Vous êtes sur la page 1sur 77

Acknowledgement

First and foremost, I would like to thank to our lecturers for the valuable guidance and advice. They
propelled us greatly to work in this project and ability to motivate us committed immensely to my
assignment. A special gratitude I give to our Lecturer Mr.SuntharRajan, whose contribution in stimulating
suggestions and encouragement, helped me to write my assignment.

I have taken undertakings in this assignment. However, it might not have been possible without the kind
backing and help of many individuals and organizations. I might want to develop my sincere thanks to
staff of ESOFT. I am highly indebted to for their guidance and constant supervision as well as for
providing necessary information regarding the assignment & also for their backing in finishing the
assignment.

I would like to express my special appreciation and thanks to all of you.

HND in Computing and Systems Development

A.SRIJASOTHAN

HND in Computing and system development

Batch No: 003 Trincomalee Brach

Signature

…………………(…………….)

A.SRIJASOTHAN [Network technology] 1


Table of contents
Task 01:

There are many different network systems types and topologies available. Discuss the benefits and
constraints of different network systems types, topologies and suggest a suitable network topology for
CALL Lanka (Pvt) Ltd networks and justify your answer.
(LO1.1)…………………………………………………………………………………………………. 4

Task 02:

Provide a report on network related technologies and standards that would be employed to fulfill the
requirements of CALL Lanka (Pvt) Ltd and discuss how they would impact on your solution
(individually and / or collectively). (LO 1.2) ………….………………….. …………………………16

Task 03:

Describe the importance of different protocols in data communication. And discuss the roles of
different protocols that you would have to employ in this solution and how they enable the effective
utilization of your networking system. (LO 1.3)……...……………. ……………………………….28

Task 04:

Design a comprehensive network solution for the main and city center and explain how your design
meets the requirements of CALL Lanka. (Pvt) Ltd. (LO 3.1) (M2.1)
(3.4)……………………………………………………….………………………………………… 33

Task 05:

Critically discuss the role of software and hardware components that you would employ in this solution
and how you would utilize them to create your new network infrastructure.
(LO 2.1)……………………………………………….……………………………………………. 38

A.SRIJASOTHAN [Network technology] 2


Task 06:

Provide the different types of servers that you would have to utilize in this solution and
comprehensively analyze and compare the different types of servers available in the market (based on
the cost and benefits of them) and make the best selection. Justify your answer. (LO 2.2) (M1.1)
(D1.1)………………………..……………………………..... ……………………………………...46

Task 07:

Discuss how workstation hardware inter-dependent with network components in the performance of
network. (LO 2.3)……………………..…………………………………………………………….. 50

Task 08:

Once the network gets up and running you need to keep a close eye on the performance and
maintenance aspects of it. Therefore you are required to obtain the feedback of the users of the network
resources in different aspects in order to stay updated. Design a feedback form to obtain the feedback
of users. And analyze and summarize them. (LO3.2)
(D1.1)……………………………………………….………………………………………………. 54

Task 09:
Record (with proper descriptions and screenshots where appropriate) your test results obtained in
Activity 04 and analyze with the expected outputs. Evaluate your analysis.
(LO4.3)………………………………………………………….………………………. …………..56

Task 10:

Discuss the enhancements that you would implement after a period of one year from the execution
of the solution to improve the aspects including but not limited to bandwidth,
Quality, security and scalability (LO 4.4)……………………………………………….. …………67

Task 11:

Design a comprehensive maintenance schedule including data backup, with the types of data that will
be backup based on users. (LO 4.5)………………...……………………. …………………………70

A.SRIJASOTHAN [Network technology] 3


Task 01

Discuss the benefits and constraints of different network systems types and topologies, and suggest
a suitable network topology for Win soft (Pvt) Ltd networks and provide the reasons for your
selection.

What is a Network?

A network consists of two or more computers that are linked in order to share resources (such as printers
and CDs), exchange files, or allow electronic communications. The computers on a network may be
linked through cables, telephone lines, radio waves, satellites, or infrared light beams.

Two very common types of networks include:

 Local Area Network (LAN)

 Wide Area Network (WAN)

You may also see references to

 A Metropolitan Area Networks (MAN)

 A Wireless LAN (WLAN)

 A Wireless WAN (WWAN)

Figure: 1.1
Explain of Computer Network

A.SRIJASOTHAN [Network technology] 4


Local Area Network

A Local Area Network (LAN) is a network that is confined to a relatively small area. It is generally
limited to a geographic area such as a writing lab, school, or building. Computers connected to a
network are broadly categorized as servers or workstations. Servers are generally not used by humans
directly, but rather run continuously to provide "services" to the other computers (and their human
users) on the network. Services provided can include printing and faxing, software hosting, file storage
and sharing, messaging, data storage and retrieval, complete access control (security) for the network's
resources, and many others.

Workstations are called such because they typically do have a human user which interacts with the
network through them. Workstations were traditionally considered a desktop, consisting of a
computer, keyboard, display, and mouse, or a laptop, with with integrated keyboard, display, and
touchpad. With the advent of the tablet computer, and the touch screen devices such as iPad and
iPhone, our definition of workstation is quickly evolving to include those devices, because of their
ability to interact with the network and utilize network services.

Servers tend to be more powerful than workstations, although configurations are guided by needs. For
example, a group of servers might be located in a secure area, away from humans, and only accessed
through the network. In such cases, it would be common for the servers to operate without a dedicated
display or keyboard. However, the size and speed of the server's processor(s), hard drive, and main
memory might add dramatically to the cost of the system. On the other hand, a workstation might not
need as much storage or working memory, but might require an expensive display to accommodate
the needs of its user. Every computer on a network should be appropriately configured for its use.

On a single LAN, computers and servers may be connected by cables or wirelessly. Wireless access
to a wired network is made possible by wireless access points (WAPs). These WAP devices provide
a bridge between computers and networks. A typical WAP might have the theoretical capacity to
connect hundreds or even thousands of wireless users to a network, although practical capacity might
be far less.

Nearly always servers will be connected by cables to the network, because the cable connections
remain the fastest. Workstations which are stationary (desktops) are also usually connected by a cable
to the network, although the cost of wireless adapters has dropped to the point that, when installing
workstations in an existing facility with inadequate wiring, it can be easier and less expensive to use
wireless for a desktop.

A.SRIJASOTHAN [Network technology] 5


Wide Area Network

Wide Area Networks (WANs) connect networks in larger geographic areas, such as Florida, the United
States, or the world. Dedicated transoceanic cabling or satellite uplinks may be used to connect this
type of global network.

Using a WAN, schools in Florida can communicate with places like Tokyo in a matter of seconds,
without paying enormous phone bills. Two users a half-world apart with workstations equipped with
microphones and a webcams might teleconference in real time. A WAN is complicated. It uses
multiplexers, bridges, and routers to connect local and metropolitan networks to global
communications networks like the Internet. To users, however, a WAN will not appear to be much
different than a LAN.

Figure: 1.2
Advantage and Disadvantage of Network

A.SRIJASOTHAN [Network technology] 6


What is a Network Operating System?

Unlike operating systems, such as Windows, which are designed for single users to control one
computer, network operating systems (NOS) coordinate the activities of multiple computers across a
network. The network operating system acts as a director to keep the network running smoothly.

The two major types of network operating systems are:

 Peer-to-Peer

 Client/Server

Figure: 1.3
Explain of network operating system Architecture

A.SRIJASOTHAN [Network technology] 7


Peer-to-Peer

Peer-to-peer network operating systems allow users to share resources and files located on their
computers and to access shared resources found on other computers. However, they do not have a file
server or a centralized management source (See fig. 1). In a peer-to-peer network, all computers are
considered equal; they all have the same abilities to use the resources available on the network. Peer-
to-peer networks are designed primarily for small to medium local area networks. Nearly all modern
desktop operating systems, such as Macintosh OSX, Linux, and Windows, can function as peer-to-peer
network operating systems.

Figure: 1.4
Explain of peer to peer Network OS

Advantages of a peer-to-peer network:

 Less initial expense - No need for a dedicated server.


 Setup - An operating system (such as Windows XP) already in place may only need to be
reconfigured for peer-to-peer operations.

Disadvantages of a peer-to-peer network:

 Decentralized - No central repository for files and applications.


 Security - Does not provide the security available on a client/server network.

A.SRIJASOTHAN [Network technology] 8


Client/Server

Client/server network operating systems allow the network to centralize functions and applications
in one or more dedicated file servers (See fig. 2). The file servers become the heart of the system,
providing access to resources and providing security. Individual workstations (clients) have access
to the resources available on the file servers. The network operating system provides the mechanism
to integrate all the components of the network and allow multiple users to simultaneously share the
same resources irrespective of physical location. UNIX/Linux and the Microsoft family of Windows
Servers are examples of client/server network operating systems.

Figure: 1.5
Explain of Client/server Network OS

Advantages of a client/server network:

 Centralized - Resources and data security are controlled through the server.
 Scalability - Any or all elements can be replaced individually as needs increase.
 Flexibility - New technology can be easily integrated into system.
 Interoperability - All components (client/network/server) work together.
 Accessibility - Server can be accessed remotely and across multiple platforms.

Disadvantages of a client/server network:

 Expense - Requires initial investment in dedicated server.


 Maintenance - Large networks will require a staff to ensure efficient operation.
 Dependence - When server goes down, operations will cease across the network.

A.SRIJASOTHAN [Network technology] 9


What is a Topology?

The physical topology of a network refers to the configuration of cables, computers, and other
peripherals. Physical topology should not be confused with logical topology which is the method
used to pass information between workstations. Logical topology was discussed in the Protocol
chapter.

Bus-topology

In this type of topology, devices or nodes are connected to the same line or single cable & each
computer system is connected to the single cable of bus & the information, which is transmitted
across bus, is received by any system in the entire network.

Star-topology

All the workstations are connected to a central computer or server in a point-to-point connection
stream. In star topology, every node or peripheral is connected to a central node, which is called
“Hub/Switch “via cables. Hub connects different nodes, which are present in the Star n/w, & it
can manage or control whole network.

Ring–topology

The set of this topology is formed in circular fashion in which the data travels in one direction
& the devices on the ring act as a repeater in the way to keep the signal strong. The backbone of
ring topology ends at the starting node, which forms a ring. It is limited to the n/w’s that require
high throughput.

Mesh-topology

Each node is directly connected to all other nodes, which are present in the entire network. In
this, each node, not only send its own data but also can broadcast the data from other nodes.
This topology is very expensive just because of there are many needless connections & it is
mainly used in wireless-connections.

Tree-topology

It attaches the features of Star & Bus-topology. In this topology, a root node is connected to all
other sub-level nodes, which are connected in hierarchically to the other sub-level nodes. The
base of this topology is similar to the Bus & Star-topologies.

Hybrid-topology

In this type of topology, you can formulate two or more different topologies in a way to form a
consequent topology. The combination of other topologies is formulated according to the
requirement/need of the organization.

A.SRIJASOTHAN [Network technology] 10


Figure: 1.6
Explain of Topologies Strength

5-4-3 Rule

A consideration in setting up a tree topology using Ethernet protocol is the 5-4-3 rule. One aspect of
the Ethernet protocol requires that a signal sent out on the network cable reach every part of the
network within a specified length of time. Each concentrator or repeater that a signal goes through
adds a small amount of time. This leads to the rule that between any two nodes on the network there
can only be a maximum of 5 segments, connected through 4 repeaters/concentrators. In addition, only
3 of the segments may be populated (trunk) segments if they are made of coaxial cable. A populated
segment is one that has one or more nodes attached to it. In Figure 4, the 5-4-3 rule is adhered to. The
furthest two nodes on the network have 4 segments and 3 repeaters/concentrators between them.

NOTE: This rule does not apply to other network protocols or Ethernet networks where all fiber optic
cabling or a combination of a fiber backbone with UTP cabling is used. If there is a combination of
fiber optic backbone and UTP cabling, the rule would translate to a 7-6-5 rule. The speed of
networking switches is vastly improved over older technologies, and while every effort should be
made to limit network segment traversal, efficient switching can allow much larger numbers of
segments to be traversed with little or no impact to the network.

A.SRIJASOTHAN [Network technology] 11


Considerations When Choosing a Topology

Money.

A linear bus network may be the least expensive way to install a network; you do not have to
purchase concentrators.

Length of cable needed.

The linear bus network uses shorter lengths of cable.

Future growth.

With a star topology, expanding a network is easily done by adding another concentrator.

Cable type.

The most common cable in schools is unshielded twisted pair, which is most often used with
star topologies.

Figure: 1.7
Explain of Topologies Shape

A.SRIJASOTHAN [Network technology] 12


Conclusion
A call center or call center is a centralized office used for the purpose of receiving or transmitting a
large volume of requests by telephone. An inbound call center is operated by a company to administer
incoming product support or information inquiries from consumers. Outbound call centers are
operated for telemarketing, solicitation of charitable or political donations, debt collection and market
research. In addition to a call center, collective handling of letter, fax, live support software, social
media and e-mail at one location is known as a contact center.

A call center is operated through an extensive open workspace for call center agents, with work
stations that include a computer for each agent, a telephone set or headset connected to a telecom
switch, and one or more supervisor stations. It can be independently operated or networked with
additional centers, often linked to a corporate computer network, including mainframes,
microcomputers and LANs. Increasingly, the voice and data pathways into the center are linked
through a set of new technologies called computer telephony integration. So I propose most suitable
network system and topology in this project. Every information I submitted in under the paragraph for
picture vise.

Figure: 1.8
Explain of winsoft Network Diagram

Figure: 1.9
Explain of winsoft
Network Topology Diagram

A.SRIJASOTHAN [Network technology] 13


Task 02

Prepare a report on network related technologies and standards that would be employed to when
implementing the network solution for Winsoft (Pvt) Ltd and discuss how they would impact on
your solution (individually and / or collectively).

The Open System Interconnection (OSI) model defines a networking framework to implement
protocols in seven layers.

The purpose of the OSI reference model is to guide vendors and developers so the digital
communication products and software programs they create will interoperate, and to facilitate
clear comparisons among communications tools.

Figure: 2.1
Explain of Open System
Interconnection

A.SRIJASOTHAN [Network technology] 14


Physical Layer

This layer conveys the bit stream – electrical impulse, light or radio signal through the network
at the electrical and mechanical level. It provides the hardware means of sending and receiving
data on carrier, including defining cable, cards and physical aspects.

In this layer, has been used tree topology and to connect each computers with server have been
used cables and a hub. But here, central device is the hub. When data transferring for each
computers use cables and internet service are controlled by routers. Mainly protocols are with
physical layer components. The physical layer is hardware specific; it deals with the actual
physical connection between the computer and the network medium. The medium used is
typically a copper cable that utilizes electric currents for signaling.

Data link Layer

At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol
knowledge and management and handles errors in the physical layer, flow control and frame
synchronization. Ethernet is the main data link layer in use.

Every computer has switches and supply electronic through them. Also has been used bridge
and WAP as central devices for data transferring in this layer. ISDN router, intelligent, hub
NIC, advanced cable tester are the network components. The data link layer maintains the data
link between computers to enable communications of Winsoft.

Network Layer

This layer provides switching and routing technologies, creating logical paths, known as virtual
circuits, for transmitting data from node to node.

Router is the central device and IP, IPX and ICMP are protocols in data link layer. And router,
frame relay device, ATM switch, advanced cable tester are the network components of network
layer. Data is transferred through protocols using routers in Winsoft. Communication of
computers. Each departments has been depend on network layer in Winsoft.

A.SRIJASOTHAN [Network technology] 15


Transport Layer

This layer provides transparent transfer of data between end systems, or hosts and is
responsible for end to end error recovery and flow control. Gateway, advance cable tester and
router are the major network components of transport layer. TCP and UDP protocols are used
on the internet.

Typically, the transport layer can accept relatively large messages, but there are strict message
size limits imposed by the network layer. Message transferring is the major activity in transport
layer in Winsoft.

Session Layer

This layer establishes, manages and terminates connection between applications. NetBIOS,
sockets, named pipes and RPC are the protocols which are used in session layer and gateway
is the major component here.

At here manages who can transmit data at a certain time and for how long. The Session layer
enables communication sessions to be established between processes or applications running
on two different computers and establishes, maintains and terminates communication sessions
between applications in Winsoft (pvt) Ltd.

Presentation Layer

This layer provides independence from differences in data representation by translating from
application to network format. And vice versa. At here, gateway and redirector are the network
devices and JPEG/ ASCII/ EBDIC/ TIFF/ GIF and PICT are the protocols in presentation layer.

All different formats from all sources are made into a common uniform format that the rest of
the OSI model can understand. The presentation layer translates the formats of each computer
to a common transfer format which can be interpreted by each computer.

A.SRIJASOTHAN [Network technology] 16


Application Layers

This application supports application end user processes. User applications are the centralized
device in this layer and this layer provides application services for file transfers-mail, and
other network software services.

Telnet and FTP are applications that exist entirely in the application level. SMTP, POP3, IMAP
and HTTP also can be used in this layer. Here, file transferring is the major activity in daily
process in Winsoft.

Figure: 2.2
Explain of Application layer of OSI

A.SRIJASOTHAN [Network technology] 17


Router

A router is hardware device designed to receive, analyze and move incoming packets to another
network. It may also be used to convert the packets to another network interface, drop them, and
perform other actions relating to a network. The picture shows the Linksys BEFSR11 wireless router
and is what many home routers resemble.

A router has a lot more capabilities than other network devices, such as a hub or a switch that are only
able to perform basic network functions. For example, a hub is often used to transfer data between
computers or network devices, but does not analyze or do anything with the data it is transferring. By
contrast, routers can analyze the data being sent over a network, change how it is packaged, and send
it to another network or over a different network. For example, routers are commonly used in home
networks to share a single Internet connection between multiple computers.

Below are some additional examples of different types of routers used in a large network.

• Router

Short for Bridge Router, a Router is a networking device that serves as both a bridge and a router.

• Core router

A core router is a router in a computer network that routes data within a network, but not between
networks.
• Edge router

For information on an edge router, see our edge device definition page.

• Virtual router

A virtual router is a backup router used in a VRRP setup.

Wireless router

Figure: 2.3
Some Types of Routers

A.SRIJASOTHAN [Network technology] 18


Switch

A switch is a telecommunication device that joins multiple devices within one Local Area Network
(LAN). Cisco manufactures different networking equipment and Cisco switches are widely used in
networking for their high performance. A switch receives a message from any device connected to it and
then transmits the message only to the device for which the message is targeted. A switch has a more
efficient way of handling and transmitting data between multiple devices within a LAN. A switch can
determine the target port for each frame and is intelligent and efficient.

There are two types of switch – Managed and Unmanaged. Here we will discuss the differences between
the two types. The key difference between them lies in the fact that a managed switch can be configured
and it can prioritize LAN traffic so that the most important information gets through. An unmanaged
switch on the other hand behaves like a “plug and play” device. It cannot be configured and simply allows
the devices to communicate with one another.

Benefits of Managed Switch over Unmanaged Switch

Managed switches give you better control over your LAN traffic and offer advanced features to control
the traffic. Managed switches have all the features of an unmanaged switch and additionally have the
ability to configure, manage, and monitor your LAN. So this helps you to monitor and decide who
should have access to your network and gives you greater control over data flow through your network.

But you cannot configure unmanaged switches as they do not support any configuration interface and
options. They are like plug-and-play devices and you need to connect your computer or other network
devices directly to the unmanaged switch. If there are no advanced applications needed, then
unmanaged switches should be the best choice.

Figure: 2.4
Some Types of Switches

A.SRIJASOTHAN [Network technology] 19


Server

In a technical sense, a server is an instance of a computer program that accepts and responds to requests
made by another program; known as a client. Less formally, any device that runs server software could
be considered a server as well. Servers are used to manage network resources. For example, a user may
setup a server to control access to a network, send/receive e-mail, manage print jobs, or host a website.

Some servers are committed to a specific task; often referred to as dedicated. As a result, there are a
number of dedicated server categories, like print servers, file servers, network servers and database
servers. However, many servers today are shared servers which can take on the responsibility of e-mail,
DNS, FTP, and even multiple websites in the case of a web server.

Because they are commonly used to deliver a services that are required constantly, most servers are
never turned off. Consequently, when servers fail, they cause the network users or company many
problems. To alleviate these issues, servers are commonly high-end computers setup to be fault tolerant.

Examples of servers

There are many classifications of servers, below is a good example of the most common types of
servers.

• Application server
• Blade server
• Cloud server
• Dedicated server
• Proxy server
• Standalone server
• Web server

A.SRIJASOTHAN [Network technology] 20


What is VOIP
VOIP is an acronym for Voice over Internet Protocol, or in more common terms phone service over the
Internet. If you have a reasonable quality Internet connection you can get phone service delivered
through your Internet connection instead of from your local phone company.

Some people use VOIP in addition to their traditional phone service, since VOIP service providers
usually offer lower rates than traditional phone companies, but sometimes doesn't offer 911 service,
phone directory listings, 411 service, or other common phone services.

How does VOIP work?


A way is required to turn analog phone signals into digital signals that can be sent over the Internet. This
function can either be included into the phone itself (See: VOIP Phones) or in a separate box like an
ATA .

1. VOIP Using an ATA

Ordinary Phone ---- ATA ---- Ethernet ---- Router ---- Internet ---- VOIP Service Provider

2. VOIP using an IP Phone

IP Phone ----- Ethernet ----- Router ---- Internet ---- VOIP Service Provider

3. VOIP connecting directly

It is also possible to bypass a VOIP Service Provider and directly connect to another VOIP user.
However, if the VOIP devices are behind NATrouters, there may be problems with this
approach.

IP Phone ----- Ethernet ----- Router ---- Internet ---- Router ---- Ethernet ---- IP Phone

4. Applications using VOIP

Traditional telephony applications, such as outbound call center applications and inbound IVR
applications, normally can be run on VOIP.

5. Why use VOIP?

There are two major reasons to use VOIP

• Lower Cost
• Increased functionality

A.SRIJASOTHAN [Network technology] 21


Lower Cost

In general phone service via VOIP costs less than equivalent service from traditional sources. This is
largely a function of traditional phone services either being monopolies or government entities. There
are also some cost savings due to using a single network to carry voice and data. This is especially true
when users have existing under-utilized network capacity that they can use for VOIP without any
additional costs.

In the most extreme case, users see VOIP phone calls (even international) as FREE. While there is
a cost for their Internet service, using VOIP over this service may not involve any extra charges, so
the users view the calls as free. There are a number of services that have sprung up to facilitate this
type of "free" VOIP call. Examples are: Free World Dialup and Skype for a more complete list see:
VOIP Service Providers

Increased Functionality
VOIP makes easy some things that are difficult to impossible with traditional phone networks.

• Incoming phone calls are automatically routed to your VOIP phone where ever you plug it into
the network. Take your VOIP phone with you on a trip, and anywhere you connect it to the
Internet, you can receive your incoming calls.
• Call center agents using VOIP phones can easily work from anywhere with a good Internet
connection.

A.SRIJASOTHAN [Network technology] 22


IP Telephone

The implementation of an IP telephone system in a business requires the use of a very specific type of

phone: The IP Telephone.

IP Phones are sometimes called VoIP telephones, SIP phones or softphones. These are just different

names for a device/software client that is designed to support the transmission of voice over the

internet, or what is better known as VoIP (or Voice over Internet Protocol) technology. IP Telephones

come in several types. Learn more about the different kinds of IP phones.

The most popular IP Phones are supported by 3CX Phone System for Windows. Information on which

IP Telephones are supported by the 3CX Phone System can be found on our support page.

IP telephone system

An IP telephone system uses packet-switched Voice over IP (VoIP), or Internet telephony, to transmit

telephone calls over the Internet as opposed to the circuit-switched telephony used by the traditional

Public Switched Telephone Network (PSTN). Also known as VoIP phone systems, IP telephone

systems typically comprise a VoIP private branch exchange (an IP PBX) and desktop VoIP phones (IP

Phones) that connect to a VoIP service provider via a Local Area Network (LAN).

One of the key advantages to IP telephone systems is that whereas long-distance calls on a regular

phone system can be cost prohibitive, the same calls on an IP phone system are free — there are no

fees beyond the cost of Internet access.

A.SRIJASOTHAN [Network technology] 23


Why choosing IP telephony?

IP telephony is a resource that allows you to transfer voice over the IP protocol, which results in cost
reduction; – up to 50% in domestic and international calls.

Su Its simple implementation has enabled a constant evolution in terms of reliability range and
presence in corporate environments.

Corporate use of IP telephony allows calls within the company to have a cost of 0, even when the
company has branches in different locations.

• Icon-check Costs reduction by integrating the entire company telephone platform in the
same system no matter if they are in the same location.
• Icon-check Low-cost maintenance, the users themselves can configure their terminal
according to the company needs.

• Icon-check Real-time reports, control the service and optimize phone communications and
available resources management.
• Icon-check Greater functionality available than with traditional telephony.
• Icon-check Centralized operation, featuring a SER (Single Electronic Receptionist) in
which every call enters via a single point and is routed to its destination, achieving better
work time management.
• Icon-check Mobility, any user can check their voice mail from the web or their own mail, a
virtual office the can always rely on.
• Icon-check Transfer, if a user is out of the office, the center can transfer the call directly to
their cell phone, therefore avoiding time loss and improving efficiency. .
• Icon-check Adaptabilility, the IP telephony service can be accessed from all kinds of
devices, PDAs, wireless phones, cell phones among others.
• Icon-check Wireless, by functioning over the IP protocol the boundaries set by expensive
wiring can be completely removed, a method that cannot be implemented in standard
telephony.

A.SRIJASOTHAN [Network technology] 24


Video Conferencing Equipment

Video Centric hold the UK’s largest stock of video conferencing equipment for you to hire for any of

your meetings or events. Video Centric provide a hire service of video conferencing systems, cameras

and interactive technologies for organizations wishing to hire equipment for a day, week, month or

quarter. We hire out systems from all of the world’s leading video conferencing vendors – Cisco,

Polycom, Life-size and more – which can also be provided with an expert video engineer to help set

up, install, administer and remove at the end of the hire period.

Video Centric also provide hire of SMART Boards, SMART Podiums, SMART Kapp IQ boards, video

conferencing PTZ cameras and LCD displays for events, training sessions or any short term hire

requirements. Some of the video equipment available to hire includes the products below, subject to

current hire stock, however do give us a call to discuss your event or needs – we may have other

available hire equipment that could be better suited, or be able to provide you with a tailored solution

based upon your specific needs.

Wireless Equipment.

We can help you set up your wireless network and help you to avoid the costly infrastructure costs

associated with wired networks. Equipment supporting 802.11b (2.4GHz) can travel up to 91 meters

indoors, and are rated up to 11 Mbps, though our experience has been that the maximum effective

throughput is only around 5Mbps. Equipment supporting the new 802.11a (5GHz) has an even longer

distance capability, and is rated up to 54 Mbps, though our experience has been that a maximum

effective throughput is only around 28 Mbps (even in burst mode).

A.SRIJASOTHAN [Network technology] 25


Here is how it works

External Connection to the Internet

You can connect to the external internet through a Cable Modem line, DSL, or dedicated line
(T1-T3).

Wireless Router

We can install a wireless router anywhere on your network. This router has a hard-wired link to
the network, and can be directly connected to the Cable Modem or DSL modem. This unit
broadcasts to wireless components on the LAN (servers, workstations, printers, etc.). This unit
can also serve as a DHCP allocator as well. Units like the Linksys wireless router have a built in
firewall that we configure through a web interface. Units like the Delink also have a built in print
server.

Wireless Access Points

We can install a wireless network connection to almost any device. If a component has a USB
port, we can use that, or we can connect to an existing Ethernet port as well. For laptops we can
use a PCMCIA card for laptops that fits right in your Type II PCMCIA slot. We can connect USB
wireless access points to printers as well, designating one of the servers/workstations to act as a
print server.

Security

We can configure your WLAN to be encrypted, which makes it harder for others to "listen in" on
your wireless LAN traffic. We couple that with other security measures since Wireless Equivalent
Privacy (WEP) is intended to keep transmission private and not to restrict access to the network.

The 802.11a devices can use 152-bit encryption, but still needs vendor enhancements to keep
transmissions private. Be sure to select a vendor like ACE that understands the difference between
what measures like WEP are supposed to do, and what they really do. Your business depends on
it.

A.SRIJASOTHAN [Network technology] 26


Virtual LAN (VLAN)
A local area network, or LAN, provides the nodes connected to it with direct (Layer 2) access to one

another. It is usually comprised of one or more Ethernet switches. Computers on different LANs talk

to each other using Layer 3 (IP), via a router.A virtual LAN (VLAN) abstracts the idea of the LAN; A

VLAN might comprise a subset of the ports on a single switch or subsets of ports on multiple

switches. By default, systems on one VLAN don't see the traffic associated with systems on other

VLANs on the same network.

VLANs allow network administrators to partition their networks to match the functional and security

requirements of their systems without having to run new cables or make major changes in their

current network infrastructure. IEEE 802.1Q is the standard defining VLANs; the

VLAN identifier or tag consists of 12 bits in the Ethernet frame, creating an inherent limit of 4,096

VLANs on a LAN.

Ports on switches can be assigned to one or more VLANs, allowing systems to be divided into logical

groups -- e.g., based on which department they are associated with -- and rules to be established about

how systems in the separate groups are allowed to communicate with each other. These can range

from the simple and practical (computers in one VLAN can see the printer on that VLAN, but

computers outside that VLAN cannot), to the complex and legal (e.g., computers in the trading

departments cannot interact with computers in the retail banking departments

A.SRIJASOTHAN [Network technology] 27


Task 03

Discuss the roles of different protocols that you would have to employ in this solution and
how they enable the effective utilization of your networking system.

In information technology, a protocol is the special set of rules that end points in a telecommunication
connection use when they communicate.

A computer communication protocol is an agreement that specifies a common language two computers use
to exchange messages. It defines communication precisely. Every LAN has a topology, or the way that the
devices on a network are arranged and how they communicate with each other.

Protocols exist at several levels of the OSI layers model. On the internet, there is a suite of protocols known
as TCP/IP protocols that are consisting of transmission control protocol, internet protocol, file transfer
protocol, dynamic host configuration protocol, Border gateway protocol and a number of other protocols.

Internet Protocol

A key communication protocol used in the internet is called, the Internet Protocol. Usually abbreviated
IP. Each computer that connects to the internet must follow the Internet Protocol. IP specifies exactly
how a packet must be formed, and how a router must forward each packet on toward its destination.

Data packets are called IP Datagrams. A datagram travels across the Internet independent of the sender.
To make datagram routing and delivery possible, each computer attached to the internet is assigned a
unique address called as Internet address, often abbreviated IP address.

Transmission Control Protocol

TCP controls how information gets transmitted in packets over the Internet. By doing this, TCP makes
the Internet more reliable. TCP solves several problems in packet switching. If a router becomes overrun
with datagrams it must discard them. Due to this reason some datagrams might be lost during
transmission. It is the TCP that handles this problem of data loss by automatically checking for and re-
sending the lost datagrams. Another problem is some datagrams arrive in a different order than they were
sent. TCP automatically checks incoming datagrams and put in order. TCP checks for duplicate datagrams
and discard them.

A.SRIJASOTHAN [Network technology] 28


TCP and IP work together

TCP handles the problems that IP does not handle without duplicating the work that IP does.

TCP and IP are so important and work together so well that the entire set of communication protocols the
Internet uses is known as the TCP/IP protocol suite. TCP/IP is also used on many local area networks.

IP does not make physical connections between computers but relies on TCP for this function. IP is also
used in conjunction with other protocols that create connections.

File Transfer Protocol

FTP is a standard way to copy files from one location. For many reasons Winsoft(pvt) Ltd transfer a file
one computer to another over a network. They transfer file to each department using file transfer protocol.
Loan department, saving department, pawning department and leasing department transfer important files
through the protocol.

More generally, it provides for some simple file management on the contents of a remote computer.

Hyper Text Transfer Protocol

“HTTP defines how messages are formatted and transmitted, and what actions Web
servers and browsers should take in response to various commands”. A HTTP client establishes a
connection with a server HTTP server and sends the server HTTP request, the server returns HTTP
response. When the response is received, the connection is terminated.

Mail protocols POP3 and SMTP

Email requires its own set of protocols and there is a variety, both for sending and for receiving mail. The
most common protocol for sending mail is Simple Mail Transfer Protocol (SMTP). When configuring
email clients, an Internet address for an SMTP server must be entered. The most common protocol used
by PCs for receiving mail is Post Office Protocol (POP). It is now in version 3 so it is called POP3. Email
clients require an address for a POP3 server before they can read mail. The SMTP and POP3 servers may
or may not be the same address. Both SMTP and POP3 use TCP for managing the transmission and
delivery of mail across the Internet.

A more powerful protocol for reading mail is Interactive Mail Access Protocol (IMAP). This protocol
allows for the reading of individual mailboxes at a single account and is more common in business
environments. IMAP also uses TCP to manage the actual transmission of mail.Winsoft (pvt) Ltd uses
these POP3 and SMTP for their mailing process in the each department and out of the department
including the whole environment.

A.SRIJASOTHAN [Network technology] 29


UDP and ICMP

Another member of the TCP/IP suite is User Datagram Protocol (UDP). This protocol is used together
with IP when small amounts of information are involved. It is simpler than TCP and lacks the flow-
control and error-recovery functions of TCP. Thus, it uses fewer system resources.

A different type of protocol is Internet Control Message Protocol (ICMP). It defines a small number of
messages used for diagnostic and management purposes. It is also used by Ping and Trace route.

VoIP Protocols

Like every other aspect of Internet communications, VoIP has evolved rapidly since its introduction in
1995, and continues to evolve today. The standards show the influence of their creators: the traditional
telecommunications players, the Internet community, and the communications equipment manufacturers
such as Cisco and 3Com.

In rough chronological order of introduction, the most widely used VoIP systems are:

H.323 Developed by the International Telecommunications Union (ITU) and the Internet Engineering
Task Force (IETF)

MGCP (Megaco) Developed by Cisco as an alternative to H.323

SIP Developed by 3Com as an alternative to H.323

SKINNY

A Cisco proprietary system allowing skinny clients to communicate with H.323 systems, by off-loading
some functions to a Call Manager.

Each of these approaches involves the use of multiple protocols. In the sections below, we split these
software tools into three groups: Signaling protocols, Media protocols, and Codecs. The media
protocols (RTP and RTCP) are common to all types of VoIP, and the codecs are also widely used. The
principle distinction between one VoIP setup and another is their use of signaling protocols and related
devices or functions, such as Gateways and Gatekeepers.

A.SRIJASOTHAN [Network technology] 30


Task 04

Design a comprehensive network solution for the main and city center and explain how your
design meets the requirements of Winsoft(pvt).

Colombo Call Center

 1st Floor:
o Reception Area
o Marketing Department (10 employees)
o GM’s Room
o Accounts Department (08 employees)
o Customer Interview Area – with Wi-Fi facilities

SCHREEN Shot 4.1


Winsoft 1st Floor

A.SRIJASOTHAN [Network technology] 31


Explain of Floor 01

In this Floor 1, we needs 1 router, 3 switches, 20 PCs, Access Point, Wireless End Device and

Wi-Fi connection.

Theoretical Router connected to switch 1, and in that switch 2 receptions pcs are connected

and also one pc (GM’s) also connection in the same switch.

Switch2 connected to switch1 in that switch2 there are 10 PCs are connected for Marketing

Department.

Switch3 connected to switch1 for Accounts Department. And 8 PCs are connected in Wi-Fi

for Customer Consultation Room. The learner suggests passive hubs for all departments,

because they are very speed. It is better to use switches because Winsoft(pvt) is a financial

institution.

Lastly here we are using access point, it is for connecting Wireless end device; this device

using for connecting wireless device for this network.

Here switch to switch connection using copper- cross over cable, router to switch and switch

to pc connection using copper- straight through cable.

Purpose of this cross cable is RX (receiving terminal) connects to TX (transmitting) of one pc

to another PC and vice versa.

A.SRIJASOTHAN [Network technology] 32


2nd Floor
o Calling Center for USA clients - 150 computers
o Video conferencing room
o Training Center with 50 computers

SCHREEN Shot 4.2


Winsoft 2nd Floor
2nd Floor need

• 2 Switch
• 2 IP phone
• 1 Router
• 2 WirelessEndDevices
• 1 Access Point

Two choices when it comes to choosing the technology for your connection cable. Copper or Fiber Optic.
This is true for low bandwidth audio especially when the distance is short. router to switch, switch to IP
phone cross over cable, router to Access point using straight through cable and switch to video
conference room using fiber optical cable for purpose of high data transmission and access point use for
connecting wireless devices.

This subject has been debated since the introduction of optical and coaxes digital audio connections and it
is believed that both are comparable, that choosing one over the other does not affect the audio quality.

A.SRIJASOTHAN [Network technology] 33


 3rd Floor
o Calling Center for UK clients - 120 computers
o Auditorium – with Wi-Fi facilities
o The Server Room with the IT team

SCHREEN Shot 4.3


Winsoft 3nd Floor

Here router to switch, switch to (pc, access point) used straight through cable, switch to server
fiber optical cable used and access point use for connecting wireless devices.

In this third floor server And Server Room, Calling center, Auditorium.

Server connected to switch Fiber Optical cable reason high rate data transmission and network
administrator pc also connected to same switch. There is a Conference Hall in that Hall there are
allocation of 150 persons in that hall all PCs are Network in Wi-Fi connection.

A.SRIJASOTHAN [Network technology] 34


When provide internet connection to other departments can be used Wi-Fi. User should connect
to the server and it can be used internet connection through cable or via W-Fi. But it is better, if
provide internet connection via Wi-Fi for other departments.

For access the internet this is better solution for Winsoft(pvt) Ltd. But they can use Bluetooth
connection for file sharing in the company. When computers are linked together via Wi-Fi, they
can share printers and files. To access other computers via Wi-Fi, have to set up a workgroup
using windows.

SCHREEN Shot 4.4


Winsoft 3nd Floor

When provide internet connection to other departments can be used Wi-Fi. User should connect to the
server and it can be used internet connection through cable or via W-Fi. But it is better, if provide internet
connection via Wi-Fi for other departments. Router to switch, switch to (pc, access point) used straight
through cable, switch to server fiber optical cable used and access point use for connecting wireless
devices. In this third floor server And Network Administrator, conference Hall. For access the internet
this is better solution for Winsoft (pvt) Ltd. But they can use Bluetooth connection for file sharing in the
company. Server connected to switch Fiber Optical cable reason high rate data transmission and network
administrator pc also connected to same switch. There is a Conference Hall in that Hall there are
allocation of 150 persons in that hall all PCs are Network in Wi-Fi connection.

A.SRIJASOTHAN [Network technology] 35


Kandy branch

1st floor

SCHREEN Shot 4.5


Kandy 1st Floor

In this Floor 1, we needs 1 router, 3 switches, 123 PCs, Access Point, Wireless End Device
Wi-Fi connection and ip phones.

here we are using access point, it is for connecting Wireless end device; this device using for
connecting wireless device for this network.

Here switch to switch connection using copper- cross over cable, router to switch and switch
to pc connection using copper- straight through cable.

Purpose of this cross cable is RX (receiving terminal) connects to TX (transmitting) of one pc


to another PC and vice versa.

A.SRIJASOTHAN [Network technology] 36


2nd Floor

SCHREEN Shot 4.6


Kandy 2nd Floor

In this 2nd floor the Auditorium computer using fiber optical cable and Wi-Fi connection.

There are two choices when it comes to choosing the technology for our connection cable.
Copper or Fiber Optic. This subject has been debated since the introduction of optical and
coaxes digital audio connections and it is believed that both are comparable, that choosing one
over the other does not affect the audio quality. This is true for low bandwidth audio especially
when the distance is short.

Here router to switch, switch to IP phone cross over cable, router to Access point using cross-
over through cable and switch to video conference room using fiber optical cable for purpose
of high data transmission and access point use for connecting wireless devices.

A.SRIJASOTHAN [Network technology] 37


Task 05

Critically discuss the role of software and hardware components that we would employ in
this solution and how we would utilize them to create your new network infrastructure.

I select Windows Server 2016 for Call Lanka private limited. Windows Server 2016 is a server operating
system developed by Microsoft as part of the Windows NT family of operating systems, developed
concurrently with Windows 10.

The first early preview version (Technical Preview) became available on October 1, 2014 together with the
first technical preview of System Center. Unlike previous Windows Server versions, which were released
simultaneously with the client operating system, Windows Server 2016 was released on September 26, 2016
at Microsoft's Ignite conference and became generally available on October 12, 2016.

Features

Windows Server 2016 has a variety of new features, including

• Active Directory Federation Services: It is possible to configure AD FS to authenticate users


stored in non-AD directories, such as X.500 compliant Lightweight Directory Access Protocol
(LDAP) directories and SQL databases.
• Windows Defender: Windows Server Antimalware is installed and enabled by default without
the GUI, which is an installable Windows feature.
• Remote Desktop Services: Support for OpenGL 4.4 and OpenCL 1.1, performance and stability
improvements; Multipoint Services role (see Windows Multipoint Server)

• Storage Services: Central Storage Qu’s Policies; Storage Replicas (storage-agnostic, block-
level, volume-based, synchronous and asynchronous replication using SMB3between servers
for disaster recovery). Storage Replica replicates blocks instead of files; files can be in use. It's
not multi-master, not one-to-many and not transitive. It periodically replicates snapshots, and
the replication direction can be changed. Failover Clustering: Cluster operating system rolling
upgrade, Storage Replicas
• Web Application Proxy: Preauthentication for HTTP Basic application publishing, wildcard
domain publishing of applications, HTTP to HTTPS redirection, Propagation of client IP
address to backend applications

• IIS 10: Support for HTTP/2


• Windows PowerShell 5.1

A.SRIJASOTHAN [Network technology] 38


Networking features

• DHCP: As Network Access Protection was deprecated in Windows Server 2012 R2, in Windows
Server 2016 the DHCP role no longer supports NAP
• DNS client: Service binding – enhanced support for computers with more than one network interface
• DNS Server: DNS policies, new DDS record types (TLSA, SPF, and unknown records), new
PowerShell cmdlets and parameters
• Windows Server Gateway now supports Generic Routing Encapsulation (GRE) tunnels
• IP address management (IPAM): Support for /31, /32, and /128 subnets; discovery of file-based,
domain-joined DNS servers; new DNS functions; better integration of DNS, DHCP, and IP Address
(DDI) Management
• Network Controller: A new server role to configure, manage, monitor, and troubleshoot virtual and
physical network devices and services in the datacenter
• Hyper-V Network virtualization: Programmable Hyper-V switch (a new building block of
Microsoft's software-defined networking solution); VXLAN encapsulation support; Microsoft
Software Load Balancer interoperability; better IEEE Ethernet standard compliance.

Hyper-V

• Rolling Hyper-V cluster update: Unlike upgrading clusters from Windows 2008 R2 to 2012 level,
Windows Server 2016 cluster nodes can be added to a Hyper-V Cluster with nodes running Windows
Server 2012 R2. The cluster continues to function at a Windows Server 2012 R2 feature level until
all of the nodes in the cluster have been upgraded and the cluster functional level has been upgraded.

• Storage quality of service (Qu’s) to centrally monitor end-to-end storage performance and create
policies using Hyper-V and Scale-Out File Servers
• New, more efficient binary virtual machine configuration format (.VMCX extension for virtual
machine configuration data and the .VMRS extension for runtime state data)

• Production checkpoints
• Hyper-V Manager: Alternate credentials support, down-level management, WSManagement
protocol
• Integration services for Windows guests distributed through Windows Update
• Hot add and remove for network adapters (for generation 2 virtual machines) and memory (for
generation 1 and generation 2 virtual machines)
• Linux secure boot

A.SRIJASOTHAN [Network technology] 39


Installation options

 Both Standard and Datacenter editions offer three installation options:

 Server Core: reduces the space required on disk, the potential attack surface, and especially the

servicing requirements. This is the recommended option unless you have a particular need for

additional user interface elements and graphical management tools.

 Server with Desktop Experience: installs the standard user interface and all tools, including client

experience features that required a separate installation in Windows Server 2012 R2. Server roles

and features are installed with Server Manager or by other methods.

 Nano Server: is a remotely administered server operating system optimized for private clouds

and datacenters. It is similar to Windows Server in Server Core mode, but significantly smaller,

has no local logon capability, and only supports 64-bit applications, tools, and agents. It takes up

far less disk space, sets up significantly faster, and requires far fewer updates and restarts than

the other options.

A.SRIJASOTHAN [Network technology] 40


Systematic Details in Table vise

Supported Server  Windows Server 2016

Operating Systems:  Windows Server 2012 R2

 Microsoft SQL Server 2016 RTM


 The 64-bit edition of SQL Server 2014 with Service Pack
Supported Database 1 (SP1)
Server:
SQL Analysis Services must also be installed if you are using the
Cube Building Service in Project Server 2016.

 Microsoft Edge
 Microsoft Internet Explorer 11
 Microsoft Internet Explorer 10
Supported browsers:  Google Chrome (latest released version)
 Mozilla Firefox (latest released version plus immediate
previous version)
 Apple Safari (latest released version)

Version Compatible with

Project Server • Project Professional 2016


2016 • Project Online Desktop Client
• Project Professional 2013
Project Server • Project Professional 2016
2013 • Project Online Desktop Client
• Project Professional 2013
Project Server • Project Professional 2010
2010 • Project Professional 2007 with Service Pack 2
Project Professional 2007 with Service Pack 2 can only connect if
Backwards Compatibility is enabled on Project Server 2010

A.SRIJASOTHAN [Network technology] 41


Systematic Details Continue…..

Component Requirement

All domain controllers in the forest need to be running one of the following:
Domain • Windows Server 2016 Standard or Datacenter
controllers • Windows Server 2012 R2 Standard or Datacenter
• Windows Server 2012 Standard or Datacenter

• Windows Server 2008 R2 Standard or Enterprise


• Windows Server 2008 R2 Datacenter RTM or later
• Windows Server 2008 Standard, Enterprise, or Datacenter

Active The Active Directory forest functionality level needs to be at Windows Server
Directory forest 2008 or higher.

Exchange 2016 supports the following domain name system (DNS) namespaces:
• Contiguous
• Noncontiguous
DNS • Single label domains
namespace
• Disjoint
support
For more information about DNS namespaces supported by Exchange, see
Microsoft Knowledge Base article 2269838, Microsoft Exchange compatibility
with Single Label Domains, Disjoined Namespaces, and Discontinuous
Namespaces.

In Exchange 2016, IPv6 is supported only when IPv4 is also installed and
enabled. If Exchange 2016 is deployed in this configuration, and the network
IPv6 support supports IPv4 and IPv6, all Exchange servers can send data to and receive data
from devices, servers, and clients that use IPv6 addresses. For more information,
see IPv6 support in Exchange 2013.

A.SRIJASOTHAN [Network technology] 42


Systematic Details Continue…..

Component Requirement Notes

 x64 architecture-based computer with For more information, see


Processor o Intel processor that supports Intel Sizing Exchange 2016
64 Deployments.
o architecture (formerly known as
Intel See the "Operating system"
o EM64T) section later in this topic
 AMD processor that supports the AMD64 for supported operating
systems.
platform
 Intel Itanium IA64 processors not
supported

Varies depending on Exchange roles that are For more information, see
installed: Sizing Exchange 2016
Memory Deployments.
• Mailbox 8GB minimum
• Edge Transport 4GB minimum

The page file size minimum and maximum must be None


Paging file set to physical RAM plus 10MB, to a maximum
size size of 32,778MB (32GB) if you're using more than
32GB of RAM.

• At least 30 GB on the drive on which you For more information, see


install Exchange Sizing Exchange 2016
Deployments.
• An additional 500 MB of available disk
space for each Unified Messaging (UM)

Disk space language pack that you plan to install


• 200 MB of available disk space on the
system drive
• A hard disk that stores the message queue
database on with at least 500 MB of free
space.

Drive DVD-ROM drive, local or network accessible None

Screen 1024 x 768 pixels or higher None


resolution

A.SRIJASOTHAN [Network technology] 43


Disk partitions formatted as NTFS file systems,
which applies to the following partitions:
• System partition
• Partitions that store Exchange binary files
or files generated by Exchange diagnostic
logging
File format Disk partitions containing the following types of None
files can be formatted as REFS:
• Partitions containing transaction log
files
• Partitions containing database files
• Partitions containing content indexing
files

Exchange version Exchange organization coexistence

Exchange 2007 and earlier Not supported


versions

Supported with Update Rollup 11 for Exchange 2010 SP3 or later


Exchange 2010 on all Exchange 2010 servers in the organization, including Edge
Transport servers.

Supported with Exchange 2013 Cumulative Update 10 or later on


all Exchange 2013 servers in the organization, including Edge
Exchange 2013 Transport servers.

Supported with the following minimum versions of Exchange:


• Update Rollup 11 Exchange 2010 SP3 or later on all
Mixed Exchange 2010 and Exchange 2010 servers in the organization, including Edge
Exchange 2013 Transport servers.
organization
• Exchange 2013 Cumulative Update 10 or later on all
Exchange 2013 servers in the organization, including Edge
Transport servers.

A.SRIJASOTHAN [Network technology] 44


Task 06

Provide the different types of servers that you would have to utilize in this solution and
comprehensively analyze and compare the different types of servers available in the market
(based on the cost and benefits of them) and make the best selection. Justify your answer.

What is a server?

“A computer or device on a network that manages network resources. There are many different
types of servers”. According to (Beal,2016)

Every Web server that is connected to the Internet is given a unique address made up of a series
of four numbers between 0 and 255 separated by periods.

Web Server

At its core, a Web server serves static content to a Web browser by loading a file from a disk
and serving it across the network to a user's Web browser. This entire exchange is mediated by
the browser and server talking to each other using HTTP.

Mail Server

A mail server usually consists of a storage area where e-mail is stored for local users, a set of
user definable rules which determine how the mail server should react to the destination of a
specific message, a database of user accounts that the mail server recognizes and will deal with
locally, and communications modules which are the components that actually handle the
transfer of messages to and from other mail servers and email clients.

There are free and open source email server products such as Citadel, hMailServer,
SmarterMail, Apache James and Axigen. Among them hMailAerever and SmarterMail are
supported to Windows only. Apache James and Axigen are cross-platform. Citadel and Zarafa
are the Linux- only.

A.SRIJASOTHAN [Network technology] 45


Comparison among the mail servers

hMail

server is unlimited use and it is easy to install and configure. Also it is flexible codes run on
most Windows versions.

As disadvantages of hmail server, lack of native mobile and Web support can be identified.

Citadel

Easy to install and there are no limits on users and it is small foot print. But it may not scale well
for larger organizations.

Apache James

Mailets provide modular design and flexibility and there is no GUI in Apache James mail server.

Axigen

is the cross- platform and there is a great user interface. Axigen is easy to install and includes
help features.

It provides free version limited to 100 users.

Zarafa

comprehensive mobile support and pleasing user interface. There is a LDA integration.

Community edition somewhat lacking in features and installation quite a few prerequisites.

SmarterMail

nice user interface and god support for mobile mail and this is informative tutorials.

It will be occurred some security issues in Open Source mail servers. Therefore SmarterMail
server is best one for the Winsoft. ViUX TM is an authorized lease reseller of SmartMail
licenses, which provide a low cost point of entry to Microsoft Exchange level features for as
little as $ per month. Unlimited Mailboxes price is $100.

A.SRIJASOTHAN [Network technology] 46


Application Server

An application server is typically used for complex transaction-based applications. To support


high-end needs, an application server has to have built-in redundancy, monitor for high-
availability, high-performance distributed application services and support for complex database
access.

FTP Server

It works on one of the oldest of the Internet services, the file transfer protocol. It provides a secure
file transfer between computers while ensuring file security and transfer control.

Proxy Server

It acts as a mediator between a client program and an external server to filter requests, improve
performance and share connections.

Database Server

Database server is the term used to refer to the back-end system of a database application
using client/server architecture.

Real time communication Server

Real-time communication servers, formerly known as chat servers or IRC Servers, and still
sometimes referred to as instant messaging (IM) servers, enable large numbers users to exchange
information near instantaneously.

Fax server

It is one of the best options for organizations that seek minimum incoming and outgoing
telephone resources, but require to fax actual documents. Fax server is essential component for
Winsoft because they need to fax some document to some companies or their clients. Here these
sending, receiving or distributing faxes over the network. Here a fax server is equipped with one
fax modem and which is plugged phone line.

A fax server is connected to the LAN and it can communicate with the computers in the network.

A.SRIJASOTHAN [Network technology] 47


Chatting server

It serves the users to exchange data in an environment similar to Internet newsgroup which
provides real-time discussion capabilities.

Printer server

A print server is a software application, network device or computer that manages print requests
and makes printer queue status information available to end users and network administrators.

Open Source Server

From your underlying open source server operating system to the server software that help you
get your job done, open source software is a critical part of many IT infrastructures. xammp

- Cost
- Purpose
- Oss requirements
- Bandwidth- network ghz

Mainly we take Mini computers. Open Source/ Microsoft Azure

Figure 6.1

Explain Types Of Servers

A.SRIJASOTHAN [Network technology] 48


Task 07

Discuss how workstation hardware inter-dependent with network components in the


performance of network.

Most people will want to install a desktop system such as Ubuntu, Kubuntu, or Xubuntu. A desktop system
is typically used for personal computing tasks and has a graphical user interface (GUI), while a server system
typically has a command-line interface (CLI).

Recommended Minimum System Requirements

The Recommended Minimum System Requirements, here, should allow even someone fairly new to
installing Ubuntu or Gnu Linux to easily install a usable system with enough room to be comfortable. A
good "rule of thumb" is that machines that could run XP, Vista, Windows 7 or x86 OS X will almost
always be a lot faster with Ubuntu even if they are lower-spec than described below. Simply try Ubuntu
CD as a Live CD first to check the hardware works.

Ubuntu Desktop Edition

1. 700 MHz processor (about Intel Celeron or better)

2. 512 MB RAM (system memory)

3. 5 GB of hard-drive space (or USB stick, memory card or external drive but see LiveCD for an
alternative approach)

4. VGA capable of 1024x768 screen resolution

5. Either a CD/DVD drive or a USB port for the installer media

6. Internet access is helpful

Screen resolution will be set at the highest your graphics card can handle but when you bootup
you should be given a "Low graphics mode" option which allows you to set it to something better
for your monitor.

On one hand, hardware produced in the last few years or with an efficient architecture or machines
built for a specific purpose can often work well with less. For example, a netbook with an 8 GB
SSD will work well although there won’t be much room for saving stuff directly onto the drive so
cloud storage services could help a lot.

A.SRIJASOTHAN [Network technology] 49


A machine with a crumbling, 15 year-old, slow, 8 GB, IDE hard-drive probably won't work and doesn't
really compare with the netbook anyway. It might be worth trying Ubuntu but really start looking at other
distress. On the other hand, some GNU/Linux distributions may require more powerful hardware as
minimum system requirements, like the Ubuntu GNOME case.

All 64-bit (x86-64) CPUs should be fast enough to run Ubuntu and can run the 32-bit (x86) version as
well. For an optimized installation (and especially for those wishing to run more than ~3 GB of RAM)
however, a 64-bit installation CD is available. The 32-bit version tends to be easier to use and runs into
less problems.

Ubuntu Desktop 11.04 and up uses Unity as the default GUI while the previous releases used GNOME
Panel by default. In order to run Unity the system needs a more capable graphics adapter – see more here
or below:

• 1000 MHz processor (about Intel Celeron or better)


• 1024 MiB RAM (system memory)
• 3D Acceleration Capable Video card with at least 256 MB

From experience, we all know that it is recommended to have 2048 MiB RAM to properly run a day to
day Ubuntu.

A good start should be with minimum 1024 and recommended 2048 MiB RAM.

Machines that are 10 or more years old (originally preloaded with "Windows ME" or "Windows 2000")
that don't meet these guideline will probably require some work to revive (the RAM usually needs to be
upgraded to the level described above). You could try a lighterweight distort or a minimal install of
Ubuntu.

The easiest and most effective step towards a minimal install of Ubuntu is to install a lighterweight
Desktop Environment such as Xfce (see Xubuntubelow), LxDE (see Lubuntu (officially supported from
11.10 onward)) or Enlightenment to name just a few of the most popular.

Some of the larger applications, such as LibreOffice, could be swapped for very much lighter equivalents
but for more information about doing a minimal install please see the guides at
https://help.ubuntu.com/community/Installation#Minimal%20installations.

A.SRIJASOTHAN [Network technology] 50


Visual Effects

Visual effects provide various optional special graphical effects for your desktop to make it look and

feel more fun and easier to use. Even if your computer is powerful enough to run visual effects, you

can turn them off and will still have a usable Ubuntu desktop system.

Visual effects are turned on by default if you have a GPU (graphics card or integrated chipset) which

is supported. Supported GPU manufacturers:

1. ATI (some may require the proprietary fglrx driver)

2. Intel (i915 or better, except GMA 500, aka "Poulsbo")

3. NVidia (with their proprietary driver)

For more information on supported graphics cards, see Desktop Effects.

Ubuntu Server (CLI) Installation

1. 300 MHz x86 processor

2. 192 MiB of system memory (RAM)

3. 1 GB of disk space

4. Graphics card and monitor capable of 640x480

5. CD drive

A.SRIJASOTHAN [Network technology] 51


Lightweight GUI alternative (Xubuntu and Lubuntu)

If you have an old or low-spec computer or want to get the most out of your hardware, using a medium-

lightweight desktop system such as Xubuntu or a lightweight such as Lubuntu is recommended, as they

make more efficient use of your system's resources. Of course, even if you have the newest equipment

out, you could still use these two.

If your system has less than 192 MiB of system memory, use the Alternate Installation CD.

Note: If you have a low-specification computer, certain features may be automatically turned off to

conserve system resources. For example, if you have a graphics card with only a small amount of video

memory (VRAM), the boot-up screen may not be shown.

Follow this link for detailed instructions: Installation/LowMemorySystems.

Minimum system requirements for Xubuntu would fall roughly between Ubuntu Server and Desktop:

• 512 MiB of system memory (RAM)

• 5 GB of disk space

• Graphics card and monitor capable of 800x600 resolution

With Lubuntu, you can use computers with even less memory.

A.SRIJASOTHAN [Network technology] 52


Task 08

You are required to obtain the feedback of the users of the network resources in different
aspects in order to stay updated of the performance and many other aspect of the network.
Design a feedback form to obtain the feedback of users. And analyze and summarize them.

Customer Satisfaction Survey

To help us maintain the highest levels of customer satisfaction, please take a moment to
answer these questions. Your response is sincerely appreciated.

We’re Name (optional)

You’re Email (optional)

Date of Service

Name of Technician

Did we meet or exceed your expectations?

Excellent Good Average Fair Poor

A.SRIJASOTHAN [Network technology] 53


Network Reliability

Please tell us how your internet is working.


How would we rate the reliability of the Winsoft(pvt) internet connection?

1 2 3 4 5 6 7 8 9 10

Al

Ne way
s
ver
Rea
On dy

How would we rate the speed of Winsoft(pvt) internet?

Not 1 2 3 4 5 6 7 8 9 10 Light
Conn ning
ected Fast

How many times since move-in day has your internet service been interrupted? *

 1

 2

 3

 4

 5 or more

How would we rate check accessibility of all nodes in a network?


How would we rate Security about this Winsoft(pvt) ?

If we have any comments or suggestions, please let us know.


If a technician has exceeded your expectations, please help us recognize them.

A.SRIJASOTHAN [Network technology] 54


What do you like about the Winsoft (pvt) product

What do you dislike about the Winsoft (pvt) product

If you have any comments or suggestions, please let us know. If a technician has exceeded your
expectations, please help us recognize them. Our mail Winsoft (pvt)@gmail.com

Open-ended
Close-ended question
question
One possible answer More possible answers One possible answer

Pre-coded categories
Slow/load 17 46 40,0% 1 1,0%
Data transmission safety 43 66 88,5% 14 14,1%
Much information 12 37 32,2% 6 6,1%
Privacy 20 57 49,6% 9 9,1%
Spam 6 58 50,4% 4 4,0%
Additional categories
Safety 1 22 7 7,1%
Viruses 1 0,9% 5 5,1%
Limitation 4 4,0%
Connection problems 2 2,0%
Other 5 3 2,6%
More than one answer* 13 13,1%
Not understandable* 12 12,1%

Number of all answers 124 115 99 100,0%

A.SRIJASOTHAN [Network technology] 55


Task 09

Record your test results obtained in Activity 04 (with proper descriptions and screenshots)
and analyze with the expected outputs. Evaluate your analysis.

1st Floor

Figure 9. 1

1st Floor Network Diagram

A.SRIJASOTHAN [Network technology] 56


Figure 9. 2

CEO room pc to router connection successfully Date sent and received, so it’s working.

Coding of trunk connection

A.SRIJASOTHAN [Network technology] 57


Pc 3 trunk connection successfully Date sent and received, so it’s working.

Figure 9. 3

Figure 9. 4 Figure 9.5

Reception pc connection also successfully Date sent and received.

A.SRIJASOTHAN [Network technology] 58


2nd Floor

Figure 9. 5

2nd Floor Network Diagram

A.SRIJASOTHAN [Network technology] 59


Figure 9. 6

IP Configuration of wireless end device

Figure 9. 7

Video conference room network connection successfully connected.

A.SRIJASOTHAN [Network technology] 60


Code for IP Phone connection.
Continue with configuration dialog? [yes/no]: n
Press RETURN to get started!

Router>enable
Router#vlan database
% Warning: It is recommended to configure VLAN from config mode,
as VLAN database mode is being deprecated. Please consult user
documentation for configuring VTP/VLAN in config mode.

Router(vlan)#
Router(vlan)#exit
APPLY completed.
Exiting....
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#int fa0/0
Router(config-if)#ip address 192.168.3.1 255.255.255.0
Router(config-if)#no shutdown
Router(config-if)#
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up
Router(config-if)#ip dhcp pool abc
Router(dhcp-config)#network 192.168.3.0 255.255.255.0
Router(dhcp-config)#default-router 192.168.3.1
Router(dhcp-config)#option 150 ip 192.168.3.1
Router(dhcp-config)#exit
Router(config)#
Router#
%SYS-5-CONFIG_I: Configured from console by console

A.SRIJASOTHAN [Network technology] 61


Code for Router connection.

Router#

Router#enable

Router#configure terminal

Enter configuration commands, one per line. End with CNTL/Z.

Router(config)#telephony-service

Router(config-telephony)#max-dn 5

Router(config-telephony)#max-ephone 5

Router(config-telephony)#ip source-address 192.168.3.1 port

% Incomplete command.

Router(config-telephony)#ip source-address 192.168.3.1 port 2005

Router(config-telephony)#auto assign 4 to 6
Router(config-telephony)#auto assign 1 to 5
Router(config-telephony)#ephone-dn 1
Router(config-ephone-dn)#%LINK-3-UPDOWN: Interface ephone_dsp DN 1.1, changed state to up
Router(config-ephone-dn)#number 5555
Router(config-ephone-dn)#ephone-dn 5
Router(config-ephone-dn)#%LINK-3-UPDOWN: Interface ephone_dsp DN 5.1, changed state to up
Router(config-ephone-dn)#number 6666
Router(config-ephone-dn)#number 5555
Router(config-ephone-dn)#ephone-dn 2
Router(config-ephone-dn)#%LINK-3-UPDOWN: Interface ephone_dsp DN 2.1, changed state to up
Router(config-ephone-dn)#number 6666
Router(config-ephone-dn)#exit
Router(config)#%DHCPD-4-PING_CONFLICT: DHCP address conflict: server pinged 192.168.3.1.
%IPPHONE-6-REGISTER: ephone-1 IP:192.168.3.2 Socket:2 DeviceType:Phone has registered.

A.SRIJASOTHAN [Network technology] 62


Code for Switch connection.

Switch>enable

Switch#config t

Enter configuration commands, one per line. End with CNTL/Z.

Switch(config)#interface range fa0/1-3

Switch(config-if-range)#switchport mode access

Switch(config-if-range)#switchport voice vlan 1

Switch(config-if-range)#exit

Connected Message

Figure 9. 8

2 IP phones are successfully connected.

A.SRIJASOTHAN [Network technology] 63


3rd Floor

Figure 9. 9

Configuring of server

Figure 9. 10

A.SRIJASOTHAN [Network technology] 64


Config of wireless end device

Figure 9. 11

Server to wireless access connection ping connection successfully connected.

Figure 9. 12

A.SRIJASOTHAN [Network technology] 65


Task 10

State the enhancements that you would implement after a period of one year from the
implementation of the solution to improve the aspects including but not limited to
bandwidth, quality, security and scalability.

System Upgrades and Enhancements

We can handle our IT projects from beginning to end with a minimal amount of disruption to our operations. If
applicable, we can also work alongside our internal IT team to make sure they have the knowledge needed
going forward.

Every project we do for you benefits from our comprehensive project management process which involves a
team of engineers, consultants, and project managers who have extensive experience delivering all types of
technology transitions smoothly, with attention to reducing the organizational change and turmoil that is usually
part of the package. This process includes:

• Budgeting
• Planning and Testing
• Creation and Execution of a Project Communication Plan
• Testing
• Project Close
• Post-Implementation Support

Clients have engaged us for projects-specific challenges including:

• Server Virtualization
• Server and Workstation Replacements and Upgrades
• Network Infrastructure Upgrades
• New Network Implementation
• Office Moves and Expansions
• Server Upgrades and Replacements
• Document Management System Implementation and Upgrades
• Cloud Computing Implementation and Migration
• Security Assessments
• Disaster Recovery Planning

A.SRIJASOTHAN [Network technology] 66


Performance Management Systems Solution

Performance Management Systems Solutions is useful for their 2G/3G Network. It offers solution for
fixed/IP and wireless domains for customers that are evolving towards consolidated network operations
management. The solution addresses the needs of communication service providers (CSPs) and large
enterprises when it comes to the challenges of managing both fixed and mobile networks.

This is especially important for those CSPs that are moving to a converged fixed-mobile network because
it gives them the ability to quickly and efficiently resolve problems, reduce customer churn and provide a
basis for future revenue enhancements by offering additional services that scale. Management Systems
Solution can be used as a powerful resource to monitor and control the system.

Network Enhancement Solutions

Stress on network capacity will continue to increase with LTE and other 4G network roll-outs – due to
subscriber consumption of all available bandwidth
Mobile data traffic will nearly double in volume annually over the next several years

The only way that mobile network operators can meet demand for capacity and realize the revenue growth
potential of mobile data – either in the 3G or the 4G environment – is by improving the utilization and
performance of their current and future network resources. That means supporting increasing amounts of
multimedia traffic – more subscribers, more applications and more content – with available network
capacity. It also means delivering a better user experience.

Optimization Service Node Wireless Access enables operators to increase available network capacity by
50% – without adding new spectrum or costly infrastructure. By increasing available network capacity,
operators can:

Defer capital expenditures (capex) for network upgrades and control operating expenses (opex) due to
increased efficiency

Deliver more content to more subscribers – increasing revenue growth

A.SRIJASOTHAN [Network technology] 67


Task 11

Design a comprehensive maintenance schedule for the network which is to be designed for
Winsoft (Pvt) Ltd.

Maintenance Schedule

Systems Unavailability

Systems Time Remarks


Academic Unix and Personal Web servers 06:30-07:00 Every Mon
Each server in the Staff Central Mail server farm 06:30-07:00 Every Wed
Image server 07:00-07:30 Every Mon
Admin server for Reception, HR personal data 06:30-07:15 Every Mon
enquiry,
Admin server for finance, marketing 06:30-07:15 Every Mon
Admin server for Calling center 06:30-07:15 Every Mon
Admin servers 04:00-06:30/ Every Tue to Sun/
04:00-07:00 every Mon
General Admin servers for HR, CEO, SDS office Unavailable after normal office hours

A.SRIJASOTHAN [Network technology] 68


Network Maintenance

Performing proactive and scheduled maintenance ensures maximum reliability and the overall
lowest TCO through minimizing costs and productivity losses that are associated with downtime
and replacement. Preventative maintenance is normally included within our standard support
packages; however, we also provide maintenance services to those clients who have an in-house
IT team and who want their team to be allocated to more specialized tasksOur program of pre-
defined and fully documented preventative maintenance tasks uses our qualified staff and
industry recommended processes. These preventative maintenance tasks are performed on:

 Server and storage infrastructure


 Desktop infrastructure
 Network equipment
 Backup and security systems

Each maintenance task can be performed at a standard frequency or on a specific nominated


basis appropriate for our environment. These tasks include:

 Patch management
 Log file review and corrective action
 Security vulnerability testing
 Anti-Virus and Anti-Spam management
 Active directory account review
 Archiving and data file management
 Routine backup verification and test restores
 Threshold trending and management – CPU, RAM, disk, network bandwidth
 Application interoperability and alerts
 Asset management tasks
 Custom maintenance tasks developed to meet unique requirements.

Note that many maintenance tasks are performed in “real-time”. That is, we use our monitoring and IT
Management Systems to automatically raise alerts based on pre-defined thresholds or known error
conditions which are then actioned by our maintenance team as they happen.

A.SRIJASOTHAN [Network technology] 69


Standard maintenance tasks may include (as an example):

Server

Standard
Task Scope Frequency

ServerLogs Realtime
Compare event logs errors and warnings against database of known
errors. Investigate any "unknown" errors for severity. Escalate any
appropriate errors as Incidents via maintenance team.

ServerPatching Monthly
Review Critical updates and prepare for periodic application: Confirm
a suitable Change Window with the client, check backups, apply
critical patches, reboot, and test server functions. Optionally apply non-
critical patches depending on server role.

ServerAnti-Virus Realtime
Verify server anti-virus protection software is running correctly and
virus definitions are being updated. Escalate any Virus definition
update failures as Incidents. Compare Virus errors and warnings
against database of known errors.

ServerDiskCapacity Realtime
Check remaining disk capacity, all relevant partitions. Establish and
maintain relevant free disk space alert thresholds. Escalate any disk
space threshold breaches as Incidents.

A.SRIJASOTHAN [Network technology] 70


Standard
Task Scope Frequency

ServerOptimisation Monthly
Review the server for overall performance Examine disk I/O, RAM,
CPU, check fragmentation, perform relevant clean-up tasks.

DatabaseMaintenance Realtime
Monitor MS Exchange and MS SQL server database size, Check
Message queue length, Check running processes.

BackupNotifications Daily
Monitor backup notifications for previous run Success / Fail. Log into
servers to investigate failed notifications.

BackupSpotChecks Quarterly
Perform a Backup Spot Check to manually verify Read / Write success.
Select a random sample of data and perform a test restore to spare
media. Verify overall backup size is commensurate with overall
Customer data size.

A.SRIJASOTHAN [Network technology] 71


Desktop

Standard
Task Scope
Frequency

DesktopPatching
Monitor WSUS operations to ensure correct operations. Escalate any failed Monthly
critical patches for manual installation.

DesktopAnti-virus
Verify desktop anti-virus software is running correctly and virus definitions
are being updated. Escalate any virus definition update failures as Incidents. Monthly
Compare virus errors and warnings against database of known errors. Escalate
as appropriate.

ActiveDirectoryAccounts
Audit Active Directory user accounts against actual user accounts. Review
Quarterly
AD Groups for correct membership / privileges. Escalate any exceptions to
modify / remove / disable accounts as appropriate.

DesktopAuditing
Audit desktops for compliance with customer’s IT policies. Check for
Annual
unlicensed / unauthorised installed software, check internet usage, check for
disk space and other issues.

A.SRIJASOTHAN [Network technology] 72


Back-up

Standard
Task Scope
Frequency

BackupNotifications
Monitor backup notifications for previous run success / fail. Log into servers Daily
to investigate failed notifications.

BackupSpotChecks
Perform a backup spot check to manually verify read / write success. Select
Quarterly
a random sample of data and perform a test restore to spare media. Verify
overall backup size is commensurate with overall customer data size.

BackupMedia
Check age and appropriateness of backup media – escalate any requirement Quarterly
to replace old or degraded media or alter capacity.

ReviewBackupScopeandRetention
Verify data retention policy against actual backup media retention. Ensure Quarterly
grandfather / father / son retention schedule is being adhered to.

DeliverAnnualData
Deliver a copy of the customer’s last annual full backup to the customer’s Annual
nominated recipient.

DisasterRecoveryVerification
Custom
Perform a “disaster recovery verification” per their DR plan

A.SRIJASOTHAN [Network technology] 73


Security

Standard
Task Scope
Frequency

FirewallLogs
Custom
Audit Firewall Logs for intrusion attempts and suspicious activity.

PasswordRotation
Force rotation / expiry of passwords for appropriate / agreed network users. Custom
Notify customer / service desk of password change process.

FirewallFirmware/Software
Back up firewall configurations, update configuration and reboot (May Custom
require outage window depending on HA configuration).

“Lite”SecurityAudit.
Simulate internal / external intrusion attacks, identify security deficiencies
Custom
and escalate where present. Includes a “lite” penetration test / port scan
using standard tools, and tailored for the customer environment.

SecurityAudit.
Simulate internal / external intrusion attacks, identify security deficiencies
Custom
and escalate where present. Includes a comprehensive penetration test on all
interfaces, tailored for the customer environment.

A.SRIJASOTHAN [Network technology] 74


References

• Sparrow,P. (2016). Network Topology and Types of Network Topologies. [ONLINE] Available at:
http://www.ianswer4u.com/2011/05/network-topology-typesof-network.html#axzz4AxPiFq2d. [Last
accessed 8th Jun 2016].
• Pcc-services. (2016). Basic Network Types. [ONLINE]Available at:
http://www.pccservices.com/network_types.html. [Last accessed 8th Jun 2016].
• BHATTACHARJEE,A. (2016). Managed vs Unmanaged Switch – Which to Choose?. [ONLINE]Available
at: https://blog.udemy.com/managed-vs-unmanagedswitch/.[ Last accessed 16th Jun 2016].
• ComputerCope.(2016).Server.[ONLINE]Availableat:
http://www.computerhope.com/jargon/s/server.htm. Last accessed 16th Jun 2016.
• Voip-info.org. (2016). What is VOIP. [ONLINE]Available at:
http://www.voipinfo.org/wiki/view/What+is+VOIP.[ Last accessed 16th Jun 2016].
• BanglaGovNet Project. (2016). What are IP Phones / IP
Telephones?.[ONLINE]Available at: https://bgnp.wordpress.com/2014/07/26/iptelephone/. [Last
accessed 16th Jun 2016].
• Video centric. (2016). Hire Video Conferencing Equipment. [ONLINE]Available at:
http://www.videocentric.co.uk/productcat/hire-equipment/. [Last accessed 16th Jun 2016].
• Search networking. (2016). virtual LAN (VLAN). [ONLINE]Available at:
http://searchnetworking.techtarget.com/definition/virtual-LAN. Last accessed 16th Jun 2016.
• UKEssays. 2016. The Impact Of Current Network Technology Information
Technology Essay. [ONLINE] Available at:
https://www.ukessays.com/essays/information-technology/the-impact-of-currentnetwork-technology-
information-technology-essay.php. [Accessed 19 November 2016].
• UKEssays. 2016. Benefits And Constraints Of Different Networking Computer Science Essay. [ONLINE]
Available at: https://www.ukessays.com/essays/computerscience/benefits-and-constraints-of-different-
networking-computer-science-essay.php.
[Accessed 19 November 2016].

• ComputerWeekly. 2016. Five networking technologies to watch. [ONLINE] Available at:


http://www.computerweekly.com/feature/Five-networking-technologies-to-watch. [Accessed 19
November 2016].
• Techwalla. 2016. Why Are Network Protocols Needed? | Techwalla.com. [ONLINE] Available at:
https://www.techwalla.com/articles/why-are-network-protocols-needed.
[Accessed 19 November 2016].

A.SRIJASOTHAN [Network technology] 75


• Exchange 2016 system requirements. 2016. Exchange 2016 system requirements.
[ONLINE] Available at: https://technet.microsoft.com/enus/library/aa996719(v=exchg.160).aspx.
[Accessed 19 November 2016].
• WiFi Notes. 2016. What is Server - Types Of Server - Uses of Servers. [ONLINE] Available at:
http://wifinotes.com/computer-networks/server-types.html. [Accessed 19 November 2016].
• Installation/SystemRequirements - Community Help Wiki. 2016.
Installation/SystemRequirements - Community Help Wiki. [ONLINE] Available at:
https://help.ubuntu.com/community/Installation/SystemRequirements. [Accessed 20 November 2016].
• Free Customer Satisfaction Survey template by 123ContactForm. 2016. Free Customer Satisfaction Survey
template by 123ContactForm. [ONLINE] Available at: http://www.123contactform.com/free-form-
templates/Customer-Satisfaction-Survey37155/. [Accessed 20 November 2016].
• Optimal Netowrks. 2016. Network Upgrades | Server Upgrades | IT Company | DC, MD, VA. [ONLINE]
Available at: http://www.optimalnetworks.com/managed-itservices/system-upgrades-and-enhancements/.
[Accessed 23 November 2016].
• First Focus. 2016. Network Maintenance & Troubleshooting - First Focus. [ONLINE] Available at:
http://firstfocus.com.au/support-maintenance/network-maintenance/.
[Accessed 23 November 2016].
• Mark.M. Backing Up and Restoring a Database (Administrator's Guide) — MarkLogic 8 Product
Documentation. (2016). Backing Up and Restoring a Database (Administrator's Guide) —
MarkLogic 8 Product Documentation. [ONLINE] Available
at: https://docs.marklogic.com/guide/admin/backup_restore. [Accessed 09 August 2016].
• b.william. (2015). network-maintenance. [ONLINE] Available
at: http://firstfocus.com.au/support-maintenance/network-maintenance/Hindi. [Accessed 9 August
2016].
• Optimal Netowrks. (2016). Network Upgrades | Server Upgrades | IT Company | DC, MD, VA.
[ONLINE] Available at:http://www.optimalnetworks.com/managed-it-services/system-upgrades-
and-enhancements/. [Accessed 09 August 2016].
• William.B. Network Enhancement Solutions. (2016). Network Enhancement Solutions.
[ONLINE] Available at: http://www.mknusa.com/products/network-enhancement-solutions.
[Accessed 09 August 2016].

A.SRIJASOTHAN [Network technology] 76


Assignment Competition Timeline Guntt Chart

A.SRIJASOTHAN [Network technology] 77

Vous aimerez peut-être aussi