Networking

  • Uploaded by: vbr business
  • 0
  • 0
  • February 2021
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Networking as PDF for free.

More details

  • Words: 6,485
  • Pages: 81
Loading documents preview...
Higher Nationals Internal verification of assessment decisions – BTEC (RQF) INTERNAL VERIFICATION – ASSESSMENT DECISIONS Programme title

Assessor

Internal Verifier Unit 02:

Unit(s)

Networking

Assignment title

Student’s name List which assessment criteria the Assessor has awarded.

Pass

Merit

INTERNAL VERIFIER CHECKLIST Do the assessment criteria awarded match those shown in the assignment brief?

Y/N Is the Pass/Merit/Distinction grade awarded justified by the assessor’s comments on the student work?

Has the work been assessed accurately?

Y/N

Y/N

Is the feedback to the student: Give details:

• Constructive? • Linked

Y/N to

relevant

assessment

Distinction

criteria?

Y/N

• Identifying

opportunities improved performance?

Y/N

for

• Agreeing actions?

Y/N

Does the assessment decision need amending?

Y/N

Assessor signature

Date

Internal Verifier signature

Date

Programme required)

Leader

signature

(if Date

Confirm action completed Remedial action taken Give details: Assessor signature Internal Verifier signature Programme Leader signature (if required)

Date

Date

Date

Higher Nationals - Summative Assignment Feedback Form Student Name/ID

Unit Title

Unit 02:

Networking

Assignment Number

Assessor

Submission Date

Date Received 1st submission Date Received 2nd submission

Re-submission Date

Assessor Feedback: LO1 Examine networking principles and their protocols. Pass, Merit & Distinction Descripts

P1

P2

M1

LO2 Explain networking devices and operations. Pass, Merit & Distinction Descripts

P3

P4

M2

D1

P6

M3

D2

M4

D3

LO3 Design efficient networked systems. Pass, Merit & Distinction Descripts

P5

LO4 Implement and diagnose networked systems. Pass, Merit & Distinction

P7

P8

Descripts

Grade:

Assessor Signature:

Date:

Resubmission Feedback:

Grade:

Assessor Signature:

Date:

Internal Verifier’s Comments:

Signature & Date:

*

Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades decisions have been agreed at the assessment board.

Pearson Higher Nationals in

Computing Unit 02: Networking Assignment 01

General Guidelines

1. A cover page or title page should be attached to your assignment. Use page 1 of this assignment brief as your cover page and make sure all details are accurately filled. 2. The entire assignment brief should be attached as the first section of your assignment. 3. The assignment should be prepared using a word processing software. 4. The assignment should be word processing in an A4 sized paper. 5. Allow 1” margin on top, bottom and right sides of the paper and 1.25” on the left side (for binding).

Word Processing Rules

1. The font size should be 12 point, and should be in the style of Time New Roman. 2. Set line spacing to 1.5. Justify all paragraphs. 3. Ensure that all headings are consistent in terms of size and font style. 4. Use footer function on the word processor to insert your name, unit, assignment no, and page number on each page. This is useful if individual sheets get detached from the submission. 5. Use the spell check and grammar check function of the word processing application to review the use of language on your assignment.

Important Points:

1. Carefully check carefully the hand in date and the instructions given with the assignment. Late submissions will not be accepted. 2. Ensure that sufficient time is spent to complete the assignment by the due date. 3. Do not wait till the last minute to get feedback on the assignment. Such excuses will not be accepted for late submissions. 4. You must be responsible for efficient management of your time. 5. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may apply (in writing) for an extension. 6. Failure to achieve at least a PASS grade will result in a REFERRAL grade. 7. Non-submission of work without valid reasons will lead to an automatic REFERRAL. You will then be asked to complete an alternative assignment. 8. If you use other people’s work or ideas in your assignment, it must be properly referenced, using the HARVARD referencing system, in your text or any bibliography. Otherwise, you’ll be found guilty of committing plagiarism. 9. If you are caught plagiarising, your grade will be reduced to a REFERRAL or at worst, you could be excluded from the course.

Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own without attributing the sources in the correct form. I further understand what it means to copy another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft. 2. I understand the plagiarism and copying policy of Edexcel UK. 3. I know what the consequences will be if I plagiarise or copy another’s work in any of the assignments for this program. 4. I declare therefore that all work presented by me for every aspect of my program, will be my own, and where I have made use of another’s work, I will attribute the source in the correct way. 5. I acknowledge that the attachment of this document signed or not, constitutes a binding agreement between myself and Edexcel UK. 6. I understand that my assignment will not be considered as submitted if this document is not attached to the assignment.

Student’s Signature: (Provide E-mail ID)

(Provide Submission Date)

Higher National Diploma in Business Assignment Brief Student Name /ID Number Unit Number and Title

Unit 2: Networking

Academic Year Unit Tutor Assignment Title

LAN Design & Implementation for Enclave Films Company

Issue Date Submission Date IV Name & Date

Submission format

The submission is in the form of an individual written report. This should be written in a concise, formal business style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as appropriate, and all work must be supported with research and referenced using the Harvard referencing system. Please also provide an end list of references using the Harvard referencing system. The recommended word count is 3,000–3,500 words for the report excluding annexures, although you will not be penalised for exceeding the total word limit. Unit Learning Outcomes:

LO1 Examine networking principles and their protocols.

LO2 Explain networking devices and operations.

LO3 Design efficient networked systems.

LO4 Implement and diagnose networked systems. Assignment Brief and Guidance:

Scenario : Enclave Films is an eminent movie company which composes movies and delivers high quality video to make it download through VividZone company website. The original movie company management has decided to consolidate the contract with VividZone by adding more efficient staff and appliances. Enclave Films is in building B and the web team is positioned in the same building while majority of the administration, sales, accounts and management functions are supported in building A. Both buildings are located in the same premises. Movie company plans to aggregate all their staff and resources in one building. Therefore when adjacent office space becomes available in building A, these groups will be accommodated together. Building A has a reception and a customer area as well. About the Network The branch network of Enclave Films has grown without proper planning. The LAN cabling in both offices is Cat5e Ethernet. The office complex provides an Ethernet link between the two buildings. The current network is a flat network design with minimal redundancy. A small wireless LAN is used occasionally by few project managers with laptops and the guests at Building B. a) Building A - general office and managers, including reception, accounts, and administration. It consists of 12 PCs and 02 printers. b) Building B - production suites and provides networking for the media development and storage. It consists of 09 high-performance workstations, 05 office PCs, and 02 printers.

The Management expects to enhance the network based on following major criteria: a) Separate the network into VLANs. b) Data traffic expected to increase by 80% c) Possibly consider connecting directly to the VividZone network; must be a fast and reliable connection d) High network availability with redundant links and technology e) Wireless network access at Building B f) QoS to support video applications g) High network reliability with network monitoring and security

Activity 01 You are newly recruited as a Network Engineer by the movie company to redesign the network. You need to produce a report for the company that includes the following: 1. An an overview of your report. 2. An explanation of;  networking principles, protocols and devices, including benefits and constraints of networked solutions  the impact of network topology, communication and bandwidth requirements, effectiveness of networking systems  operating principles of networking devices and server types and networking software

Activity 02

1. Prepare a written plan of how you are going to design a Local Area Network including a blueprint of your LAN. 2. Justify the security requirements and quality of services needed for selection of accessories 3. Design a networked system to meet a given specification 4. Provide the IP address allocation table for the redesigned network. 5. Install & configure network services and applications of your choice. 6. Conduct a test and evaluate the design to meet the requirements and analyse user feedback. 7. Suggest a maintenance schedule to support the networked system.

Activity 03 1. Implement a networked system based on your prepared design. 2. Conduct verification with e.g. Ping, extended ping, trace route, telnet, SSH, etc. 3. Record the test results and analyze these against expected results. 4. Investigate what functionalities would allow the system to support device growth and the addition of communication devices.

Contents Acknowledgment......................................................................................................................17 Current Status...........................................................................................................................19 OSI 7 Layer Model...................................................................................................................22 Layer 7 – Application...........................................................................................................24 Layer 6 – Presentation..........................................................................................................25 Layer 5 – Session.................................................................................................................27 Layer 4 – Transport..............................................................................................................28 Layer 3 – Network................................................................................................................29 Layer 2 – Data Link..............................................................................................................30 Layer 1 – Physical................................................................................................................31 Network Devices......................................................................................................................32 Routers..................................................................................................................................33 Network Cables....................................................................................................................34 Twisted Pair Cable...........................................................................................................34 Coaxial Cable...................................................................................................................35 Fiber Optic Cables............................................................................................................36 Switches................................................................................................................................37 Network Topologies.................................................................................................................38 Bus topology.........................................................................................................................38 Ring topology.......................................................................................................................39 Star topology........................................................................................................................40 Softwares..................................................................................................................................41 Wireshark.............................................................................................................................41 XAMPP................................................................................................................................49

Proposed Network Structure....................................................................................................57 IP Table....................................................................................................................................59 Cisco Packet Tracer Implementation.......................................................................................60 Virtual Local Area Network (VLAN)......................................................................................63 Dynamic Host Configuration Protocol (DHCP)......................................................................65 Subnetting.................................................................................................................................66 Testing......................................................................................................................................67 Maintaining Schedule...............................................................................................................70 Future Improvements...............................................................................................................70 Security.....................................................................................................................................71 References................................................................................................................................72 Assignment Gantt Chart...........................................................................................................74

Table of Figures Figure 1 Current Network Structure.........................................................................................23 Figure 2 The Current Network Structure.................................................................................24 Figure 3 OSI 7 Layer Model....................................................................................................27 Figure 1 A Router.....................................................................................................................36 Figure 2 Twisted Pair Cable.....................................................................................................38 Figure 3 Coaxial Cable.............................................................................................................39 Figure 4 Fiber Optic Cable.......................................................................................................40 Figure 5 Network Switch.........................................................................................................41 Figure 6 Bus topology..............................................................................................................42 Figure 7 Ring topology.............................................................................................................43 Figure 8 Star topology..............................................................................................................43 Figure 9 Wireshark logo...........................................................................................................44 Figure 10 Wireshark step 1......................................................................................................45 Figure 11 Wireshark step 2......................................................................................................46 Figure 12 Wireshark Step 3......................................................................................................47 Figure 13 Wireshark step 4......................................................................................................48 Figure 14 Wireshark step 5......................................................................................................49 Figure 15 Wireshark step 6......................................................................................................50 Figure 16 Wireshark step 7......................................................................................................51 Figure 17 Wireshark step 8......................................................................................................52 Figure 18 XAMPP logo............................................................................................................52 Figure 19 XAMPP step 1.........................................................................................................53 Figure 20 XAMPP step 2.........................................................................................................54

Figure 21 XAMPP step 3.........................................................................................................55 Figure 22 XAMPP step 4.........................................................................................................56 Figure 23 XAMPP step 5.........................................................................................................57 Figure 24 XAMPP step 6.........................................................................................................58 Figure 25 XAMPP step 7.........................................................................................................59 Figure 26 Proposed Network Structure....................................................................................60 Figure 27 Cisco Implementation..............................................................................................64 Figure 28 VLANs in cisco........................................................................................................67 Figure 29 IP DHCP pool..........................................................................................................68 Figure 30 Subnet Mask.............................................................................................................69 Figure 31 Subnet Masks...........................................................................................................70 Figure 32 Test Table.................................................................................................................72 Figure 33 Maintaining Schedule..............................................................................................73

Table of Tables Table 1 Current Department Positioning..................................................................................25 Table 2 IP Table......................................................................................................................63 Table 3 Assignment Gantt Chart..............................................................................................78

Current Status The following report describes the current network infrastructure of the Enclave Films Company. According to the given scenario the current network of the company spreads across 2 buildings. For a better understanding of the scenario the buildings are named as, 1) Building A 2) Building B Both building A and building B are situated in the same premise. The following image shows a simple sketch of the network device placement of the 2 buildings.

Ethernet Cable

Storage 1

Ethernet Cable

Storage 2

Storage 3

Server 1

Ethernet Cable Ethernet Cable

Ethernet Cable

Printer 1

General Office 3

Ethernet Cable Router

Ethernet Cable

Ethernet Cable

Production Suite 2

Printer 1

Manager 1

Manager 2

Manager 3

Production Suite 3

Figure 1 Current Network Structure

Please zoom in if the above image is not clear.

Media Development 5 Ethernet Cable

Ethernet Cable Media Development 3

Ethernet Cable Production Suite 4

Reception PC2 Printer 2

Media Development 2

Ethernet Cable

Production Suite 1 Switch

Ethernet Cable Ethernet Cable

Server 2

Switch

General Office 2

Media Development 4

Switch

Ethernet Cable Connecting The 2 Routers of The 2 Buildings

General Office 1

Media Development 1

Ethernet Cable Ethernet Cable

Switch

Accounts PC3 Ethernet Cable

Ethernet Cable

Reception PC1

Accounts PC2

Ethernet Cable

Ethernet Cable

Room: 2" X 2"

Switch

Router

Ethernet Cable

Accounts PC1

Ethernet Cable

Ethernet Cable Admin PC2 Switch Admin PC1 Ethernet Cable

Production Suite 5

Printer 2

Media Development 6

Figure 2 The Current Network Structure As shown in the above image the networks of the 2 buildings are connected using a Cat5e ethernet cable which makes it a single network. The following table show the positioning of different departments across the 2 buildings.



Building A Administration



Building B Enclave Films



General Office



The Web Team



Accounts



Management



Reception Table 1 Current Department Positioning

As shown in the above table the departments are divided between the 2 buildings. So, the idea is to move everything from building B to building A thereby emptying the building B. The current infrastructure of the network is also divided into 2. The following table shows the users of the 2 networks, the end user devices that are connected to the 2 networks and the total number of end user devices.

Users of the network



Building A General Office



Building B Production Suits



Managers





Reception

Development



Accounts



Media

Media Storage



Administration 

 The end user devices

Computers 

The total number of end

12 Personal



2 Printers

14

9 High

Performance Workstations 

5 Personal

Computers for office use 

2 Printers



16

user devices

Occasionally a wireless LAN is also connected to the network which is used by the project managers and guests. When redesigning the new network to enhance the network an understanding of the terms used in networking, the standards of networking and the principals and theories of networking is a must. The following section describes those which are need to design the network mentioned in the scenario.

OSI 7 Layer Model The Open Systems Interconnection (OSI) model is conceptual framework that describes the functions of a networking or telecommunication system. It divides data communication into 7 layers and it standardize the protocols that are used and group them according to their functionalities. This ensures that the networking system is interoperable regardless of the technology type or the manufacturer. So, simply it gives us a visual description of the processes that happen inside a networking system. The purpose of this model is to resolve the incompatibility between different manufacturers and to set clear standards for network

communication. This also helps the network operators to narrow down the problems within the network[CITATION Raz18 \l 1033 ]. In the OSI model the control is passed from one layer to the next. The 7 Layers of the OSI model 

Layer 7 - Application



Layer 6 - Presentation



Layer 5 - Session



Layer 4 - Transport



Layer 3 - Network



Layer 2 - Data Link



Layer 1 – Physical

The below image represents a simple description about the 7 layers of the OSI model.

Figure 3 OSI 7 Layer Model Layer 7 – Application Application layer is the top layer of the OSI model. It is the closest layer to the end user. It directly interacts with the user to provide various services such as[CITATION Raz18 \l 1033 ], 

Email



Network data sharing



File transfer etc.

The application layer of the model recognizes the networking entities for the following purposes[CITATION Raz18 \l 1033 ].



To facilitate the networking requests sent by the end user.



To determine the availability of resources



To synchronize communication



To manage application specific networking requirements

Some examples for the layer 7 applications are[ CITATION Sha18 \l 1033 ], 

A web browser such as, o Google Chrome o Mozilla Firefox o Safari



Skype

Any application that interact with the user through or with a network connection can be identified as a layer 7 application. Some of the most common protocols that’s used by this layer are[ CITATION Bea19 \l 1033 ], 

FTP – File Transfer Protocol



SMTP – Simple Mail Transfer Protocol



DNS – Domain Name System



HTTP – Hypertext Transfer Protocol



SSH – Secure Shell

Layer 6 – Presentation The presentation layer of the OSI model represents the translation or conversion of the data formats between the application and the network. Functions of the presentations layer include[ CITATION Raz18 \l 1033 ],



Data conversion from network format to application format and from application format to network format



Character code translation



Compression of data



Encryption or decryption of data for secure transmission

The presentation layer which is also known as the syntax layer maps the syntax of the data so that the received or sent information is consumable by every network entity[ CITATION Raz18 \l 1033 ]. E.g.: -

The data transferred from a communication application is formatted and

encrypted at this layer before transmission. After it reaches the target destination the data is formatted

and decrypted in to the intended format (text, image, video etc.).

The presentation layer also serializes and deserialize complex information so that it be transported across the network[ CITATION Raz18 \l 1033 ]. Some of the common protocols used by this layer are, 

SSL – Secure Socket Layer



FTP – File Transfer Protocol



SSH – Secure Shell



IMAP – Internet Message Access Protocol

Layer 5 – Session When 2 devices in the network such as computer or servers need to communicate with each other a session needs to be created[ CITATION Sha18 \l 1033 ]. This is done at the session layer of the OSI model. This layer can coordinate the connection between the 2 devices because it belongs to the top 3 layers of the OSI model that deals at a software level[ CITATION Raz18 \l 1033 ]. The functions of this layer involve, 

Setting up / Opening of the sessions



Coordinating the ongoing session



Terminating / Closing each session



Reestablishing the session activities



Authenticating and authorizing the communication between 2 entities



Identifying half duplex and full duplex operations



Synchronizing data streams

A session can be referred to as a data exchange done between 2 entities of a network[ CITATION Raz18 \l 1033 ]. E.g.: -

HTTP sessions which allow the users to visit and browse website within a specific

time period. Some of the common protocols that’s used by this layer are[ CITATION Raz18 \l 1033 ], 

RPC – Remote Procedure Call



PPTP – Point to Point Tunneling Protocol



SCP – Session Control Protocol



SDP – Session Description Protocol

Layer 4 – Transport The transport layer of the OSI model deals with the coordination of data transfers that happen between end systems and the hosts[ CITATION Sha18 \l 1033 ]. It ensures complete and reliable delivery of data packets[ CITATION Raz18 \l 1033 ]. It provides mechanisms such as[ CITATION Raz18 \l 1033 ], 

Error control



Flow control



Congestion control

These mechanisms help to keep track of the data packets, check for errors and duplication and resend packets that fails delivery. It uses service point addressing function to ensure that the packets are sent to a specific destination via a port address. Packet segmentation and reassembly ensures that the data is divide and sent in a sequence. The integrity and the accuracy of the packets will be rechecked at the destination based on the receiving sequence[ CITATION Raz18 \l 1033 ]. The following decisions are taken in this layer[ CITATION Sha18 \l 1033 ]. 

How much data to send



At what rate the data should be sent



Where does it goes

The best-known example for a protocol of this layer is the Transmission Control Protocol (TCP) which is built on top of the Internet Protocol (IP). It is commonly known as TCP/IP. Both the TCP and UDP (User Datagram Protocol) works at the transport layer while IPs are working at the Network Layer of the OSI model[ CITATION Sha18 \l 1033 ]. TCP – For connection-oriented data transmission UDP – For connectionless data transmission

Layer 3 – Network This layer organizes and transmits data across multiple networks. In the network layer of the OSI model the router functionalities are found[ CITATION Raz18 \l 1033 ]. This layer is responsible for the functions such as, 

Packet forwarding



Routing through different routers



Encapsulation



Fragmentation

Routers at this layer help to find the best physical path for a packet to travel across a network based on the following facts[ CITATION Raz18 \l 1033 ]. 

Characteristics of the network



Traffic controls



Congestion of data packets



Priority of service

The network layer uses logical addressing for packets to separately identify the source and the destination. The outgoing data is divided into packets and incoming packets are reassembled into information which will be consumed at a higher application level[ CITATION Raz18 \l 1033 ]. Some of the hardware that belong to the network layer are[ CITATION Raz18 \l 1033 ], 

Routers



Bridge routers



3-layer switches

Some of the common protocols that belong to this layer are,



IPv4 – Internet Protocol Version 4



IPv6 – Internet Protocol Version 6



ICMP – Internet Control Message Protocol



IGMP – Internet Group Management Protocol

Layer 2 – Data Link The data link layer provides the function of node to node data transfer between 2 directly connected nodes and also manages the connections between physically connected devices such as switches[ CITATION Sha18 \l 1033 ]. Within this layer 2 sub layers also exist[ CITATION Sha18 \l 1033 ]. Those are, 1) Media Access Control (MAC) Layer a. Responsible for managing access and permissions to transmit data between the nodes 2) Logical Link Control (LLC) Layer a. Responsible for the flow controls and error controls to ensure accurate and error free data transmission This is the layer in which most types of switches operate[ CITATION Sha18 \l 1033 ]. The raw data received from the physical layer which is the 1st layer is packaged into data frames with the necessary protocols to route between the nodes. The layer expects acknowledgement for the encapsulated raw data which is transmitted sequentially[ CITATION Raz18 \l 1033 ]. Some of the devices and protocols that operate within the data link layer are, 

Ethernet technology



PPP – Point to Point Protocol



Switch



Network bridges

Layer 1 – Physical This layer exists at the bottom of the OSI model. It represents the electrical, optic, electromagnetic elements that transmits information between the network devices and the infrastructure[ CITATION Raz18 \l 1033 ]. That means every physical aspect such as, 

Cable types



Radio frequency links (802.11 used in wireless systems)



The layout of the pins



Voltages



Network topologies o Bus o Star o Ring o Tree



Communication modes o Simplex o Half duplex o Full duplex



Data transmission performance o E.g.: -

Bit Rate Bit Synchronization



Modulation



Switching

In real world networking the attention first goes to the physical layer when a problem has occurred in the network. The physical layer is responsible for the communication of raw data over a physical medium[ CITATION Sha18 \l 1033 ].

Some of the common protocols included in the physical layer are, 

Wi-Fi (Wireless Fidelity)



Ethernet technology

Some of the common hardware that belongs to this layer are, 

Antennas



Cables



Modems



Repeaters



Hubs

Network Devices Following are some details about the network devices that will be used in the designing of the proposed network.

Routers

Figure 4 A Router

A router can be identified as a hardware device that receive, analyze and move data packets between networks. It can also be used to convert or redirect the packets to another interface, drop them. A router has more capabilities than a switch or a hub. A switch or a hub can only

perform basic network functions such as transferring data between 2 computers. But the router is far more intelligent. It can analyze the data that are being sent over in the network. In todays world routers are often used in homes to share an internet connection between multiple devices[ CITATION Com192 \l 1033 ]. The following image show the exterior look of an Asus ROG Rapture GT-AC5300 Router. Network Cables A cable can be identified as a physical media that is used to transfer data in a network. Following are some types of cables used to connect the network devices. Twisted Pair Cable A twisted pair cable is type of cable made by intertwining 2 separate wires. There are 2 types of twisted pair cable[ CITATION Com193 \l 1033 ]. 1) Unshielded Twisted Pair (UTP) An UTP cable consists of 2 copper wires twisted around each other 2) Shielded Twisted Pair (STP) It consists of 2 copper wires wrapped in foil which acts as a shield and give a more reliable data transmission

Figure 5 Twisted Pair Cable

Coaxial Cable It is a type of cable designed for purposes such as video transmission, communication and audio. It has a high bandwidth and a greater transmission capacity. These cables are mostly used to connect TVs and to connect to and internet connection using a modem. This cable is thick and has a metal male connector which connects to a female connector[ CITATION Com194 \l 1033 ].

Figure 6 Coaxial Cable

Fiber Optic Cables Fiber optic cables are made with made with optical fibers such as glass and is coated in a plastic cover. They are used to send data through pulses of light. The coating helps the fiber to protect from heat, cold and any electromagnetic interference. This type of cable allows much faster data transmission than common copper wire cables. It has very high bandwidth capabilities. Fiber optics are commonly used among the huge cooperate networks such as internet backbones because of the capabilities of this cable[ CITATION Com195 \l 1033 ].

Figure 7 Fiber Optic Cable

Switches A switch can be identified as a hardware device that filters and forwards data packets. But it is not capable of doing much. A switch is more advanced than a hub but not more advanced than a router. It stands between the hub and the router. Switches do not broadcast packets like hubs. Therefore, they are more preferred than hubs[ CITATION Com196 \l 1033 ]. The below image shows an exterior look of the TP-Link TL-SG108 8-Port Gigabit Ethernet Switch.

Figure 8 Network Switch

Network Topologies A network topology is a physical layout of the network devices in the network. It determines how the workstations or hosts will connect with each other. Following are some of the popular network topologies used. Bus topology This network topology is also known as the line topology. In this topology every computer is directly connected to a cable or a backbone. As the backbone of the topology a coaxial or RJ45 cable is used[ CITATION Com197 \l 1033 ].

Figure 9 Bus topology

Ring topology In a ring topology the computers are connected in a circular path. Each computer is connected to 2 other computers. In a ring topology the data flow is from one device to the next until it reaches the destination. This data flow can be unidirectional or bidirectional. If any of the computers in a ring topology is broken it will affect the whole topology[ CITATION Com198 \l 1033 ].

Figure 10 Ring topology

Star topology This is considered as one of the common network topologies. In this topology every computer connects to a central device such as a hub or a switch. The central device acts as a server while the others act as clients. Coaxial cables or RJ45 cables are used to connect the clients to the server device[ CITATION Com199 \l 1033 ].

Figure 11 Star topology

Softwares When working with a network there are some softwares that helps to manage, maintain, protect and monitor the network and all its activities. This softwares are usually used by the network administrators. Following are some of those softwares and their usage[ CITATION Wir19 \l 1033 ].

Wireshark

Figure 12 Wireshark logo

Wireshark is considered as the world’s most used network protocol analyzer. It can observe the network activities at a microscopic level. It is used by many organizations, government institutes and educational institutes. Following are some of the functions of Wireshark. 

Deep inspection of network protocols



Live data capture and offline analysis



Multi-platform compatibility



Rich VoIP analysis



Capable of browsing the captured data via a GUI.

Following images show the installation process of the Wireshark.

Figure 13 Wireshark step 1

Figure 14 Wireshark step 2

Figure 15 Wireshark Step 3

Figure 16 Wireshark step 4

Figure 17 Wireshark step 5

Figure 18 Wireshark step 6

Figure 19 Wireshark step 7

Figure 20 Wireshark step 8

XAMPP

Figure 21 XAMPP logo

XAMPP is a cross platform web server solution stack package developed by Apache Friends. It consists of features such as Apache HTTP Server, MariaDB database, and interpreters for scripts written in the PHP and Perl programming languages. Following set of images show the installation process of XAMPP.

Figure 22 XAMPP step 1

Figure 23 XAMPP step 2

Figure 24 XAMPP step 3

Figure 25 XAMPP step 4

Figure 26 XAMPP step 5

Figure 27 XAMPP step 6

Figure 28 XAMPP step 7

Proposed Network Structure The following image shows the proposed network structure of the Enclave Films company.

Switch

Accounts 1

19'-4" Ethernet Cable

Ethernet Cable

Storage 1

Storage 2

Storage 3

Production Suite 1

Ethernet Cable Ethernet Cable Switch

Production Suite 4

Ethernet Cable

Ethernet Cable Connecting The 2 Routers of The 2 Buildings

Ethernet Cable

Server 1

Production Suite 2

Production Suite 5

Production Suite 7

Production Suite 9

Production Suite 8

Production Suite 10

Ethernet Cable

Printer 1

General Office 2

General Office 5 General Office 3 Switch

Ethernet Cable

Ethernet Cable

Ethernet Cable Ethernet Cable

Ethernet Cable

Server 2

Switch

Ethernet Cable Media Development 1

Printer 1

Media Development Ethernet Cable 6 Media Development 4 Media Development 2

EthernetMedia CableDevelopment 7

Reception 2 Manager 1 Printer 2

Figure 29 Proposed Network Structure

Manager 5

Manager 4

Manager 2

Manager 3

Switch

Ethernet Cable

General Office 4

General Office 1

Switch

Ethernet Cable

Ethernet Cable

Ethernet Cable

Reception 3

Accounts 3

Router

Reception 1

Switch Accounts 2 Accounts 4Ethernet Cable Accounts 5

Ethernet Cable

Ethernet Cable

Administration 3 Administration 2

Ethernet Cable

Administration 1

Media Development 3

Media Development Printer 2 5

Ethernet Cable Production Suite 3

Production Suite 6

Please zoom in if the image is not clear.

As shown in the above image the number of devices in the network has changed.

IP Table The following table shows the VLAN IDs, IP addresses and subnet masks of each department in the proposed network.

Department

No. of users

VLAN ID

IP / Subnet

Subnet Mask

Production Suits

10

60

192.168.1.0 / 28

255.255.255.240

Media

7

70

192.168.1.16 / 28

255.255.255.240

General Office

5

10

192.168.1.32 / 29

255.255.255.248

Managers

5

20

192.168.1.40 / 29

255.255.255.248

Accounts

5

40

192.168.1.48 / 29

255.255.255.248

Reception

3

30

192.168.1.56 / 29

255.255.255.248

Administration

3

50

192.168.1.64 / 29

255.255.255.248

Storage

3

80

192.168.1.72 / 29

255.255.255.248

Development

Table 2 IP Table

Cisco Packet Tracer Implementation The following image shows the cisco packet tracer implementation of the proposed network.

Figure 30 Cisco Implementation

As shown in the above image the upper part of the layout consists with the departments of the building A of the original structure. And the lower part contains the departments that was in the building B. The above setup will be used to test the proposed system.

Virtual Local Area Network (VLAN) A VLAN allows a network administrator to setup separate networks inside the same network by configuring a network device such as a router. There will be no extra cable cost when setting up the VLANs since it is done using the already available router. A VLAN allows a network to be divided and organized to filter data accordingly[ CITATION Com1910 \l 1033 ]. The following image displays the VLANs that was created when implementing the network on cisco packet tracer.

Figure 31 VLANs in cisco

As shown in the above image a VLAN is created for each department in the Enclave Films company to make it easier to organize and filter the network. Only several ports are shown because the ports of the other VLANs are in different switches. The switch in the above image is to connect the PCs in the Production Suits.

Dynamic Host Configuration Protocol (DHCP) DHCP is a protocol used to assign automatic IP addresses to the computers and other devices in a network. Usually this is set up on a separate DHCP server or on a router. In today’s world almost all of the home internet routers are released with an already implemented DHCP server[ CITATION Com1911 \l 1033 ]. The following image shows the IP DHCP polls created for the proposed network in the implementation in the cisco packet tracer.

Figure 32 IP DHCP pool

Subnetting

Figure 33 Subnet Mask

The purpose of a subnet mask is to bitwise operations of the IP addresses on a network. It divides the IP address into 2 or more groups. This process can be identified as subnetting. Subnetting can be used to improve security and to help balance the network traffic. The following table shows the subnet masks that were used in each of the VLANs in the implementation of the proposed system on cisco packet tracer.

VLAN ID

IP / Subnet

Subnet Mask

10

192.168.1.32 / 29

255.255.255.248

20

192.168.1.40 / 29

255.255.255.248

30

192.168.1.56 / 29

255.255.255.248

40

192.168.1.48 / 29

255.255.255.248

50

192.168.1.64 / 29

255.255.255.248

60

192.168.1.0 / 28

255.255.255.240

70

192.168.1.16 / 28

255.255.255.240

80

192.168.1.72 / 29

255.255.255.248

Figure 34 Subnet Masks

Testing

The following table represents some of the tests done to check the proposed network using the implementation on the cisco packet tracer.

Test

Test

Expected

Case

Description

Output

Actual Output

Comments

no. 1

Testing

the The PCs should

connectivity between

ping

because

the network

PCs of general gateways office

Connectivity check successful

are

and defined.

accounts

2

Testing DHCP

the The IP address IP should

be

retrieval from assigned the router.

automatically.

Automatic retrieval successful

IP

3

Testing

the The PCs should

connectivity between

ping

because

the network

managers PCs gateways and administration PCs

Figure 35 Test Table

defined.

The connectivity checks

are

successful

Maintaining Schedule The following table shows the frequency of the maintenance that should be done on the proposed network.

Task

Frequency

Restarting the devices

Weekly

Running a virus scan

Daily

Checking for hardware malfunctions

Weekly

Checking for network malfunctions

Weekly

Figure 36 Maintaining Schedule

Future Improvements Following are some future improvements that could be done to the network. 

More PCs could be included in the network



More servers could be set up to increase the storage capacity



Fiber optic cables can be used to further improve transmission speed.



A better ISP can be chosen to speed up the internet connection within the network

Security

Following are some security programs or antivirus softwares that can be implemented on the proposed network to increase security.

1) Kaspersky 2) Malwarebytes 3) McAfee 4) Webroot 5) Symantec 6) Comodo Internet Security A custom fire wall can also be installed to the network to improve security. Daily backups of the network should be taken in case the network fails or got attacked.

References Beal, V., 2019. The 7 Layers of the OSI Model - Webopedia Study Guide. [Online] Available at: https://www.webopedia.com/quick_ref/OSI_Layers.asp [Accessed 11 May 2019]. Computer Hope, 2019. What is a Coaxial Cable?. [Online] Available at: https://www.computerhope.com/jargon/c/coaxialc.htm [Accessed 7 June 2019]. Computer Hope, 2019. What is a Fiber Optic Cable?. [Online] Available at: https://www.computerhope.com/jargon/f/fiberopt.htm [Accessed 7 June 2019]. Computer Hope, 2019. What is a Ring Topology?. [Online] Available at: https://www.computerhope.com/jargon/r/ringtopo.htm [Accessed 7 June 2019]. Computer Hope, 2019. What is a Router?. [Online] Available at: https://www.computerhope.com/jargon/r/router.htm [Accessed 7 June 2019]. Computer Hope, 2019. What is Bus Topology?. [Online] Available at: https://www.computerhope.com/jargon/b/bustopol.htm [Accessed 7 June 2019]. Computer Hope, 2019. What is DHCP (Dynamic Host Configuration Protocol)?. [Online] Available at: https://www.computerhope.com/jargon/d/dhcp.htm [Accessed 7 June 2019]. Computer Hope, 2019. What is Star Topology?. [Online] Available at: https://www.computerhope.com/jargon/s/startopo.htm [Accessed 7 June 2019]. Computer Hope, 2019. What is the difference between a network hub, switch and router?. [Online] Available at: https://www.computerhope.com/issues/ch001559.htm [Accessed 7 June 2019]. Computer Hope, 2019. What is Twisted-pair Cable?. [Online] Available at: https://www.computerhope.com/jargon/t/twispair.htm [Accessed 7 June 2019]. Computer Hope, 2019. What is VLAN (Virtual Local Area Network)?. [Online] Available at: https://www.computerhope.com/jargon/v/vlan.htm [Accessed 11 June 2019].

Raza, M., 2018. What is the OSI Model? Explore the 7 Layers of the Open Systems Interconnection Model - BMC Blogs. [Online] Available at: https://www.bmc.com/blogs/osi-model-7-layers/ [Accessed 11 May 2019]. Shaw, K., 2018. The OSI model explained: How to understand (and remember) the 7 layer network model | Network World. [Online] Available at: https://www.networkworld.com/article/3239677/the-osi-model-explainedhow-to-understand-and-remember-the-7-layer-network-model.html [Accessed 11 May 2019]. Wireshark, 2019. Wireshark · Go Deep.. [Online] Available at: https://www.wireshark.org/ [Accessed 7 June 2019].

Grading Rubric

Grading Criteria

Achieved

Feedback

LO1 : Examine networking principles and their protocols.

P1 Discuss the benefits and constraints of different network types and standards. P2 Explain the impact of network topology, communication and bandwidth requirements. M1 Compare common networking principles and how protocols

enable the effectiveness of networked systems. LO2: Explain networking devices and operations

P3 Discuss the operating principles of networking devices and server types. P4 Discuss the inter-dependence of workstation hardware with relevant networking software.

M2 Explore a range of server types and justify the selection of a server, considering a given scenario regarding cost and performance optimization. LO 1 & LO2

D1 Considering a given scenario, identify the topology protocol selected for the efficient utilisation of a networking system.

LO3 : Design efficient networked systems

P5 Design a networked system to meet a given specification. P6 Test and evaluate the design to meet the requirements and analyze user feedback. M3 Install and configure network services and applications on your choice. D2

Design a maintenance schedule to support the networked system. LO4 : Implement and diagnose networked systems

P7 Implement a networked system based on a prepared design. P8 Document and analyze test results against expected results. M4 Recommend potential enhancements for the networked systems. D3 Use critical reflection to evaluate own work and justify valid

conclusions.

Related Documents


More Documents from "Mohit Agarwal"