Assignment Networking
Assignment Networking
Assignment networking
Date
Grade: Assessor Signature:
ii
I understand the feedback given to me and agree to carry out the ac琀椀ons in
Date
future works as required and indicated.
Please note that grade decisions are provisional. They are only con昀椀rmed once internal and external
modera琀椀on has taken place and grades decisions have been agreed at the assessment board.
Programme:
Unit:
Plagiarism
iii
Plagiarism is a par琀椀cular form of chea琀椀ng. Plagiarism must be avoided at all costs and students
who break the rules, however innocently, may be penalised. It is your responsibility to ensure
that you understand correct referencing prac琀椀ces. As a university level student, you are
expected to use appropriate references throughout and keep carefully detailed notes of all your
sources of materials for material you have used in your work, including any material
downloaded from the Internet. Please consult the relevant unit lecturer or your course tutor if
you need any further advice.
Student Declara琀椀on
Student declara琀椀on
I cer琀椀fy that the assignment submission is en琀椀rely my own work and I fully understand the consequences
of plagiarism. I understand that making a false declara琀椀on is a form of malprac琀椀ce.
iv
Table of Contents
Assignment Brief (RQF)............................................................................................................i
LO1. Introduction............................................................................................................................1
1.1. Background.......................................................................................................................1
1.3. Objective...........................................................................................................................1
1.7. Plan..................................................................................................................................20
LO2. Hardware..............................................................................................................................21
2.1.1. Hub............................................................................................................................21
2.1.2. Switch........................................................................................................................22
2.1.3. Router........................................................................................................................23
2.1.4. Bridge........................................................................................................................25
2.1.5. Gateway.....................................................................................................................26
2.1.6. Repeater.....................................................................................................................27
2.2. Inter-dependance..............................................................................................................29
LO3. Implementation.....................................................................................................................32
3.1. Design..............................................................................................................................32
3.2. Justification......................................................................................................................35
3.5. Maintenance.....................................................................................................................41
LO4. Conclusion............................................................................................................................42
4.1. Implementation................................................................................................................42
4.2. Verification......................................................................................................................43
References......................................................................................................................................48
vi
vii
Abstract
This project focuses on the networking development process for MadZoo Digital, a start-up firm
specializing in software development and network solutions. The primary goal is to build and
construct a local area network (LAN) that meets the organization's various divisions' demands.
MadZoo Digital emphasizes the importance of networking implementation in promoting
effective communication, collaboration, and data exchange. Different network types are
investigated, considering their advantages and disadvantages, and standards must be applied to
ensure interoperability and security. Network communication rules are explored, as are the
impact of network topologies on performance.
Bandwidth needs are discussed, and the merits and downsides of common network concepts are
discussed. Protocols' function in promoting connectivity and efficient operation of networked
systems is presented, with real examples of switching concepts in action.
The assignment delves further into the operation of networking devices, emphasizing their
unique applications and functions. Different types of servers are investigated, and the
interdependence of workstation hardware and networking software is discussed, emphasizing
their collaborative nature. A variety of server types are chosen based on a specific scenario,
considering cost and performance optimization. The decision is justified by proving how the
chosen server fits the organization's needs.
The project culminates with a step-by-step strategy for designing the LAN, justifying device
selection, providing an assessment test plan, and choosing and configuring network services. A
maintenance schedule is also provided to maintain the networked system's continued efficacy.
Overall, this assignment provides a thorough approach to developing and executing an
innovative LAN for MadZoo Digital, considering networking concepts, protocols, devices, and
the organization's special requirements.
viii
Acknowledgement
I would like to express my sincere appreciation and gratitude to my Sir Shafeer, for sir
invaluable guidance, support, and mentorship throughout the process of completing this project
on the importance of networking implementation in MadZoo Digital. Thank you, sir, for your
unwavering support, mentorship, and belief in my potential.
ix
LO1. Introduction.
A start-up with a focus on network solutions, MadZoo Digital was founded in 2020. They assist
marketers in connecting with affluent audiences by translating ideas into immersive experiences
using the power of data, creativity, and technology. Due to strong demand, the company is
developing and introducing new divisions, such as Research & Development, Project
Management Office, Information Security, and Customer Service.
1.1. Background.
MadZoo Digital is a start-up focused in software development and network solutions. Through
data-driven tactics, creative design, and smart technology, the company strives to help marketers
engage with aspirational and affluent customers.
1.3. Objective.
MadZoo Digital's objective is to be a top provider of software development and network
solutions, assisting companies in successfully connecting with their target audiences and
achieving their business objectives. The company aspires to offer outstanding experiences that
increase customer engagement, enhance brand reputation, and contribute to the growth and
success of its customers by combining data-driven strategy, creative expertise, and cutting-edge
technology. MadZoo Digital seeks to be at the forefront of industry innovations, consistently
reinvent its services, and exceed customer expectations in order to establish itself as a trusted
partner in the digital landscape.
A computer network has various devices or medium that aid in communication between two
different devices known as network devices.
Router, switch, bridge, hub, Gateway, Modem, and Repeater are some examples. The network is
the interconnection of various devices, referred to as hosts, that are linked by multiple pathways
to send and receive data or media. The computer network is classified into four categories, which
are listed below: (Types of Network, 2023)
Protocols are used in networking in a variety of ways. A protocol is a set of rules or algorithms
that describe how two entities communicate across a network, and distinct protocols are specified
at each layer of the OSI Model.
Figure 2: LAN
Advantages
Low Cost
Disadvantages
Figure 3: MAN
Advantages
Disadvantages
Figure 4: PAN
Advantages
Disadvantages
confined space
Data Transmission is Slow
Radio signal interference
Figure 5: WAN
Advantages
Disadvantages
Figure 6: TOPOLOGY
Building a durable, secure, and easy-to-maintain local area network (LAN) architecture can be
make-or-break for your organization. Depending on the total network size and your aims, there
are various different types of network architecture that are ideal for different reasons.
Star topology
Bus Topology
Ring Topology
Figure 9: Ring Topology
Tree Topology
Mesh Topology
Hybrid Topology
10
Hybrid topologies integrate two or more different topological structures; for example, the tree
topology combines the bus and star patterns. Hybrid architectures are most popular in bigger
organizations where each departments have customizable network topologies according to their
demands and network consumption. (Contributor, 2019)
11
A protocol is a collection of rules: network protocols are formal standards and regulations that
specify the exchange of data packets to establish communication between two servers or more
devices through a network. They are made up of constraints, processes, and formats.
Network protocols
TCP (transfer Control Protocol) and IP (Internet Protocol) are the two most essential protocols
for data transfer across the Internet. We may connect devices that access the network by using
these together (TCP/IP); additional communication protocols linked with the Internet include
POP, SMTP, and HTTP. despite the fact that most people are unaware of it and have no idea
how it works. These protocols enable data flow from our gadgets, allowing us to surf websites,
send emails, listen to music online, and so on.
Basic packet communication protocols such as TCP/IP and HTTP are examples of
network communication protocols.
Network security protocols (HTTPS, SSL, and SFTP) establish security in network
interactions between servers.
Network management protocols, such as SNMP and ICMP, enable network maintenance
and administration.
The Open System Interconnection (OSI) paradigm logically arranges network protocol families
into network layers. The goal of this Open System Interconnection is to create an environment on
which to build communication architectures across different systems. (Interserver., 2019)
12
Frame Relay
SDH: Synchronous Digital Hierarchy
SONET: Synchronized optical network
13
Bandwidth
The maximum ability of a wired or wireless communications link to transport data via a network
connection in a certain length of time is referred to as network bandwidth. The number of bits,
kilobits, megabits, or gigabits that may be delivered in one second is sometimes referred to as
bandwidth.
The bandwidth of a data link controls how much data it can send and receive at the same time.
The amount of water that may flow via a conduit is analogous to bandwidth. The greater the
diameter of the pipe, the more water that can flow through it at the same time. The same concept
14
holds true for bandwidth. The larger the capacity of the communication channel, the more data it
can handle per second.
A web page's bandwidth influences how quickly it will load in a browser. This is likely the most
crucial thing to consider when selecting a web hosting platform. It is critical to think about how
the website and internet connection will affect bandwidth. A website with a lot of graphics may
take 10 GB or more in bandwidth. A simpler website will also need less bandwidth. A quicker
internet connection allows you to download online pages and videos more quickly, while a
higher bandwidth improves the user experience. (sharmadevesh769, 2023)
Network protocols are a collection of rules, standards, and data formats that govern how devices
communicate data across networks. These protocols are crucial to how network devices
communicate with one another. The gadgets would be unable to communicate with each other
without network protocols. (communications@[Link], 2023)
15
Switching
In computer networks, switching mechanisms are used to link devices and allow them to interact
with one another. We can also use switching strategies to move data from one device to another.
Switching enables many devices to share the same communication channel at the same time. As
a result, the network's efficiency improves. Additionally, switching allows the network to route
data to its intended destination. It also includes a method for error detection and repair. Circuit
switching, packet switching, and message switching are the three basic switching mechanisms
used in computer networks. (Datta, 2023)
o Circuit switching
In traditional telephone networks, users mostly employ circuit switching. When two devices in a
circuit-switched network wish to interact, they create a connection by establishing a dedicated
channel between them. This route is only available for the length of the conversation. As a result,
no other devices may utilize it at that moment.
Once the connection is established, users may transport data between devices via the dedicated
way. This path is often made up of a series of interconnected switches or nodes that route the
data to its final destination. (Datta, 2023)
16
Circuit switching is not widely utilized in computer networks since it is inefficient for data
transmission. The dedicated path is reserved for the length of the conversation. As a result, we
waste a lot of bandwidth at certain periods. Furthermore, circuit switching is unsuitable for
networks with large traffic levels.
However, in some specialized applications, like as satellite communications, where the latency
of packet switching might be prohibitive, we still employ circuit switching.
Advantages
o For the length of the conversation, circuit switching creates a dedicated communication
link between two devices. As a result, we set aside enough bandwidth for the whole
session. This results in assured bandwidth, which is useful for applications requiring a
consistent data flow.
o There is no packet loss since we reserve the dedicated communication for the duration of
the talk. Finally, circuit switching ensures consistent performance.
Disadvantages
17
o Circuit switching necessitates the use of a dedicated communication route for the length
of the connection. As a result, the dedicated link is not used at these periods, resulting in
wasteful bandwidth consumption.
o
o Circuit switching is not well suited for high-traffic networks. In big networks, this
restricts the scalability of circuit switching.
o
o Finally, dedicated resources, such as switches or nodes, are required to construct the
dedicated communication line. As a result, the expenses of building and maintaining
circuit-switched networks may be prohibitively expensive.
o Packet Switching
Packet switching is a means of transmitting data across a network. We separate data into
individual packets and send them across the network independently. Each packet contains the
contents as well as the destination address needed to route the packet to its destination.
In packet switching, each packet travels across the network independently and might take several
pathways to its destination. Because we may send numerous packets across the same network at
the same time, this method makes better use of network resources. (Datta, 2023)
18
The Internet is built on packet switching, which employs the Transmission Control
Protocol/Internet Protocol (TCP/IP) set of protocols to communicate between devices. In this
system, we send packets between devices, and routers along the way utilize the destination
address information in each packet to route it to the next hop until it reaches its destination.
Advantages
o It enables many packets to be broadcast over the network at the same time, making better
use of the available bandwidth. Packet switching is a strong and dependable data transfer
technology. Because we route packets individually over the network, if one packet is lost
or delayed, it has no effect on the delivery of subsequent packets. Packet switching is
extremely adaptable. It adapts quickly to shifting traffic patterns and network
circumstances.
Disadvantages
o The act of dividing data into packets and appending header information to each packet
can add overhead and latency to the transmission process. This might lengthen the time it
takes packets to reach their destination. Furthermore, it has the potential to lower total
data transfer speed. It is susceptible to security risks such as packet snooping. This has
the potential to jeopardize the privacy and security of data transferred across the network.
Furthermore, especially in bigger or more complicated networks, it can be difficult to set
up and administer.
o Message Switching
Message switching was a prominent data transfer mechanism in the early days of networking,
prior to the advent of packet switching. A message is divided into fixed-length blocks or frames
in message switching. Furthermore, we send each frame via the network individually.
Furthermore, until the full message is received, each intermediary node keeps the frames.
Finally, the message is sent to its destination via the nodes. Unlike packet switching, message
switching is a store-and-forward data transport technique. That is, each intermediary node saves
the complete message until it can be transmitted to the next node. When compared to packet
19
switching, this might result in longer transmission delays. We can only send each message if an
intermediary node gets all of its components. (Datta, 2023)
Advantages
o Message switching is a very dependable data transport technology. The full message is
stored by each intermediary node until it can be transmitted to the next node. Because we
hold each message at intermediary nodes before sending it, we limit the chance of data
loss or corruption.
o It is a basic data transmission technology that does not need complicated routing
algorithms or network management approaches. This makes it simple to set up and
administer, especially in tiny or low-bandwidth networks.
o Message switching offers a lower overhead than other data transfer techniques. This
means that there is greater accessible bandwidth for data transmission.
Disadvantages
o When compared to other approaches, such as packet switching, message switching has a
larger delay. Furthermore, because each intermediary node must keep the complete
message until it can be sent, it might be wasteful in terms of network resource
consumption.
20
Practical situation
1. Packet switching
o To transfer data between devices on the Internet, packet switching is used.
o Packet switching is used by video streaming services to provide video material to
customers.
o To provide real-time gaming experiences, online gaming platforms employ packet
switching.
2. Circuit switching
o Analog telephone networks employ circuit switching to create a dedicated
communication link between two devices for the duration of the communication
session.
o Optical mesh networks employ circuit switching to offer a guaranteed data rate
between the transmitter and receiver.
o The Public Switched Telephone Network (PSTN) employs circuit switching to create
a dedicated communication link between two devices for the duration of the
communication session.
3. Message switching
o Early computer networks featured message switching.
o Message switching was employed by telegraph message switching centers.
1.7. Plan.
The most appropriate topology protocol would be the Star Topology with the TCP/IP protocol
suite based on the scenario of deploying a client-server architecture in the company.
The Star Topology is well-suited for client-server architectures because it provides for a
centralized server that can effectively manage requests from several clients. In this architecture,
each department's PCs (clients) would be connected to a central switch or hub, which would then
be connected to the server.
21
The TCP/IP protocol suite is the best option for efficient network use. TCP/IP is a widely used
collection of protocols for internet communication that is extremely scalable, dependable, and
adaptable. It ensures accurate and efficient data transmission between the server and clients.
Implementing the client-server architecture with the Star Topology and TCP/IP protocol suite
would allow for effective communication between clients in different departments and the
central server. The server would process requests, maintain data, and give services to clients,
guaranteeing smooth operations and optimal network use.
LO2. Hardware.
2.1. Network devices.
Network devices are, at their heart, communication devices. They are the components necessary
for hardware communication and interaction on a computer network. Electronic equipment such
as fax machines, computers, printers, and other IT infrastructure may be included in this gear.
The fundamental function of network devices is to send and receive data in a timely and secure
manner. "Network Devices" refers to a large category of communication equipment that includes
hubs, switches, routers, bridges, gateways, load balancers, modems, repeaters, and other devices.
(A Guide to Network Devices - Restorepoint, 2023)
2.1.1. Hub
A Network Hub is one of the most popular networking devices that may be found on any small
network, such as a home or business network. The physical layer of the OSI model is where the
hub functions. It is the most basic networking equipment, hence it is inexpensive. A hub is just a
repeater with many ports. A hub's role in networking is similar to that of a repeater. It broadcasts
data and transmits data in the form of binary bits.
Types of hub,
o Passive Hub
o Active Hub
22
o Intelligent Hub
Functions,
o When a Hub gets data from one of the connected devices, it sends it to all of the other
ports without first checking for the target device, except the port through which the data
was received. The diagram below depicts the operation of a HUB.
2.1.2. Switch
A switch is a physical component in a network that filters and forwards network packets from
one networking device (switch, router, computer, server, and so on) to another. It is common in
local area networks (LANs) to deliver each incoming message frame by inspecting the physical
device address, also known as the Media Access Control address (MAC address).
23
A switch is really a multiport network bridge that employs hardware addresses to process and
forward data at the OSI model's data link layer (layer 2). By integrating routing operations,
certain switches may also handle data at the network layer (layer 3). These switches are also
known as layer 3 switches or multilayer switches.
Functions,
o Connect numerous hosts: A switch often provides a large number of ports for cable
connections, enabling star topology routing. It is typically used to link numerous
computers to a network.
o Message is forwarded to a certain host: A switch, like a bridge, employs the same
forwarding or filtering logic on each port. When a host on the network or a switch
delivers a message to another host on the same network or switch, the switch receives and
decodes the frames to read the message's physical (MAC) address.
o control traffic: A switch in networking can easily control traffic entering and departing
the network, as well as link devices such as PCs and access points.
2.1.3. Router
The router is a physical or virtual internetworking equipment that receives, analyzes, and
transmits data packets between computer networks. A router checks a data packet's destination IP
24
address and utilizes headers and forwarding tables to determine the best path to transport the
packets. Cisco, 3Com, HP, Juniper, D-Link, Nortel, and other well-known firms manufacture
routers.
A router operates on the third layer of the OSI model and is based on a computer's IP address. It
communicates between two or more networks using protocols like as ICMP. It is also called as
an intelligent device since it can automatically compute the optimal route to transfer network
packets from source to destination. In LAN (Local Area Network) and WAN (Wide Area
Network) contexts, a router is employed. It is used in workplaces for connectivity, for example,
and it may also connect distant networks, such as those from Bhopal to Mumbai. It
communicates with other routers in the network. It transfers data across a network using the
routing protocol.
A router operates on the third layer of the OSI model and is based on a computer's IP address. It
communicates between two or more networks using protocols like as ICMP. It is also called as
an intelligent device since it can automatically compute the optimal route to transfer network
packets from source to destination.
Functions,
25
o A router operates on the OSI model's third layer (Network Layer), and it may connect
with its neighboring devices through IP addresses and subnets.
o A router delivers high-speed internet access via several ports such as gigabit, fast-
Ethernet, and STM link port.
o It enables users to adjust the network port according to their needs.
o The central processing unit (CPU), flash memory, RAM, Non-Volatile RAM, console,
network, and interface card are the key components of routers.
2.1.4. Bridge
A bridge in a computer network is one kind of network device, used to separate a network into
sections. Every section in the network represents a collision domain that has separate bandwidth.
So that network performance can be improved using a bridge. In the OSI model, a bridge works
at layer-2 namely the data link layer. The main function of this is to examine the incoming traffic
and examine whether to filter it or forward it.
Functions,
o This networking device divides local area networks into many pieces.
o It operates at the data connection layer in the OSI paradigm.
26
o It is used to save the MAC address of a PC in a network and also to reduce network
traffic.
2.1.5. Gateway
A gateway is a network hardware device that is used to communicate between two networks that
utilize different transmission protocols, and it serves as an entrance and exit "Gate" for the
networks, allowing all data to bypass the gateway before being routed. Gateways can be used to
connect WANs and LANs. The gateway works as a "Translator" between two systems that
employ different communication protocols, data formats, or architectures. It might be a server,
router, firewall, or any other network device that allows traffic to flow into and out of the
network.
Functions,
o It enables the movement of all information over the Web and serves as the entrance point
for numerous networks, allowing users to execute a variety of operations such as sending
email, navigating the Web, purchasing products and services via the Web, and so on.
o It acts as a link between sensors and internet gadgets.
o The use of a gateway increases the battery life of sensors and other devices.
27
o It is possible to communicate with sensors and internet devices using multiple protocols
and then transform the data into a common protocol that can be delivered to the cloud by
utilizing a gateway.
o It aids in reducing latency when preparing information.
2.1.6. Repeater
Repeaters are network hardware devices that act at the physical layer of the OSI model to
amplify or regenerate signals before retransmitting them. "Signal Boosters" are another name for
repeaters. A repeater may extend a data signal from one network segment and then pass it to
another, thereby increasing the network size. The repeater allows data to be sent over long
distances while still ensuring data security and quality. It may also re-transmit data while
securely retaining the signals. Due to the limitations of signal propagation over larger distances,
a repeater was launched for wired data communication networks, but now easy installation in
wireless networks for cell scaling is available.
28
Functions,
29
Functions,
2.2. Inter-dependance.
In networking, interdependence refers to the link between distinct networks in which nodes in
one network require assistance from nodes in another network. This notion is an area of network
research that deals with phenomena generated by complicated network interactions. Here are a
few crucial points concerning interconnected networks:
30
When a node in one network fails, the dependent nodes in other networks fail, which can cause
more harm to the initial network, resulting in cascading failures and potentially catastrophic
effects.
Interdependence across networks can lead to fragmentation as a result of a rapid cascade, which
can be studied to better understand the interaction and robustness of nodes in various networks.
Infrastructure networks are highly interdependent, with power stations that comprise the nodes of
the power grid requiring fuel transported via a network of roads or pipes and being controlled by
nodes of the communications network.
Dependency links reflect the requirement for network assistance, whereas links in a conventional
network represent connectivity.
Figure 24:interdependence
The source nodes SA and SB are considered to be self-sufficient in terms of both power and
communication in the initial phase (tstep1), while the remainder of the nodes and lines are
blacked out. As we get to tstep2, we can restore A1 and B1 since they supply power and
communication to each other. We can restore A3 in step 3 since we have electricity from A1 and
a communication link from B1. In step 4, we restore A4 and B3. Finally, in tstep5, we may
restore A2 and B2. (Figure 1: Illustrative example of interdependent networks, 2023)
31
1. Application server - These servers host web applications (computer programs that run
inside a web browser), allowing network users to run and utilize them without having to
install a copy on their own machines. These servers are not required to be part of the
World Wide Web. Clients are computers equipped with a web browser.
2. Catalog server - These servers keep an index or table of contents of information that may
be discovered throughout a vast dispersed network. A distributed network may comprise
computers, users, files shared via file servers, and web apps. Directory servers and name
servers are two examples of catalog servers. Their clients are any computer programs that
need to find something on the network.
3. Communications server - These servers maintain the environment required for one
communication endpoint to locate and communicate with other endpoints. Depending on
the network's openness and security standards, these servers may or may not include a
directory of communication endpoints and a presence detection service. Their clients
serve as communication hubs.
4. Computing server - These servers use a network to share massive quantities of computing
resources such as CPU and random-access memory. These servers may be used for any
computer software that requires more CPU power and RAM than a typical desktop
computer can provide. To implement the client-server concept, the client must be a
networked computer.
5. Database servers- manage and share any type of database across a network. A database is
a structured collection of data that may be shown in a table. Spreadsheets, accounting
32
software, asset management software, and nearly any computer application that consumes
well-organized data, especially in huge amounts, are clients of these servers.
6. Fax server - A fax server is a server that shares one or more fax machines via a network,
eliminating the need for physical access. These servers' clients are any fax sender or
recipient.
7. File server - Distributes files and directories over a network, as well as storage space for
files and folders. Clients are designed to be networked computers, yet local programs can
also be clients.
8. Game servers- allow many computers or gaming devices to play multiplayer games.
Their clients are personal PCs or game consoles.
9. letter server - These servers enable email communication in the same manner that a post
office enables snail letter communication. Clients of these servers are email senders and
receivers.
10. Print server - These servers distribute one or more printers across a network, eliminating
the need for physical access. Their customers are computers that require printing.
11. Proxy server - This server operates as an intermediate between a client and a server,
taking incoming client communication and forwarding it to the server. Content
management and filtering, enhancing traffic throughput, preventing unwanted network
access, and simply routing data across a big and complicated network are all reasons to
utilize a proxy server. Clients can be any networked machine.
12. Web server - A server that hosts web pages. A web server is what makes the World Wide
Web possible. Each website is served by one or more web servers. Clients are computers
that have a web browser.
Apache HTTP Server: Apache is a popular open-source web server that is well-known for its
flexibility and large feature set. For many years, it has been a major participant in the web server
business. Apache is well-known for its capacity to manage several concurrent connections as
well as its support for a diverse set of modules and extensions. It is very customisable and works
well with a variety of operating systems.
Justification:
33
Cost: Because Apache HTTP Server is open-source and freely available, it is a low-cost choice.
There are no license fees while utilizing Apache, which helps to save costs.
Performance: Apache works well in cases with a large number of concurrent connections. It
features a strong and mature design that can successfully manage enormous traffic levels.
LO3. Implementation.
3.1. Design.
Following the installation of the workspace, the appropriate devices should be connected
to the network.
34
The network for MadZoo firm consists of four networks: research and development (5
PCs & 1 Printer), project management (3 PCs), information security (3 PCs), and
customer service (2 PCs & 1 Printer).
Each of these networks has a switch that allows these devices to be connected to one
another.
A router is used to bring these networks together.
Another network is set up to store data in a server.
Click the "Config" tab after selecting a device (PC, printer, or server).
Configure each device's IP address, subnet mask, default gateway, and DNS server
settings.
Determine which device (PC or server) will function as the DHCP server.
Enable the DHCP service by clicking the "Services" tab.
35
Configure the IP address range, subnet mask, default gateway, and DNS server settings
for DHCP.
To access the command line interface, double-click the switch and pick the "CLI" tab.
Follow the following steps in the figure below,
Configure access control lists (ACLs) on the switch to manage traffic flow and improve
security.
Use a fire wall in between the router and the networks in order to protect the data that
containing in these networks.
36
Using the necessary tools in Cisco Packet Tracer, draw a network diagram.
Record the IP addresses, VLAN configurations, switch settings, and any security
measures that are in place.
3.2. Justification.
1. Switches:
Switches are necessary for establishing a LAN network and allowing
communication among devices on the local network.
They include many ports for connecting PCs, printers, and other devices, making
data transfer more efficient.
Switches include characteristics such as VLAN support, QoS capabilities, and
link aggregation, allowing for improved network administration and performance
optimization.
2. PCs:
Employees' principal gadgets for day-to-day work are personal computers (PCs).
Each department requires a specified number of PCs in order for their employees
to do their duties properly.
37
PCs are selected based on their processing power, memory, and other specs that
fit the company's needs.
3. Printers:
Printers are required for departments that require tangible document output, such
as research and development and customer service.
The printers chosen should fulfill the printing requirements of the individual
departments in terms of quality, speed, and functionality.
4. Firewall:
The firewall is an important security mechanism that guards the LAN network
from unauthorized access, threats, and assaults.
It monitors and filters network traffic according to established criteria, preventing
harmful activity and ensuring network security.
Firewalls can also enable VPN (Virtual Private Network) connection and
intrusion detection/prevention, hence improving network security.
5. Router:
The router serves as a bridge between the LAN network and other networks, such
as the internet.
It connects employees to the internet, allowing them to access online resources,
interact with other parties, and use cloud services.
Routing protocols and traffic control functions are enabled by routers, providing
effective data routing between the LAN and external networks.
6. Server:
The server is crucial to the network's and its users' ability to access different
services and resources.
It can house programs, databases, and files that employees must access and share.
Servers allow centralized data storage, backup and recovery capabilities, and
improved staff communication.
38
Testing scope: The following elements are included in the scope of the test plan:
1. Bandwidth: Determine if the network infrastructure can manage the needed bandwidth for
each department.
Testing approach:
1. Bandwidth Testing:
a. 2.1. Determine the cost of the suggested design by taking into account the following
factors:
- The cost of computers, printers, servers, and routers.
- The cost of networking hardware (switches, cables, and so on).
- Software license costs (if applicable).
- The expense of upkeep and support.
b. 2.2. Compare the overall cost of the suggested design to the budget allotted for the
project
39
c. Confirm that the suggested design fits within the budget limits.
Test cases:
1. Bandwidth Testing:
40
DHCP, which stands for Dynamic Host Configuration Protocol, is a network protocol that is
used to automatically assign IP addresses to computers and devices connected to the internet.
41
o Define the IP address range that will be assigned to client devices by the
DHCP server.
o Enter the scope's starting and terminating IP addresses, subnet mask, default
gateway, and DNS server addresses.
2. Lease Duration:
o Define the lease period, which is the amount of time a client may use an
issued IP address before it must be renewed.
o Based on your network requirements and the estimated number of devices,
select a suitable lease length.
3. DHCP Options:
o Configure DHCP options to offer clients with extra network parameters.
o Configure domain name, DNS servers, NTP servers, and other pertinent
information.
4. Reservations:
o Assign specific IP addresses to devices by creating reservations.
o Specify the MAC address and the corresponding IP address for devices that
require a static assignment.
4. Activate DHCP Server:
- Start delivering DHCP requests from client devices by activating the DHCP server.
- Check that the DHCP service is operating and that it is set to start automatically when
the system boots.
5. Verify DHCP Functionality:
- Connect a client device to the network and verify it is set to automatically get an IP
address (DHCP client mode).
- The DHCP server should provide the client with an IP address, subnet mask, default
gateway, and other configurable information.
6. Monitoring and Troubleshooting:
- Keep an eye on the DHCP server for any possible problems.
- Track DHCP server performance, lease allocations, and client activities using logging
and monitoring tools.
42
3.5. Maintenance.
1. Equipment Inventory and Documentation:
- Compile an inventory of all computers, printers, and network devices in each
department.
- Keep a record of each device's specs, serial numbers, and settings for future reference.
- Keep a consolidated record of network diagrams, IP addresses, and software
licensing.
2. Preventive Maintenance:
- To avoid dust collection and overheating, schedule periodic inspections and cleanings
of computers, printers, and network equipment.
- Perform frequent hardware checks, including power supply, fans, and cables, to
proactively detect and fix possible issues.
- Perform system backups and data integrity checks to protect against data loss.
3. Network Performance Optimization:
- Examine network traffic patterns for possible bottlenecks and adjust network
parameters accordingly.
- Monitor and regulate bandwidth utilization to ensure that the network runs smoothly.
- To prioritize key applications and services, use Quality of Service (QoS) rules.
4. Security Measures:
- Update and patch operating systems, software programs, and firmware on a regular
basis to address security vulnerabilities.
- Install and maintain strong firewalls and intrusion detection/prevention systems.
- Perform routine security audits and penetration testing to identify and mitigate any
risks.
5. Printer and Peripheral Maintenance:
- Regularly clean and maintain printers, scanners, and other peripherals.
- To ensure high-quality printing, calibrate and align printer heads.
- To reduce damage and downtime, train users on correct printer and peripheral
handling.
43
LO4. Conclusion.
4.1. Implementation.
- Network infrastructure:
- Set up a central network switch or switches to connect all of the computers
and printers in the various departments.
- Set up the network switch(es) to accommodate the desired number of devices
while also providing adequate network bandwidth.
- Research and development department:
- Connect the network switch to the 5 PCs and 1 printer in the Research and
Development department.
- Assign IP addresses to each machine and set them to automatically get IP
addresses using DHCP (Dynamic Host Configuration Protocol).
- Set up the Research and Development team's file sharing and shared network
resources.
- Project management office:
- Connect the network switch to the three PCs in the Project Management
Office.
44
45
4.2. Verification.
1) Open the Command Prompt: On your computer, open the Command Prompt by clicking
on the Windows button and entering "cmd" into the search box.
2) Ping the following command: Enter "ping" and the IP address or domain name of the
device to be tested. It would be "ping [Link]" in this case.
3) Enter the following: To run the Ping command, press Enter.
4) View the outcomes: Examine the Ping command results to check if the device is
reachable and how long it takes to obtain a response. The number of packets transmitted,
received, and lost, as well as the round-trip time (RTT) for each packet, will be displayed
in the results.
5) To use extended Ping, type "ping" followed by the IP address or domain name of the
device you wish to test, then add the "-t" option to ping the device continually. It would
be "ping -t [Link]" in this case.
6) View the outcomes: Examine the results of the extended Ping command to determine
whether or not the device is reachable and how long it takes to obtain a response. The
46
number of packets transmitted, received, and lost, as well as the RTT for each packet,
will be updated in real time.
7) Analyze the results: Examine the Ping and extended Ping commands to see if the device
is reachable and how long it takes to obtain a response. If there are dropped packets or
excessive RTT values, network connectivity difficulties may exist and must be resolved.
Analysis:
The test results show that all four packets were properly delivered and received without loss after
the ping and extended ping verification to the IP address [Link]. This result is good,
47
indicating a steady and dependable network connection between the source and destination IP
addresses.
In terms of expected outcomes, obtaining 100% success with no packet loss corresponds to the
intended outcome for a ping test. It indicates that network connectivity to the provided IP address
is stable and uninterrupted, with no visible difficulties interfering with communication between
the source and destination.
Quality of Service (QoS) is crucial in ensuring that critical applications and communication
devices receive the network resources and prioritization they require. Proper bandwidth
management becomes increasingly important as the network expands and more communication
devices are added. QoS allows traffic to be prioritized, ensuring that critical communication
devices such as VoIP phones or video conferencing systems receive the necessary bandwidth and
latency, resulting in a flawless communication experience.
Another essential factor is the incorporation of wireless access points (WAPs). By deploying
WAPs around the premises, wireless devices may be easily connected and expanded. Additional
WAPs can be built as the number of wireless devices grows to ensure enough coverage and
bandwidth. To allow higher device density and deliver faster wireless rates, WAPs must support
the most recent wireless standards, such as Wi-Fi 6.
48
Intrusion Detection and Prevention Systems (IDPS): Using IDPS systems can assist identify and
prevent harmful network activity. IDPS analyzes network traffic, identifies possible threats or
intrusion attempts, and generates warnings or performs mitigation steps. IDPS solutions help to
maintain a secure network environment by proactively recognizing and responding to security
problems.
Encryption and virtual private networks (VPNs): When sending sensitive data over public
networks or between remote locations, it is critical to use encryption methods and virtual private
networks (VPNs). Encryption protects data during transmission by rendering it unreadable to
unauthorized parties. VPNs protect and encrypt remote access tunnels, preserving data security
and integrity.
References
49
Contributor, s. (2019, 08 15). What is Network Topology? Best Guide to Types & Diagrams .
Retrieved from DNSstuff: [Link]
50