Sei sulla pagina 1di 67

Assignment Brief

BTEC Level 4-5 HNC/HND Diploma (QCF)

To be filled by the Learner


Name of the Learner : Sarah Angelo Peter

Edexcel No : Centre No : Col/A 045272 Batch: 58


Date of Submission :

Unit Assessment Information

Qualification : Higher National Diploma in Computing and Systems Development

Unit Code & Title : M/601/0472– Unit 24 - Networking Technologies (No 1 of 1)

Assessment Title & No’s : Plan and Design a network solution for Learning Resource Center

Learning outcomes and grading opportunities:


LO 01: Understand networking principles
Learning Outcomes LO1.1 LO1.2 LO1.3
LO 02: Understand networking components
Learning Outcomes LO2.1 LO2.2 LO2.3
LO 03: Be able to design networked systems
Learning Outcomes LO3.1 LO3.2
LO 04:Be able to implement and support networked systems
Learning Outcomes LO4.1 LO4.2 LO4.3 LO4.4 LO4.5

Merit and Distinction Descriptor


M1 M2 M3 D1 D2 D3

Assessor : Mr.Mithila Internal Examiner (IE) :Mr. Praveen Mahindra

Date Reviewed : Date of IE :

Date Issued : Date Due :

Sarah. A Networking Technologies Page 1


Statement of Originality and Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it
as my own without attributing the sources in the correct way. I further understand what it means to
copy another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of the Excel UK.
3. I know what the consequences will be if I plagiaries or copy another’s work in any of the
assignments for this program.
4. I declare therefore that all work presented by me for every aspects of my program, will be my
own, and where I have made use of another’s work, I will attribute the source in the correct
way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding
agreement between myself and Excel UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the attached.

Signature: …………………………… Date: .………………

Sarah. A Networking Technologies Page 2


Acknowledgment

I feel great pleasure to thank to everyone who assisted me with the preparation of this assignment and
to all those comments and criticisms have helped to keep the inclusion accurate and up to date. I’m
especially grateful to the following for their help: my lecturer Amma for helping me to understand
this subject. Also I would like to remember my colleagues, friends who shared their knowledge with
me to clear this scenario.

Although every care has been taken to check mistakes and misprints, yet it is very difficult to claim
perfection. Any error, omissions and suggestions for the improvement of this assignment, brought
to my notice will be thankfully acknowledged and incorporate in my next assignments.

Thank You

Sarah. A Networking Technologies Page 3


Contents
Acknowledgment .................................................................................................................................................3
Task 01:................................................................................................................................................................5
There are many types of networks system used to connect devices. ...................................................................7
1. Bus topology ...........................................................................................................................................9
2. Ring topology............................................................................................................................................11
3. Mesh topology...........................................................................................................................................12
4. Star topology.............................................................................................................................................14
6. Tree topology ........................................................................................................................................15
4. Hybrid Topology ..................................................................................................................................16
Advantages of Hybrid Network Topology in to Winsoft (Pvt) Ltd. ..........................................................17
Disadvantages of Hybrid Topology in to Winsoft (Pvt) Ltd ......................................................................17
Hybrid topology is the suitable topology for this scenario ................................................................................18
Task 02:..............................................................................................................................................................19
Provide a report on network related technologies and standards that would be employed to fulfill the
requirements of Winsoft (Pvt) Ltd and discuss how they would impact on your solution (individually and / or
collectively)........................................................................................................................................................19
Task 03:..............................................................................................................................................................24
Describe the importance of different protocols in data communication. And discuss the roles of different
protocols that you would have to employ in this solution and how they enable the effective utilization of your
networking system .............................................................................................................................................24
Task 04:..............................................................................................................................................................27
Design a comprehensive network solution for the main and city center and explain how your design meets the
requirements of Winsoft (Pvt) Ltd. ....................................................................................................................27
Task 05:..............................................................................................................................................................29
Critically discuss the role of software and hardware components that you would employ in this solution and
how you would utilize them to create your new network infrastructure ............................................................29
Software components: ........................................................................................................................................29
Task 06:..............................................................................................................................................................30
Task 07:..............................................................................................................................................................32

Sarah. A Networking Technologies Page 4


Discuss how workstation hardware inter-dependent with network components in the performance of network.
...........................................................................................................................................................................32
Task 08:..............................................................................................................................................................37
Task 09:..............................................................................................................................................................41
Record your test results obtained in Activity 04 (with proper descriptions and screenshots) and analyze with
the expected outputs. Evaluate your analysis.....................................................................................................41
Task 10:..............................................................................................................................................................45
Discuss the enhancements that you would implement after a period of one year from the execution of the
solution to improve the aspects including but not limited to bandwidth, quality, security and scalability........45
Effective and efficient security for the most demanding networks ................................................................47
Fortinet high-end next gen firewalls ..........................................................................................................47
Fort iGATE 7000 Series ...........................................................................................................................47
Get better protection, deeper visibility, and superior performance ............................................................47
Task 11:..............................................................................................................................................................48
Design a comprehensive maintenance schedule including data backup, with the types of data that will be
backup based on users. .......................................................................................................................................48
Windows Server 2012. .......................................................................................................................................50
References ..........................................................................................................................................................61

Table 1 ...............................................................................................................................................................24
Table 2 ...............................................................................................................................................................29
Table 3 ...............................................................................................................................................................30
Table 4 ...............................................................................................................................................................31
Table 5 ...............................................................................................................................................................39
Table 6 ...............................................................................................................................................................49

Figure 1 ..............................................................................................................................................................10
Figure 2 ..............................................................................................................................................................11
Figure 3 ..............................................................................................................................................................13
Figure 4 ..............................................................................................................................................................14
Figure 5 ..............................................................................................................................................................15
Figure 6 ..............................................................................................................................................................17
Figure 7 ..............................................................................................................................................................19
Figure 8 ..............................................................................................................................................................27
Figure 9 ..............................................................................................................................................................32
Figure 10 ............................................................................................................................................................33
Figure 11 ............................................................................................................................................................34

Sarah. A Networking Technologies Page 5


Figure 12 ............................................................................................................................................................35
Figure 13 ............................................................................................................................................................35
Figure 14 ............................................................................................................................................................39
Figure 15 ............................................................................................................................................................41
Figure 16 ............................................................................................................................................................42
Figure 17 ............................................................................................................................................................42
Figure 18 ............................................................................................................................................................43
Figure 19 ............................................................................................................................................................44

Sarah. A Networking Technologies Page 6


Task 01:
There are many different network systems types and topologies available. Discuss the benefits
and constraints of different network systems types, topologies and suggest a suitable network
topology for Winsoft (Pvt) Ltd networks and justify your answer.

There are many types of networks system used to connect devices.


1. LAN (Local Area Network).

2. MAN (Metropolitan Area Network).

3. WAN (Wide Area Network).

Local Area Network.

Local area networks is commonly used for to connect numbers of computer printer, scanner etc.in a
institutions, and also through LAN we could able to share data and files between the notes

Wide Area Network

Usually WAN uses for large geographical area coverage’s. Through WAN we could able to connect
one or more than one local area networks. WAN also be connected through public networks and
satellites

Metropolitan Area Network

Sarah. A Networking Technologies Page 7


Among the three types of networks MAN is provide biggest coverage. Through MAN it could able
to connect long distance in city. MAN is the backbone of all types of networks. It could be able to
interconnect among the cities.

Sarah. A Networking Technologies Page 8


There are many types of network topologies are widely using to define the physical and logical
arrangement of network devices.

Network topologies

1. Bus topology
2. Ring topology
3. Mesh topology
4. Star topology
5. Tree topology

1. Bus topology

In this topology all the devices are connected to a centralized single linear cable. This cable is back
bone of the network

Connect all computers with the support of centralized main cable. It could easy to make network
connection with computer and other devices. The main disadvantage of bus topology is the networks
coverage depends on main cable. We couldn’t close two edges

Sarah. A Networking Technologies Page 9


Figure 1

Benefits of bus topology

 It is very easy to setup, understand the system.


 We can easily setup a new node to this topology because there is main cable uses for entire
networks

 Minimum expense requires than other topologies and simple network.


o Cable length used to this topology is less than other topologies.

 More efficient for small network.

 Easy to enhance a network.

Sarah. A Networking Technologies Page 10


Disadvantages of bus topology

 Number of connections are limited. Because the man cable length is limited and we can
connect the nodes only between the terminators.
 If we find the mistake in the man cable, the entire network will be shut down because
backbone is the only data transfer path for entire network.
 It seems the minimum security

 Difficult to find if there is any fault in the entire network.

2. Ring topology

The ring topology will connected with a single cable in circular or round shape All the computer are
switch on during .Ring topology systems in place.

Figure 2

Sarah. A Networking Technologies Page 11


Benefits of ring topology

 No need of a central server.


 Easy to add or remove new nodes.
 Less cost than star topology.
 Easy to detect network faults.

Disadvantages of ring topology

 Delay in transferring the data


 If we want to connect new network we have to shut down all networks because all wires
connected together.
 If there is a mistakes in one connection entre network will be closed because we need transfer
the data in all computers.

3. Mesh topology

In this topology each and every nodes are connected to other nodes (all devices are interconnected),
each node not only transfer its own data signal also they can relay data packet from other nodes

Sarah. A Networking Technologies Page 12


Figure 3

Benefits of mesh topology

 If there is a fault in a single node does not affect the network.


o All the devices are interconnected so they can use alternate paths for data transferring,
so data transfer is not depend on a single node.
 Easily transfer data to many nodes at the same time.
o All the nodes are interconnected with each other so if we send a data signal that will
reach relevant nodes at the same time.
 Network can handle data traffic.
o It can easily choose least traffic path to transfer data signal.

Disadvantages of mesh topology

Sarah. A Networking Technologies Page 13


 Very expensive
o In this topology all nodes are interconnect with each other so we need high amount of
transmission media cables.
 In this topology all nodes are interconnected to every other node of the network. If we send a
data packet to particular node of the network, that will travel many different path to reach
that node, this leads to redundancy of many network connection.

4. Star topology
All computers and devices will connected with a main switch and other computers will be connected
in star shape

Figure 4

Benefits of star topology

 Easy to add or remove network devices.


 Data packet transmission is more efficient than other topologies.
 Easy to identify faults in network nodes.

Disadvantages of star topology

 The cost of network is higher compare to other network because we use central hub or switch
 Limited network connection

Sarah. A Networking Technologies Page 14


 If there is a fault in central hub or switch entire network will collapsed

6. Tree topology

This topology is a hierarchical manner of network nodes, there is root node at the top of the
hierarchy. There are client nodes under the root node. The root node (top level node) is commonly a
main frame computer client nodes are mini or microcomputer.

Figure 5

Advantage of tree topology

 Even though there are many connection like a branches of a tree if there is any fault in part
other section can be functioning without any disturbance.
 Easy to find the errors in the network.
 Expand the new connections is easy and possible.

Sarah. A Networking Technologies Page 15


Disadvantages of tree topology

 In this topology all the star connections and all the single nodes are connected to the
backbone so if there any failure in the backbone, the entire network will be shut down.
 It is a very biggest and complexity topology. That’s why difficult to maintenance, high cost
and configure the network also difficult.

4. Hybrid Topology

Before starting about Hybrid topology, we saw that a network topology is a connection of various
links and nodes, communicating with each other for transfer of data. We also saw various
advantages and disadvantages of Star, Bus, Ring, Mesh and Tree topologies.

Now let’s discuss what Hybrid Network topology is and why it finds its application in Wide
Area Networks. Hybrid, as the name suggests, is mixture of two different things. Similarly in this
type of topology we integrate two or more different topologies to form a resultant topology
which has good points (as well as weaknesses) of all the constituent basic topologies rather than
having characteristics of one specific topology. This combination of topologies is done according
to the requirements of the organization.

For example

If there exists a ring topology in one office department while a bus topology in another
department, connecting these two will result in Hybrid topology. Remember connecting two
similar topologies cannot be termed as Hybrid topology. Star-Ring and Star-Bus networks are
most common examples of hybrid network.

Let's see the benefits and drawbacks of this networking architecture

Sarah. A Networking Technologies Page 16


Figure 6
Hybrid Network Topology Image

Advantages of Hybrid Network Topology in to Winsoft (Pvt) Ltd.

 Reliable : Unlike other networks, fault detection and troubleshooting is easy in this type of
topology. The part in which fault is detected can be isolated from the rest of network and
required corrective measures can be taken, WITHOUT affecting the functioning of rest of the
network.

 Scalable: Its easy to increase the size of network by adding new components, without
disturbing existing architecture.

 Flexible: Hybrid Network can be designed according to the requirements of the organization
and by optimizing the available resources. Special care can be given to nodes where traffic is
high as well as where chances of fault are high.

 Effective: Hybrid topology is the combination of two or more topologies, so we can design it
in such a way that strengths of constituent topologies are maximized while there weaknesses
are neutralized. For example we saw Ring Topology has good data reliability (achieved by use
of tokens) and Star topology has high tolerance capability (as each node is not directly
connected to other but through central device), so these two can be used effectively in hybrid
star-ring topology.

Disadvantages of Hybrid Topology in to Winsoft (Pvt) Ltd



Complexity of Design: One of the biggest drawbacks of hybrid topology is its design. It’s not

Sarah. A Networking Technologies Page 17


easy to design this type of architecture and it’s a tough job for designers. Configuration and
installation process needs to be very efficient.

 Costly Hub: The hubs used to connect two distinct networks, are very expensive. These hubs
are different from usual hubs as they need to be intelligent enough to work with different
architectures and should be function even if a part of network is down.

 Costly Infrastructure: As hybrid architectures are usually larger in scale, they require a lot
of cables, cooling systems, sophisticate network devices, etc.

Hybrid topology is the suitable topology for this scenario.


According to my knowledge I prefer the tree topology is most suitable option for Winsoft (Pvt) Ltd.
Because In this scenario there are two buildings one is Colombo main building and other one is Kandy
building first we see the main building that has 3 floors. Each floor has more than 100 computers in
the network, we could able to connect all the computer in Colombo and kandy with use of Hybrid
Topology. Even though there are many connection like a branches of a Hybrid if there is any fault in
part other section can be functioning without any disturbance. We are going to connect more than 100
computers in the network, if there is any fault in any section it is very easy to find the errors in the
network. If we want to do the expansion the new connections are easy and possible.
If we use star topology all the nodes of the network should directly connected with central connection
point, in this scenario we have more than 500 nodes so we need that much of cables, Network
connection is limited because every node of the network interconnected to the central connection point
so the number of connection is depends on the capacity of the central connection point. So we can’t
connect all the nodes in the same network, if the central connection point failure entire network will
be shut down. So we can’t choose those topologies to this scenario.

Hybrid topology is a combination of star and bus topology so we need only one longest cable to
backbone for the entire network. After we have to divide all the nodes as groups for the use of those
nodes. Nodes are in a single group will be connected with a central connection point and all the central
connection points are connected with the backbone. we can simply add or remove a new network
device with backbone that will not affect the any other nodes or entire network, easy to find the fault
and maintenance also easy because nodes are grouped by a different star topology so if there any fault
in the network we quickly identify by checking the every single star also it is more than secure other
topologies, So that’s why I suggest Hybrid topology is the suitable topology for this scenario.

Sarah. A Networking Technologies Page 18


Task 02:

Provide a report on network related technologies and standards that would be employed to
fulfill the requirements of Winsoft (Pvt) Ltd and discuss how they would impact on your
solution (individually and / or collectively).

OSI Model

Open system interconnection model describes a networking framework to implement set of rules in 7
layers. This model is a theoretical framework to understand difficult interconnections in networking.
Control process transfer from one layer to another layer.

Figure 7

1. Physical layer ( layer 1)


Physical layer is the bottom layer in the OSI model. This layer explains the physical
components of the different communication media. This layer defines the physical
requirements for a particular communication. Hub performs at physical layer.
Ex: define cable sizes, which type of BNC connector has to use and the termination method

Sarah. A Networking Technologies Page 19


2. Data link layer (layer 2)
This layer encode and decode data packet into bites. This layer manages transmission protocol
and this handles faults in physical layer, this layer has two sub layers media access control
(MAC) and logical link control (LLC)
MAC layer controls access methods and permissions to transfer data.
LLC layer control frame synchronization.
Switches performs at data link layer.

3. Network layer (layer 3)


Network layer handles Switching and routing functions, develops logical (logical address
mapping) path for transfer data from device to device. Routers, layer 3 switchers perform at
network layer.

4. Transport layer (layer 4)


Transport layer confirms data packets are transferred without any faults or duplication. TCP/IP
found in this layer.
Transport layer delivers:
- Message segmentation
- Message acknowledgement
- Message traffic control
- Session multiplexing

5. Session layer (layer 5)


Session establishment, maintenance and termination between applications.
Session support: implements the function that allow process over the network.

6. Presentation layer (layer 6)


Presentation layer is the translator for the network that mean this layer deliver independent
platform in data representation by converting data from one format to any different format
This layer delivers independence from compatibility errors.

Sarah. A Networking Technologies Page 20


7. Application layer (layer 7)
This layer supports application and end user processes, application layer interacts with the
operating system when the end user select to transfer data or do any other network operations.
This layer has generally needed operations:
 Resource sharing and device redirection
 Remote file access
 Remote printer access
 Inter-process communication
 Network management
 Directory services
 Electronic messaging
 Network virtual terminals

IEEE 802.11 Standards

802.11 is the generic name of a family of related standards for Wi-Fi wireless networks. The
numbering system comes from the IEEE 802.11, which uses "802" to designate many standards of
computer networks including Ethernet (802.3).

802.11 standards define rules for communication in wireless local area networks (WLAN). Popular
802.11 standards contain 802.11a, 802.11g, and also 802.11n.

802.11 was the original standard of this family, ratified in 1997 defined WLAN 802.11 operating at
1-2 Mbps. This rule is obsolete today.

Each extension to the original 802.11 adds a unique font for the name. While 802.11g and 802.11n are
the most interesting for the average consumer, there are many other extensions or are under
development.

Transmission control protocol (TCP/IP)

TCP/IP is a communication protocol, is used to connect host on network.

TCP is a transport layer protocol. It is defined as a reliable protocol.

TCP-Server and TCP-client connection has three phases

:-Establish a connection

Sarah. A Networking Technologies Page 21


-Transfer Data

-Terminate the connection

IP addressing

IP address has two versions one is IPV-4 and other one is IPV-6, IPV-4 is 32bit scheme, IPV-4 allows
4.3 billion unique address. It represented in following type

Byte 1. Byte 2. Byte 3. Byte4 (1 Byte = 8 bits)

192 . 168 . 10 . 1

11000000 10101000 00001010 00000001

Sarah. A Networking Technologies Page 22


32bits divided as network ID and Host ID, IPV-4 has 5 major classes

Class A – first 1 byte for network ID and remaining 3 bytes for Host ID

Class B – first 2 bytes for network ID and remaining 2 bytes for Host ID

Class C – first 3 bytes for network ID and remaining 1 byte for Host ID

Class D – this is used for multicasting.

Class E – this reserved for future use.

IPV-6 is 128bit scheme and this is the latest version, IPV-6 allows more users and n nodes to transfer
data between them. It allows nearly three hundred and forty trillion unique address.

Example of IPV-6 address: 2001:db8: ffff: 1:201:02ff:fe03:0405

Justification

OSI reference model to describe how information is transferred from one network component to
another, from the moment a user enters information using a keyboard and mouse so that when the
information is converted into electrical or light signals transferred along of a length of wire.

Developed the ISO seven-layer model to help vendors and network administrators to gain a better
understanding of how data is handled and transported between network devices, and to provide
guidance for the implementation of new standards and technologies network. To assist in this process,
is separated from the OSI reference model the process of network communication into seven layers
simple.

In our case each class room and conference hall are equipped with Wi-Fi connection, so the IEE 802.11
standard will help us.

We use IPV-4 version class C address to configure LAN network. To identify a particular node in
network.

Sarah. A Networking Technologies Page 23


Task 03:

Describe the importance of different protocols in data communication. And discuss the roles of
different protocols that you would have to employ in this solution and how they enable the
effective utilization of your networking system

Data Communication protocols

There are many protocols in network technology

Example:
Table 1

OSI layer Name of the layer Common Protocols


7 Application HTTP, FTP, SMTP, DNS,
Telnet
6 Presentation
5 Session
4 Transport TCP, SPX
3 Network IP
2 Data link Ethernet
1 Physical

Routable protocol

Routing protocols give a platform to routers to advertise their own routing table and learn other router
information which are enable to learn, and define which path is the best path to routes to a destination.
TCP/IP is one of the example for routable protocol.

Non routable protocol

Non routable protocol is used device address to transfer data without using IP address, this can be used
in a LAN network (this must be used with in interior network), and this protocol is limited to smaller
LANs.

NetBEUI is a non-routable protocol this is an improved version of NetBIOS.

File Transfer Protocol (FTP)

Sarah. A Networking Technologies Page 24


FTP is a standard network protocol for transferring files between computers on the network. This is
an application protocol that uses the TCP/IP protocol. It is generally used to transfer web side files
from their designer to the computer that acts like their server for everyone in the internet. Also it is
generally helped to download programs and other documents to our computer from other server.

Hypertext Transfer Protocol (HTTP)

HTTP is the underlying protocol used by the World Wide Web. HTTP defines how messages
formatted and transferred, and what actions Web servers and internet browsers should take in response
to several commands. For an example, when we enter a particular URL in our browser, this actually
sends an HTTP command to the Web server directing it to search and transmit the requested Web
page.

Simple Mail Transfer Protocol (SMTP)

This is a protocol for transferring email messages between clients to servers. Most e-mail systems that
send mail over the Internet use SMTP to send messages from one server to another; messages can be
retrieved with an email client using POP or IMAP. In addition, SMTP is generally used to send
messages from a mail client to a mail server. This is why it is necessary to specify both the POP or
IMAP server and the SMTP server when you configure your email application.

Transmission Control Protocol (TCP)

TCP is one of the main protocols in network technology. The IP protocol deals only with data packets,
TCP enables two hosts to establish a network connection and interchange streams of data. TCP
guarantees transfer of data and also guarantees that data packets will be transported in the same order
in which they were sent.

Internet Protocol (IP)

IP specifies the format of data packets, also named datagrams, and the addressing pattern. Most
networks association IP with a higher-level protocol named Transmission Control Protocol (TCP),
which establishes a virtual connection between a destination and a source.

IP by itself is something like the postal scheme. It allows us to address a data package and drop it in
the system, but there is no straight link between us and the recipient. TCP / IP, on the other pointer,
establish a network connection between two hosts so that they can transfer messages back and forth
for a period of time.

The current version of IP is IPv4 and the new version is IPv6, is under development.
Sarah. A Networking Technologies Page 25
Ethernet

Originally known as Alto Aloha Network, Ethernet is a network protocol widely used local area (LAN)
originally created by Xerox PARC in 1973 by Robert Metcalfe, as the first network to offer Carrier
Sense Multiple Access / Collision Detection Ethernet is a solution fast, reliable network that is still
widely used today, Here is a list of the different standards of Ethernet and additional information about
each is shown.

Ethernet II / DIX / 802.3

Ethernet II is a revised version of Ethernet rewritten by the Digital Equipment Corporation, Intel and
Xerox. Ethernet II, also known as DIX and 802.3.

Fast Ethernet / 100BASE-T / 802.3u

Fast Ethernet is also known as 802.3u 100BASE-T or is a communication protocol that allows
computers on a local area network to share information with each other at a rate of 100 million bits
per second instead of the normal 10 million BPS. Fast Ethernet works over Category 5 cabling twisted
pair.

There are two available standards 100BASE-T. The first standard known as 100BASE-T uses CSMA
/ CD. The second standard, known as 802.12 or 100VG-AnyLAN is similar to another standard;
however, a different Ethernet frame to send their data is used.

100BASE-T is available in three different cable technologies:

1. 100BASE-T4 uses four pairs of telephone grade wire twisted pair is used for networks that
require low quality twisted pair 100-Mbps Ethernet.
2. 100BASE-TX Powered by ANSI = 100BASE-TX is also known as 100BASE-X, 100BASE-
TX uses two data wire to wire twisted pair
3. 100BASE-FX = Powered by ANSI, uses 2 100BASE-FX fiber cable supports.

Sarah. A Networking Technologies Page 26


Task 04:

Design a comprehensive network solution for the main and city center and explain how your
design meets the requirements of Winsoft (Pvt) Ltd.
Figure 7

Figure 8

Sarah. A Networking Technologies Page 27


In the Design phase, the Networking Company staff uses the initial requirements determined
during the Plan phase to direct its work. Figure 6 shows the initial topology identified during the
Plan phase

The design requirements document supports the specifications identified in the Prepare and Plan
phases for the following:

 Availability
 Scalability
 Security
 Manageability
The design must be flexible enough to allow for changes or additions as new goals or needs
emerge.
The technology must be integrated into the current operations and network management
infrastructure
One main router, server and main switch in the Colombo branch .five sub switches connect to
main switch. In any problem into switches easy find in to the main switch. Where the problem and
easily give a solution. In the kandy branch to same setup. colombo branch to Kandy branch connect
to firewall system .fire wall system is high security give in to this company.
In a Colombo company. 1st floor details, 2 switches, Wi-Fi connection, Computers for the employees,
Computer for the reception, Computer for the GM’s room .2nd Floor details 2 switches, Wi-Fi
connection, Training Center with 50 computers, Calling Center for USA clients - 150 computers. 3rd
Floor details Firewall, Router, Server, Main switch, Calling Center for UK clients with 120
computers, Auditorium – with Wi-Fi facilities. Kandy branch 1st floor details, 1 Main switch, firewall,
One switch, One server, One router ,Computer for the receptionist ,100 computers for the Australian
clients, Wi-Fi connection 2nd floor details, 2 Switches, 30 computers for the training center, Calling
Center for Asian clients - 80 computers, Wi-Fi connection for the Auditorium

Sarah. A Networking Technologies Page 28


Task 05:

Critically discuss the role of software and hardware components that you would employ in this
solution and how you would utilize them to create your new network infrastructure

Software components:
In server based networking there should be a server computer and other computers in the network are
called clients. Client pc’s request and receive related network services from the server computer so
the server computer has a specialized operating system. Server computer is usually higher
performance system. Using server based networking model client pc’s are able to design with
minimum hardware requirements. Winsoft (Pvt) Ltd uses windows 7 operating system for the client
computers because it is more user friendly than other operating systems and windows server 2012 for
server computer.
Table 2

Item Description
Microsoft windows server 2012 R2 Standard edition
Microsoft windows 8 pro Original version
EMC AVAMAR backup
ESET NOD32 business edition Antivirus
Microsoft office 2013 Professional
Adobe suite Adobe collection

Hardware components:

We use hubs, switches, Wi-Fi routers, routers as the network devices.

Hubs and switch: Hub is a network equipment it connect computers in a private network, we can use
hub for small network. If the network larger we may use switches to divide the groups of hubs, it helps
to reduce the network traffic. In our case Colombo -04 building has computer labs, each lab has more
the 35 computer so we have to use both hub and switch together.

Wi-Fi router: it is usually used to access internet without wire connection. Commonly portable devices
use Wi-Fi connection. In our case each class room and conference halls are equipped with Wi-Fi
connection.

Router: it is a network device operates at the network layer, it connects multiple networks together it
can use to connect two or more LAN or WAN together. In our case we have both LAN and WAN
networks for this company

Sarah. A Networking Technologies Page 29


Table 3

Items Model Specifications


UTP cables Systimax CAT 6 4 pair
RJ 45 connectors
Patch panel Intellinet 24 port
19' Rack
cable management
CAT 6 data gate plus jack
1m slim boot patch cords
2m slim boot patch cords
1U patch guide
5 U wall mount enclosure
24 port 10/100/1000 switch Cisco 2960
Cisco 806
Cisco (OPTIONAL)
Cisco ASA 5510 firewall edition

Hardware wireless components

Access point Cisco Cisco aironet 600

Hardware components

PCs /workstations HP 6000 pro


Server HP ML380
UPS 700VA
UPS 1.2KVA
Network attached storage Synology ds212j

Task 06:
Provide the different types of servers that you would have to utilize in this solution and
comprehensively analyze and compare the different types of servers available in the market (based
on the cost and benefits of them) and make the best selection. Justify your answer.

Sarah. A Networking Technologies Page 30


Table 4

Configuration IBM System Dell PowerEdge HP G8 ML350p HP G7 SL390s


xx3650 M3 T610 (668267-005) (626447-B21)
Maximum Memory 288GB 192GB 768GB 192GB
Maximum Storage 16TB 24TB 54TB 4TB
Memory slots 18 DIMM 12 DIMM 24 DIMM 12 DIMM
Mother board Intel 5520 Intel 5520 Intel C600 Intel 5520
No of processer 2 2 2 1
sockets
Specific standard 10-BASE-T - 10-BASE-T 10-BASE-T
supported 100-BASE-TX 100-BASE-T
1000-BASE-T 1000-BASE-TX
1000-BASE-TX 1000-BASE-T
Maximum cache 12MB 12MB 15MB 12MB
Supported operating Microsoft Microsoft windows Microsoft Microsoft
system windows Linux Windows windows
Linux Linux Linux
Compatible Intel Xeon E5600 Intel Xeon E5600 Intel Xeon E5 Intel Xeon X5600
processer Intel Xeon L5600 Intel Xeon L5600
Intel Xeon X5600 Intel Xeon X5600
Core configuration Dual core Quad-core Dual-Core Single-Core
Quad-Core Hex-core 8-Core Dual-Core
Hex-Core Quad-Core Triple-Core
Hex-Core Quad-Core
Hex-Core
Cost $2040 $1125 $2060 $4449

We have chosen HP G8 ML350p (668267-005) as the server computer for Winsoft (Pvt) Ltd . This server pc
supports Microsoft Windows platforms (Operating system) and supports Linux also. Compare to other severs
this cost is reasonable.

It has more RAM memory, memory slots, and Maximum cache than other servers and it support 1000-base
specific standard. In future if we need to extend our network we can increase the main memory. That’s why I
prefer this for our given scenario.

Sarah. A Networking Technologies Page 31


Task 07:

Discuss how workstation hardware inter-dependent with network components in the


performance of network.
Every workstation hardware inter-dependent with network components.

In a network, all devices are interconnected to share resources. When a particular device is ask for a
resource from another device, the first device is mentioned to as a client. Because all devices are part
of a network act in association, almost any device can be referred to as a client. Based on this, there
can be different type of clients in a network. For example, if we send a data form city center to main
building, first the data will go to Ethernet port of that particular computer after that Ethernet port will
send that data to switch, which is connected with particular computer, then the switch will check the
address of the data and pass the data to the router after that router will pass that data to main building
router via internet, then the router will check the address of the data and pass that to switch the switch
will check the address of the data and transfer to the Ethernet port of that addressed computer then the
user can access the data.

Network Interface Card

Figure 9

A Network Interface Card (NIC) is a device that lets computers to be combined together in a
network, naturally a Local Area Network (LAN). Networked computers communicate with each
other using a specific protocol for transferring data packets among the different machines or nodes.
The network interface card acts as an translator, letting the machine to mutually send and obtain
data on a LAN. Information Technology (IT) specialists frequently use these cards to setup wired
or wireless networks.

Function and Purpose of an NIC

After building a LAN, a network interface card is set up in every single computer on the network
and must use the same architecture such as Ethernet cards, Token Ring cards, or an alternate
technology. An Ethernet network interface card is set up in an existing slot inside the computer,
classically on the motherboard. The NIC allocates a unique Media Access Control (MAC) address

Sarah. A Networking Technologies Page 32


to the machine, that is used to direct traffic amongst the computers on a network. Network cardsÂ
as well change data starting at parallel format, used by computers, to a serial format necessary in
data transfers and then back again to accept the data.
Wired Networks

A card's back plate structures a port that turns a data cable, such as an Ethernet cable, that runs
from every NIC to a central hub or switch. The hub acts like a transmission, passing data among
the computers through their MAC addresses as well as let them to share assets like printers and
scanners. Furthermore, in a wired network, a cable actually joins each computer to each other or
to a hub.

Wireless Networks
Wireless cards are installed like their wired counterparts, but rather than a port for a cable, the card
features a small antenna. The NIC interconnects with a central wireless switch or hub via radio
waves. Wireless LANs are frequently suitable, but might have several limitations depending on
the material a structure is made from.
Choosing the Right NIC

Figure 10

When purchasing components for a LAN, it is essential to ensure that the NICs and hub or switch
have the similar abilities. The whole network must be either wired or wireless, except if
components are specifically chosen that have both functionalities. In addition, different versions
of hardware usually support new features plus greater data speeds than older tools.

How a network without Network Interface Card

Several NIC cards work with wired connections although others are wireless. Most NICs support
either wired Ethernet or WiFi wireless standards. Ethernet NICs plug into the system bus of the
PC and contain jacks for network cables, while WiFi NICs contain built-in transmitters .

Sarah. A Networking Technologies Page 33


Without it, users cannot access to the internet at all because there is NIC connected around the
area. There is no signal receiver to transmit data.

Network switch

Figure 11

A network switch  is a device that manages the involvement of numerous computers or


networks on the matching data connection. A network switch not include hubs or repeaters, as
these devices do not consist of every type of logical processors.

A network switch can support 10/100 Mbit/s or 10/100/1000 Mbit/s port transfer rates. It is likely
to have numerous network switches operating at diverse speeds on the same network. On the other
hand, this form of setup gives itself to bottlenecks and restricts the potential routes available for
the flow of data.

The network switch functions as the traffic management system within the network, directing data
packets to the correct destination. These devices are used to link minor devices to the network as
well as to make sure the full cost effectiveness and the ability to share properties.

The characteristic to setup of a network switch is two computers, one printer, and a wireless
router. Every devices are connected to the network switch, and each item have to be clearly well-
known and connection rules produced.

When the setup is complete, every computer on the network, will use the similar printer. They also
can transfer files to each other and anyone with a wireless card can access the network, print and
transfer files. The network switch is intended to let the resources to be shared without decreasing
performance.

Network Cable

Sarah. A Networking Technologies Page 34


Network cable is used to connect and transfer data among computers and a network. The best
popular used types of network cable are the twisted pair, coaxial, Ethernet cross over, and fiber
optic.

The unshielded twisted pair (UTP) cable is used in several Ethernet networks. Each pair of wires
that is housed inside of the lining cable is twisted into some additional rotations to prevent
interfering from new devices on the network. The arrangement of this type of cable increases its
consistency as well as it helps to reduce network disasters.

Figure 12

Coaxial cable, or coax, is a different common type of network cable. It has a copper conductor in
its center and a plastic coating serves as an insulator among the center conductor and also a metal
shield. The cable is then protected with a coating. The thicker the coating which less pliable affords
extra shield.

Figure 13

Ethernet crossover cable is used to connect a computer network made up of two or more
computers. This kind of network cable rejects the need for network switches or routers. The cable
also let the computers to be connected with their network adaptors, such as the network interface
card (NIC).

Sarah. A Networking Technologies Page 35


Fiber optic network cables are used for networks that extent large distance. This category of
cabling has some layers of protecting coating. It also transmits light as opposed to electrical signals
like other cables. Furthermore, fiber optic is as well transmits data at high speeds and is therefore
used in large network environments.

As wireless networks become more and more popular, network cable is becoming less necessary.
Still, many systems, especially large scale systems, continue to rely on network cables.

Sarah. A Networking Technologies Page 36


Task 08:
Once the network gets up and running you need to keep a close eye on the performance and
maintenance aspects of it. Therefore you are required to obtain the feedback of the users of the
network resources in different aspects in order to stay updated. Design a feedback form to obtain
the feedback of users. And analyze and summarize them.

User Feedback form for Winsoft (Pvt) Ltd

5. Antivirus security system?


User Feedback

Name ………………………………

Position ………………………………

1. How is the internet speed?


a. Excellent (……)
b. Average (……)
c. Low (……)
d. Bad (……)

2. How is the data transferring speed?


a. Excellent (……)
b. Average (……)
c. Low (……)
d. Bad (……)

3. How is the security level?


a. Excellent (……)
b. Average (……)
c. Low (……)
d. Bad (……)
e.
4. How is the LAN connection speed?
a. Excellent (……)
b. Average (……)
c. Low (……)
d. Bad (……)
Sarah. A Networking Technologies Page 37
a. Excellent (……)
b. Average (……)
c. Low (……)
d. Bad (……)

6. Was the technician helpful, friendly, and courteous?


Excellent (……)
a. Average (……)
b. Low (……)
c. Bad (……)

7. How would you rate the appearance of the technician?

a. Excellent (……)
b. Average (……)
c. Low (……)
d. Bad (……)
8. How would you rate the competence of the technician?

a. Excellent (……)
b. Average (……)
c. Low (……)
d. Bad (……)

9. Did we meet or exceed your expectations?

a. Excellent (……)
b. Average (……)
c. Low (……)
d. Bad (……)

10. What is your overall rating for this visit?


a. Excellent (……)
b. Average (……)
c. Low (……)
d. Bad (……)
Excellent = 10 Average = 8 Low = 6 Bad = 4

Thank you for your cooperation.

Sarah. A Networking Technologies Page 38


Table 5

No Client Name Q1 Q2 Q3 Q4 Q5 Q6 Q7 Q8 Q9 Q10 Total


01 Miss. Ramya 8 6 6 4 8 5 4 6 4 6 57
02 Mr. Raja 10 8 10 8 6 8 8 10 8 6 82
03 Mrs. Rainjan 8 8 8 8 6 6 8 8 8 6 74
04 Mr. Kamal 8 6 8 8 6 6 10 8 8 6 74
05 Mr. Suthan 8 8 10 8 6 4 4 10 8 6 72
06 Mr. Sathees 4 8 4 6 4 6 6 4 6 4 52

40-60 very bad Services

60.-80 is ok Normal services

80-100 Good services

Total
90
80
70
60
Points Title

50
40
Total
30
20
10
0
Miss. Mr. raja Mrs. Mr. Mr. Mr.
ramya rainjan kamal suthan sathees

Figure 14

Report

Our first question is How is the internet speed?, if most of the users are select excellent and average,
that’s fine so we don’t need to worry about the internet connection. Else we have to change the high
performance internet router or we have to get another new faster internet connection.

The second question is how is the data transferring speed? , if most of the users are select excellent
and average, that’s fine so we don’t need to worry about that. Else we need to replace the high speed

Sarah. A Networking Technologies Page 39


data transferring cables, if we used any hub then we need to replace the switch for them and we should
replace the high data transfer rate Ethernet card for all computer in the network.

The fifth question is how is the security level? , if most of the users are select excellent and average,
that’s fine so we don’t need to worry about the security level. Else we need to install a high
performance antivirus or security guard.

In these company clients is very Sinification for their services

Sarah. A Networking Technologies Page 40


Task 09:

Record your test results obtained in Activity 04 (with proper descriptions and screenshots) and
analyze with the expected outputs. Evaluate your analysis.

Figure 15

Sarah. A Networking Technologies Page 41


Figure 16

Figure 17

Sarah. A Networking Technologies Page 42


The following output will look like this:

Figure 18

Record (with proper descriptions and screenshots where appropriate) your test results obtained in
Activity 04 and analyze with the expected outputs. Evaluate your analysis.

Ping is a tool that helps to verify IP-level connectivity when troubleshooting, the ping command to
send an ICMP echo request to a destination host name or IP address. Use Ping when we want to verify
that a host computer can send IP packets to a destination host. We may also use the Ping tool to isolate
network hardware problems and incompatible configurations.

In our case we need to test whether the configuration working as expected or not. So we can test using
ping command, if got reply from destination host like given below then our configuration is working
correctly.

The following output will look like this:

Test Expected output Original output

Sarah. A Networking Technologies Page 43


Figure 19 Router working Check Power connection Power button on Blink green light

Check all cable connection Work probably router (every port


light blink green)

Switch working Check Power connection Power button on Blink green light

Check all cable connection Work probably Switch (every port


light blink green)

Clint System are Check Power connection Power button on Blink green light
working
Check windows OS windows OS worked successfully

Check network drivers Ethernet port worked successfully

· I92.168.2.1 The following pinged statement Ping statistics for 192.168.2.1:

Should run successfully Packets: sent =4, received = 4

lost = 0

It means that it has run successfully.

Sarah. A Networking Technologies Page 44


Task 10:

Discuss the enhancements that you would implement after a period of one year from the
execution of the solution to improve the aspects including but not limited to bandwidth,
quality, security and scalability

Scalability
: Scalable network designs can grow to include new user groups and remote sites and
Can support new applications without impacting the level of service delivered to existing users.

Availability

: A network designed for availability is one that delivers consistent, reliable perform-
Acne, 24 hours a day, 7 days a week. In addition, the failure of a single link or piece of equipment
Should not significantly impact network performance.

Security

: Security is a feature that must be designed into the network, not added on after the net-
Work is complete. Planning the location of security devices, filters, and firewall features is critical
To safeguarding network resources.

Manageability

: No matter how good the initial network design is, the available network staff
Must be able to manage and support the network. A network that is too complex or difficult to
Maintain cannot function effectively and efficiently

Sarah. A Networking Technologies Page 45


Enhancements that I would implement after a period of one year from the execution of the
solution.

We have select hybrid topology for our solution so if we need to develop our network after one year
we can easily extend our network any time,

Examples:

 If we need new client computer in a same building, we can easily create by connecting
switches with backbone.
 If we need new client section or conference hall, we need only a Wi-Fi router for connect
them with our network.
 If we want to connect a new LAN in different city building, we can easily connect by using
internet router with our main building router.
 Increase security coverage while simplifying management across your physical, virtual, and
cloud deployments.
 Monitoring VLAN Traffic software in feature
 Fastest, most flexible platform: optimized for internal, perimeter, data center, distributed, and
cloud deployments E.G

Fortis leverages a performance-optimized security-engine architecture and custom


FortiASICs in the Fort iGATE platform to deliver faster throughput performance – up to
10 times faster than equivalent firewalls from other vendors. With FortiOS, you have the
flexibility to deploy exactly the capabilities and form factor you need for your specific
firewall use case.

 Security

Security is a feature that must be designed into the network, not added on after the net-work
is complete. Planning the location of security devices, filters, and firewall features is critical
to safeguarding network resources.

 Introducing High security firewall

Sarah. A Networking Technologies Page 46


Effective and efficient security for the most demanding networks

To be effective against today's evolving threat landscape, your security solution needs to reliably
control network traffic through awareness of applications, users, and content. To be efficient, it needs
to be consolidated, simple to manage, and easily scalable.

Fortinet high-end next gen firewalls

Fort iGATE 7000 Series


The Fort iGATE 7000E Series expands Fortinet’s high-end offerings with the new
Fort iGATE 7040E enterprise firewall. Available in six different configurations
to meet customer needs, the 7040E offers simplicity and flexibility of
deployment, with ultra-high NGFW performance and effortless scale to secure vast amounts of mobile
and cloud traffic.

Get better protection, deeper visibility, and superior performance

To provide consistently top-rated security, greater visibility, and unmatched performance, we give
you the unique combination of the most advanced threat intelligence from FortiGuard Labs with
our intuitive FortiOS Operating System, and purpose-built FortiASIC processors.

 Protecting against Internal Attacks in feature

Today’s networks are more likely to face an attack originating from the access layer of the internal
network than from external sources. As a result, the design of server farm security is different from
the older DMZ model. A layer of firewall features and intrusion protection is required between the
servers and the internal networks, and between the servers and the external users. An additional
security layer between the servers may also be required. The sensitivity of data stored on the
servers and contained in the transactions traveling the network determines the appropriate security
policy for the design of the server farm.

Be able to implement and support networked systems Devices : installation of communication


devices, allocation of addresses, local client configuration, server configuration, server installation

Sarah. A Networking Technologies Page 47


Connectivity : installation of internet work communication medium Testing : communication;
bandwidth User access : bandwidth, applications, devices Policy review : bandwidth, resource
availability System monitoring : utilization, bandwidth needs, monitoring user productivity
Maintenance schedule : backups, upgrades, security, auditing

Quality of Service (QoS) is a industry standard to ensure high performance for critical applications.
In this mechanism network administrator can use their existing equipment to give more through
put on service delivery without changing the network architecture or hardware. In this technology
some traffic is given preference over the others for its uses and this require reliable and guaranteed
delivery. So QoS is helps to achieve this goal. There are list of network characteristics managed
by QoS.

Qos benefits for network:

Gives administrators control over network resources and allows them to manage the network from
a business, rather than a technical, perspective. Ensures that time-sensitive and mission-critical
applications have the resources they require, while allowing other applications access to the
network.

Improves user experience.

Reduces costs by using existing resources efficiently, thereby delaying or reducing the need for
expansion or upgrades.

Task 11:

Design a comprehensive maintenance schedule including data backup, with the types of data
that will be backup based on users.

Maintenance schedule

Chief network administrator responsible all network issues chief network administrator can give
order and make time schedule for maintenance of the company

Sarah. A Networking Technologies Page 48


Table 6

Responsible person Duties Time Duration


Testing the server computer After 5.00pm Every month end
hardware
Network administrator Mail backup After 5.00pm Every Friday
Software update After 5.00pm Every month end
Antivirus update After 5.00pm Every Friday
Network Switch on and switch off the Morning 8.00am
administrating every WI-FI routers and Evening – after Every day
assistant maintain other network 5.00pm
devices
Finance department Accounts data backup After 5.00pm Every day
head
Receptionist Student report backup After 5.00pm Every day
Lab assistant Student practical backup After 5.30pm Every day

Sarah. A Networking Technologies Page 49


Windows Server 2012.

Sarah. A Networking Technologies Page 50


In this easy step by step guide, to install and activate Windows Server 2012.

Before you start make sure you have the minimum requirements to install Windows Server

Processor: Minimum: 1.4 GHz 64-bit processor


Ram: Minimum: 512 MB
Disk Space: Minimum: 32 GB
Other requirements:

 DVD drive
 Super VGA (800 x 600) or higher-resolution monitor
 Keyboard and Microsoft® mouse (or other compatible pointing device)
 Internet access

You can then download the evalution copy of Windows Server 2012 from here, Download
the ISO and burn it to some DVD:

Now that we have everything we need, we can start:

1- Insert the Windows Server 2012 DVD, and once you get the following message press
Enter to boot from the setup

Sarah. A Networking Technologies Page 51


2- Wait for a while till the setup loads all necessary files (Depending on your machine, it will
take couple of minutes)

3- Once the setup files are loaded, the setup will start with the following screen. You can
change these to meet your needs (the default values should be fine for now)

Sarah. A Networking Technologies Page 52


4- Once you click next, you can start the installation, click “Install now”

5- You will see the following screen, wait until it finishes loading

Sarah. A Networking Technologies Page 53


6- In the following setup screen, you will see four options. Select Windows Server 2012
Datacenter Evaluation (Server With GUI).

Sarah. A Networking Technologies Page 54


7- After you click Next from previous screen, Read the License terms, tick the “I accept the
license terms” and click Next

8- Now it will ask you for the drive (or partition) you want to install Windows on. Here I’m
installing it on the one partition I have here. NOTE: This will remove the content of the
partition. Either you create a partition to install windows on, or you can test this on a testing
machine

9- Now once we picked our partition, clicking on next from previous screen will start the
setup. This process might take a while.

Sarah. A Networking Technologies Page 55


10- Once the setup is done, it will restart and start your Windows Server 2012 for the first
time. It will ask you then to set up a password for the Administrator user

11- The setup will finalize your settings, might take a couple of minutes

Sarah. A Networking Technologies Page 56


12- Once the setup is done, you can log in for the first time to your Windows Server, as the
screen says, press Ctrl+Alt+Delete to log in, and use the password you set in the setup
process

13 – Once you Log in, Windows Server 2012 will show the Server Manager

Sarah. A Networking Technologies Page 57


Configure Your Static IP Address

The default installation of Windows 2008 sets your IP v4 and IP v6 addresses to use
DHCP. Since we will be configuring this computer to be a domain controller, you must
change the IP address of the computer to be a static IP address.

To change your IP address, click on "View Network Connections" in the Server Manager
screen. This will display the list of active network interfaces.

Sarah. A Networking Technologies Page 58


Double click on your network adaptor to display the adaptors status.

Press the Properties button.

Sarah. A Networking Technologies Page 59


Highlight "Internet Protocol Version 4 (TCP/IPv4)" and then press the Properties button.

Sarah. A Networking Technologies Page 60


Gantt chart

7 8 9 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6
Task
1
Task
2

Task
3

Task
4

References

Sarah. A Networking Technologies Page 61


 Fortinet. 2017. High-End Firewall. [ONLINE] Available at:

https://www.fortinet.com/products/firewalls/firewall/fortigate-high-end.html.

[Accessed 16 March 2017].

 . 2017. TechNet Evaluation Center. [ONLINE] Available at:

http://technet.microsoft.com/en-

US/evalcenter/hh670538.aspx?ocid=&wt.mc_id=TEC_108_1_33. [Accessed 16

March 2017].

 Free Essay Examples and Research Papers | StudyMode. 2017. Free Essay Examples

and Research Papers | StudyMode. [ONLINE] Available at:

http://www.studymode.com/. [Accessed 16 March 2017].

 Wikipedia. 2017. Wikipedia, the free encyclopedia. [ONLINE] Available at:

http://en.wikipedia.org/wiki/Main_Page. [Accessed 16 March 2017].

 https://www.fortinet.com/products/firewalls/firewall/fortigate-high-end.html

 http://catalogue.pearsoned.co.uk/samplechapter/1587132125.pdf

 http://technet.microsoft.com/en-

US/evalcenter/hh670538.aspx?ocid=&wt.mc_id=TEC_108_1_33

 http://edugeeks.in/wp-content/

 http://fcit.usf.edu/network/

 http://studydroid.com/

 http://en.wikipedia.org/wiki/Main_Page

Sarah. A Networking Technologies Page 62


Sarah. A Networking Technologies Page 63
Possible
Outcomes/Criteria for PASS Page Feedback
evidence
LO1 Understand networking principles
1.1discuss the benefits and constraints of different networking systems Task 01
types and topologies
1.2evaluate the impact of current network technology, communication Task 02
and standards
1.3discuss how protocols enable the effective utilization of different Task 03
networking systems

LO2 Understand networking components


2.1discuss the role of software and hardware components Task 04

2.2discuss server types and selection requirement Task 05

2.3 discuss the inter-dependence of workstation hardware with Task 06


network components

LO3 Be able to design networked systems


3.1design a networked system to meet a given specification Task 07

3.2evaluate the design and analyses user feedback Task 08

Sarah. A Networking Technologies Page 64


LO4 Be able to implement and support networked systems

4.1implement a networked system based on a prepared design Activity 01 -


03
4.2test the network system to meet user requirements Activity 04

4.3 document and analyses test results against expected results Task 09

4.4 recommend potential enhancements for the networked Task 10


Systems
4.5 design a maintenance schedule to support the networked system. Task 11

Grade Descriptor for MERIT Possible evidence Feedback


M1 Identify and apply strategies to find appropriate
solutions
To achieve M1, you must decide
M1.1Effective judgments have been made correctly the servers required in this
solution and justify your selection of
the best server out of the products
available in the market (Task 06).

M2 Select / design appropriate methods / techniques

M2.1relevant theories and techniques have been applied To achieve M2, you must provide a
comprehensive solution for the
scenario given here (Task 04) by
applying correct techniques and
theories

Sarah. A Networking Technologies Page 65


M3 Present and communicate appropriate findings

M3.3 A range of methods of presentation have been used and To achieve M3 your documentation
technical language has been accurately used must be well structured adhering to
the formatting guidelines with non-
overlapping facts.
Data provided are accurate, reliable
and consistent.
Appropriate technical terms must
have been used with correct screen
shots where appropriate.

Grade Descriptor for DISTINCTION Possible evidence Feedback


D1 Use critical reflection to evaluate own work and justify
valid conclusions To achieve D1, you must decide
D1.1Conclusions have been arrived at through synthesis of ideas correctly the servers required in this
and have been justified solution and justify your selection of
the best server out of the products
available in the market (Task 06).

D2 Take responsibility for managing and organizing


activities To achieve D2, you must perform the
Activity 1- 3 correctly.
D2.3Activities have been managed

Sarah. A Networking Technologies Page 66


Gantt chart must be provided at the
appendix section and submit the
work on time.
D3 Demonstrate convergent / lateral / creative thinking To achieve D3, you must provide a
comprehensive solution for the
D.3.4Problems have been solved scenario given here (Task 04).

Strengths: Weaknesses:

Future Improvements & Assessor Comment:

Assessor: Signature: Date: ____/____/______

Internal Verifier’s Comments:

Internal Verifier: Signature: Date: ____/____/______

Sarah. A Networking Technologies Page 67

Potrebbero piacerti anche