Assignment Brief BTEC Level 4-5 HNC/HND Diploma (QCF)
To be filled by the Learner Name of the Learner
: Sarah Angelo Peter
Edexcel No
:
Date of Submission
:
Centre No : Col/A 045272
Batch: 58
Unit Assessment Information Qualification
: Higher National Diploma in Computing and Systems Development
Unit Code & Title
: M/601/0472 – Unit 24 - Networking Technologies (No 1 of 1)
Assessment Title & No’s
: Plan and Design a network solution for Learning Resource Center
Learning outcomes and grading opportunities:
LO 01: Understand networking principles Learning Outcomes LO1.1 LO1.2 LO1.3 LO 02: Understand networking components
Statement of Originality and Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own without attributing the sources in the correct way. I further understand what it means to copy another’s work.
1. I know that plagiarism is a punishable offence because bec ause it constitutes theft. 2. I understand the plagiarism and copying policy of the Excel UK. 3. I know what the consequences will be if I plagiaries or copy another’s work in any of the assignments for this program. 4. I declare therefore that all work presented by b y me for every aspects of my program, will be my own, and where I have made use of another’s work, I will attribute the source in the correct
way. 5. I acknowledge that the attachment of this document signed or not, constitutes a binding agreement between myself and Excel UK. 6. I understand that my assignment will not be considered as submitted if this document is not attached to the attached.
Signature: ……………………………
Date: .………………
Acknowledgment
I feel great pleasure to thank to everyone who assisted me with the preparation of this assignment and to all those comments and criticisms have helped to keep the inclusion accurate and up to date. I’m
especially grateful to the following for their help: my lecturer Amma for helping me to understand this subject. Also I would like to remember my colleagues, friends who shared their knowledge with me to clear this scenario.
Although every care has been taken to check mistakes and misprints, yet it is very difficult to claim perfection. Any error, omissions and suggestions for the improvement of this
assignment, brought
to my notice will be thankfully acknowledged and incorporate in my next assignments.
Contents Acknowledgment .................................................................................................................................................3 Task 01: ................................................................................................................................................................5 There are many types of networks system used to connect devices. ...................................................................7 1.
Bus topology
2. Ring topology
...........................................................................................................................................9
............................................................................................................................................11
3. Mesh topology...........................................................................................................................................12 4. Star topology.............................................................................................................................................14 6.
Tree topology
........................................................................................................................................15
4.
Hybrid Topology
..................................................................................................................................16
Advantages of Hybrid Network Topology Topology in to Winsoft (Pvt) Ltd. ................................... .................. ................................... .......................17 .....17 Disadvantages of Hybrid Topology in to Winsoft (Pvt) Ltd ................................. ............... .................................... ................................... ...................17 ..17 Hybrid topology is the suitable topology for this scenario ................................................................................18
Discuss how workstation hardware inter-dependent with network components c omponents in the performance of network. ...........................................................................................................................................................................32 Task 08: ..............................................................................................................................................................37 Task 09: ..............................................................................................................................................................41 Record your test results obtained in Activity 04 (with proper descriptions and screenshots) and analyze with the expected outputs. Evaluate your analysis. ....................................................................................................41 Task 10: ..............................................................................................................................................................45 Discuss the enhancements that you would implement after a period of one year from the execution of the solution to improve the aspects including but not limited to bandwidth, quality, security and scalability........45 Effective and efficient security for the most demanding networks ................................ ............... ................................... ................................47 ..............47 Fortinet high-end next gen firewalls ..........................................................................................................47 Fort iGATE 7000 Series ...........................................................................................................................47 Get better protection, deeper visibility, visibility, and superior performance .................................. ................. ................................... ..........................47 ........47 Task 11: ..............................................................................................................................................................48 Design a comprehensive maintenance schedule including data backup, with the types of data that will be backup based on users................................... ................. .................................. ................................... ................................... ................................... .................................... ...............................48 .............48 Windows Server 2012. .......................................................................................................................................50 References ..........................................................................................................................................................61
Figure Figure Figure Figure Figure Figure Figure Figure
12 13 14 15 16 17 18 19
............................................................................................................................................................35 ............................................................................................................................................................35 ............................................................................................................................................................39 ............................................................................................................................................................41 ............................................................................................................................................................42 ............................................................................................................................................................42 ............................................................................................................................................................43 ............................................................................................................................................................44
Task 01: There are many different network systems types and topologies available. Discuss the benefits and constraints of different network systems types, topologies and suggest a suitable network topology for Winsoft (Pvt) Ltd networks and justify your answer.
There are many types of networks system used to connect devices.
1. LAN (Local Area Network). 2. MAN (Metropolitan Area Network). 3. WAN (Wide Area Network).
Local Area Network.
Among the three types of networks MAN is provide biggest coverage. Through MAN it could able to connect long distance in city. MAN is the backbone of all types of networks. It could be able to interconnect among the cities.
There are many types of network topologies are widely using to define the physical and logical arrangement of network devices . Network topologies
1. Bus topology 2. Ring topology 3. Mesh topology 4. Star topology 5. Tree topology
1. Bus topology
In this topology all the devices are connected to a centralized single linear cable. This cable is back bone of the network Connect all computers with the support of centralized main cable. It could easy to make network
Figure 1
Disadvantages of bus topology
Number of connections are limited. Because the man cable length is limited and we can connect the nodes only between the terminators.
If we find the mistake in the man cable, the entire network will be shut down because backbone is the only data transfer path for entire network.
It seems the minimum security
Difficult to find if there is any fault in the entire network.
2. Ring topology
The ring topology will connected with a single cable in circular or round shape All the computer are switch on during .Ring topology systems systems in place.
Benefits of ring topology
No need of a central server.
Easy to add or remove new nodes.
Less cost than star topology.
Easy to detect network faults.
Disadvantages of ring topology
Delay in transferring the data
If we want to connect new network we have to shut down all networks because all wires connected together.
If there is a mistakes in one connection entre network will be closed because we need transfer the data in all computers.
3. Mesh topology
Figure 3
Very expensive o
In this topology all nodes are interconnect with each other so we need high amount of transmission media cables.
In this topology all nodes are interconnected to every other node of the network. If we send a data packet to particular node of the network, that will travel many different path to reach that node, this leads to redundancy of many network connection.
4. Star topology
All computers and devices will connected with a main switch and other computers will be connected connecte d in star shape
If there is a fault in central hub or switch entire network will will collapsed
6. Tree topology
This topology is a hierarchical manner of network n etwork nodes, there is root node at the top of the hierarchy. There are client nodes under the root node. The root node (top level node) is commonly a main frame computer client nodes are mini or microcomputer.
Disadvantages of tree topology
In this topology all the star connections and all the single nodes are connected to the backbone so if there any failure in the backbone, the entire network will be shut down. It is a very biggest and complexity complex ity topology. That’s why difficult to maintenance, high cost
and configure the network also difficult. 4. Hybrid Topology
Before starting about Hybrid topology, we saw that a network a network topology is a connection of various links and nodes, communicating with each other for transfer of data. We also saw various advantages and disadvantages of Star, Bus, Star, Bus, Ring, Ring, Mesh Mesh and and Tree Tree topologies. Now let’s discuss what Hybrid Network topology topology is and why it finds its application in Wide
Area Networks. Hybrid, as the name suggests, is mixture of two different things. Similarly in this
Figure 6
Hybrid Network Topology Image
Advantages of Hybrid Network Topology in to Winsoft (Pvt) Ltd.
Reliable : Unlike
other networks, fault detection and troubleshooting is easy in this type of topology. The part in which fault is detected can be isolated from the rest of network and required corrective measures can be taken, WITHOUT affecting the functioning of rest of the network.
easy to design this type of architecture and it’s a tough job for designers. Configuration and installation process needs to be very efficient.
Costly Hub: The hubs used to connect two distinct networks, are very expensive. These hubs
are different from usual hubs as they need to be intelligent enough to work with different architectures and should be function even if a part of network is down.
Costly Infrastructure: As
hybrid architectures are usually larger in scale, they require a lot of cables, cooling systems, sophisticate network devices, etc.
Hybrid topology is the suitable topology for this scenario .
According to my knowledge I prefer the tree topology is most suitable option for Winsoft (Pvt) Ltd. Because In this scenario there are two buildings one is Colombo main building and other one is Kandy building first we see the main building that has 3 floors. Each floor has more than 100 computers in the network, we could able to connect all the computer in Colombo and kandy with use of Hybrid Topology. Even though there are many connection like a branches of a Hybrid if there is any fault in part other section can be functioning without without any disturbance. We are going to connect more than 100 computers in the network, if there is any fault in any section it is very easy to find the errors in the network. If we want to do the expansion the new connections are easy and possible.
Task 02: Provide a report on network related technologies and standards that would be employed to fulfill the requirements of Winsoft (Pvt) Ltd and discuss how they would impact on your solution (individually and / or collectively).
OSI Model
Open system interconnection model describes a networking ne tworking framework to implement set of rules in 7 layers. This model is a theoretical framework to understand difficult interconnections in networking. Control process transfer from one layer to another layer.
2.
Data link layer (layer 2)
This layer encode and decode data packet into bites. This layer manages transmission transmission protocol and this handles faults in physical layer, this layer has two sub layers media access control (MAC) and logical link control (LLC) MAC layer controls access methods and permissions to transfer data. LLC layer control frame synchronization. Switches performs at data link layer. 3. Network layer (layer 3)
Network layer handles Switching and routing functions, develops logical (logical address mapping) path for transfer data from device to device. Routers, layer 3 switchers perform at network layer. 4. Transport layer (layer 4)
Transport layer confirms data packets are transferred without any faults or duplication. d uplication. TCP/IP found in this layer. Transport layer delivers: - Message segmentation - Message acknowledgement - Message traffic control Session multiplexing
7. Application layer (layer 7)
This layer supports application and end user processes, application layer interacts with the operating system when the end user select to transfer data or do any other network operations. This layer has generally needed operations: Resource sharing and device redirection Remote file access Remote printer access Inter-process communication Network management Directory services Electronic messaging Network virtual terminals
IEEE 802.11 Standards
802.11 is the generic name of a family of related standards for Wi-Fi wireless networks. The numbering system comes from the IEEE 802.11, which uses "802" to designate many standards of computer networks including Ethernet (802.3). 802.11 standards define rules for communication in wireless local area networks (WLAN). Popular 802.11 standards contain 802.11a, 802.11g, and also 802.11n.
-Transfer Data
-Terminate the connection
32bits divided as network ID and Host ID, IPV-4 has 5 major classes Class A – first first 1 byte for network ID and remaining 3 bytes for Host ID Class B – first first 2 bytes for network ID and remaining 2 bytes for Host ID Class C – first first 3 bytes for network ID and remaining 1 byte b yte for Host ID Class D – this this is used for multicasting. Class E – this this reserved for future use. IPV-6 is 128bit scheme and this is the latest version, IPV-6 allows more users and n nodes to transfer data between them. It allows nearly three hundred and forty trillion unique address. Example of IPV-6 address: 2001:db8: ffff: ffff: 1:201:02ff:fe03:0405
Justification
OSI reference model to describe how information is transferred from one network component to another, from the moment a user enters information using a keyboard and mouse so that when the information is converted into electrical or light signals transferred along of a length of wire.
Task 03: Describe the importance of different protocols in data communication. And discuss the roles of different protocols that you would have to employ in this solution and how they enable the effective utilization of your networking system
Data Communication protocols
There are many protocols in network technology Example: Table 1
OSI layer Name of the layer 7 Application 6 5 4 3 2
Presentation Session Transport Network Data link
Common Protocols HTTP, FTP, SMTP, DNS, Telnet
TCP, SPX IP Ethernet
FTP is a standard network protocol for transferring files between computers on the network. This is an application protocol that uses the TCP/IP protocol. It is generally used to transfer web side files from their designer to the computer that acts like their server for everyone in the internet. Also it is generally helped to download programs and other documents to our computer co mputer from other server. Hypertext Transfer Protocol (HTTP)
HTTP is the underlying protocol used by the World Wide Web. HTTP defines how messages formatted and transferred, and what actions Web servers and internet browsers should take in response to several commands. For an example, when we enter a particular URL in our browser, this actually sends an HTTP command to the Web server directing it to search and transmit the requested Web page.
Simple Mail Transfer Protocol
(SMTP)
This is a protocol for transferring email messages between clients to servers. Most e-mail systems that send mail over the Internet use SMTP to send messages from one server to another; messages can be retrieved with an email client using POP or IMAP. In addition, SMTP is generally used to send messages from a mail client to a mail server. This is why it is necessary to specify both the POP or IMAP server and the SMTP server when you configure your email application.
Ethernet
Originally known as Alto Aloha Network, Ethernet is a network protocol p rotocol widely used local area (LAN) originally created by Xerox PARC in 1973 by Robert Metcalfe, as the first network to offer Carrier Sense Multiple Access / Collision Detection Ethernet is a solution fast, reliable network that is still widely used today, Here is a list of the different standards of Ethernet and additional information about each is shown.
Ethernet II / DIX / 802.3 Ethernet II is a revised version of Ethernet rewritten by the Digital Equipment Corporation, Intel and Xerox. Ethernet II, also known as DIX and 802.3.
Fast Ethernet / 100BASE-T / 802.3u Fast Ethernet is also known as 802.3u 100BASE-T or is a communication protocol that allows computers on a local area network to share information with each other at a rate of 100 million bits per second instead instead of the the normal 10 million BPS. Fast Fast Ethernet works over Category Category 5 cabling twisted twisted pair.
Task 04: Design a comprehensive network solution for the main and city center and explain how your design meets the requirements of Winsoft (Pvt) Ltd.
Figure 7
In the Design phase, the Networking Company staff uses the initial requirements determined during the Plan phase to direct its work. Figure 6 shows the initial topology identified during the Plan phase The design requirements document supports the specifications identified in the Prepare and Plan phases for the following:
Availability Scalability Security Manageability
The design must be flexible enough to allow for changes or additions as new goals or needs emerge. The technology must be integrated into the current operations and network management infrastructure
Task 05: Critically discuss the role of software and hardware components that you would employ in this solution and how you would utilize them to create your new network infrastructure
Software components:
In server based networking there should be a server computer and other computers in the network are called clients. Client pc’s request and receive related network services from the server computer so the server computer has a specialized operating system. system. Server computer is usually higher performance system. Using server based networking model client pc’s are able to design with minimum hardware requirements. Winsoft (Pvt) Ltd uses windows 7 operating system for the client computers because it is more user friendly than other operating systems and windows server 2012 for server computer. Table 2
Item
Description
Microsoft windows server 2012 R2 Microsoft windows 8 pro EMC AVAMAR backup ESET NOD32 business edition
Standard edition Original version Antivirus
Table 3
Items
Model
Specifications
UTP cables RJ 45 connectors Patch panel 19' Rack cable management CAT 6 data gate plus jack 1m slim boot patch cords 2m slim boot patch cords 1U patch guide 5 U wall mount enclosure 24 port 10/100/1000 switch
Systimax
CAT 6 4 pair
Intellinet
24 port
Cisco Cisco ASA 5510 firewall edition
Cisco 2960 Cisco 806 (OPTIONAL)
Hardware wireless components
Access point
Cisco
Cisco aironet 600
Table 4
Configuration
IBM System xx3650 M3 Maximum Memory 288GB Maximum Storage 16TB Memory slots 18 DIMM Mother board Intel 5520 No of processer 2 sockets Specific standard 10-BASE-T supported
Dell PowerEdge T610 192GB 24TB 12 DIMM Intel 5520 2
HP G8 ML350p (668267-005) 768GB 54TB 24 DIMM Intel C600 2
HP G7 SL390s (626447-B21) 192GB 4TB 12 DIMM Intel 5520 1
-
Maximum cache Supported operating system
12MB Microsoft windows Linux
10-BASE-T 100-BASE-TX 1000-BASE-T 1000-BASE-TX 15MB Microsoft Windows Linux Intel Xeon E5
10-BASE-T 100-BASE-T 1000-BASE-TX 1000-BASE-T 12MB Microsoft windows Linux Intel Xeon X5600
Dual-Core 8-Core Quad-Core
Single-Core Dual-Core Triple-Core
Compatible processer Core configuration
12MB Microsoft windows Linux Intel Xeon E5600 Intel Xeon L5600 Intel Xeon X5600 Dual core Quad-Core Hex-Core
Intel Xeon E5600 Intel Xeon L5600 Intel Xeon X5600 Quad-core Hex-core
Task 07: Discuss how workstation hardware inter-dependent with network components in the performance of network.
Every workstation hardware inter-dependent with network components. In a network, all devices are interconnected to share resources. When a particular device is ask for a resource from another device, the first device is mentioned to as a client. Because all devices are part of a network act in association, almost any device can be referred to as a client. Based on this, there can be different type of clients in a network. For example, if we send a data form city center to main building, first the data will go to Ethernet port of that particular computer after that Ethernet Ethernet port will send that data to switch, which is connected with particular computer, then the switch will check the address of the data and pass the data to the router after that router will pass that data to main building router via internet, then the router will check the address of the data and pass that to switch the switch will check the address of the data and transfer to the Ethernet port of that addressed computer then the user can access the data. Network Interface Card
to the machine, that is used to direct traffic amongst the computers on a network. Network cards as well change data starting at parallel format, used by computers, to a serial format necessary in data transfers and then back again to accept the data. Wired Networks A card's back plate structures a port that turns a data cable, such as an Ethernet cable, that runs from every NIC to a central hub or switch. The hub acts like a transmission, passing data among the computers through their MAC addresses as well as let them to share assets like printers and scanners. Furthermore, in a wired network, a cable actually joins each computer to each other or to a hub. Wireless Networks Wireless cards are installed like their wired counterparts, but rather than a port p ort for a cable, the card ca rd features a small antenna. The NIC interconnects with a central wireless switch or hub via radio waves. Wireless LANs are frequently suitable, but might have several limitations depending on the material a structure is made from. Choosing the Right NIC
Without it, users cannot access to the internet at all because there is NIC connected around the area. There is no signal receiver to transmit data.
Network switch
Figure 11
A network switch  is a device that manages the involvement of numerous computers or networks on the matching data connection. A network switch not include hubs or repeaters, as these devices do not consist of every ever y type of logical processors.
Network cable is used to connect and transfer data among computers and a network. The best popular used types of network cable are the twisted pair, coaxial, Ethernet cross over, and fiber optic. The unshielded twisted pair (UTP) cable is used in several Ethernet networks. Each pair of wires that is housed inside of the lining cable is twisted into some additional rotations to prevent interfering from new devices on the network. The arrangement of this type of cable increases its consistency as well as it helps to reduce network n etwork disasters.
Figure 12
Coaxial cable, or coax, is a different common type of network cable. It has a copper conductor in its center and a plastic coating serves as an insulator among the center conductor and also a metal
Fiber optic network cables are used for networks that extent large distance. This category of cabling has some layers of protecting coating. It also transmits light as opposed to electrical signals like other cables. Furthermore, fiber optic is as well transmits data at high speeds and is therefore used in large network environments.
Task 08: Once the network gets up and running you need to keep a close eye on the performance and maintenance aspects of it. Therefore you are required to obtain the feedback of the users of the network resources in different aspects in order to stay updated. Design a feedback form to obtain the feedback of users. And analyze and summarize them.
User Feedback form for Winsoft (Pvt) Ltd 5. Antivirus security system? User Feedback Name
………………………………
Position
………………………………
1. How is the internet speed? a. Excellent (……) b. Average (……) c. Low (……) d. Bad (……)
a. b. c. d.
Excellent Average Low Bad
(……) (……) (……) (……)
6. Was the technician helpful, friendly, and courteous? Excellent (……) a. Average (……) b. Low (……) c. Bad (……) 7. How would you rate the appearance of the technician? a. b. c. d.
Excellent Average Low Bad
(……) (……) (……) (……)
8. How would you rate the competence of the technician? a. Excellent b. Average c. Low
(……) (……) (……)
Table 5
No
01 02 03 04 05 06
Client Name
Miss. Ramya Mr. Raja Mrs. Rainjan Mr. Kamal Mr. Suthan Mr. Sathees
40-60 very bad Services 60.-80 is ok Normal services 80-100 Good services
Total 90 80 70 e l t i T
60 50
Q1
Q2
Q3
Q4
Q5
Q6
Q7
Q8
Q9
Q10
Total
8 10 8 8 8 4
6 8 8 6 8 8
6 10 8 8 10 4
4 8 8 8 8 6
8 6 6 6 6 4
5 8 6 6 4 6
4 8 8 10 4 6
6 10 8 8 10 4
4 8 8 8 8 6
6 6 6 6 6 4
57 82 74 74 72 52
data transferring cables, if we used any hub then we need to replace the switch for them and we should replace the high data transfer rate Ethernet card for all computer in the network.
The fifth question is how is the security level? , if most of the users are select excellent and average, that’s fine so we don’t need to worry about the security level. Else we need to install a high
performance antivirus or security guard. In these company clients is very Sinification for their services
Task 09: Record your test results obtained in Activity 04 (with proper descriptions and screenshots) and analyze with the expected outputs. Evaluate your analysis.
Figure 16
The following output will look like this:
Figure 18
Record (with proper descriptions and screenshots where appropriate) your test results obtained in Activity 04 and analyze with the expected outputs. Evaluate your analysis.
Figure 19
Router working
Switch working
Clint System are working
·
I92.168.2.1
Check Power connection
Power button on Blink green light
Check all cable connection
Work probably router (every port light blink green)
Check Power connection
Power button on Blink green light
Check all cable connection
Work probably Switch (every port light blink green)
Check Power connection
Power button on Blink green light
Check windows OS
windows OS worked successfully
Check network drivers
Ethernet port worked successfully
The following pinged statement
Ping statistics for 192.168.2.1: 192.168.2.1:
Should run successfully
Packets: sent =4, received = 4 lost = 0
Task 10:
Discuss the enhancements that you would implement after a period of one year from the execution of the solution to improve the aspects including but not limited to bandwidth, quality, security and scalability
Scalability
: Scalable network designs can grow to include new user groups and remote sites and Can support new applications without impacting the level of service delivered to existing users. Availability
: A network designed for availability is one that delivers consistent, reliable performAcne, 24 hours a day, 7 days a week. In addition, the failure of a single link or piece of equipment
Enhancements that I would implement after a period of one year from the execution of the solution.
We have select hybrid topology for our solution so if we need to develop our network after one year we can easily extend our network any time, Examples:
If we need new client computer in a same building, we can easily create by connecting switches with backbone.
If we need new client section or conference hall, we need only onl y a Wi-Fi router for connect them with our network.
If we want to connect a new n ew LAN in different city building, we can easily connect by using internet router with our main building router.
Increase security coverage while simplifying management across your physical, virtual, and cloud deployments.
Monitoring VLAN Traffic software in feature
Fastest, most flexible platform: optimized for internal, perimeter, data center, distributed, and
Effective and efficient security for the most demanding networks To be effective against today's evolving threat landscape, your security solution needs to reliably control network traffic through awareness of applications, users, and content. To be efficient, it needs to be consolidated, simple to manage, and easily scalable. Fortinet high-end next gen firewalls
Fort iGATE 7000 Series
The Fort iGATE 7000E Series expands Fortinet’s high-end offerings with the new Fort iGATE 7040E enterprise firewall. Available in six different configurations to meet customer needs, the 7040E offers simplicity and flexibility of deployment, with ultra-high NGFW performance and an d effortless scale to secure vast amounts of mobile and cloud traffic. Get better protection, deeper visibility, and superior performance
To provide consistently top-rated security, greater visibility, and unmatched performance, we give
Connectivity : installation of internet work communication medium Testing : communication; bandwidth User access : bandwidth, applications, devices Policy review : bandwidth, resource availability System monitoring : utilization, bandwidth needs, monitoring user productivity Maintenance schedule : backups, upgrades, security, auditing Quality of Service (QoS) is a industry standard to ensure e nsure high performance for critical applications. In this mechanism network administrator can use their existing equipment to give more through put on service delivery without changing the network architecture or hardware. In this technology some traffic is given preference over the others for its uses and this require reliable and guaranteed delivery. So QoS is helps to achieve this goal. There are list of network characteristics managed by QoS. Qos benefits for network: Gives administrators control over network resources and allows them to manage the network from a business, rather than a technical, perspective. Ensures that time-sensitive and mission-critical applications have the resources they require, while allowing other applications access to the
Table 6
Responsible person
Duties Testing the server computer hardware Network administrator Mail backup Software update Antivirus update Network Switch on and switch off the administrating every WI-FI routers and assistant maintain other network devices Finance department Accounts data backup head Receptionist Student report backup Lab assistant Student practical backup
Time After 5.00pm
Duration Every month end
After 5.00pm After 5.00pm After 5.00pm Morning 8.00am Evening – after after 5.00pm
Every Friday Every month end Every Friday Every day
After 5.00pm
Every day
After 5.00pm After 5.30pm
Every day Every day
Windows Server 2012.
In this easy step by step guide, to install and activate Windows Server 2012 .
Before you start make sure you have the minimum requirements to install Windows Server
Processor: Minimum: 1.4 GHz 64-bit processor Ram: Minimum: 512 MB Disk Space: Minimum: 32 GB
2- Wait for a while till the setup loads all necessary files (Depending on your machine, it will take couple of minutes)
7- After you click Next from previous screen, Re ad the License terms, tick the “I accept the license terms” and click Next
8- Now it will ask you for the drive (or partition) you want to install Windows on. Here I’m installing it on the one partition I have here. NOTE: This will remove the content of the
10- Once the setup is done, it will restart r estart and start your Windows Server 2012 for the first time. It will ask you then to set up a password for the Administrator user
12- Once the setup is done, you can log in for the first fi rst time to your Windows Server, as the screen says, press Ctrl+Alt+Delete to log in, and use the password you set in the setup process
Double click on your network adaptor to display the adaptors status.
Highlight "Internet Protocol Version 4 (TCP/IPv4)" (TCP/ IPv4)" and then press the Properties button.
Gantt chart
7 Task 1 Task 2 Task 3 Task 4
8
9
1 0
1 1
1 2
1 3
1 4
1 5
1 6
1 7
1 8
1 9
2 0
2 1
2 2
2 3
2 4
2 5
2 6
Fortinet. 2017. High-End Firewall . [ONLINE] Available at: https://www.fortinet.com/products/firewalls/firewall/fortigate-high-end.html. [Accessed 16 March 2017].
. 2017. TechNet Evaluation Center . [ONLINE] Available at: http://technet.microsoft.com/enUS/evalcenter/hh670538.asp US/evalcenter/hh670538.aspx?ocid=&wt.mc_id= x?ocid=&wt.mc_id=TEC_108_1_ TEC_108_1_33. 33. [Accessed [Accessed 16 March 2017].
Free Essay Examples and Research Papers | StudyMode. 2017. Free Essay Examples and Research Papers | StudyMode . [ONLINE] Available at:
http://www.studymode.com/. [Accessed http://www.studymode.com/. [Accessed 16 March 2017].
Wikipedia. 2017. Wikipedia, the free encyclopedia. [ONLINE] Available at: http://en.wikipedia.org/wiki/Main_Page. [Accessed http://en.wikipedia.org/wiki/Main_Page. [Accessed 16 March 2017].
Outcomes/Criteria for PASS
LO1 Understand networking principles constraints of different networking systems types and topologies 1.2evaluate the impact of current network technology, communication and standards 1.3discuss how protocols enable the effective utilization of different networking systems 1.1discuss the benefits and
Possible evidence
Task 02 Task 03
Task 04
2.2discuss server types and
Task 05
the inter-dependence of workstation hardware with network components
2.3 discuss
Task 06
LO3 Be able to design networked networked systems 3.1design a networked system to meet a given specification
Task 07
3.2evaluate
Task 08
Sarah. A
the design and analyses user feedback
Networking Technologies
Feedback
Task 01
LO2 Understand networking components 2.1discuss the role of software and hardware components
selection requirement requirement
Page
Page 64
LO4 Be able to implement and support networked systems systems 4.1implement a networked system based on a prepared design
Activity 01 03
4.2test the network system to
Activity 04
meet user requirements
4.3 document and analyses test results against expected results
Task 09
4.4 recommend
Task 10
potential enhancements for the networked
Systems 4.5 design a maintenance schedule to support the networked system.
Grade Descriptor for MERIT M1
Feedback
To achieve M1, you must decide correctly the servers required in this solution and justify your selection of the best server out of the products available in the market (Task 06).
Select / design appropriate methods / techniques
M2.1relevant theories and techniques have been applied
Sarah. A
Possible evidence
Identify and apply strategies to find appropriate solutions
M1.1Effective judgments have been made
M2
Task 11
Networking Technologies
To achieve M2, you must provide a comprehensive solution for the scenario given here (Task 04) by applying correct techniques and theories
Page 65
M3
Present and communicate appropriate findings
M3.3 A range of methods methods of presentation have been been used and
technical language has been accurately used
Grade Descriptor for DISTINCTION D1
Use critical reflection to evaluate own work and justify valid conclusions
D1.1Conclusions have been arrived at through synthesis of ideas
and have been justified
D2
Take responsibility for managing and organizing activities
To achieve M3 your documentation must be well structured adhering to the formatting guidelines with nonoverlapping facts. Data provided are accurate, reliable and consistent. Appropriate technical terms must have been used with correct screen shots where appropriate.
Possible evidence
Feedback
To achieve D1, you must decide correctly the servers required in this solution and justify your selection of the best server out of the products available in the market (Task 06). To achieve D2, you must perform the Activity 1- 3 correctly.
D2.3Activities have been managed
Sarah. A
Networking Technologies
Page 66
D3
Demonstrate convergent / lateral / creative thinking
D.3.4Problems have been solved
Gantt chart must be provided at the appendix section and submit the work on time. To achieve D3, you must provide a comprehensive solution for the scenario given here (Task 04).
Strengths:
Weaknesses:
Future Improvements & Assessor Comment:
Assessor:
Signature:
Date: ____/____/______ ____/____/______
Signature:
Date: ____/____/______ ____/____/______
Internal Verifier’s C omme omments:
Internal Verifier:
Sarah. A
Networking Technologies
Page 67