Sie sind auf Seite 1von 34

Assignment Brief

BTEC Level 4-5 HNC/HND Diploma (QCF)

To be filled by the Student


Name of the Student : Malinda Lasitha bandara Lelarathna

Edexcel No : K954844 Registration No: 7058 Batch No: 43

Unit Assessment Information

Qualification : Higher National Diploma in Computing and Systems Development

Unit Code & Title : Unit 44 – Local Area Network Technology (LAN)

Assessment Title & No’s : A LAN Solution for Kandy Metro College (LAN – 17 – 001)

Learning outcomes and grading opportunities:


LO 01: Understand the impact of LAN technologies
Learning Outcomes LO 1.1 LO 1.2 LO 1.3
LO 02: Be able to design LAN infrastructures
Learning Outcomes LO 2.1 LO 2.2
LO 03: Be able to implement LAN infrastructures
Learning Outcomes LO 3.1 LO 3.2 LO 3.3
LO 04: Be able to manage LAN infrastructures
Learning Outcomes LO 4.1 LO 4.2 LO 4.3

Merit and Distinction Descriptor


M1 M2 M3 D1 D2 D3

Date Issued : 2018 – 06 -03 Date Due : 2018 – 10 - 12

Date of Submission: 2018-12-23

Assessor : mr. Geeth Date Assessed:

Internal Verifier (IV): Date of IV:

All rights reserved ©ESOFT Metro Campus, Sri Lanka


Malinda Lasitha| Reg No - 7058 | Batch No – 43 | Branch – Kandy | Unit-44 Page 1 of 34
Statement of Originality and Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to
present it as my own without attributing the sources in the correct way. I further
understand what it means to copy another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of the Edexcel UK.
3. I know what the consequences will be if I plagiaries or copy another’s work in any of
the assignments for this program.
4. I declare therefore that all work presented by me for every aspect of my program,
will be my own, and where I have made use of another’s work, I will attribute the
source in the correct way.
5. I acknowledge that the attachment of this document signed or not, constitutes a
binding agreement between myself and Edexcel UK.
6. I understand that my assignment will not be considered as submitted if this
document is not attached to the attached.

Student’s Signature: …Malinda… Date:.2018/12/23…

All rights reserved ©ESOFT Metro Campus, Sri Lanka


Malinda Lasitha| Reg No - 7058 | Batch No – 43 | Branch – Kandy | Unit-44 Page 2 of 34
Scenario

You are working for IT Support and Services Company. You are assigned with a project of designing

a complete LAN technology solution for one of your clients. Kandy Metro College is a private

college with more than 2000 students and five branches in Sri Lanka. They are planning to open a

new head office in Kandy and have other branches Island wide. It has a centralized distributed

database system for the students’ details. You are required to provide a complete Local Area

Networking solution for their head office in Kandy.

The head office will comprise of the following departments:

 Customer Service: Customer Service area has 5 computers where students can approach for

assistance related to their attendance and progress or any other academic related issues.

 Accounts/Finance: This department has 40 computers and a network printer and have

access to only those working in finance department.

 Lab: With 200 computers, the lab will be divided in to two rooms and each which will

contain 100 devices including a network printer. The Lab needs to be an isolated network as

the student will be allowed to use it for their Practical purpose. They should also be able to

Access only Web Server and Internet from these machines.

 Server Area: A control room with all the servers for the College. File Server, Web Server,

Domain Controller are located in this area and planning for minimum 10 Servers.

 Web Services: It hosts the college’s intranet services. Students can log on to this server to

get the information about their account, their attendance, progress and other study related

materials.

 Domain Services: Keeps the record of all the users and their access rights and permission.

Create, edit and delete student and staff details.

All rights reserved ©ESOFT Metro Campus, Sri Lanka


Malinda Lasitha| Reg No - 7058 | Batch No – 43 | Branch – Kandy | Unit-44 Page 3 of 34
The college will be using private IP address 192.168.0.0/16 within LAN and they will be using

Network Address Translation (NAT) or Port Address Translation (PAT) for accessing outside

network. For the college, the availability of the service and security of the personal and financial

data is very important. At the same time, it must be financially viable. So they have asked you to

come up with a complete network design and implementation that will guarantee the scalability,

security and availability of the devices and resources within the network.

Clearly state your assumptions. You are allowed to design and implement the LAN solution
according to your assumptions but main objectives should NOT be violated

Task 1: Understand the impact of LAN technologies

a. Identify and explain different LAN Technologies available in the market. Explain different

LAN technology in relation to the scenario above. (LO 1.1)

b. What do you understand by quality of service (QoS) and bandwidth management? Evaluate

and analyze with examples why do you think it is important to perform QoS and Bandwidth

Management? (LO 1.2)

c. Discuss concerns that a LAN may face in terms of network security, availability and

performance? Explain how a Hierarchical Network Design can improve on availability,

security, scalability and performance (LO 1.3, M1.3)

Task 2: Be able to design LAN infrastructures

a. Design network infrastructure to fulfill the requirement of above scenario, including the

diagram of the network infrastructure, and all devices (ex. Switches, routers, cables, etc.)?

(LO 2.1, M2.1)

b. Identify the LAN components used for the above design and evaluate the suitability of the

chosen LAN components. (LO 2.2)

Task 3: Be able to implement LAN infrastructures

All rights reserved ©ESOFT Metro Campus, Sri Lanka


Malinda Lasitha| Reg No - 7058 | Batch No – 43 | Branch – Kandy | Unit-44 Page 4 of 34
a. Prepare a list of IP addresses, subnetwork IDs, Broadcast IDs for each department, justify

your choice for chosen techniques (VLSM or others) and Draw a complete LAN design

including servers, connecting devices, workstations, peripherals, etc. for the above scenario.

Include the configuration scripts in the appendix.

(LO 3.1, Activity 1 and 2, D3.4)

b. What type technologies can be used in order to keep the resources and devices secured in

the above network? Justify your choice of technology (e.g. Access Control Lists, Port

Security, etc.) for implementation in the above network. (LO 3.2, Activity 3).

c. The IT director asked you to review and test the LAN, prepare a test case form so that the

performance, availability and security of the proposed network can be tested. (LO 3.3, LO

4.2)

Task 4: Be able to manage LAN infrastructures

a. One of the computers used in the library replaced; plan a step by step process to connect

the new computer to the network and test connectivity effectively and efficiently? (LO 4.1)

b. There are many tools available in the market to monitor the performance of a network,

choose one and produce a performance monitoring report for your network.

(LO 4.3, Activity 4).

All rights reserved ©ESOFT Metro Campus, Sri Lanka


Malinda Lasitha| Reg No - 7058 | Batch No – 43 | Branch – Kandy | Unit-44 Page 5 of 34
Acknowledgement

I would like to express my deepest appreciation to all those who provided me the possibility
to complete this Assignment. A special gratitude I give to our Lecturer Mr. Geeth, whose
contribution in stimulating suggestions and encouragement, helped me to coordinate my
project especially in writing this Assignment.
Malinda Lasith Bandara

All rights reserved ©ESOFT Metro Campus, Sri Lanka


Malinda Lasitha| Reg No - 7058 | Batch No – 43 | Branch – Kandy | Unit-44 Page 6 of 34
Table of Content

1. Understand the impact of LAN technologiesa. Different LAN Technologies11


1.1. Identify and explain different LAN Technologies....................................................11
1.1.1. Different LAN technologies.............................................................................11
1.1.2. Fast Ethernet...................................................................................................11
1.1.3. Gigabit Ethernet..............................................................................................11
1.1.4. 10 Gigabit Ethernet.........................................................................................12
1.2. b. Quality of service (QoS) and bandwidth management.......................................12
1.2.1. What is Quality of Service?.............................................................................12
1.3. How a Hierarchical Network Design can improve on availability, security, scalability and
performance.......................................................................................................................12
1.3.1. Security...........................................................................................................12
1.3.2. Availability.......................................................................................................12
1.3.3. Scalability........................................................................................................13
2. Be able to design LAN infrastructures.............................................................13
2.1. Design network infrastructure to fulfill the requirement of above scenario..........13
2.2. Identify the LAN components.................................................................................13
2.2.1. Switch..............................................................................................................14
2.2.2. Router.............................................................................................................14
2.2.3. Firewall............................................................................................................14
3. Be able to implement LAN infrastructures......................................................15
3.1. IP Assigning for the Kandy Metro College Network................................................15
3.1.1. LAN Design......................................................................................................15
3.1.2. Scripts of building network infrastructure......................................................16
3.2. Justify Your technology...........................................................................................18
3.3. Review and test the LAN.........................................................................................19
3.3.1. Testing Connection between two computers.................................................19
3.3.2. Testing SSH/telnet...........................................................................................20
3.3.3. Testing ACL......................................................................................................21
4. Be able to manage LAN infrastructures...........................................................22
4.1. Connecting new computer to the system...............................................................22
4.2. monitor the performance of a network..................................................................23

All rights reserved ©ESOFT Metro Campus, Sri Lanka


Malinda Lasitha| Reg No - 7058 | Batch No – 43 | Branch – Kandy | Unit-44 Page 7 of 34
All rights reserved ©ESOFT Metro Campus, Sri Lanka
Malinda Lasitha| Reg No - 7058 | Batch No – 43 | Branch – Kandy | Unit-44 Page 8 of 34
Table of Figures

Figure 2.1 – LAN design..........................................................................................................13


Figure 3.1 – Complete Building...............................................................................................15
Figure 3.7 – creating DHCP SERVER........................................................................................16
Figure 3.8 – Creating Sub interfaces.......................................................................................16
Figure 3.9 – user name and password....................................................................................17
Figure 3.10 – Creating VLANs..................................................................................................17
Figure 3.11 – VLAN port assigning..........................................................................................17
Figure 3.12 – Configure ACL....................................................................................................17
Figure 3.13 – ACL assigning.....................................................................................................18
Figure 3.14 – Pinging computers............................................................................................19
Figure 3.16 – Request Timeout...............................................................................................19
Figure 3.17 – Connected.........................................................................................................20
Figure 3.18 – Valid password..................................................................................................20
Figure 3.19 – invalid pinging...................................................................................................21
Figure 3.20 – Valid Pinging......................................................................................................21
Figure 4.1 – IP configuration window.....................................................................................22
Figure 4.2 – DHCP completed.................................................................................................22
Figure 4.3 – Pinging computers..............................................................................................23
Figure 4.4 - Wi-Fi adapter analyzing.......................................................................................23
Figure 4.5 - capture filtering...................................................................................................24
Figure 4.6 - this is the general filtering...................................................................................24

All rights reserved ©ESOFT Metro Campus, Sri Lanka


Malinda Lasitha| Reg No - 7058 | Batch No – 43 | Branch – Kandy | Unit-44 Page 9 of 34
Table of Tables

IP address Ranges...................................................................................................................15

All rights reserved ©ESOFT Metro Campus, Sri Lanka


Malinda Lasitha| Reg No - 7058 | Batch No – 43 | Branch – Kandy | Unit-44 Page 10 of 34
1. Understand the impact of LAN technologiesa. Different LAN
Technologies

2. Identify and explain different LAN Technologies

A network is a collection of independent devices that interact with each other for sharing
information through a common means of communication. Limited geographic areas such as
local area networks, buildings or rooms. LANs 2or 3 can be small and can spread to 100
computers using thousands of computers.[ CITATION LAN18 \l 1033 ]

2.1.1. Different LAN technologies

 Fast Ethernet

 Gigabit Ethernet

 10 Gigabit Ethernet

2.1.2. Fast Ethernet

This technology for Ethernet Networks. This technology enhances the Ethernet speed limit
from 10 Mbps to 100 Mbps. But with the Ethernet cable structure, there are fewer changes to
this technology. According to the IEEE standards, this IEEE standard is known as 802.3u.

2.1.3. Gigabit Ethernet

This technology was developed to enable fast communications with multimedia applications
with some technologies. This technology is known as 1000BASE-t and GigE. This can be
faster than 10 times faster than 100BASE-T Ethernet. It also uses the configuration method
for using IEEE 802.3 standards. The existing ethernet can also interact with Gigabit
Solutions. The main difference between Gigabit and Fast Ethernet is the additional full
duplex operation of the MAC layer and data rate.

All rights reserved ©ESOFT Metro Campus, Sri Lanka


Malinda Lasitha| Reg No - 7058 | Batch No – 43 | Branch – Kandy | Unit-44 Page 11 of 34
2.1.4. 10 Gigabit Ethernet

These are the fastest and most recent Ethernet technology these days. IEEE Standards
802.3ae generally defines Ethernet version 10Gbit 10 times per 10 times per second than
Gigabit Ethernet. Fiber optic cabling technology.

3. b. Quality of service (QoS) and bandwidth management

3.1.1. What is Quality of Service?

Data traffic management is a way to reduce the cost of service, jitter and packet loss based on
the service quality ratio. Manages a specific type of QoS network. Sensitive data, such as
temporary ringtones and video, uses QoS to manage the network's automotive requirements.
Reduction of quality destruction.[ CITATION Alh18 \l 1033 ]

Packet Loss – This happens when the network connection has deteriorated. Then the routers
and switches start packet dropping. In real-time, packets are packed, you can see the gates
and gaps.

Jitter – This event is due to the replacement of the signal clock in a digital signal. Two
variations of network variation on two-stream packet streaming. Instant communication, such
as mobile phone and video conferencing, leads to a fatal accident. Hosting also desktops and
virtual desktops infrastructure.

4. How a Hierarchical Network Design can improve on availability, security, scalability


and performance

4.1.1. Security

This is easy to upgrade and manage. Variable security options can be configured for
changeable switches. The administrator can also use the most powerful security features in
distribution switches.[ CITATION cis09 \l 1033 ]

4.1.2. Availability

For networks, getting is more important. It is possible to dramatically improve the user with
convenient redundancy with the hooking networks. Layer-layers need to be connected to a
variety of distribution layouts.[ CITATION cis09 \l 1033 ]

All rights reserved ©ESOFT Metro Campus, Sri Lanka


Malinda Lasitha| Reg No - 7058 | Batch No – 43 | Branch – Kandy | Unit-44 Page 12 of 34
4.1.3. Scalability

Sources of networks are perfectly scalable. When the design module network grows, the
design elements will be reset. It's easy to design and run widgets every time.[ CITATION
cis09 \l 1033 ]

5. Be able to design LAN infrastructures

6. Design network infrastructure to fulfill the requirement of above scenario

Customer Care – 5 Computers Account/Finance – 40 Computers

Figure 2.1 – LAN design

7. Identify the LAN components

To fulfil the network architecture several devices and several technologies needed. To get
maximum performance from the network design important devices are needed. That are,

7.1.1. Switch
All rights reserved ©ESOFT Metro Campus, Sri Lanka
Malinda Lasitha| Reg No - 7058 | Batch No – 43 | Branch – Kandy | Unit-44 Page 13 of 34
In the context of networking, a switch is a high-speed device that receives data from the
Internet. Redirects them to the local destination network (LAN) on their destination. LAN
switch data layer layer (Layer 2) or OSI model layer layer. Hence all packet packets can be
supported.[ CITATION tec186 \l 1033 ]

7.1.2. Router

A router is an analytics tool that analyzes the content of packets that are transmitted in a
network or other network. Whether the source and destination are the same on the same
network, or whether they should switch from a different type of another network type
determines a packet data with a routine header information for the new network type.
[ CITATION tec187 \l 1033 ]

7.1.3. Firewall

Firewall is a network security system designed to prevent unauthorized access to a private


network or private one. Firewalls can be run as hardware and software, or both combines
simultaneously. Piracy online users use private networks on the Internet, especially on-line.
All messages that enter the Internet go through the firewall, blocking each message checked,
and blocking the exact security criteria.[ CITATION web18 \l 1033 ]

8. Be able to implement LAN infrastructures


All rights reserved ©ESOFT Metro Campus, Sri Lanka
Malinda Lasitha| Reg No - 7058 | Batch No – 43 | Branch – Kandy | Unit-44 Page 14 of 34
9. IP Assigning for the Kandy Metro College Network

9.1.1. LAN Design

Figure 3.1 – Complete Building

IP address Ranges

Departmen Devices Network IP Broadcast IP Range


t
LAB 1 101 Hosts 192.168.0.0/25 192.168.0.127/25 192.168.0.1 –
192.168.0.126
LAB 2 101 Hosts 192.168.0.128/2 192.168.0.255/25 192.168.1.129
5 -
192.168.1.254
Accounts 41 Hosts 192.168.1.0 /26 192.168.1.63/26 192.168.1.1 –
192.168.1.62
Servers 10 hosts 192.168.1.64 / 192.168.1.79 /28 192.168.1.65–
28 192.168.1.78
Customer 5 hosts 192.168.1.80 / 192.168.1.87 / 29 192.168.1.81 -
Care 29 192.168.1.86

9.1.2. Scripts of building network infrastructure

Creating DHCP Server

All rights reserved ©ESOFT Metro Campus, Sri Lanka


Malinda Lasitha| Reg No - 7058 | Batch No – 43 | Branch – Kandy | Unit-44 Page 15 of 34
Figure 3.7 – creating DHCP SERVER

Creating Sub-interfaces in Router

Figure 3.8 – Creating Sub interfaces

Creating user name and password

All rights reserved ©ESOFT Metro Campus, Sri Lanka


Malinda Lasitha| Reg No - 7058 | Batch No – 43 | Branch – Kandy | Unit-44 Page 16 of 34
Figure 3.9 – user name and password

Creating VLANs

Figure 3.10 – Creating VLANs

Figure 3.11 – VLAN port assigning

Configuring ACL

Figure 3.12 – Configure ACL

All rights reserved ©ESOFT Metro Campus, Sri Lanka


Malinda Lasitha| Reg No - 7058 | Batch No – 43 | Branch – Kandy | Unit-44 Page 17 of 34
Figure 3.13 – ACL assigning

10. Justify Your technology

To overcome the requirements of the network there should be several technologies. There are
several technologies that can use for basic network management.

That are,

ACL – Access Control List

ACLs are a set of rules used most commonly to filter network traffic. They are used on
network devices with packet filtering compatibilities (e.g. routers or firewalls). ACLs are
applied on the interface basis to packets leaving or entering an interface.[ CITATION stu18 \l
1033 ]

VLAN – Virtual Local Area Network

VLAN has the same idea about Local Area Network but the connectivity is based on subnets.
Switches can provide multiple independent VLANs for configure subnets. VLANs are mainly
associated with Broadcast domain. It is usually composed of one or more Ethernet switches.
VLANs make administrators to partition a single switch network into several departments
with special features.[ CITATION Sla18 \l 1033 ]

Port Security

Ethernet LANs are vulnerable to attacks such as address spoofing and Layer 2 rejection of
service on network devices. This feature help to protect the data transferring port on device
against loss of information and productivity that such attack can cause. Basic Port security
features is enabled in device default configuration. Administrator can do further modification
with a minimal configuration steps.[ CITATION Jun18 \l 1033 ]
All rights reserved ©ESOFT Metro Campus, Sri Lanka
Malinda Lasitha| Reg No - 7058 | Batch No – 43 | Branch – Kandy | Unit-44 Page 18 of 34
11. Review and test the LAN

11.1.1. Testing Connection between two computers.

Test No 1 - Pinging between two computers same VLAN

Type “ping 192.168.1.83” and enter

Figure 3.14 – Pinging computers

Test No 2 - Pinging between two computers different VLANs

Type “ping 192.168.1.6” and enter

Figure 3.16 – Request Timeout

All rights reserved ©ESOFT Metro Campus, Sri Lanka


Malinda Lasitha| Reg No - 7058 | Batch No – 43 | Branch – Kandy | Unit-44 Page 19 of 34
11.1.2. Testing SSH/telnet

Test No 1 - telnet with valid IP

Type “telnet 192.168.1.89” and enter

Figure 3.17 – Connected

Test No 2 - use valid password at the User Access Verification

Figure 3.18 – Valid password

All rights reserved ©ESOFT Metro Campus, Sri Lanka


Malinda Lasitha| Reg No - 7058 | Batch No – 43 | Branch – Kandy | Unit-44 Page 20 of 34
11.1.3. Testing ACL

Test No 1 - Pinging from Customer care department to Accounts server

Type “ping 192.168.1.68” and enter

Figure 3.19 – invalid pinging

Test No 2 - Pinging from account department to Accounts server

Type “ping 192.168.1.68” and enter

Figure 3.20 – Valid Pinging

All rights reserved ©ESOFT Metro Campus, Sri Lanka


Malinda Lasitha| Reg No - 7058 | Batch No – 43 | Branch – Kandy | Unit-44 Page 21 of 34
12.Be able to manage LAN infrastructures

13. Connecting new computer to the system

There are few steps to connect a new computer to the network. That are,

Step 1 - Connect computer with the cable to the switch.

Step 2 - Accessing the window that can assign the IP addresses on operating system.

Step 3 - Click “DHCP” button.

Figure 4.1 – IP configuration window

Figure 4.2 – DHCP completed

All rights reserved ©ESOFT Metro Campus, Sri Lanka


Malinda Lasitha| Reg No - 7058 | Batch No – 43 | Branch – Kandy | Unit-44 Page 22 of 34
Testing the connectivity of newly connected computer and network

Type “ping 192.168.1.83” and press enter.

Figure 4.3 – Pinging computers

14. monitor the performance of a network

There are several tools and applications in the networking industry based on network
regulation. Network Monitoring means improving traffic congestion and monitoring traffic
flows. Of all these, wireshark can be a great tool with a number of bad experimenting
methods. These are only a few. But there are hundreds of filters to analyze a network

Figure 4.4 - Wi-Fi adapter analyzing

From here users can start capturing packets and this will take us to a filter selection

All rights reserved ©ESOFT Metro Campus, Sri Lanka


Malinda Lasitha| Reg No - 7058 | Batch No – 43 | Branch – Kandy | Unit-44 Page 23 of 34
Figure 4.5 - capture filtering

These are the protocols available to capture different ongoing data traffic.

This is a general filtering of the network over wireless interface and the red details are TCP
packet flow with ACK tag. The three way hand shaking is all covered up here in the
monitoring

Figure 4.6 - this is the general filtering

All rights reserved ©ESOFT Metro Campus, Sri Lanka


Malinda Lasitha| Reg No - 7058 | Batch No – 43 | Branch – Kandy | Unit-44 Page 24 of 34
References
Slattery, T. & Burke, J., 2018. VLAN (virtual LAN). [Online]
Available at: https://searchnetworking.techtarget.com/definition/virtual-LAN
[Accessed 01 10 2018].

Alhava, O. & Finnell, K., 2018. QoS (quality of service). [Online]


Available at: https://searchunifiedcommunications.techtarget.com/definition/QoS-Quality-of-Service
[Accessed 20 09 2018].

Burke, J., 2015. jitter. [Online]


Available at: https://searchunifiedcommunications.techtarget.com/definition/jitter
[Accessed 02 10 2018].

Burke, J. & Brazziel, D., 2018. network switch. [Online]


Available at: https://searchnetworking.techtarget.com/definition/switch
[Accessed 05 10 2018].

cisco Training Academy , 2009. Benefits of a Hierarchical Network. [Online]


Available at: http://cisco-training-academy.blogspot.com/2009/10/benefits-of-hierarchical-
network.html
[Accessed 02 10 2018].

Clark, . C. & Michael, . C., 2018. firewall. [Online]


Available at: https://searchsecurity.techtarget.com/definition/firewall
[Accessed 05 10 2018].

Cobb, M., 2016. Secure Shell (SSH). [Online]


Available at: https://searchsecurity.techtarget.com/definition/Secure-Shell
[Accessed 11 10 2018].

Juniper Networks, 2018. Understanding Port Security Features to Protect the Access Ports on Your
Device Against the Loss of Information and Productivity. [Online]
Available at: https://www.juniper.net/documentation/en_US/junos/topics/concept/port-security-
overview.html
[Accessed 02 10 2018].

LANTRONIX, 2018. Ethernet Tutorial – Part I: Networking Basics. [Online]


Available at: https://www.lantronix.com/resources/networking-tutorials/ethernet-tutorial-
networking-basics/
[Accessed 20 august 2018].

Mitchell, B., 2018. 802.11 Standards Explained: 802.11ac, 802.11b/g/n, 802.11a. [Online]
Available at: https://www.lifewire.com/wireless-standards-802-11a-802-11b-g-n-and-802-11ac-
816553
[Accessed 20 09 2018].

All rights reserved ©ESOFT Metro Campus, Sri Lanka


Malinda Lasitha| Reg No - 7058 | Batch No – 43 | Branch – Kandy | Unit-44 Page 25 of 34
Mitchell, B., 2018. What Is a Router for Computer Networks?. [Online]
Available at: https://www.lifewire.com/how-routers-work-816456
[Accessed 05 10 2018].

Rouse, M., 2010. access point. [Online]


Available at: https://searchmobilecomputing.techtarget.com/definition/access-point
[Accessed 05 10 2018].

Sharpened Productions , 2014. Wi-Fi. [Online]


Available at: https://techterms.com/definition/wi-fi
[Accessed 20 09 2018].

Slattery, T., Gibbs, A. & Spence, S., 2018. subnet (subnetwork). [Online]
Available at: https://searchnetworking.techtarget.com/definition/subnet
[Accessed 03 10 2018].

study ccna, 2018. What are acls. [Online]


Available at: https://study-ccna.com/what-are-acls/
[Accessed 10 12 2018].

techopedia.com, 2018. router. [Online]


Available at: https://www.techopedia.com/definition/2277/router
[Accessed 10 10 2018].

techopedia.com, 2018. switch. [Online]


Available at: https://www.techopedia.com/definition/2306/switch-networking
[Accessed 10 12 2018].

webopedia.com, 2018. firewall. [Online]


Available at: https://www.webopedia.com/TERM/F/firewall.html
[Accessed 10 12 2018].

whatismyipaddress.com, 2018. What is Network Address Translation?. [Online]


Available at: https://whatismyipaddress.com/nat
[Accessed 11 10 2018].

Wilson, T., 2012. Securing Networks: Access Control List (ACL) Concepts. [Online]
Available at: https://www.pluralsight.com/blog/it-ops/access-control-list-concepts
[Accessed 01 10 2018].

All rights reserved ©ESOFT Metro Campus, Sri Lanka


Malinda Lasitha| Reg No - 7058 | Batch No – 43 | Branch – Kandy | Unit-44 Page 26 of 34
All rights reserved ©ESOFT Metro Campus, Sri Lanka
Malinda Lasitha| Reg No - 7058 | Batch No – 43 | Branch – Kandy | Unit-44 Page 27 of 34
Annexes

Gantt chart

September October November December


W W W W W W W W W W W W W W W W
1 2 3 4 1 2 3 4 1 2 3 4 1 2 3 4
Task 1
Task 2
Task 3
Task 4
Documen
tation

All rights reserved ©ESOFT Metro Campus, Sri Lanka


Malinda Lasitha| Reg No - 7058 | Batch No – 43 | Branch – Kandy | Unit-44 Page 28 of 34
Practical Observation Sheet

No Activity LO Date Assessor


: covered Signature
1 Build the network design as per your (LO 3.1)
recommendation.
2 Implement VLANs according to the scenario (LO 3.1)
and show the inter-VLAN communication
3 Design Access Control Lists (ACL) and apply (LO 3.2)
where appropriate in the LAN structure

4 Evaluate the performance of a network with a (LO 4.3)


network monitoring tool of your choice

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 29 of 34


Assessment Criteria

Outcomes/Criteria for PASS Possible Page Feedback


evidence
LO1 Understand the impact of LAN technologies

1.1 critically evaluate different LAN technologies Task 1 – a.

1.2 critically analyse traffic intensive services and Task 1 – b.


their
performance
1.3 discuss LAN concerns and make Task 1 – c.
recommendations to sustain network security,
reliability and performance

LO2 Be able to design LAN infrastructures

2.1 design a LAN infrastructure to meet a given Task 2 – a.


requirement

2.2 critically evaluate the suitability of LAN Task 2 – b.


components

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 30 of 34


LO3 Be able to implement LAN infrastructures

3.1 build and configure a LAN (including services) to Task 3 – a.


meet a given requirement

3.2 implement network security on a LAN Task 3 – b.

3.3 critically review and test a LAN Task 3 – c.

LO4 Be able to manage LAN infrastructures

4.1 monitor and troubleshoot a LAN Task 4 – a.

4.2 resolve LAN issues to improve security, reliability Task 3 – c.


and performance

4.3 critically evaluate the performance of a LAN. Task 4 – b.

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 31 of 34


Grade Descriptor for MERIT Possible evidence Feedback
M1 Identify and apply strategies to find
appropriate solutions
M1.3 an effective approach to study and research has Task 1 – c.
been applied

M2 Select /design appropriate


methods/techniques
M2.1 relevant theories and techniques have been applied Task 2 – a.

M3 Present and communicate appropriate


findings Documentation is well structured adhering to
the formatting guidelines with non-
M3.3 a range of methods of presentation have been used overlapping facts.
and technical language has been accurately used Data provided are accurate, reliable and
consistent

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 32 of 34


Grade Descriptor for DISTINCTION Possible evidence Feedback
D1 Use critical reflection to evaluate own
work and justify valid conclusions Provide realistic improvements that could
D1.1 realistic improvement have been proposed against make your design and solution effective.
defined characteristics for success

D2 Take responsibility for managing and


organizing activities
D2.3 Activities have been managed On time submission of assignment with Gantt
Chart

D3 Demonstrate
convergent/lateral/creative thinking

D3.4 problems have been solved Task 3 – a.

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 33 of 34


Strengths: Weaknesses:

Future Improvements & Assessor Comment:

Assessor: Signature: Date: ____/____/______

Internal Verifier’s Comments:

Internal Verifier: Signature: Date: ____/____/______

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 34 of 34

Das könnte Ihnen auch gefallen