Unit 02 - Networking Assignment
Unit 02 - Networking Assignment
Unit 02 - Networking Assignment
Assignment title LAN Design & Implementation for Enclave Films Company
Internal Verifier
Date
signature
Programme Leader
Date
signature (if required)
Assessor Feedback:
LO1 Examine networking principles and their protocols.
Pass, Merit & Distinction P1 P2 M1
Descripts
Resubmission Feedback:
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and
grades decisions have been agreed at the assessment board.
Action Plan
Summative feedback
Assessor Date
signature
Student Date
signature
1. A cover page or title page should be attached to your assignment. Use page 1 of this
assignment brief as your cover page and make sure all details are accurately filled.
2. The entire assignment brief should be attached as the first section of your assignment.
3. The assignment should be prepared using a word processing software.
4. The assignment should be word processing in an A4 sized paper.
5. Allow 1” margin on top, bottom and right sides of the paper and 1.25” on the left side (for
binding).
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Set line spacing to 1.5. Justify all paragraphs.
3. Ensure that all headings are consistent in terms of size and font style.
4. Use footer function on the word processor to insert your name, unit, assignment no, and
page number on each page. This is useful if individual sheets get detached from the
submission.
5. Use the spell check and grammar check function of the word processing application to
review the use of language on your assignment.
1. Carefully check carefully the hand in date and the instructions given with the assignment.
Late submissions will not be accepted.
2. Ensure that sufficient time is spent to complete the assignment by the due date.
3. Do not wait till the last minute to get feedback on the assignment. Such excuses will not be
accepted for late submissions.
4. You must be responsible for efficient management of your time.
5. If you are unable to hand in your assignment on time and have valid reasons such as illness,
you may apply (in writing) for an extension.
6. Failure to achieve at least a PASS grade will result in a REFERRAL grade.
7. Non-submission of work without valid reasons will lead to an automatic REFERRAL. You will
then be asked to complete an alternative assignment.
8. If you use other people’s work or ideas in your assignment, it must be properly referenced,
using the HARVARD referencing system, in your text or any bibliography. Otherwise, you’ll
be found guilty of committing plagiarism.
9. If you are caught plagiarising, your grade will be reduced to a REFERRAL or at worst, you
could be excluded from the course.
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present
it as my own without attributing the sources in the correct form. I further understand what it
means to copy another’s work.
Unit Tutor
Assignment Title LAN Design & Implementation for Enclave Films Company
Issue Date
Submission Date
Submission format
The submission is in the form of an individual written report. This should be written in a concise,
formal business style using single spacing and font size 12. You are required to make use of headings,
paragraphs and subsections as appropriate, and all work must be supported with research and
referenced using the Harvard referencing system. Please also provide an end list of references using
the Harvard referencing system.
The recommended word count is 3,000–3,500 words for the report excluding annexures,
although you will not be penalised for exceeding the total word limit.
Unit Learning Outcomes:
Enclave Films is in building B and the web team is positioned in the same building
while majority of the administration, sales, accounts and management functions are
supported in building A. Both buildings are located in the same premises. Movie
company plans to aggregate all their staff and resources in one building. Therefore
when adjacent office space becomes available in building A, these groups will be
accommodated together. Building A has a reception and a customer area as well.
The branch network of Enclave Films has grown without proper planning. The LAN
cabling in both offices is Cat5e Ethernet. The office complex provides an Ethernet
link between the two buildings.
The current network is a flat network design with minimal redundancy. A small
wireless LAN is used occasionally by few project managers with laptops and the
guests at Building B.
Activity 02
1. Prepare a written plan of how you are going to design a Local Area
Network including a blueprint of your LAN.
2. Justify the security requirements and quality of services needed for
selection of accessories
3. Design a networked system to meet a given specification
4. Provide the IP address allocation table for the redesigned network.
5. Install & configure network services and applications of your choice.
6. Conduct a test and evaluate the design to meet the requirements and analyse
user feedback.
7. Suggest a maintenance schedule to support the networked system.
Activity 03
1. Implement a networked system based on your prepared design.
2. Conduct verification with e.g. Ping, extended ping, trace route, telnet, SSH,
etc.
3. Record the test results and analyze these against expected results.
4. Investigate what functionalities would allow the system to support device
growth and the addition of communication devices.
P1
Discuss the benefits and constraints of different network types
and standards.
P2
Explain the impact of network topology, communication and
bandwidth requirements.
M1
Compare common networking principles and how protocols
enable the effectiveness of networked systems.
P3
Discuss the operating principles of networking devices and
server types.
M2
Explore a range of server types and justify the selection of a
server, considering a given scenario regarding cost and
performance optimization.
LO 1 & LO2
D1
Considering a given scenario, identify the topology protocol
selected for the efficient utilisation of a networking system.
P5
Design a networked system to meet a given specification.
P6
Test and evaluate the design to meet the requirements and
analyze user feedback.
M3
P7
Implement a networked system based on a prepared design.
P8
Document and analyze test results against expected results.
M4
Recommend potential enhancements for the networked
systems.
D3
Use critical reflection to evaluate own work and justify valid
conclusions.
2. An explanation: ............................................................................................................. 28
Activity 02................................................................................................................................ 54
1. Prepare a written plan of how you are going to design a Local Area Network including
a blueprint of your LAN. ..................................................................................................... 54
2. Justify the security requirements and quality of services needed for selection of
accessories............................................................................................................................ 56
4. Provide the IP address allocation table for the redesigned network. ............................ 62
5. Install & configure network services and applications of your choice. ........................ 63
7.1. Why maintain schedule to support the networked system? ................................. 102
11. Implement a networked system based on your prepared design. ............................ 104
2. Conduct verification with e.g. Ping, extended ping, trace route, telnet, SSH, etc. ..... 105
3. Record the test results and analyze these against expected results. ............................ 115
4. Investigate what functionalities would allow the system to support device growth and
the addition of communication devices. ............................................................................ 116
4.2. Existence of more subnet works already for future purposes. ............................. 117
4.4. Taking action to add new services to the client computer ................................... 118
Bibliography........................................................................................................................... 120
1. Overview of report
Enclave Films also found that the company‟s network facilities were not at a strong level.
Vivid Zone appears to be assisting Enclave Films or building B, in the administration, sales,
accounting and management of the building. If we look at the activities of these two
institutions, most of the work is done by Building B. In other words, Enclave Films‟
resources are in short supply, and all of its resources are in the A building, Vivid Zone.
However, the special feature here is that Enclave Films is planning to bring all their staff and
resources together in one building, considering the future of the company. That being said,
when I was able to get adjoining office space for Building A or Vivid Zone, I realized that
these two companies would be staying in the same building as a group. Then there is a
reception and customer area in Building A.
As far as the network of this institution is concerned, it appears that the branch networking of
this institution has been done without proper planning. The Ethernet connection between the
two offices is low and it looks like there will be an Ethernet connection between the two
buildings. In fact, it appears to be connected from one building to another. This network plan
seems to be a flat network plan with minimal redundancy.
As mentioned earlier, the film company's network was not up to par. If they are considered as
criteria:
Disruption of data traffic
Here are some suggestions on how to look or get an appointment for Vivid Zone
networks. The film industry network expects a fast and reliable connection.
Expect access to superior networks with redundant links and technology.
There is a strong need for wireless network access in the building. They hope that this
will make their work easier. That is, it was meant for laptop managers.
Expect Quality of service support for video applications.
The above are the points that Enclave Films hopes to further enhance its network. These
factors will help keep the organization‟s network strong in the future. This will enhance the
future of the company with its high technology, high network connectivity, high security and
high reliability. It will also facilitate the work of the managers of the organization. By the
criteria, I mentioned earlier, I could guarantee for sure that this is a good path for the
development of the institution.
The Management expects to enhance the network based on following major criteria:
Available Network
In total, Enclave Films and Vivid Zone have a network of 12 personal computers, 04 printers,
09 high performance computers and 05 office personal computers.
Hardware Requirements
Server Computer
Cisco Router
Cisco Switches
Wireless Access Point
Cat5e Cable
Fibre-optic cable
Modem
Software Requirements
Firewall
Network Operating System
Client Operating System
Description Amount
A network consists of two or more computers connected together for sharing. Uses a network
to transfer data to hardware such as printers, fax machines, and scanners. There are
advantages to sharing expensive software and databases, such as communicating from one
computer to another. There are also disadvantages. Network disadvantages include hardware
costs, viruses spreading easily, slow working computers, and networking job costs (network
managers, network administrators). A network can be connected via computer cables,
telephone lines, radio waves, satellites or infrared light beams.
With a VPN, people‟s Internet traffic travels through the Internet in a private Internet
encrypted tunnel. Anyone can access the destination until the VPN tunnel is completed.
In some cases, an access method, the protocol is a standard that can be referred to as a data
transfer system. Local Area Network, Internet, Intranet, etc. Each protocol has a formatting
method for formatting data. After it was sent after the data compression or how the data looks
wrong to check.
Successful network should follow the transmission of data. On the specific rules and
regulations that have been designed for efficiency for computer-based programming language
similar protocols. Transmission protocols and standards for data communications, providing
detailed information about the process. The protocol is, in other words, a need for a mutually
acceptable and enforceable set of rules for the exchange of information for both ends of the
communication network. Computer networks are the communications between the different
communications systems. Any organization is possible to send or receive information.
However, the two companies could not be sent to the bit stream, and each one can be
expected to understand them.
Enclave Films organization the protocol types of work for which they are used:
TCP/IP (Transmission Control Protocol / Internet Protocol)
This protocol should be mandatory in every organization. It is possible for one computer to
connect to another and exchange data. This protocol enables all branches of the organization
to be connected. Since this protocol runs parallel to the Internet Protocol, you can also access
the Internet through this. This protocol is the OSI (Open Systems Interconnection) Layer
Streaming Protocol, which is used for messaging, transporting, and connecting to remote
computers over networks and the Internet. However, the information of their organization can
be exchanged only within that institution.
TCP ensures that the data is kept at the correct destination. Before the data is transmitted, a
connection is created between the TCP source and the destination, and this communication
continues until it is activated. This TCP/IP protocol can be connected to the server via an
Ethernet cable and to a computer via a branch server.
There is a file transfer protocol for TCP/IP connections. The FTP protocol often works with
the Internet. Files can be transferred wirelessly to another person‟s computer via their
computer. Specifically, this protocol is used to send emails as well as transfer files from
Google Drive when needed. Email and Google lead the organization, both internally and
externally. For example, this protocol would be very important for a company to share a
document or video from another organization to meet a need.
Enclave Films is working closely with film companies and Vivid Zone to share this file via
email. This is mostly used for file sharing. The protocol used to transfer large files such as
multimedia files, and communicating through these, side learning is a difficult task.
Enclave Films organization the company website, videos and images to communicate is
essential. Release protocols URL (Uniform Resource Locator) can be integrated through
lateral learning should be replaced, such as burn YouTube. In this protocol, the file can be
uploaded and downloaded. In addition, ends with any organization can see the information in
the world, to include employee unreformed HTTP Protocol.
Enclave Films standpoint HTTPS primarily designed to protect information, billing system or
SSL encryption is encrypted TLS, sensitive data and transactions for the unsecured HTTP
protocol to protect the unprotected hacker protection. Collaborates with the HTTPS
Certification Authority to evaluate the security certification of corporate websites.
Enclave Films requires this protocol to maintain remote connections. This was meant
specifically for other branches or overseas branches. This draft will be emailed in a
transaction similar to the transaction in writing. If the Enclave Films film company does not
send it, it will be automatically deleted.
Including benefits:
Strong Business Relationships - Networking is about sharing. It helps each other build
trust and reach goals. Being in touch with your contacts regularly and finding
opportunities to support them can help strengthen the relationship.
Get fresh ideas - Sharing information about challenges, experiences and objectives is a
major advantage of networking. For it allows for a new understanding that is otherwise
unexpected. Similarly, presenting useful ideas for a relationship is a great way to build the
reputation of an innovative thinker.
Advance your Career - Seeing and Focusing is an essential part of networking that is
essential in building a career. Regular participation in professional and social events helps
to get to know your face. Providing useful information or tips to people in need can help
build your reputation as a knowledgeable, trusted and supportive person.
Build Confidence - Constantly meet new people, build invaluable social skills and self-
confidence that you can take with you anywhere, effectively stepping out of the comfort
zone.
Developing Long Term Personal Relationships - Of course, the point of networking is
to develop and nurture professional relationships, but some strong and long-lasting
friendships are borne out of work relationships.
(Michael Page team, 2018)
Each local area network (LAN) is essential for the on-going maintenance of important nodes.
The implementation of regional network of nodes, Computers, routers and other data may be
included. This is the concept of the network topology. Network topology is the basic
understanding needed to understand its various sub categories. Such connections require the
use of any organization in order to make their tasks easier. It is important to maintain the
connection in that it is important to connect one computer to another computer with network
cables. It is interconnected with each other and different nodes. Alternatively, the data
transfer between the nodes can be described as how the network topology. Network topology
communications network elements setting. Command and control network topology radio
networks, such as various types of industrial sectors and a network of buses can be used for
processing information to telecommunications networks.
1. Logical Topology
A network‟s logical topology can also be referred to as its signal topology. This type of
topology is not interested in how devices on the network are connected but how they
communicate with each other. Logical topologies are created by the network protocols on
NICs that determine the movement of data on the physical topology.
Bus topology
Ring topology
Communications:
This technology includes a bus as a main cable with small cables that connect computers.
This type of topographic network is like a classroom where everyone hears a conversation
and goes everywhere until they reach their destination.
Communications:
Ring network topology, nodes are connected to the rings or loop. Send data around the ring,
and it will be sent to a computer system to another until they reach a destination.
2. Physical Topology
The physical layout device on a network. Every LAN has a topology, or the way that the
devices on a network are arranged and how they communicate with each other. The way that
the workstations are connected to the through the actual cables that transmitted data the
physical structure of the network is called the physical topology.
Mesh Topology
Star Topology
Tree Topology
Communications:
A network topology with a grid does not have a focal point, and instead, each node is
connected to at least one node, or usually more than one. Each node has the ability to send
and receive messages to other nodes. The node acts as a relay, sending a message to its final
destination. (bbc)
Communications:
The information received from one computer is sent to the address server via nodes. In this
sense, the node (i.e. the device on which it is based) controls the entire network. Computers
are usually connected to a UTP-cable (unbroken twisted pair cable). (Sivaranjith, 2018)
Communication:
This topology consists of a group of interconnected star circuits. Bus and star topography are
hybrids, and the baseline connecting star topography is called the trunk. Tree topography is
easier than any single bus and single star proposals to further expand any network.
(Sivaranjith, 2018)
1. Networking Devices
Computer networking devices are called by various names such as networking devices,
network hardware, network devices. However, not all names are the same but have different
purposes. If you look at different devices, they work in different layers of computer networks.
The different layers of a computer network are like different regions of a computer network
with specific functions, also known as „network protocols‟.
For example: A LAN cable aims to connect a computer to a local area network, while a Wi-
Fi router aims to send and receive data between one person and another person's Internet
connection. Similarly, we can think of other network devices that serve different purposes.
However, due to its functional mechanism, a hub is not so safe and secure. Moreover,
copying data packets on all interfaces or ports is slower and more congested.
Switch
Like a hub, a switch also works on the LAN layer, but a switch can be said to be more
intelligent than a hub. The hub only performs the function of forwarding data, 'filtering and
forwarding' with a switch, which is the most intelligent way of dealing with data packets.
Therefore, when a packet is received from one interface of the switch, it filters the packet and
sends it only to the interface of the desired receiver. For these purposes, a switch maintains a
CAM (Content Addressable Memory) table that contains the system configuration and
Modem
A modem is an interesting network device in everyday life. The man's house can be
connected to the internet via a wire. There are different types of wires for that. This wire is
used to carry our internet data to the outside internet world.
However, computer data or binary 1s and 0s of digital data generated by the way the other
hand, the wire analog signal while the modem comes.
Router
A router is a network device that is responsible for switching from one network to another.
These two networks can be a public network or a private company network. You can think of
a router as a traffic cop directing different network traffic in different directions.
Bridge
If a router connects two different types of networks, a bridge connects two sub-networks as
part of the same network. You can think of two different labs or two different floors
connected by a bridge.
For example, in a university campus, the dormitory ISP line may be farther away than the
main college coming from. If the university authority wants to pull a wire between the
dormitories and the main campus, they will have to reuse it. Because of the large distance,
there are limits to the distance that different types of cables can carry data.
(Shekhar, 2016)
You must store at least 100 GB of hard disk space to store video, pictures, music, software or
any other file. So a cable connection is used to connect the computers together.
Print Server
A print server is software that manages the requests of printers, network devices, or
computers. End users and network administrators will provide print queue status information.
Print servers are used in large enterprise and small or home office (SOHO) networks. Enclave
Films can manage multiple printers on a single computer that serves as the organization's
print server. There are printers for each department of the organization that connect the
switch from the computer to the server.
Database Server
A database server is a device that retrieves data from a database and returns it to other service
providers' computer systems. Users can access query data using a query language specific to
the query language. Enclave Films uses a database server to store data. In particular, the SQL
database system will be functional within the organization.
Usually some organizations use file data server. However, a database server is more efficient
than a file server is. All databases are managed by the database server. Any type of computer
database can be used as a server.
Enabling an FTP server requires a TCP/IP network, based on the use of specialized servers
with more FTP servers. The FTP server is disabled so that connections can always be made
between servers. The FTP server is an important part of the FTP format and helps to share
files over the Internet. This server is especially important for downloading movies produced
by Enclave Films through Vivid Zone‟s websites.
DNS Server
DNS is a system that circulates within the hierarchy of clients on which DNS is created. A
DNS server is a computer that can connect to any registered DNS. It is an index of domain
names and IP addresses, and when applied, you can say the IP address of the current
relationship with the domain name. If it does not know, it will try to find it from other DNS
servers. When you type your domain name into your browser, any browser, such as Chrome
or Firefox, will try to tell the domain server the IP address of this domain and the DNS
server.
The DNS server is a critical part of the DNS (Domain Name System) infrastructure. Without
DNS servers, the Internet would not work properly. It stores their hostname and IP address,
and is used by the web address or device to check the queries for access to another network
system. Also known as, the server name, the DNS server is actually useful.
DHCP Server
DHCP is a network management tool for Transmission Control Platform (TCP) and Internet
Protocol (IP). There are two Internet Protocols used to connect devices and the TCP / IP
Protocol, the main Internet access point.
The primary function of DHCP is to automatically manage and configure IP addresses on the
network and not to send them to individual users‟ individual IP addresses. However, it is
more powerful and uses the default gateway, domain name server (DNS) and subnet mask to
find out how to install network devices. The DHCP server is somewhat self-explanatory. It is
a DHCP server that is configured to configure devices and other network information
connected to the network address with an IP address.
Usually, when searching for a website name, the Internet Service Provider (ISP) will make a
request on your behalf, linking it to the real IP address. Your online requests will then be
reactivated when you use a proxy. The advantage of a proxy server is that it can serve all its
users. While using a proxy, your Internet request goes from your computer to your ISP
provider. But then sent to the proxy server and then to the website. If one or more websites
are frequently requested, these may be in the proxy cache, which may improve the user
response time. Proxy uses the IP address of your choice in a setting similar to your actual IP
address.
Helps to establish server roles such as server operating systems, web server, mail server, file
server, database server, application server and print server. Popular server operating systems
include the SUSE Linux server for Windows Server, Mac OS X Server, and Red Hat
Enterprise Linux (RHL) and Linux variants.
The first network operating system was released in 1983 by Novell NetWare. NetWare was
released by other network operating systems. Includes examples of other network operating
systems, such as Windows 2000, Microsoft Windows XP, and Linux.
1. Prepare a written plan of how you are going to design a Local Area Network
including a blueprint of your LAN.
Looking at these two offices, here are a few things to help strengthen the network design
here.
Both buildings are located on the same premises.
LAN cabling in both offices Cat5e Ethernet
Office Complex Having an Ethernet connection between the two buildings
The web team is located in the same building.
When adjoining office space is available for the Vivid Zone building, these groups
stay together.
Network security is a broad topic with multiple layers of access. The data connection layer,
network layer and application layer can be addressed. Related issues are: Packet invasion and
encryption, routing tables with IP packets and their updated version, and host-level errors
occurred in the data connection layer, network layer, and application, respectively.
(Berry)
Quality of service (QoS) requirements is technical specifications that specify the system
quality of features such as performance, availability, scalability, and serviceability. QoS
requirements are driven by business needs specified in the business requirements.
System quality Description
Performance Measure response time and output relative to user load conditions.
Availability A measure of the amount of resources and services a system's end users
can access, often expressed as system overtime.
Scalability Ability to add capacity (and users) to a system deployed over time. Scale
usually involves adding resources to the system, but changes in
deployment architecture should not be necessary.
Security A complex collection of factors that describe the integrity of a system and
its users. Security includes user authentication and authorization, data
security, and secure access to a deployed system.
Latent capacity The ability of a system to load an extraordinary maximum load without
additional resources. Cryptic capacity is a factor in the attributes of
availability, functionality and scale.
Serviceability Ease of maintaining a deployed system, including system monitoring,
troubleshooting, and hardware and software component upgrades.
Table 2: Quality of Service Requirements
(docs.oracle.com, 2010)
Performance
Looking the Enclave Films organization networking efficiency it seems that very high speed
networking is expected.
Data traffic here is expected to increase by 80%
Limiting its time speed for video applications to a certain period
Wireless network access for laptop project managers
A fast network to connect directly to the Vividzone network
Scalability
Scale is the ability to add capacity to a system and assist in loading the system with existing
users or an additional user base. The scale usually requires the addition of resources, but does
not require a change in deployment architecture design or loss of service due to the time
taken to collect additional resources.
Working to add fibre-optic cables to the network. (These cables can be connected to a
branch at least 10 km away.)
Data transfer speeds range from 100 Mbit/s to 10,000 Mbit/s.
Security
Security is a complex topic that involves all levels of a deployed system. It is the
responsibility of the authorities to ensure the security of the computer hardware and software
of the organization, especially to ensure security for any organization‟s computer.
Protecting yourself from the clutches of hackers
Ability to minimize damage caused by various viruses
High productivity and reliability
Software security
Serviceability
Serviceability is the ease of maintaining a deployed system, including system monitoring,
troubleshooting, adding and removing users from the system, and upgrading hardware and
software components.
If hackers catch a system, reset it.
System speed
Internet facilities
When an employee of the organization leaves, the employee‟s account is also
removed from the system.
In case of any damage to the branch branches or network cables connected internally
by the company, the cable should be removed.
5.1. Activity 01
Windows Server 2012 operating system is installed to the correct IP address settings.
Figure the primary domain for enclavefilms.com
Add a computer server to the appropriate IP addresses with domain settings.
Check whether configuration works as expected.
Step 01
Open the VMware workstation and click the “Create a New Virtual Machine”.
Step 03
After the open in “Guest Operating System Installation” module, click on “Installer disc
image file (iso):” and click the “Browse…” button. After the click on “I will install the
operating system later” and click the “Next” button.
Step 05
After the module, “Name the Virtual Machine” and select text box change the name.
Step 07
After the came to “Ready to Create Virtual Machine” and click the “Finish” button.
Step 09
After the module, and come to loading the virtual machine.
Step 11
Click the “Install now” button.
Setup is starting
Step 13
After the come “Licence term” module and click the “I accept the licence terms”.
Step 15
Select the “Upgrade: Install Windows and keep files, settings, and application”.
Step 17
Step 19
Step 21
Step 23
Step 25
Step 27
Step 01
After the open in “Guest Operating System Installation” module, click on “Installer disc
image file (iso):” and click the “Browse…” button. After the click on “I will install the
operating system later” and click the “Next” button.
After the module, click combo box and select “Windows 7” operating system.
Step 03
After the module, change “Virtual machine name:” and click “Browse….” Button.
After the open in “Guest Operating System Installation” module, click on “Installer disc
image file (iso):” and click the “Browse…” button. After the click on “I will install the
operating system later” and click the “Next” button.
Step 05
After the module, come to “Ready to Create Virtual Machine” and click the “Finish” button.
Step 07
Step 09
Step 11
After the come “Licence term” module and click the “I accept the licence terms”.
Select the “Upgrade: Install Windows and keep files, settings, and application”.
Step 13
Step 15
Step 17
Give the product key and click the “Next” button. Alternatively, click the “Skip” button.
Step 19
Set the time zone, date and time. In addition, after the click “Next” button.
Step 21
Step 23
Running windows 7
Step 25
Step 27
Select “Internet Protocol Version 4 (TCP/IPv4)” combo and click the “Properties” button.
Step 29
After the display properties, click the “Use the following IP address” and enter the “IP
address” and “Subnet mask” call the network.
Step 31
Windows Security module on change domain user name and password. In addition, after the
click on “Ok” button.
A customer feedback form is a way to get feedback from users on corporate products,
services and businesses. The purpose of these forms is to provide a better understanding of
the overall customer experience of their business.
User requirements
Employee Number : 2
Employee Name : Senesh Akmeemana
Position : Network 01
Employee Number : 5
Employee Name : Bumith Withana
Position : Network 04
Employee Number : 3
Employee Name : Ruwindya Pathirana
Position : Network 05
Data is the most important thing for any organization. In a network system, data is
transmitted from one person's computer to another over the network. If this type of network
suddenly crashes, the entire system will crash. If their network is not properly maintained or
protected, it can lead to data loss and vulnerability by hackers. It should have a maintenance
schedule and keep it high performance. Security improves the efficiency of the system and
improves network productivity. This will prevent unwanted and unauthorized access to the
network. Therefore, the most important thing for a network is a maintenance schedule.
Moreover, maintain a more important schedule for the resources allocated to achieve network
objectives.
In the case of the new network implemented above, the end result is a pre-structure of the
functionality. The network team will explain how to activate this network. Task 02 identifies
the blue print, network diagrams, and VLSM math, server installation, and IP routing table.
1000BaseT and Purchase Cat5e cables have been identified as the most suitable Ethernet
network.
On top of the modern network that was activated, I had to buy a few computer network
devices that already had other network devices. These will be many Cisco products in the
devices mentioned above. It also has unbranded accessories. Before buying as a network
engineer in a network team, pay attention to the quality of brands, features and accessories.
Server computer
Considering the diagram of the activated network, there is still the possibility of adding more
switches and computers as per the requirement of the company. There is no limit to the
number of computers that can be added to this network and any number of computers can be
deployed.
As mentioned in Activity 2, the network team activates the routing table with the new subnet
mask and assigns IP ranger to the subnet. No less than 30 computers with six sub-networks,
no need to change full IP ranges, and can be subdivided from the prepared table.
Enclave Films will need a very fast Wi-Fi facility. This makes the work of the organization
easier.
It also has a server computer in the network enabled above. Meanwhile, Microsoft Windows
Server 2012 has been installed as an operating system. Through the 2012 server where
ADDS, Firewall, Proxy server and anti-virus protectors are installed and configured.
However, if you want to add more features, you can add and configure as needed.
Activity 01 - Examine
networking principles and
their protocols. In
addition, Explain
networking devices and
operations.
Activity 02 - Design
efficient networked
systems.
Activity 03 - Implement
and diagnose networked
systems.