Networking Assignment 2 Course Hero
Networking Assignment 2 Course Hero
Networking Assignment 2 Course Hero
ASSIGNMENT NUMBER: 2
ASSIGNMENT NAME: Network Design and Implement
SUBMISSION DATE:
DATE RECEIVED:
ASSIGNMENT 1
NETWORKING
Summative Feedback:
Internal verification:
ASSIGNMENT 2
NETWORKING
Contents
A. Introduction....................................................................................................................................4
B. Content...........................................................................................................................................4
I. Identify the topology protocol selected for the efficient utilization of a networking system (D1)
4
II. Written step by step plan on how you are going to design a Local Area Network(P5)................5
III. Install and configure network services and applications (M3)................................................9
IV. Implement a networked system based on your prepared design(P7)...................................15
V. Design a maintenance schedule to support the networked system(D2)...................................31
VI. Recommend potential enhancements for the networked systems (M4)..............................33
VII. Discuss significance upgrades and security requirements in your network design(D3)........34
VIII. References............................................................................................................................35
ASSIGNMENT 3
NETWORKING
A. Introduction
After more than 25 years of establishment and continuous development, the Internet has
outstanding features that no one can deny, from the ability to connect strongly to abundant
information sources as well as a matter of time. and information processing speed. But in
parallel with those advantages, the Internet has contained in it immeasurable dangers.
Therefore, as a person in the network training industry, consulting and designing network
systems for partners. We want to build a completely new, effective and secure network
based on partner requests.
We believe that, with this project, we can help your company manage, use and secure
information well so that the company makes good use of technology and is suitable for the
financial resources of a medium company. and small is on the rise.
B. Content
I. Identify the topology protocol selected for the efficient
utilization of a networking system (D1)
A protocol is a set of rules and procedures for communicating data. Rules are defined for
each step and process during communication between two or more computers. Networks
have to follow these rules to successfully transmit data.
The Ethernet is a local area network (LAN) set of protocols which serves the physical and
data link layers. Ethernet utilizes a linear bus or star topology. Ethernet served as the basis
for the IEEE 802.3 standard.
The Ethernet deals with the low level Physical and Data Link Layers.
The Data Link Layer is divided into two sublayers:
Logical Link Control (LLC). This sublayer establishes the transmission paths between
computers or devices on a network.
Media Access Control (MAC). On a network, the network interface card (NIC) has a unique
hardware address which identifies a computer or peripheral device. The hardware address is
used for the MAC sublayer addressing. Ethernet uses the MAC hardware addresses for the
source and destination for each packet transmitted.
ASSIGNMENT 4
NETWORKING
Ethernet uses CSMA/CD when transmitting packets. The Carrier Sense Multiple Access with
Collision Detection (CSMA/CD) is an algorithm, for transmitting and receiving packets over a
common network hardware medium, by aiding in avoiding transmission collisions. The
network is checked for other transmissions, when the way is clear, the computer
transmissions can begin. If a collision is detected the packet is retransmitted later.
The topology that I will use in the scenario will be bus topology.
II. Written step by step plan on how you are going to design a
Local Area Network(P5)
LAN-
LAN stands for “Local Area Network” Designing a Local Area Network also known as a LAN is
a complex process with a variety of factors to consider. A well-designed LAN will provide
consistent, high quality service to every device attached to the network, no matter its size.
Likewise, the network must be able to provide continuous access to functions such as
printing and file sharing. To make sure the network is fast, efficient and secure, all these
aspects should be planned in advance.
A Local Area Network provides connectivity to a relatively small group of users in a single
building, office or campus. It also typically connects to the global Internet through a gateway
server, which acts as the main defence against unauthorized access to network resources.
With all this in mind, the main consideration in the early stages of LAN planning is what size
it will be and what services it will provide. While a LAN featuring ten nodes can be set up in
as little as one day, a larger network is a bigger undertaking.
Justification of the topology the topology that is used for the network is bus topology.
It is easy to connect a device to the network.
If the computer or peripheral has the appropriate connection device, then it can be easily
added to the network. The new device connects to the linear bus topology and becomes part
of the network immediately. For those who need a temporary network that can be setup
quickly, there isn’t a better option that is available right now. If several users need mutual
access to a printer, adding the printer to the network meets that need immediately.
The failure of one station does not affect the rest of the network.
If one computer or peripheral should fail when using bus topology, the rest of the network is
not affected by this change in performance. The linear nature of the network means that
each unit transmits to the backbone and that data is then available to the other units that
ASSIGNMENT 5
NETWORKING
The size and scope of bus topology is naturally incomplete. It can, however, be extended
quite easily. Joining cable with a repeater or connector allows for additional peripherals or
computers to be added to the network. Although this can increase the number of packet
collisions that may occur, it is a simplified solution that can get people up and working
quickly and for a minimal overall cost.
Multiple peripherals can be supported through bus topology.
Routers, printers, and other data devices can be connected to this network in addition to
computers or terminals. This can increase the speed of productivity because instead of
sending commands to a centralized network, a command can be sent directly to the needed
peripheral. Since it’s a for a college multiple peripheral devices will be used therefore bus
topology would work best.
ASSIGNMENT 6
NETWORKING
ASSIGNMENT 7
NETWORKING
2. Router
This a device that examines the contents of data packets transmitted within a network or to
another network. Routers control whether the source and destination are on the same
network or whether data must be transferred from one network type to another, which
requires summarizing the data packet with routing protocol header information for the new
network type.
3. Cloud
This is a type service where cloud computing resources and substructure are used to return
and manage data and services which is done over the internet.
4. Server
A server is a computer, a device or a program that is dedicated to managing network
resources. Servers are often referred to as dedicated because they carry out hardly any other
tasks apart from their server tasks.
5. Switch
In the context of networking a switch is a highspeed device that receives incoming data
packets and redirects them to their destination on a local area network (LAN).
6. iPhone
An IP telephone system uses packet switched Voice over IP (VoIP), or Internet telephony, to
transmit telephone calls over the Internet as opposed to the circuit switched telephony used
by the traditional Public Switched Telephone Network (PSTN).
7. Firewall
A firewall is a network security device that monitors incoming and outgoing network traffic
and decides whether to allow or block specific traffic based on a defined set of security rules.
8. Printer
A printer is an external hardware output device that takes the electronic data stored on a
computer or other device and generates a hard copy of it Internal connections.
The devices used in the network use dissimilar types of connection from the wired to the
wireless which include the following cables: Fiber optic cable.
An optical fiber cable is a type of cable that has a number of optical fibers bundled together,
which are usually covered in their individual protective plastic covers. Optical cables are used
to transfer digital data signals in the form of light up to distances of hundreds of miles with
higher throughput rates than those achievable via electrical communication cables.
ASSIGNMENT 8
NETWORKING
Coaxial cable
A coaxial cable is a type of shielded and insulated copper cable that is used in computer
networks and to deliver cable TV services to end users.
External connections
The external connections are completed wirelessly using the wireless LANs which has high
frequency radio signals, infrared light beams to communicate between the workstations,
servers and hubs where the workstation the data is been sent has a transceiver to send and
receive the data and they are great for the smart devices mostly from the phones and
laptops.
The above result shows that the packets sent are 4 and the received packets are 4 so it
means that ping is working correctly.
ASSIGNMENT 9
NETWORKING
IP COFING
The above result shows the default gateway address and the IP address for the specific
computer.
ASSIGNMENT 10
NETWORKING
IP CONFIG/ALL
The above result shows the IP address the subnet mask the default gateway the DNS serves
and the DHCP server.
ASSIGNMENT 11
NETWORKING
Tracert
The above result shows the tracing route from one IP to another DHP server
The above snippet shows the DCHP server working and giving a PC an IP address.
ASSIGNMENT 12
NETWORKING
DNS Server
ASSIGNMENT 13
NETWORKING
TheiwebiserveriisiworkingiandiitsiusingitheiIPiaddressi192.168.9.7
ASSIGNMENT 14
NETWORKING
ASSIGNMENT 15
NETWORKING
ASSIGNMENT 16
NETWORKING
Step 3: Click disk image file then click browse and select window 2003 then click next
ASSIGNMENT 17
NETWORKING
Click finish
ASSIGNMENT 18
NETWORKING
ASSIGNMENT 19
NETWORKING
ASSIGNMENT 20
NETWORKING
Enter IP address
ASSIGNMENT 21
NETWORKING
Click next
ASSIGNMENT 22
NETWORKING
ASSIGNMENT 23
NETWORKING
i
As it show below DNS was installed successfully
ASSIGNMENT 24
NETWORKING
ASSIGNMENT 25
NETWORKING
ASSIGNMENT 26
NETWORKING
ASSIGNMENT 27
NETWORKING
Click next
Type the path to folder you want share or click browser to pick the folder and
Clickiwindowitheninewifolderiknowniiticommonipoolitheniokayitheniclickinext
ASSIGNMENT 28
NETWORKING
ASSIGNMENT 29
NETWORKING
ASSIGNMENT 30
NETWORKING
ASSIGNMENT 31
NETWORKING
Check computer server two go to my computer then go to properties copy the name
Theievidentishowibelowimapitheiallocatedinetworkidriveiwasisuccessfully
ASSIGNMENT 32
NETWORKING
A VPN creates a secure “tunnel” by which you can access your network remotely. Array can
establish, manage, and support your firewall services for you.
Router Management
Array will ensure your router is configured properly to optimize network performance and
ensure critical business systems run.
ASSIGNMENT 33
NETWORKING
Asset Management
Arrayiwilliworkiwithiyouitoireviewiyouricorporateiassetsiandidevelopiailifecycleiplaniforiboth
isoftware and hardware. This process will ensure that each member of your team is working
with the right technology that will increase workforce productivity.
It is naturally done using network backup software, which classifies the network components
to back up, configures the backup schedule and copies the data to a backup storage. Backups
with having information backed up in case anything happens to any of the servers and data is
lost the data will be recovered then easily through the backup.
Increasing growth of the network, the switches and more of access points will be added that
helps the network to expand meaning your business/organization also expand and the
outcome of your business increases.
ASSIGNMENT 34
NETWORKING
The decision to replace equipment should be made carefully even in the best of times.
Current conditions dictate extra diligence, but new technology and applications can yield
over all savings that make upgrades worthwhile.
With the advancement of Wireless routers, one does not need to have any care or worry
about the surroundings, wireless routers whenever they are able to work can give you a
tremendous amount of speed without having to have any wires attached to your device.
ASSIGNMENT 35
NETWORKING
VIII. References
reliability, n., n.d. [Online] Available at: Chapter 11 Network reliability [online]
sciencedirect.com. Available at:
https://www.sciencedirect.com/science/article/abs/pii/S0927050705801288
https://www.networkworld.com/article/2175048/8-ways-to-improve-wired-network-
security.html https://www.networkcomputing.com/networking/7-tips-upgrading-your-
network https://cordkuttersconnect.com/understanding-the-advantages-and-disadvantages-
of-wireless-routers/
ASSIGNMENT 36
NETWORKING
ASSIGNMENT 37