3bk) as well as I
want to you WIFI (IEEE 802.11) and Bluetooth (IEEE 802.15.1) to connect some devices.

1.2 Network Topologies.

Network topology or network layout is the logical paths where data travels in a computer
network.

There are Two Types of Network Topology.

 Physical Topology.
 Logical Topology

1.3.1 Physical Topology.


This is the way of in which a network is laid out physically.

Types of Physical Topologies

Bus Topology - This is one of the most basic networking configurations, where every device
connected uses a single communication cable or line. The other connected devices are

00148603 1
Mohamed Indas Mohamed Thasm
4
unaffected if one connected device fails, but all
other connected nodes may stop working if the shared communication line
(backbone) fails.

Mesh Topology - In this case, a host is linked to one or more hosts. There are two types of mesh
topology: full mesh, in which every host in the network is connected point-to-point, and partial
mesh, in which some hosts are not connected point-to-point to every other host.

**Star Topology - The central hub functions as a single point of failure similar to the Bus
Topology's shared communication line. The only means of communication between hosts is the
hub.

Ring Topology - Each device connected to this network have two neighbors to communicate. All
data travels in a ring, and a failure of that ring will bring the whole network down.

Hybrid Topology - A hybrid topology combines two or more topologies. A prime example of a
hybrid topology is Tree Topology, which combines Bus and Star.

(Source: Authors Work)

(Source: Authors work )

00148603 1
Mohamed Indas Mohamed Thasm
5
1.3.2 Advantages & Disadvantages of
Physical Network Topologies.

Table 1Topology Advantage and Disadvantage

Topology Advantage Disadvantage

Bus Less Expensive. Suited for No redundancy.


temporary networks. Node failures No Security.
Less Cable Length.
does not affect others.

Ring Cheap. Easy to reconfigure. All More expensive than bus.


nodes with equal access. Unidirectional.
No Security.

star Easy to design and implement. Reconfiguration difficult.


Centralized administration. Expensive.
Scalable. Bottlenecks due to overloaded
hubs
Mesh Simplest. Reconfiguration extremely difficult.
Reliable. Expensive and impractical for large
Fault Tolerant. networks.
Issue with broadcasting messages.

(Source: Authors Work)

1.2.3 Logical Topology.

A computer network's logical paths by which data is transmitted are referred to as its logical
topology.

Ethernet

 The widely used LAN technology known as Ethernet was codified in IEEE 802.3 in
1980. Data collisions are common in networks like Ethernet that share media files.

00148603 1
Mohamed Indas Mohamed Thasm
6
 Ethernet use Carrier Sense Multi
Access/Collision Detection (CSMA/CD) technology to detect
collisions
 A network interface card with a 48-bit MAC address is an Ethernet connector.
 Traditional Ethernet adheres to the 10BASE-T standard. It uses coaxial cable or CAT-5
Twisted pair cable with an RJ45 connector to transmit data at up to 10 Mbps.
 Ethernet follows Star Topology with segment length up to 100 meters. All devices are
connected to a Hub/Switch in a Star fashion.
 There are some versions of Ethernet based on the transfer speed.
1. Standard Ethernet –10 Mbps (IEEE 802.3)
2. Fast Ethernet –100 Mbps (IEEE 803.2)
3. Giga-Ethernet –1000 Mbps (IEEE 802.3ab & 802.3ah)

1.3 Recommendation for Matara Branch


Based on the above considerations, here's a recommended setup for the Matara branch.

LAN - To ensure Gigabit Ethernet (1 Gbps) connections and high-speed communication for
desktops, servers, and printers, implement a wired Ethernet LAN using IEEE 802.3 (Ethernet).

WLAN - For employee and visitor access, set up a wireless network using IEEE 802.11ax (Wi-Fi
6). To address potential security issues, implement strong security measures like WPA3.

TOPOLOGY - Employ a star topology for the LAN, with a central Ethernet switch as the hub.
This setup simplifies management and troubleshooting.

Network Protocol Suit - Use the TCP/IP protocol suite for seamless integration with the internet
and compatibility with various devices.

1.5 Virtual LAN


A virtual local area network is any broadcast domain that is partitioned and isolated in a
computer network at the data link layer. In this context, virtual, refers to a physical object
recreated and altered by additional logic, within the local area network.

(Source: Authors Work)

00148603 1
Mohamed Indas Mohamed Thasm
7
Figure VI VLAN

1.4.1 usage of Network Topologies

There is no topology that one can choose as the ideal one. The needs and scale of the network
will thus decide on the best structure for your company. I chose the Start Topology for each
department because the Matara branch has several departments.

Reasons to choose star Topology For each department.

Centralized control of network - The control entity for all nodes is a central switch or hub. If
the Switch/Hub is a bottleneck, we can increase its capacity.

Easy Manageability and scalability - Because of the network's centralized management, the
Star Fashion network is simple to manage and scalable. It is very simple to add new computers
or network nodes to the network in the future without affecting network performance.

Easy To maintain - Each host or node in this network is connected by a unique cable, making
configuration easy. If one node fails, it does not affect the entire network. In addition, the star

00148603 1
Mohamed Indas Mohamed Thasm
8
topology has significantly lower downtime
when compared to other topologies because it is straightforward and
troubleshoot.

High performance level - This network performs better than others when compared because
data packets are sent directly to the target node, preventing unnecessary network traffic.

But we need to connect all the department with each other. BUS Topology is ideal for it.

 Bus topology is easy to expand by joining by two cables together.

And I use the ring topology for server room because these advantages it has.

 Control network between each workstation.


 A network server is not needed.
 Data can be transferred at high speed between workstation.
 Additional workstation can be added at future if needed, without affecting the network
performance.

(Source: Authors Work)

1.4 Network protocol suites

A set of guidelines that control how devices communicate over a network is known as a network
protocol suite. The most popular sets of network protocols are,

1. ISO OSI model


2. TCP/IP Model

1.5.1 ISO OSI Model


Open system interconnection model is a conceptual that covers all the aspect of network
communications. It was developed by international organization for standardization in 1994. This
is model that allows any two different systems to communication regardless their underlying
architecture. Furthermore, the OSI model is not a protocol but for understanding and designing a

00148603 1
Mohamed Indas Mohamed Thasm
9
network architecture that is interoperable, robust
and flexible.

Benefits of OSI model are,

1. Reduce complexity
2. Standardizes interface
3. Facilitates modular engineering
4. Ensure interpretable technology
5. Accelerates evolution
6. Simplifies teaching and learning.

Layers of OSI model

The OSI model is a seven-layer architecture. It defines seven layers or levels in a complete
communication system.

1. Physical Layer
2. Datalink Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer

(Source: Authors Work)

00148603 2
Mohamed Indas Mohamed Thasm
0
01.Physical layer

The first and lowest layer in the Open Systems Interconnection (OSI) communications model is
the physical layer. Data is transported using electrical, mechanical, or procedural interfaces by
the physical layer.

02.Datalink Layer

The second layer of the seven-layer OSI model of computer networking is known as the data link
layer or layer 2. This layer serves as the protocol layer that crosses the physical layer to transfer
data between nodes on a network segment.

03.Network Layer

The third layer in the OSI model of computer networks is the network Layer. Transferring
network packets from the source to the destination is its main job. Both the source host and the
destination host are involved.

04.Transport Layer

The transport layer is what? The fourth layer of the Open Systems Interconnection (OSI)
communications model is the transport layer. It is in charge of making sure that data packets are
delivered between sender and receiver accurately and dependably. TCP or User Datagram
Protocol (UDP) are typically used for the transport layer.

05.Session Layer

The session layer is layer 5 in the seven-layer OSI model of computer networking. The
mechanism for initiating, terminating, and managing a session between end-user application
processes is provided by the session layer.

06.Presentation Layer

The presentation layer, which is layer 6 in the seven-layer OSI model of computer networking,
acts as a network's data translator. It is referred to as the syntax layer at times.

07.Application Layer

00148603 2
Mohamed Indas Mohamed Thasm
1
The shared protocols and interface techniques
used by hosts in a communication network are specified by the application
layer, which is actually an abstraction layer. Application Layer aids in synchronizing
communication and identifying communication partners. Users can communicate with other
software programs through this layer.

(Source: Authors Work)

1.5.1 TCP/IP Model

The TCP/IP Model allows us to determine how a particular computer should be connected to the
internet and how data should be transmitted between them.

Four layers of TCP/IP Model

TCP/IP Layers Function Example protocols

Application Represents data to the user and DNS, Telnet, SMTP, POP3,
controls dialogues IMAP, DHCP, HTTP, FTP

Transport Support communication TCP, UDP


between diverse devices
across diverse networks

Internet Determine the best path through IP, ICMP


the network.

Network access Controls the hardware devices and Ethernet, frame


the media that make up the
network
Table 2 TCP/IP Layer Function

00148603 2
Mohamed Indas Mohamed Thasm
2
00148603 2
Mohamed Indas Mohamed Thasm
3
1.5.2 Comparison between OSI Model and
TCP/IP Model
Figure VII The TCP/IP model compared with the OSI mode

Gstatic.com, 2023, encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcTLEZWWDYk3Mqk-0Wr1E2fo4et2k8lkA6Y-


1w&usqp=CAU. Accessed 5 Oct. 2023.1111ISO OSI model

OSI MODEL TCP/IP MODEL

OSI stands for Open System Interconnection TP/IP stands for Transmission Control
because it allows any two different systems to Protocol/Internet Protocol. It is named after these
communicate regardless of their architecture. protocols, being part of this model.
OSI model has seven layers. TCP/IP has four layers

This model provides clear distinction between It does not clearly distinguish between services,
services, interfaces and protocols interfaces & protocols.

Table 3 OSI/TCP/IP Model

00148603 2
Mohamed Indas Mohamed Thasm
4
00148603 2
Mohamed Indas Mohamed Thasm
5
1.4.3 TCP/IP Model for Protocols

The TCP/IP protocol is the most suitable choice for the SYNTAX SOLUTION because it is an
open protocol standard, completely free to use, and can be implemented with no relying on
hardware or an operating system that is specific to the device. TCP/IP is ideal to connect because
it is so widely supported.

TCP/IP can be accessed via Ethernet, a DSL link, a dial-up line, an optical network, and
essentially any other physical transmission medium, according to Hasintha NayanajithHND
COM Networking31| standardized high-level protocols for trustworthy, easily accessible user
services. Because of this, I advise using the TCP/IP protocol with the Syntax Solution. Branch in
Matara

1.5 Network Protocols

All the networks must have a set of rules governing how to communicate and transfer resources
with each other and, this set of rules are simply called Network Protocols.

01.Application Layer Protocols

FTP-File Transfer Protocol

FTP is used to copy files from one host to another. It created two processes called control process
and data transfer process at both ends. Also, it establishes two connections. One is for data
transfer and another one is for control information. FTP uses port 21 for control connection and
port 20 for the data connection

Advantage Disadvantage

00148603 2
Mohamed Indas Mohamed Thasm
6
Lack of Encryption (in standard FTP)
Widespread Compatibility
easy to use Firewall and NAT issues

Security Options (e.g., FTPS, User Credentials in Clear Text


SFTP)
Batch Processing Limited Support for Resuming
Transfers
Table 4 Advantages and disadvantages of FTP

00148603 2
Mohamed Indas Mohamed Thasm
7
SMTP – Simple Mail Transfer Protocol
This is the accepted protocol for sending email over the internet in an effective and dependable
manner. Additionally, SMTP is a control-oriented, text-based protocol that also sends
notifications of incoming mail.

Advantage Disadvantage
Widespread Adoption Lack of Security (in standard SMTP)

Simplicity SPAM Vulnerability

Tex-Based Reliability Challenges

Interoperability No Built-In Authentication

Reliability Limited Attachment size

Delivery Delay

Table 5Advantages and disadvantages of SMTP

HTTP – Hyper Text Transfer Protocol

Protocol It is a protocol to use that specifies how the web server and browser will communicate
with one another. HTTP employs TCP port 80 for showing information in websites.

Table 6 HTTP

Advantage Disadvantage
Widespread Compatibility Lack of Encryption (in standard FTP)

easy to use Firewall and NAT issues

Security Options (e.g., FTPS, SFTP) User Credentials in Clear Text

Batch Processing Limited Support for Resuming Transfers

00148603 2
Mohamed Indas Mohamed Thasm
8
02.Transport Layer Protocols

TCP –Transmission Control Protocol

a communications standard that enables application programs and computing devices to


exchange messages over a network

UDP –User Datagram Protocol

a communications protocol for time-sensitive applications like gaming, playing videos, or


Domain Name System (DNS) lookups. UDP results in speedier communication because it does
not spend time forming a firm connection with the destination before transferring the data

Difference between TCP and UDP

Comparison TCP UDP


Speed Low High
Connection Type Connection Oriented Protocol Connection Protocol
Reliability Reliable Protocol Unreliable Protocol

Acknowledge Acknowledge Segment NO acknowledge


Table 7 Different TCP and UDP

03.Internet Layer Protocols

IP Internet protocol

Internet Protocol (IP) is a fundamental communication protocol that facilitates the transmission
of data across networks. It's a key component of the Internet and other interconnected networks.
IP is an addressing protocol designed to route information packets from the source to the

00148603 2
Mohamed Indas Mohamed Thasm
9
destination across a network. There are two
main versions of IP currently in use:

1.IPv4 (Internet Protocol version 4):

1. Address Format: IPv4 addresses (such as 192.168.1.1) are 32-bit numerical labels written in
dotted-decimal notation.

2. Address Space: Offers roughly 4.3 billion distinct address spaces.

3. Problems: IPv4's constrained address space caused the pool of addresses to run out,
necessitating the development of IPv6.

Figure VIII IP 4

00148603 3
Mohamed Indas Mohamed Thasm
0
2.IPv6 (Internet Protocol version 6):

1.Address Format: 128-bit hexadecimal labels are used for IPv6 addresses
(2001:0db8:85a3:0000:0000:8a2e:0370:7334, for example).

2. Address Space: Provides a far greater address space, enabling practically infinitely many
distinct addresses.

3.Transition: In order to solve the issue of address exhaustion, IPv6 is intended to gradually
replace IPv4.

Figure IX IPV 6

00148603 3
Mohamed Indas Mohamed Thasm
1
Difference between IPv4 and IPv6
Table 8 different between IPv4 And IPv6

IPv4 IPv6
32 Bits IP Address 128 Bits IP Address
Binary Bits are separate by a Dot (.) Binary bits are separate by a colon (:)
Provide 12 fields in the header Provide 8 fields in the header
Numeric Addressing Numeral-based addressing

Support Borders Not Support Borderers


Use for the designated Network from host portion Not Used

00148603 3
Mohamed Indas Mohamed Thasm
2
ACTIVITY 02

LO2: Explain networking devices and operations

2.1 Network device And Server Type

Below is a list of network devices that can play a role in enabling your organization to transfer
information as securely as possible: Bridges, hubs, NICs, modems (used for analog phone lines)
and repeaters are the earliest types of network devices; they were ubiquitous

Figure X HUb

2.1.1What is HUB

00148603 3
Mohamed Indas Mohamed Thasm
3
A hub is a fundamental networking device used
in local area networks (LANs) to connect multiple devices. A hub's main
function is to expand the physical network by enabling communication between numerous
devices.

00148603 3
Mohamed Indas Mohamed Thasm
4
Bandwidth of Ethernet Hubs.

The speeds that Ethernet hubs support differ. The rated speeds of the original Ethernet hubs were
limited to 10 Mbps. Modern hubs typically have both 10 Mbps and 100 Mbps speeds and can
support up to 100 Mbps.

Types Of Ethernets Hubs

There are 3 basic Types of Hubs.

 Active Hub
 Passive Hub
 Intelligent Hub

Active Hub

A multiport repeater, sometimes referred to as an active hub, is a hub that regenerates the signal
before sending it to every port that is connected. In big networks, this aids in overcoming signal
degradation.

Passive Hub

A passive hub simply serves as a point where connections can be joined together but does not
amplify or regenerate the signal. Signal quality can degrade with each connection in a passive
hub.

Intelligent Hub

An intelligent hub has additional features compared to a basic hub. It may have diagnostic
capabilities, monitoring functions, and possibly some rudimentary filtering capabilities.
However, it is still less sophisticated than a modern switch.

It's crucial to remember that although "hub" and "switch" are sometimes used synonymously in
discussions about networking today, these two devices have different purposes. A switch makes
decisions based on MAC addresses, directing traffic only to the designated device, whereas a hub
broadcasts data to all connected devices.
00148603 3
Mohamed Indas Mohamed Thasm
5
Switches are the recommended option for modern networking configurations because of their
effectiveness, capacity allocated to each port, and capacity to minimize collision domains. You
may run into references to these kinds of hubs if you are maintaining a legacy system or working
with older equipment. However, switches are the default option for modern network design.

00148603 3
Mohamed Indas Mohamed Thasm
6
2.1.2 Router

Figure XI Router

What is Router

A router is a network device that connects different networks together. It operates at the network
layer (Layer 3) of the OSI (Open Systems Interconnection) model and is responsible for
forwarding data packets between networks. Routers play a crucial role in directing data traffic
efficiently across interconnected networks, including local area networks (LANs) and wide area
networks (WANs).

How Router Works

Devices used as Layer 3 Network Gateways are routers. They function as dedicated computers
with I/O interfaces, digital memory, and a processor. An embedded operating system known as
00148603 3
Mohamed Indas Mohamed Thasm
7
Router Firmware, or Cisco International
Operating System, is kept in the router's memory. The router firmware is
capable of running specific applications on them and requires significantly less storage space.

00148603 3
Mohamed Indas Mohamed Thasm
8
1.2.3 Switch

Figure XII Switch

What is Switch

Operating at Layer 2 (data link layer) of the OSI (Open Systems Interconnection) model, a
switch is a type of network device. Its main purpose is to link devices that are connected to the
same local area network (LAN) and to make decisions by using the device's hardware address
(MAC). Switches are more sophisticated than traditional hubs and are frequently used in
contemporary Ethernet networks.

Network Switch Technology

To keep up with the constantly changing needs of contemporary networks, network switch
technology has advanced significantly. These switches, which are the backbone of local area
networks, use a variety of switching techniques, such as cut-through and store-and-forward,
along with shared memory, shared bus, and crossbar switching architectures, to improve
scalability and performance. Unmanaged switches offer ease of use for plug-and-play setups,

00148603 3
Mohamed Indas Mohamed Thasm
9
while managed switches offer advanced features
like network monitoring, VLAN support, and Quality of Service. Switches
with power over Ethernet capabilities can power devices connected to them, and network
segmentation for enhanced security is made possible by VLAN support. Network switches add to
effective packet forwarding by combining Layer 2 and Layer 3 functionality; in addition,
features like spanning tree protocols and link aggregation provide redundancy and prevent loops.
Since

00148603 4
Mohamed Indas Mohamed Thasm
0
2.1.4 Advantage and Disadvantages of Hubs,
Router and switch.

DEVICE Advantage Disadvantage

Router Multiple networks are connected Expensive.


by a specialized device. Because it examines data
Not a duplicate transmission from the physical
layer to the network layer, it is
slower than devices.
Hub Less Expensive Hub is not so secure and safe.
It is half duplex.
Used for connect the multiple
devices. It will broadcast to all the ports
Switch Filtering data. Connect two similar devices only.

Secure. Looping when redundancy wire is


created
Port Information
Figure XIII Advantage and disadvantage of Router, hub and switch

2.1.5 Different Between Hub, Switch and Router

Hub Switch Router

Physical Layer Network, data Layer Network layer

Broadcast messages Multicast Message Routes data as packets

Send data as bits Sends data as frames Send data as packets

Connect device a within the same Connect devices to network Connect two different networks
network

00148603 4
Mohamed Indas Mohamed Thasm
1
Store MAC Address Store MAC Address

Does Not store MAC


Address
Figure XIV Different between Hub, switch and router

00148603 4
Mohamed Indas Mohamed Thasm
2
2.1.6 Usage of Network Desing SYNTAX
SOLUTION

Switches and routers have been chosen by me, the network consultant at SYNTAX SOLUTION,
to be used in the Matara branch's network design. When necessary, routers are used as gateways
to establish a connection between two department LANs. Each department uses switches to
create a local area network. Furthermore, Switches are precisely aware of a data frame's intended
destination. Therefore, unlike a hub, a 10/100 Mbps switch can dedicate its entire bandwidth to
each of its ports.

2.1.7 Network Security


The phrase "network security" refers to a wide range of procedures, guidelines, and technological
solutions used to safeguard computer networks and data against damage, intrusion, and illegal
access. It entails putting policies in place to guarantee the availability, confidentiality, and
integrity of data on a network. A few crucial facets of network security are as follows

01.Firewall

Figure XV Firewall

00148603 4
Mohamed Indas Mohamed Thasm
3
Simplilearn.com, 2023,

A trusted internal network and an untrusted external network, like the Internet, are separated by
firewalls. They use preset security rules to monitor and manage all incoming and outgoing
network traffic. Firewalls defend against a variety of cyberthreats and aid in preventing
unauthorized access.

00148603 4
Mohamed Indas Mohamed Thasm
4
There are two types of firewall policies widely
used.

Allow Policies:

The "Allow" policy's default setting allows all network traffic, barring any that contravenes a
particular security rule.

Operation: The firewall permits communication if the traffic satisfies any of the set rules that
specifically permit it. Permitting the traffic is the default action in the absence of a matching rule.

Benefits: This strategy frequently allows for more latitude in network communication. Usually,
it's simpler to implement at first, particularly in settings where network traffic must be explicitly
permitted.

Deny Policies

Description: Unless specifically permitted by a security rule, all network traffic in a "Deny"
policy is blocked by default.

Operation: The firewall prevents communication if the traffic matches any of the set rules that
expressly forbid it. Denying traffic is the default action in the absence of a matching rule.

Benefits: By default, this method is more restrictive and offers a higher level of security. It
abides by the least privilege principle, permitting only those communications that are absolutely
necessary and preventing all others.

00148603 4
Mohamed Indas Mohamed Thasm
5
02.Proxy Server

Figure XVI Proxy Server

Javatpoint.com, 2023, static.javatpoint.com/tutorial/computer-network/images/what-is-a-proxy-server-and-how-does-it-


work2.png. Accessed 23 Nov. 2023.

Between client devices, such as PCs or smartphones, and other servers, like web servers or other
online resources, a proxy server serves as a middleman. A client sends a request to a proxy
server, which acts as a middleman between the client and the destination server, forwards the
request, gets the response from the destination server, and sends it back to the client. Since it
only speaks with the proxy, the client is ignorant to the direct connection to the destination
server.

03. Intrusion Prevention System (IPS)

An Intrusion Prevention System (IPS) is a real-time security solution that monitors network or
system activities to detect and prevent malicious behavior. It uses signature-based and anomaly-
based detection methods, conducts deep packet inspection, and responds to threats by blocking
or mitigating them. IPS aims to proactively safeguard networks and systems from various cyber
threats, providing a crucial layer of defense in cybersecurity strategies.

00148603 4
Mohamed Indas Mohamed Thasm
6
2.1.8 Server

A server is a system or computer that, within a network, offers functionality, resources, or


services to other computers, also referred to as clients. Servers are made to perform certain
functions, like hosting websites, managing files, storing and executing apps, and enabling device
communication. They are an essential component of computing environments' network
infrastructure and are vital to the operation of many different functions. In order to efficiently
distribute resources throughout a network and respond to client requests, servers frequently run
nonstop.

There are various types of servers, each designed to fulfill specific roles and provide particular
services within a networked environment. Here are some common types of servers:

Web Server: unction: Hosts and serves website content in response to client requests via the
Hypertext Transfer Protocol (HTTP) or its secure variant, HTTPS.

Application Server: Function: Hosts and runs business applications, providing a runtime
environment for application code to execute and deliver services to clients.

Mail server: Function: Manages and transfers emails over a network. It handles the sending,
receiving, and storage of email messages.

FTP Server: Function: Facilitates the transfer of files between computers on a network. Users
can upload and download files using the FTP protocol.

Server Physical Types

There are several physical varieties of servers, and each is made to fulfill particular needs in
terms of scalability, storage, and performance. The following are a few typical server physical
types:

 Tower Sever

00148603 4
Mohamed Indas Mohamed Thasm
7
 Rack Mount server
 Blade Sever

00148603 4
Mohamed Indas Mohamed Thasm
8
Different Servers Available in Market

01.PowerEdge R830 Rack Server

Figure XVII Server

The Dell PowerEdge R830 is a 2U rack server with four sockets. It's designed for dense
virtualization deployments and scalable database applications. Here are some of its
specifications:

 Processors: Intel Xeon E5-4600V4 family


 Form factor: 2U
 Chipset: Intel C612
 Memory: Up to 48 DIMM slots
 Drive bays: Up to 16 2.5" SAS/SATA hard drives
 Expansion slots: 7 PCIe 3.0 slots
 Management: iDRAC8 Express, iDRAC8 Enterprise, iDRAC8 with Lifecycle Controller

00148603 4
Mohamed Indas Mohamed Thasm
9
02.PowerEdge R240 Rack Server

Increase performance, ability to scale, and simplify your IT with an entry-level 1U rack server
designed for web hosting and multi-purpose applications

Figure XVIII PowerEdge R240 Rack Mount server

Here are some specifications for the Dell EMC PowerEdge R240:

 Processor: One Intel Xeon Scalable processor


 Memory: 4 x DDR4 DIMM slots, supports UDIMM, up to 2666MT/s, 64GB Max
 Power supplies: Single 250W (Bronze) or 450W (Platinum) power supply
 Drives: Up to four 3.5-inch SAS, SATA drives or SSDs, or four 3.5-inch cabled drives, or
two 3.5-inch cabled drives

00148603 5
Mohamed Indas Mohamed Thasm
0
03.PowerEdge R7515 Rack Server

Figure XIXPower Edge R7515 Rack Server

The Dell EMC PowerEdge R7515 is a single-socket 2U server designed to handle workloads like
software-defined storage, virtualization and data analytics.

The Dell EMC PowerEdge R7515 is a single-socket 2U rack server. It's designed to handle
workloads such as:

Software-defined storage

 Virtualization
 Data analytics

Here are some of the R7515's features:

 Scalable system architecture


 100% more processing cores
 Faster data transfer speeds
 20% more memory performance
 Supports 2nd or 3rd generation AMD processors
 Up to 64 cores and 128 threads

00148603 5
Mohamed Indas Mohamed Thasm
1
04.Fusion Server Pro 1288H V5 Rack Server

Figure XX Fusion Server Pro 1288H V5 Rack Server

This 1U, 2 socket rack server is the Huawei Fusion Server Pro 1288H V5. Processing workloads
produced by cloud computing virtualization, High Performance Computing (HPC), and Big Data
processing is best suited for high density deployment. It reduces overall costs by increasing data
center space utilization and providing superior performance and scalability.

The Fusion Server Pro 1288H V5 has the following features:

 Processor: 4110
 Memory: 16GB
 Hard drive: 1200GB 10K SAS
 Raid card: SR150-M
 Power supply: 550W

Here are some places to buy the Fusion Server Pro 1288H V5:

 AliExpress: Offers free worldwide shipping


 Alibaba: Offers 1,000 pieces per month
 Router-switch.com: Offers fast shipping and free tech support

Servers Selection Requirement

00148603 5
Mohamed Indas Mohamed Thasm
2
In order to choose a server that best suits your
organization's needs, performance standards, and growth goals, you must
take into account a number of important factors. The following are some crucial elements to take
into account when choosing servers

00148603 5
Mohamed Indas Mohamed Thasm
3
So, when choosing servers for Matara branch of
SYNTAX SOLUTION, I have to pay my attention for the following things.

 Match the primary needs


 Affordable
 Choose best of bread
 Buy the right operating system
 Build in expansion and redundancy
 Support and maintenance

In my capacity as SYNTAX SOLUTION's network consultant, I chose to deploy three server


PCs for the Matara branch. The IT company SYNTAX SOLUTION has a large number of
project files on file. For the Matara Branch, I set up a database server with MySQL and Oracle
databases. Because it satisfies the system requirements of both Oracle and MySQL databases, I
have selected the Dell PowerEdge R830 Rack Server as the database server.

MySQL

 CPU: Intel Core or Xeon 3GHz, or Dual Core 2GHz, or equal AMD CPU
 Cores: Single, but Dual/Quad Core is recommended
 RAM: 4 GB, but 6 GB is recommended
 Graphic Accelerators: nVidia or ATI with support of OpenGL 1.5 or higher
 Display: 1024×768, 1920×1200 or higher
 Windows: Microsoft .NET Framework 4.5.2, Microsoft Visual C++ 2015-2022
Redistributable, Microsoft Windows 11 or Windows Server 2022

Oracle

 CPU: Intel Core or AMD Opteron at 2Ghz with Dual Core or faster
 RAM: 1 GB minimum, 4 GB recommended
 Disk space: 500 MB minimum, 10 GB recommended
 Database server: Four or more 3.3 GHz Intel Xeon class or higher processor cores
 RAM: 8 GB or more
 Tablespace: 100 MB minimum

00148603 5
Mohamed Indas Mohamed Thasm
4
00148603 5
Mohamed Indas Mohamed Thasm
5
2.2 Networking Software

Network managers can deploy, maintain, and track networks with the aid of networking
software. It reveals the inner workings of network administrators, whereas software allows users
to carry out particular tasks. Network software is "Invisible" to end users; its sole purpose is to
seamlessly enable those users' access to network resources.

User Management- User management is a system that controls how people access devices,
software, and services. It involves managing permissions for access and actions, as well as
monitoring usage.

File Management-File management is the process of organizing, storing, and retrieving files. It
can also refer to the process of managing a system that handles digital data.

Enables virtualization of network- Network virtualization is a process that abstracts physical


network resources and devices into virtual ones. This allows network functions, hardware
resources, and software resources to be delivered independently of hardware.

2.2.1 Networking Software

Server OS

For server to function, server operating system is required. In order to implement DHCP, Mail
Server, and Web Server within the company, we require servers for the SYNTAX SOLUTION
Matara branch network. There are numerous server operating systems available, but for the
Matara Branch of SYSTAX SOLUTION, I have chosen to utilize Microsoft Server 2019.

Active directory

Microsoft uses this technology to manage PCs and other devices connected to a network. It is
one of Windows Server OS's main features. Building and managing domains, users, and objects
within a network is made easier for network administrators by Active Directory. An administrator
could create a group of users and grant them access to particular server folders, for instance. As a
network grows, Active Directory offers a mechanism to arrange a lot of users into logical groups

00148603 5
Mohamed Indas Mohamed Thasm
6
and subgroups while also offering access control
at every level.

2.2.2 Compatibility

The capacity of two systems to function together without requiring changes is known as
compatibility. Software programs that are compatible employ the same data formats. The
interoperability of any two products—hardware and software, same- or different-type products,
or different versions of the same product—is referred to as compatibility. The following should
work together in networking.

 Hardware- The term "hardware" in the context of computing refers to the physical
components of a computer system or electronic device. It encompasses all the tangible,
touchable parts that make up a computer or a related system.
 Operating System- An operating system (OS) is a crucial software component that
manages computer hardware and provides services for computer programs
 Software- software refers to a set of instructions, data, or programs that enable a
computer or electronic device to perform specific tasks

Without these compatibilities, lots of errors can be come. Few of them are,

If you install the server OS without meeting the minimum requirements, the server may crash.
Additionally, if you install some servers without the necessary prerequisites, they won't function
or crash.

Your clients' and servers' different operating systems prevent them from performing some tasks
correctly. Since your switches, routers, and other primary networking equipment are different
models, configuring that

00148603 5
Mohamed Indas Mohamed Thasm
7
Therefore, I have to select compatible devices
as our requirements

00148603 5
Mohamed Indas Mohamed Thasm
8
Chapter 03

L03 Design of Networked System

3.1 VLAN

It is the networking equivalent of virtualizing PCs. Multiple broadcast domains (LAN segments)
can be connected to a single switch via network virtualization with VLANs on switches. We can
divide a switch into multiple switches by using VLANs. Only on specific hardware that has
virtualization enabled are we using software for this purpose. I set up seven VLANs for the seven
branches of SYNTAX SOLUTION's Matara branch.

3.2 IP Subnetting

In my capacity as the Matara branch's network system designer and advisor, I selected the IP
address 198.168.10.0/24 and divided it into subnets for each department. Depending on how
many users are in each department, I assign an IP address to each one. I set up the VLAN
because it allows me to divide a large number of broadcast domains into several logical subnets.
A group of users who require high security can be added to the VLAN so that external users
outside the VLAN are unable to communicate with them. We can think of VLAN as independent
from users' physical or geographic locations when it comes to the logical classification of users
based on their functions.

00148603 5
Mohamed Indas Mohamed Thasm
9
Departm User VLAN Subnet Net ID Broadca IP Range
ent mask st ID
Admin 55 VLAN /26 192.168.1 192.168.1 192.168.10
Departme 10 0.0 0.63 .1-
nt 192.168.10
.62
Accountin 25 VLAN /27 192.168.1 192.168.1 192.168.10
g & 20 0.64 0.95 .65-
Finance 192.168.10
.94
IT 20 VLAN /27 192.168.1 192.168.1 192.168.10
Departme 30 0.96 0.127 .95-
nt 192.168.10
.126
HR 10 VLAN /28 192.168.1 192.168.1 192.168.10
40 0.128 0.143 .129-
192.168.10
.142
Customer 10 VLAN /28 192.168.1 192.168.1 192.168.10
Care 50 0.144 0.159 .145-
192.168.10
.158

Legal 5 VLAN /29 192.168.1 192.168.1 192.168.10


70 0.169 0.179 .169-
192.168.10
.178

00148603 6
Mohamed Indas Mohamed Thasm
0
I've gone over the various network devices I
used in the Matara branch's network design in the section above on
network devices. I will now talk about the networking software that I need in order to design the
network.

3.3 Wireshark

An open-source network protocol analyzer called Wireshark records and examines data on
computer networks in real time. Numerous protocols are supported, packet contents are decoded
for analysis, and features like live filtering, statistical tools, and export options are offered. For
network troubleshooting, security analysis, and protocol development, Wireshark is
indispensable.

 Monitor network traffic in real time.


 Assist in troubleshooting network problems.
 Intercept traffic and convert it from binary to a format that users can understand.

00148603 6
Mohamed Indas Mohamed Thasm
1
3.4 FileZilla

Users can use this open-source tool to move files from a local computer to a remote computer.
Some of FileZilla's features are listed below.

 accessible in versions for both the client and the server.


 It can generate and save a list of FTP servers along with the connection information that
goes with it. FileZilla functions similarly to a file manager, letting users edit files and
folders and enabling drag-and-drop between local and remote directories.
 FileZilla works with Linux, Mac, and Windows. It is compatible with SFTP, FTPS, and
FTP protocols.

3.5 PuTTY

PuTTY is a free, cross-platform terminal emulator and network file transfer tool widely used for
remote access to systems through protocols like SSH and Telnet. It supports secure connections,
session management, SSH key authentication, and file transfer via SCP and SFTP. PuTTY is
known for its simplicity, versatility, and compatibility with various operating systems, making it
a popular choice for network administrators and developers.

00148603 6
Mohamed Indas Mohamed Thasm
2
ACTIVITY 04

Implement and diagnose networked systems.

4.1 Network Implementation


When putting a network in place, two things need to be taken into account. Analyzing network
requirements and selecting the best solutions to meet client expectations are essential steps in
building an effective network for the Syntax Solutions Matara branch. As a result, numerous
actions need to be taken.

Step 1: First, satisfy the performance, capacity, and network port requirements of the company.
To ascertain their application and future improvement requirements, meet with colleagues from
every division of the film company Syntax Solutions.

In Step 2, design and build the cable arrangement: Because it gives Syntax Solutions a physical
communication path, cabling is a crucial part of network architecture.

Step 3: Examine the network's current functionality. Use network management software and
protocol analyzers to perform the analysis at different points during the workday, such as the
start of shifts and times when there is usually a surge in network traffic, like when complex
engineering data or a heavy workload is being transferred over the network.

Step 4: Gather data from current logical and physical network diagrams to support the
architecture as it stands at Syntax Solutions Company. Determine the network equipment,
switches, LAN uplink bandwidth, wireless access routers, and current standards. Since there are
more A and B buildings, get up-to-date information for the LAN's IP address design, including
virtual LAN details and connection requirements, for the logical design.

Step 5: Select a routing system for the network that facilitates quick convergence and ease of
management and create an IP address that meets expansion requirements.

Thus, using CISCO packet tracer, the author created a network that suited the needs of the
Matara branch of Syntax Solutions based on the network design mentioned above, the

00148603 6
Mohamed Indas Mohamed Thasm
3
procedures, and user feedback. The relevant
supporting documents are included below.

(Source: Authors Work)

1.4.1 Colombo branch

Figure XXI Colombo branch designing a Visio

00148603 6
Mohamed Indas Mohamed Thasm
4
Admin
Department

IP Address: 192.168.10.0

Network
192.168.10.0
Address:

Usable Host IP
192.168.10.1- 192.168.10.2
Range:

Broadcast
192.168.10.3
Address:

Total Number of
4
Hosts:

Number of
Table 9 Admin department 2
Usable Hosts:

Subnet Mask: 255.255.255.252

Wildcard Mask: 0.0.0.3

Binary Subnet
11111111.11111111.11111111.11111100
Mask:

IP Class: C

CIDR Notation: /30

IP Type: Private

Short: 192.168.10.0/30

Binary ID: 11000000101010000000101000000000


Integer ID: 3232238080

Hex ID: 0xc0a80a00


00148603 6
Mohamed Indas Mohamed Thasm
5
in-addr.arpa: 0.10.168.192.in-addr.arpa

IPv4 Mapped
Accounting & Finance

Department

IP Address: 192.168.10.64

Network Address: 192.168.10.64

Usable Host IP Range: 192.168.10.65- 192.168.10.66

Broadcast Address: 192.168.10.67

Total Number of Hosts: 4

Number of Usable Hosts: 2

Subnet Mask: 255.255.255.252

Wildcard Mask: 0.0.0.3

Binary Subnet Mask: 11111111.11111111.11111111.11111100

IP Class: C

CIDR Notation: /30

IP Type: Private

Short: 192.168.10.64 /30

Binary ID: 11000000101010000000101001000000

Integer ID: 3232238144

00148603 6
Mohamed Indas Mohamed Thasm
6
0xc0a80a40
Hex ID:

in-addr.arpa: 64.10.168.192.in-addr.arpa

IPv4 Mapped Address: :: ffff:c0a8.0a40

6to4 Prefix: 2002:c0a8.0a40 :: /48

Table 10 Accounting & finance department

IT Department

IP Address: 192.168.10.96

Network Address: 192.168.10.96

Usable Host IP Range: 192.168.10.97 - 192.168.10.98

Broadcast Address: 192.168.10.99

Total Number of Hosts: 4

Number of Usable
2
Hosts:

Subnet Mask: 255.255.255.252

Wildcard Mask: 0.0.0.3

Binary Subnet Mask: 11111111.11111111.11111111.11111100

IP Class: C

00148603 6
Mohamed Indas Mohamed Thasm
7
/30
CIDR Notation:

IP Type: Private

Short: 192.168.10.96 /30

Binary ID: 11000000101010000000101001100000

Integer ID: 3232238176

Hex ID: 0xc0a80a60

in-addr.arpa: 96.10.168.192.in-addr.arpa

IPv4 Mapped Address: :: ffff:c0a8.0a60

6to4 Prefix: 2002:c0a8.0a60 :: /48

Table 11 IT department

HR Department

IP Address: 192.168.10.128

Network Address: 192.168.10.128

Usable Host IP Range: 192.168.10.129 - 192.168.10.130

Broadcast Address: 192.168.10.131

Total Number of Hosts: 4

Number of Usable Hosts: 2

00148603 6
Mohamed Indas Mohamed Thasm
8
Subnet Mask: 255.255.255.252

Wildcard Mask: 0.0.0.3

Binary Subnet Mask: 11111111.11111111.11111111.11111100

IP Class: C

CIDR Notation: /30

IP Type: Private

Short: 192.168.10.128/30

Binary ID: 11000000101010000000101010000000

Integer ID: 3232238208

Hex ID: 0xc0a80a80

in-addr.arpa: 128.10.168.192.in-addr.arpa

IPv4 Mapped Address: :: ffff:c0a8.0a80

6to4 Prefix: 2002:c0a8.0a80 :: /48

Table 12 HR Department

Customer care

IP Address: 192.168.10.144

00148603 6
Mohamed Indas Mohamed Thasm
9
192.168.10.144
Network Address:

Usable Host IP Range: 192.168.10.145 - 192.168.10.146

Broadcast Address: 192.168.10.147

Total Number of Hosts: 4

Number of Usable Hosts: 2

Subnet Mask: 255.255.255.252

Wildcard Mask: 0.0.0.3

Binary Subnet Mask: 11111111.11111111.11111111.11111100

IP Class: C

CIDR Notation: /30

IP Type: Private

Short: 192.168.10.144 /30

Binary ID: 11000000101010000000101010010000

Integer ID: 3232238224

Hex ID: 0xc0a80a90

in-addr.arpa: 144.10.168.192.in-addr.arpa

IPv4 Mapped Address: :: ffff:c0a8.0a90

00148603 7
Mohamed Indas Mohamed Thasm
0
2002:c0a8.0a90 :: /48
6to4 Prefix:

Table 13 Customer care

00148603 7
Mohamed Indas Mohamed Thasm
1
1.4.2 Mathara Branch

Figure XXII Mathura branch

00148603 7
Mohamed Indas Mohamed Thasm
2
Floor network system

Figure XXIII Networking

00148603 7
Mohamed Indas Mohamed Thasm
3
References

Google.com,2023,www.google.com/url?sa=i&url=https%3A%2F%2Fwww.cloudns.net%2Fblog
%2Fwhat-is-ipv4-everything-you-need-to-know
%2F&psig=AOvVaw3WTab8FtrLSMgdeIzTjU2f&ust=1700313812040000&source=images&cd
=vfe&opi=89978449&ved=0CBIQjRxqFwoTCOC5wteQy4IDFQAAAAAdAAAAABAE.
Accessed 17 Nov. 2023.

00148603 7
Mohamed Indas Mohamed Thasm
4
00148603 7
Mohamed Indas Mohamed Thasm
5
Grading Rubric

Grading Criteria Achieved Feedback

LO1 : Examine networking principles and their protocols.

P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Assess common networking principles and how protocols enable
the effectiveness of networked systems.

LO2 : Explain networking devices and operations

00148603 Mohamed Indas Mohamed Thasmeer 76


P3
Discuss the operating principles of networking
devices and server types.
P4
Discuss the interdependence of workstation
hardware and relevant networking software
M2
Explore a range of server types and justify the
selection of a server for a given scenario,
regarding cost and performance optimisation

LO 1 & LO2
D1 Evaluate the topology protocol selected for a
given scenario and how it demonstrates the efficient
utilisation of a networking system.

LO3 : Design efficient networked systems

P5
Design a networked system to meet a given
specification.
P6

00148603 Mohamed Indas Mohamed Thasmeer 77


Design a maintenance
schedule to support the networked system.

M3
Analyse user feedback on your designs with the
aim of optimising your design and improving
efficiency.
D2
Critically reflect on the implemented network,
including the design and decisions made to
enhance the system.
LO4 : Implement and diagnose networked systems

P7
Implement a networked system based on a
prepared design.
P8
Document and analyze test results against

00148603 Mohamed Indas Mohamed Thasmeer 78


expected results.
M4
Recommend potential enhancements for the
networked systems.
D2 Critically reflect on the implemented network,
including the design and decisions made to enhance
the system.

00148603 Mohamed Indas Mohamed Thasmeer 79


00148603 Mohamed Indas Mohamed Thasmeer 80

You might also like