INTERNATIONAL SCHOOL OF
MANAGEMENT AND TECHNOLOGY
FACULTY OF COMPUTING
ASSIGNMENT COVER SHEET
This form is to be completed by students submitting assignments of level 4 and level 5.
Students are required to complete all sections and attach to your assignment.
STUDENT DETAILS
STUDENT NAME Amar Mahaseth
STUDENT ID
UNIT AND ASSIGNMENT DETAILS
UNIT TITLE Unit 2: Networking
UNIT NUMBER M/618/7393
ASSIGNMENT Cutting Edge IT Solution Network System
TITLE
ISSUE DATE 29/03/2023 DUE DATE 28/05/2023
ASSESSOR
NAME
ESTIMATED
WORD LENGTH
SUBMISSION
HAND IN DATE
DECLERATION AND ACKNOWLEDGEMENT
When submitting assignments, each student must sign a declaration confirming
that the work is their own.
Plagiarism and Collusion
Plagiarism: to use or pass off as one’s own, the writings or ideas of another
without acknowledging or crediting the source from which the ideas are taken.
Collusion: submitting an assignment, project or report completed by another
person and passing it off as one’s.
In accordance with the Academic Integrity and Plagiarism Policy:
1. I declare that:
a) this assignment is entirely my own work, except where I have included fully-
documented references to the work of others,
b) the material contained in this assignment has not previously been submitted
for any other subject at the University or any other educational institution,
except as otherwise permitted,
c) no part of this assignment or product has been submitted by me in another
(previous or current) assessment, except where appropriately referenced, and
with prior permission from the Lecturer / Tutor / Unit Coordinator for this unit.
2. I acknowledge that:
a) if required to do so, I will provide an electronic copy of this assignment to the
assessor;
b) the assessor of this assignment may, for the purpose of assessing this
assignment:
I. reproduce this assignment and provide a copy to another member of
academic staff;
II. communicate a copy of this assignment to a plagiarism checking
service such as Plagiarism Check (which may then retain a copy of this
assignment on its database for the purpose of future plagiarism
checking).
I am aware of and understand that any breaches to the Academic Code of Conduct
will be investigated and sanctioned in accordance with the College Policy.
SIGNATURE DATE
Table of Contents
Executive Summary.......................................................................................................................4
Activity 01.......................................................................................................................................5
Presentation....................................................................................................................................5
IPV4..............................................................................................................................................15
IPV6..............................................................................................................................................15
HTTPS..........................................................................................................................................15
FTP................................................................................................................................................16
Networking Devices.....................................................................................................................16
Types Of Network Devices..........................................................................................................16
Network Server Types.................................................................................................................18
Workstation Hardware...............................................................................................................18
Conclusion....................................................................................................................................19
Activity 02.....................................................................................................................................20
Design of the Network.................................................................................................................20
Device Configuration and Security Considerations.................................................................21
Maintenance Schedule.................................................................................................................21
Test Plan.......................................................................................................................................22
Feedback Form............................................................................................................................23
User Feedback and Analysis.......................................................................................................24
Network Server Selection............................................................................................................25
Justification of Server Selection.................................................................................................25
Activity 3.......................................................................................................................................26
Implementation of the Network Design.....................................................................................26
Optimized Design.........................................................................................................................26
Configuration...............................................................................................................................27
Executive Summary
The opening of a new branch in Butwal by Cutting Edge IT Solution necessitates a secure,
efficient, and scalable network infrastructure. The network design must ensure isolation of all
four departments, have a mixture of wired and wireless connectivity, and provide access to the
required documentation and software. Additionally, the network must be designed to minimize
lag of data traffic between floors and eliminate connectivity dead spots. Our proposed network
topology includes the installation of a firewall to prevent data breaches and allow inbound and
outbound traffic. We will use VLANs to create secured areas on the network for each team, with
access restricted to team members and their respective team leaders only. All documentation and
office software will be located on a file server. To ensure proper communication between
devices and networks, we will employ TCP/IP protocols. Networking devices such as routers,
switches, firewalls, and repeaters will be used in accordance with their operating principles to
ensure the network infrastructure is reliable, efficient, and secure. We will also configure
workstation hardware and the relevant networking software for optimal performance.
Activity 01
Presentation
Slide 1 Title
In this first slide we discussed about Introduction, As an IT officer of Cutting-Edge IT Solution,
my role is to design, implement, and optimize the network system for the new branch office in
Butwal. In this presentation, I will discuss the networking principles and topology, devices, and
their operating principles and propose a suitable topology for the scenario.
Slide 2 Types of Networks
In this second slide we discussed about Types of Networks, A Personal Area Network (PAN) is a
type of network that enables electronic devices to communicate with each other within a short
range, typically up to 10 meters, in the immediate vicinity of the user (Yulia Volyntseva, 2020).
Benefits
Data Protection
cost-effective
easy to use and maintain
Space-Saving
Stability and reliability
concurrent multiple connections
Constrain
Network performance is impacted by sluggish data transmission speeds.
Coverage area is restricted, which limits the range of network connectivity.
Radio signals may be disrupted, resulting in interference and signal degradation.
A Local Area Network (LAN) refers to a collection of computers and devices that are
interconnected via a common communication line or wireless connection, with the purpose of
sharing resources and data through a central server (Bhardwaj, 2020).
Benefits
Resource sharing
Improved communication
Centralized data management
Enhanced security
Scalability
Constrain
Limited geographical range
Network congestion
Security vulnerabilities
Dependence on network hardware
Compatibility issues
Slide 3 Types of Networks
In this third slide we discussed about types of networks, A Metropolitan Area Network (MAN)
refers to a computer network that links together computers within a metropolitan area, which
could be a single large city, multiple towns/cities, or a large geographical region encompassing
several buildings (Taylor, 2022).
Benefits
Enhanced connectivity
Improved collaboration
Cost-effective
Scalability
Centralized management
Constrain
Limited coverage
Limited bandwidth
Cost
Complexity
Vulnerability to disruptions
A Wireless Area Network (WAN) is a type of network that enables the transmission of voice,
data, images, and videos across a wide geographical area, by combining Local Area Networks
(LANs) and Metropolitan Area Networks (MANs) (Mishal Roomi, 2020).
Benefits
Geographical Coverage
Scalability
Cost-Effective
Increased Productivity
Centralized Management
Constrain
Complexity
Reliability
Security Risks
Performance
Compatibility
Slide 4 Network Standards
In this Fourth slide we discussed about Networks Standards, A model called the Open Systems
Interconnect (OSI) has been conceptualized to describe networking and telecommunications
systems. It consists of seven layers, each with its unique role and function (Shaw, 2022).
TCP/IP is the communication protocol utilized by computers to connect to the internet. It
comprises a set of protocols that enable the creation of a network of networks, allowing a host
device to access the internet (Margaret Rouse, 2021).
The IEEE 802.11 standard, also referred to as WIFI, defines the structure and requirements of
Wireless Local Area Networks (WLANs). These networks utilize radio waves at high
frequencies to establish connections between nodes (Shaw, 2022).
Slide 5 Network Design
In this fifth slide we disused about Network Design and types of Network Topology, the term
network topology refers to the way in which nodes, such as routers and switches, are arranged
and interconnected within a network. This arrangement is typically depicted in the form of a
graph or diagram, showing the connections between the various nodes (TIM KEARY, 2023).
Types of network topology
The mesh topology is a distinctive type of network architecture where each computer in the
network is directly connected to all other computers (Halstead, 2015).
Advantages of Mesh Topology
Easy installation.
Compared to mesh and star topologies, fewer cables are needed in other network
topologies.
Simple to oversee and extend.
Disadvantages of Mesh Topology
The performance of the backbone is crucial in a network.
At any given moment, data can only flow in a single direction within a network.
During periods of high traffic, network congestion can easily occur.
A central router or access point forms the hub of a star network, connecting all the nodes or
terminals in the network to it (Proctor, 2018).
Advantages of Star Topology
A switch, acting as a central point, makes it simple to manage a star network.
Adding or removing nodes is a straightforward process in a star network.
Low cable usage
Disadvantages of Star Topology
If the central switch fails or goes down, then the entire network may be affected and stop
functioning until the issue is resolved.
The performance of the switch is critical to the functionality of the network in a star
topology, making the network dependent on the switch's performance.
The network size in a star topology is limited by the finite number of switch ports
available.
A ring topology is a network architecture where every device is connected to exactly two other
devices, forming a circular ring with all connected devices. The connection between devices is
established using a coaxial or RJ-45 cable (Agarwal, 2022).
Advantages of Ring Topology
Ring topology offers good performance in high-traffic networks.
Ring topology can be fault-tolerant without a central node.
Disadvantage of Ring Topology
A failure at any point in the ring can cause the entire network to fail.
Troubleshooting and finding faults in the network can be challenging due to the
complexity of the circular layout.
The addition or removal of nodes in a ring topology can be difficult and disruptive to the
entire network.
This is a straightforward physical network topology commonly utilized in Local Area Networks
(LANs). It involves connecting all nodes in the network through a single cable, known as the
"backbone". However, if the backbone cable is damaged, the entire network may become
inoperative (Agarwal, 2020).
Advantages of Bus Topology
Bus topology is relatively simple and inexpensive to set up, as it requires less cabling
than other topologies.
It can be easy to extend or expand the network by simply adding new nodes to the bus.
Bus topology can be a good option for small networks that have a low amount of traffic.
It can provide efficient performance in networks that have a limited number of devices.
Disadvantages of Bus Topology
A single point of failure exists in bus topology: if the backbone cable fails, the entire
network will fail.
Bus topology performance can be impacted when multiple devices transmit data
simultaneously, leading to signal collisions and data loss.
Troubleshooting and identifying faults in a bus topology can be challenging due to its
linear layout.
As more nodes are added to the network, the bus can become congested, leading to
performance degradation.
Hybrid Topology
Hybrid topology is a network configuration that utilizes at least two different network topologies,
such as bus topology, ring topology, mesh topology, tree topology, and star topology, in
combination to form a more complex network architecture (Agarwal, 2023).
Advantages of Hybrid Topology
Hybrid topology allows for customization and flexibility in designing the network
according to specific business needs.
It can support a larger number of nodes and provides more redundancy and fault
tolerance compared to individual topologies used alone.
The use of multiple topologies provides the benefits of each individual topology,
resulting in improved performance, reliability, and scalability.
Hybrid topology is cost-effective, as it allows businesses to use existing network
infrastructure while incorporating new technologies.
Disadvantages of Hybrid Topology
Hybrid topology can be complex and difficult to manage, requiring skilled network
administrators to configure and maintain the network.
The use of multiple topologies can lead to compatibility issues between different
technologies, resulting in decreased network performance and reliability.
It may require additional hardware and software to integrate different topologies, which
can increase the overall cost of the network.
Troubleshooting network issues in a hybrid topology can be more difficult and time-
consuming due to the complexity of the network
(The network design of Cutting-Edge IT Solution uses Hybrid Topology.)
Slide 6 Bandwidth Requirements
In this sixth slide we discussed about Bandwidth requirements for the Topologies, Bandwidth is
a term commonly used to refer to the amount of data that can be transferred over a network in a
given time, usually measured in bits per second (Bps). However, it can also be used informally to
describe a person's mental capacity for performing tasks or engaging in deep thought at a
particular moment (LIBERTO, 2022).
Slide 7 Network Protocols & Principles
In this seventh slide we discussed about Network protocols and Principles, IPv4 which stands for
Internet Protocol Version 4, is a widely adopted protocol for transmitting data across various
types of networks. It is the fourth version of the Internet Protocol and is commonly used in data
communication (Rouse, 2017).
IPv6, the most recent iteration of the Internet Protocol, offers a significant improvement over its
predecessor, IPv4. One of the major enhancements is the substantial increase in the number of
unique IP addresses that can be assigned to computers and devices connected to the Internet.
With IPv6, the quantity of addresses available is effectively unlimited, eliminating the previous
shortage of IP addresses (Anmol, 2022).
The Hypertext Transfer Protocol Secure (HTTPS) is a variant of the standard HTTP protocol,
with an added layer of security. This security layer is provided by the Secure Sockets Layer
(SSL) extension, which facilitates the safe transmission of data over a network. By using an SSL
certificate, HTTPS ensures that data exchanged between the client and server remains secure and
protected from unauthorized access or interception (Patel, 2021).
A TCP-based network, such as the Internet, uses the FTP protocol, also known as the File
transfer Protocol, to move files from one host to another (Harris, 2021).
Slide 8 Devices Operating Principles
In these eight slides we discussed about Devices Operating Principles and types of network
devices, Networking devices refer to physical equipment that facilitates the exchange and
coordination of data among hardware components within a computer network. Each networking
device operates within a specific segment of the network and serves a unique purpose
(Priyanshu, 2022).
A switch is a network device that has multiple ports and is equipped with a buffer and design
features that enhance its efficiency and performance. The high number of ports allows for better
traffic management, which results in improved network performance (Priyanshu, 2022).
A router is a type of network device that shares similarities with a switch, but its main function is
to direct data packets to their intended destinations based on their IP addresses. Operating
primarily at the Network Layer, a router is often referred to as an intelligent device due to its
ability to autonomously determine the most optimal path for network packets to traverse from
source to destination (Priyanshu, 2022).
A firewall is a security mechanism in computer networks that controls and limits the flow of
internet traffic entering, exiting, or moving within a private network. Its purpose is to safeguard
the network and its resources from unauthorized access or malicious activities (Kaspersky,
2023).
A repeater is a device with two ports that functions at the physical layer of a network. Its primary
role is to restore a signal that has weakened or become corrupt during transmission over the same
network, thereby allowing the signal to travel a greater distance. In essence, a repeater
regenerates the signal to ensure its integrity and strength (Priyanshu, 2022).
A bridge is a networking device that connects two or more network segments and selectively
forwards data frames between them. It operates at the data link layer, uses MAC addresses to
determine the forwarding of data, and can isolate traffic within a segment to improve
performance and security (Priyanshu, 2022).
Slide 9 Network Server & Workstation
In this nineth slide we discussed about Network Server Types and Workstation Hardware and
Networking Software, Network servers refer to powerful computers that serve as a centralized
location for storing data and programs, which can be accessed and shared by multiple users
within a network (Ingalls, 2021).
A workstation is a type of computer specifically intended for professional use by a single user.
While it offers greater capabilities than a personal computer, it is not as robust as a mainframe
computer, which is specifically designed to handle complex calculations and accommodate
multiple users (McMahon, 2023).
Slide 10 Relationship Hardware & Software
Conclusion
Workstation hardware and networking software are interdependent, as the hardware must be
compatible with the software used to ensure smooth operation within a network environment.
For example, if a workstation is equipped with a network interface card (NIC) that is not
supported by the networking software, the workstation may not be able to connect to the network
or may experience connectivity issues. Additionally, the amount of RAM, processing power, and
storage capacity of the workstation can impact its ability to run networking software efficiently
and effectively.
On the other hand, networking software is designed to work with specific hardware
configurations, and may not function properly if the hardware does not meet the minimum
requirements. The software may also need to be configured to work with the specific hardware
components of a workstation.
Overall, choosing the right hardware and networking software combination is crucial for
ensuring reliable and efficient network operation within a workstation environment.
Activity 02
Design of the Network
Figure 1 Blueprint of the Cutting-Edge IT solution
The network for Cutting Edge IT Solution will consist of four departments with their respective
areas on the network. The departments are IT, Finance, HR, and Sales. The top floor will have
the IT department with seven computers, the second floor will have the Finance and HR
departments with five and four computers respectively, and the first floor will have the Sales
department with six computers. The network will use both wired and wireless connectivity.
Each team member will have access to their own content and shared team documentation, but
they will not have access to any other documentation. However, the respective team leader can
access all material for that team. There is an area for company documentation that anyone can
view. All documentation and office software will be located on a file server.
The network will be designed to isolate each team from each other for security purposes. A
firewall will be installed and configured to allow inbound and outbound traffic. Proper
consideration will be given to network security to minimize the risk of data breaches. There will
be no lag of data traffic between floors and no connectivity 'dead spots.'
Device Configuration and Security Considerations
The network will use both wired and wireless connectivity. Wired connections will be used for
the servers and desktop computers, while wireless connectivity will be used for laptops and
mobile devices. The network will use VLANs to isolate each department and ensure security.
Each department will have its own VLAN with its own subnet. The VLANs will be configured
on the switches, and the router will be configured to route traffic between the VLANs.
The network will have a firewall to provide security to the network. The firewall will be
configured to allow inbound and outbound traffic to and from specific ports. The firewall will be
configured to block all other traffic. The firewall will be configured to block all traffic that does
not meet the security policies of the organization.
The network will use NAT (Network Address Translation) to translate private IP addresses to
public IP addresses for internet access. The NAT will be configured on the router.
Maintenance Schedule
Time Tasks
Daily Monitoring network performance and troubleshooting any issues that arise.
Weekly Backing up data and updating software.
Monthly Conducting security audits and updating network policies.
Table 1 Maintenance Schedule
Test Plan
The following test plan covers all areas of the networked system requirements, indicating the test
action, test data, and expected results:
VLAN Configuration Test:
Test Action: Verify that each VLAN is isolated from one another.
Test Data: Two devices connected to different VLANs.
Expected Result: Devices should not be able to communicate with each other.
DHCP Test:
Test Action: Verify that IP addresses are being allocated correctly.
Test Data: Connect a new device to the network.
Expected Result: The device should be allocated an IP address from the correct VLAN
subnet.
Firewall Test:
Test Action: Verify that the firewall is blocking traffic between VLANs.
Test Data: Two devices connected to different VLANs.
Expected Result: Devices should not be able to communicate with each other, except for
traffic originating from the respective team leader.
Wireless Connectivity Test:
Test Action: Verify that there are no connectivity dead spots.
Test Data: Move to different areas of the building.
Expected Result: The device should maintain a strong and stable wireless connection
throughout the building.
Server Access Test:
Test Action: Verify that authorized personnel can access the file server.
Test Data: Attempt to access the file server from an unauthorized device.
Expected Result: Access should be denied.
Feedback Form
Figure 2 Feedback Form
User Feedback and Analysis
Feedback will be collected from a range of users on the effectiveness of the solution design,
including feedback on the ease of use, the speed and efficiency of the network, and the
accessibility of shared documentation. This feedback will be analyzed to identify areas for
improvement, with the aim of optimizing the design and improving the efficiency of the
networked solution.
Selecting the Best File Server Brand
DELL EMC (14G PowerEdge Servers)
The 14th Generation PowerEdge servers from Dell EMC are highly recommended for customers
seeking a reliable and advanced solution for their modern data center needs. These servers are
designed with a no-compromise approach, ensuring a comprehensive and adaptable solution that
customers can depend on. By opting for the 14th Generation PowerEdge servers, customers gain
access to a scalable, streamlined, and secure platform that enables the necessary IT
transformation to stay relevant both now and, in the future, (Dell, 2018).
Figure 3 Dell EMC (server)
Cisco File Server (UCS S3260)
The Cisco UCS® S3260 Storage Server is a versatile dual node x86 server that offers investment
protection and is specifically designed to cater to data-intensive workloads. With its flexible
architecture, it can deliver high performance or high capacity based on your specific needs.
When combined with UCS Manager, customers can effortlessly deploy storage capacity ranging
from Terabytes to Petabytes in just a matter of minutes (Cisco, 2020).
Figure 4 Cisco File Server
Best File Server Chosen
I recommend the Dell EMC record server for Cutting Edge IT Solution because of its respectable
display rate. It furthermore seems to be tenacious and financially astute. It is the perfect piece of
equipment for small and medium-sized businesses. The Cisco record server is much more
pricey, and even if it has higher adaptability and excellent execution, for an IT company like
Cutting Edge IT Solution, it looks to be quite excessively expensive. As a result, I advise using
the Dell EMC file server to move documents in a more secure manner for better presentation.
Server Selection Requirements
Select a server that meets your primary needs.
purchase a cheap server.
the finest of the breed.
purchase a suitable operating system.
Add provisions for growth and redundancy.
sustaining and maintaining.
Select reputable cloud service providers.
Configure virtualization to meet your needs.
Activity 3
Implementation of the Network Design
Cutting Edge IT Solution has decided to open a new branch in Butwal and requires a virtual
networked solution for the organization. This report will cover the implementation of the
optimized design, including evidence such as screenshots, configuration files, annotated and
verified demonstration evidence, and network monitoring reports. Additionally, a test plan
implementation will be presented, along with the analysis of the results of the test plan, and
recommendations for potential enhancements for the networked system.
Optimized Design
Figure 5 Optimized Design
Configuration
Distribution Layer Switch
Step 1 Add power supply
Figure 6 Add Power supply
Step 2 Turn all Switch
Figure 7 Enable All Switch
Basic Configuration
IT Department Switch
Figure 8 Basic Configuration IT Switch
Finance Department Switch
Figure 9 Basic Configuration Finance Switch
HR Department Switch
Figure 10 Basic Configuration HR Switch
Sales Department Switch
Figure 11 Basic Configuration Sales Switch
Multilayer Switch
Figure 12 Basic Configuration Multilayer Switch
Core Router
Figure 13 Basic Configuration Core Router
VLAN Assignment & Trunk Ports plus Assign Switch Ports
IT Department Switch
For Trunk Configuration
Figure 14 Trunk Configuration IT Department
For VLAN & Switch Ports Configuration
Figure 15 VLAN & Switch Ports Configuration IT Department
Finance Department Switch
For Trunk Configuration
Figure 16 Trunk Configuration Finance Department
For VLAN & Switch Ports Configuration
Figure 17 VLAN & Switch Ports Finance Department
HR Department Switch
For Trunk Configuration
Figure 18 Trunk Configuration HR Department
For VLAN & Switch Ports Configuration
Figure 19 VLAN & Switch Ports HR Department
Sales Department Switch
For Trunk Configuration
Figure 20 Trunk Configuration Sales Department
For VLAN & Switch Ports Configuration
Figure 21 VLAN & Switch Ports Sales Department
Trunk and VLAN Config on Multi-layered Switches
Figure 22 Trunk Config on Multi-layered Switches
Figure 23 VLAN Config on Multi-layered Switches