You are on page 1of 76

ESOFT METRO CAMPUS

#3, De Fonseka Road, Colombo 04.


Higher National Diploma in Computing & Systems Development / Business Management
Assignment Submission Form
Name Vagish Kirubaharan Name of Group Members (If Applicable)
ESOFT Reg. No COL/A-051935
Edexcel No JF23156
Module Name Networking Technologies(NT)
Name of the Lecturer Miss Ama Kulathilake
Date Due 24-04-2018
Date Submitted
Fine
Email-Address VagishKirubaharan@gmail.com
Contact No 0725160041, 0322224469
Check List () CD Assignment Brief Formatting Sheet Harvard Referencing
Signature on Coversheet Signature on Student Declaration

Herewith I agree for the given terms and conditions on plagiarism & Academic dishonesty also I declare the work
submitted doesn’t breach these regulation.
Note: Keep the softcopy of the assignment with you until the official results released by ESOFT. ESOFT has all rights to request the softcopy
again at any time.

Signature Date

Higher National Diploma in Computing & Systems Development / Business Management


Assignment Submission Form
Name Vagish Kirubaharan
Student Reg. No COL/A-051935
Edexcel No JF23156
Module Name Networking Technologies(NT)
Name of the Lecturer Miss Ama Kulathilake
Date Due 24-04-2018
Date Submitted
Fine
Email-Address VagishKirubaharan@gmail.com
Contact No 0725160041, 0322224469
Check List () CD Assignment Brief Formatting Sheet Harvard Referencing
Signature on Coversheet Signature on Student Declaration

I will keep the copy of this sheet until I receive the Results of my Submitted work

Signature Date

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 1 of 76


Signature
Assignment Brief
BTEC Level 4-5 HNC/HND Diploma (QCF)

To be filled by the Learner


Name of the Learner : Vagish Kirubaharan

Edexcel No : JF23156 Centre No : COL/A-05193 Batch:HND-COM-65


Date of Submission :

Unit Assessment Information

Qualification : Higher National Diploma in Computing and Systems Development

Unit Code & Title : M/601/0472– Unit 24 - Networking Technologies (No 1 of 1)

Assessment Title & No’s : A network solution for Winsoft (Pvt) Ltd Center

Learning outcomes and grading opportunities:


LO 01: Understand networking principles
Learning Outcomes LO1.1 LO1.2 LO1.3
LO 02: Understand networking components
Learning Outcomes LO2.1 LO2.2 LO2.3
LO 03: Be able to design networked systems
Learning Outcomes LO3.1 LO3.2
LO 04: Be able to implement and support networked systems
Learning Outcomes LO4.1 LO4.2 LO4.3 LO4.4 LO4.5

Merit and Distinction Descriptor


M1 M2 M3 D1 D2 D3

Assessor : Internal Examiner (IE) :

Date Reviewed : Date of IE :

Date Issued : Date Due :

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 2 of 76


Statement of Originality and Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my
own without attributing the sources in the correct way. I further understand what it means to copy another’s
work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of the Edexcel UK.
3. I know what the consequences will be if I plagiaries or copy another’s work in any of the assignments
for this program.
4. I declare therefore that all work presented by me for every aspect of my program, will be my own, and
where I have made use of another’s work, I will attribute the source in the correct way.
5. I acknowledge that the attachment of this document signed or not, constitutes a binding agreement
between myself and Edexcel UK.
6. I understand that my assignment will not be considered as submitted if this document is not attached
to the attached.

Student’s Signature: Date:

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 3 of 76


Assignment Brief
Winsoft (Pvt) Ltd is an upcoming call center. It has 02 branches with the head office at Colombo and the other
is located in Kandy. The building of the head office has 03 floors, and the Kandy is with 02 floors.

The setup of the head office in Colombo is as follows:

 Floor 1:
o Reception area
o Marketing Department (10 employees)
o GM’s Room
o Accounts Department (08 employees)
o Customer Interview Area – with Wi-Fi facilities

 Floor 2:
o Calling Center for USA clients - 150 computers
o Video conferencing room
o Training Center with 50 computers

 Floor 3
o Calling Center for UK clients - 120 computers
o Auditorium – with Wi-Fi facilities
o The Server Room with the IT team

The arrangement of the branch in Kandy is:

 Floor 1:
o Reception area
o Center Manager’s Room
o Calling Center for Australian clients - 100 computers
o Video conferencing room

 Floor 2:
o Calling Center for Asian clients - 80 computers
o Training Center with 30 computers
o Auditorium – with Wi-Fi facilities

The requirements of the WINSOFT.com are as follows:

a) All departments’ computers of the HEAD OFFICE are to be integrated in to a centralized network. Name
– WINSOFT.com.

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 4 of 76


b) All computers in the KANDY branch are to be integrated in to a child entity of the main domain which
supposed to be designed under (a).
Name – KANDY.WINSOFT.com
c) Finance department should be kept independently in separate non-centralized environments.
d) The Auditorium of each branch and Customer Interview Area are to be equipped with Wi-Fi
connections which are limited only to their respective sites.
e) A dedicated connection between two branches (Head Office and Kandy) which would allow the intra
network connectivity between departments.

You are the Chief Network Engineer of Winsoft (Pvt) Ltd, and assigned with the task of plan, design and
implement a network solution for your own organization.

You are free to make assumptions, but all your assumption must be stated in the introduction.

Main Tasks
Task 01:
Discuss the benefits and constraints of different network systems types and topologies, and suggest a
suitable network topology for Winsoft (Pvt) Ltd networks and provide the reasons for your selection.
(LO1.1)

Task 02:
Prepare a report on network related technologies and standards that would be employed to when
implementing the network solution for Winsoft (Pvt) Ltd and discuss how they would impact on your
solution (individually and / or collectively). (LO 1.2)

Task 03:
Discuss the roles of different protocols that you would have to employ in this solution and how they
enable the effective utilization of your networking system. (LO 1.3)

Task 04:
Design a comprehensive network solution for the main and city center and explain how your design meets
the requirements of Winsoft (Pvt) Ltd. (LO 3.1) (M2.1) (3.4)

Task 05:
Critically discuss the role of software and hardware components that you would employ in this solution
and how you would utilize them to create your new network infrastructure. (LO 2.1)

Task 06:
Provide the different types of servers that you would have to utilize in this solution and comprehensively
analyze and compare the different types of servers available in the market (based on the cost and benefits
of them) and make the best selection. Justify your answer. (LO 2.2) (M1.1) (D1.1)
All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 5 of 76
Task 07:
Discuss how workstation hardware inter-dependent with network components in the performance of
network. (LO 2.3)

Task 08:
You are required to obtain the feedback of the users of the network resources in different aspects in order
to stay updated of the performance and many other aspect of the network. Design a feedback form to
obtain the feedback of users. And analyze and summarize them. (LO 3.2) (D1.1)

Task 09:
Record your test results obtained in Activity 04 (with proper descriptions and screenshots) and analyze
with the expected outputs. Evaluate your analysis. (LO4.3)

Task 10:
State the enhancements that you would implement after a period of one year from the implementation of
the solution to improve the aspects including but not limited to bandwidth, quality, security and scalability
(LO 4.4)

Task 11:
Design a comprehensive maintenance schedule for the network which is to be designed for Winsoft (Pvt)
Ltd. (LO 4.5)

Practical Observation Sheet


Activity Activity Learning Date Signature
No Outcome (LO)
1 Install Windows Server 2008 Operating System and (LO 4.1)
set up correct IP Address Settings
2 Configure the Primary Domain Controller for (LO 4.1)
WINSOFT.com
3 Add a client computer to the domain with (LO 4.1)
appropriate IP Address Settings to the domain
WINSOFT.com
4 Design the child domain for KANDY.WINSOFT.com (LO 4.1)
5 Test whether the configurations work as expected (LO 4.2)

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 6 of 76


Possible
Outcomes/Criteria for PASS Page Feedback
evidence
LO1 Understand networking principles
1.1 discuss the benefits and constraints of different Task 01
networking systems types and topologies
1.2 evaluate the impact of current network Task 02
technology, communication and standards
1.3 discuss how protocols enable the effective Task 03
utilization of different networking systems

LO2 Understand networking components


2.1 discuss the role of software and hardware Task 04
components
2.2 discuss server types and selection requirement Task 05

2.3 discuss the inter-dependence of workstation Task 06


hardware with network components

LO3 Be able to design networked systems


3.1 design a networked system to meet a given Task 07
specification
3.2 evaluate the design and analyse user feedback Task 08

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 7 of 76


LO4 Be able to implement and support networked systems

4.1 implement a networked system based on a Activity


prepared design 01 - 03
4.2 test the network system to meet user Activity
requirements 04
4.3 document and analyse test results against Task 09
expected results
4.4 recommend potential enhancements for the Task 10
networked
Systems
4.5 design a maintenance schedule to support the Task 11
networked system.

Grade Descriptor for MERIT Possible evidence Feedback


M1 Identify and apply strategies to find
appropriate solutions
To achieve M1, you must
M1.1 Effective judgments have been made decide correctly the servers
required in this solution and
justify your selection of the
best server out of the
products available in the
market (Task 06).

M2 Select / design appropriate methods /


techniques
To achieve M2, you must
M2.1 relevant theories and techniques have been provide a comprehensive
applied solution for the scenario
given here (Task 04) by
applying correct techniques
and theories

M3 Present and communicate appropriate


findings
To achieve M3 your
M3.3 A range of methods of presentation have documentation must be
been used and technical language has been well structured adhering to
accurately used the formatting guidelines
with non-overlapping facts.
Data provided are
accurate, reliable and
consistent.
Appropriate technical
terms must have been used
with correct screen shots
where appropriate.

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 8 of 76


Grade Descriptor for DISTINCTION Possible evidence Feedback
D1 Use critical reflection to evaluate own
work and justify valid conclusions To achieve D1, you must
D1.1 Conclusions have been arrived at decide correctly the servers
through synthesis of ideas and have been justified required in this solution
and justify your selection of
the best server out of the
products available in the
market (Task 06).

D2 Take responsibility for managing and


organising activities To achieve D2, you must
perform the Activity 1- 4
D2.3 Activities have been managed correctly.
Gantt chart must be
provided at the appendix
section and submit the
work on time.
D3 Demonstrate convergent / lateral / To achieve D3, you must
creative thinking provide a comprehensive
solution for the scenario
D.3.4 Problems have been solved given here (Task 04).

Strengths: Weaknesses:

Future Improvements & Assessor Comment:

Assessor: Signature:
Date: ____/____/______

Internal Verifier’s Comments:

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 9 of 76


Internal Verifier: Signature:
Date: ____/____/______

Date

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 10 of 76


Unit 24 – Networking Technologies

Assignment Title –WinSoft Pvt ltd

By

Mr.Vagish Kirubaharan

Reg.No : COL/A-051935

Batch : HND-COM-065

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 11 of 76


Task 1

The Network

The Introduction of the Network


The Network includes two or more than thousands of computers which are linked together to share resources
and materials For eg Printers and CDs they allow electronic communications. The network of the computers
are linked through cables , telephone line, radio waves , satellites ,or infrared light beams.

The Five Types of Network

 Local Area Network(LAN)


 Wide Area Network(WAN)
 Metropolitan Area Network (MAN)
 Wireless LAN (WLAN)
 Wireless WAN(WWAN)

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 12 of 76


The Structure of the Computer Network

The User

Operating
Application
System

Hardware

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 13 of 76


Local Area Network
This Network known as the local Area Network(LAN) belongs to a small area. It is limited in a
geographical area such as schools, writing labs or a building in the city. The Computers are connected to the
network which comes under the category of servers and workstations. The Servers are not used by anyone
but they are created to provide services to the other computers on the network.

The Services provided by the servers include printing faxing software hosting and other services etc.

The Workstations are interacted via the network as they do not have human interface or access by the human
users .The Workstations are known as the desktop with the keyboard mouse display or the laptop with
intergrated keyboard .

When it comes to the question in which one of these two is the powerful The Servers are considered as
powerful than the workstation although their configurations are guided by their users.

The Workstation does not need a high storage or a working memory, But the display must be expensive in
order to accommodate the needs of the user. Every Computers on the network must be configured for the
use.

On the single LAN the Servers and Computers are connected by their cables or in a wireless method. The
access is created via wireless access points (WAP).The devices which belong to WAP provide a bridge
between the computers and networks.

All the servers are connected via the cables to the network .Because the connections of the cable still remain
fast

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 14 of 76


Wide Area Network
This Network known as the Wide Area Networks (WANs) helps to connect networks in larger geographic
areas, such as New Delhi, India ,Srilanka or the world. The Dedicated transoceanic cabling or satellite
uplinks may be used to connect this type of global network.

The Usage of WAN in the schools and universities in New Delhi can help to communicate with other
countries like Canada ,London,Paris etc without wasting money on high phone call rates and bills.The WAN
is complicated as it uses multiplexers bridges and routers to connect local and metropolitan networks for
global communications like the internet.

When it comes to the difference These two networks don’t have any difference in their performances.

Advantages

 Used for the detection of chronic diseases related to Devices


 Its used in Military for security purposes
 It Provides assistance for the communication between individual and machines

Disadvantages

 Wired Network Restriction


 Interference of Multiple devices
 Lack of Intergration sensors

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 15 of 76


The Network Operating System
For the operating systems such as windows and linux which are designed for one user interface the
Network Operating System is used to coordinate the activites of multiple computers across the network.

The Two Types of Network Operating System

1. Peer-to-Peer
2. Client/Server

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 16 of 76


Peer to Peer Network

The Operating Systems with the peer to peer network allows the users to share their resources and files
which are located on their computers They don’t have a file server or a centralized management source.

In the peer to peer network all the computers and devices are considered equal . they all have the same
abilities to use the resources available on the network.The Peer-to-peer networks are designed primarily for
small to medium local area networks. Nearly all modern desktop operating systems, such as Macintosh
OSX, Linux, and Windows, can function as the peer-to-peer network operating system.

Advantages

 Less initial expense - No need for a dedicated server


 Setup - An operating system (such as Windows XP) already in place may only need to
be reconfigured for peer-to-peer operations.

Disadvantages

 Decentralized - No central repository for files and applications.


 Security - Does not provide the security available on a client/server network.

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 17 of 76


Client/Server

The Client/Server Operating Systems allows the network to centralize the functions and applications in one
or more than thousands of servers which are dedicated. The file servers are the heart of the system,by
providing the access to the resources and providing security.The Networking Operating system provides the
mechanism to intergrate the components of the network and they allow the users to share the same resources
of their irrespective physical location.

Advantages

 Centralized - Resources and data security which are controlled through the server.
 Scalability - Any or all the elements can be replaced individually as the needs
increase
 Flexibility - New technology which can be easily integrated into the system
 Interoperability – All the components (client/network/server) work together
 Accessibility - Server can be accessed remotely and across the multiple platforms

Disadvantages

 Expense - Requires higher investment in the dedicated server.


 Maintenance - Large networks will require a staff to ensure the efficient operation.
 Dependence - When the server goes down, the operations will cease across the
network.

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 18 of 76


The Topology
The Physical Topology of the network refers to the configuration of cables,computers and the other
peripherals. Physical topology must not be confused with the logical topology which is the method used to
pass information between the workstations.

Bus Topology
The devices or nodes are connected to the same line or single cable in this toplogy known as Bus
Topology.This is transmitted across the bus which is transmitted across the bus and received by any system
in the network.

Star-topology
the workstations are connected to a central computer or server in a point-to-point connection stream this
topology is known as the star topology. In the star topology each and every node or peripheral is connected
to a central node, which is called “Hub/Switch “via cables. The Hub connects different nodes . which is
present in the Star n/w, & it can manage or control whole network.

Ring–topology
this topology is formed in the circular fashion in which the data travels in one direction & the devices on the
ring act as a repeater in the way to keep the signal strong.The Backbone of the topology ends at the starting
node.

Mesh topology
This node is directly connected to all the other nodes, which are present in the entire network. In this, each
node, not only send its own data but also can broadcast the data from other nodes. This topology is very
expensive just because of there are many needless connections & it is mainly used in wireless-connections.

Tree topology
This includes the features of the Star and Bus Topology. In this topology, a root node is connected to all the
other sub-level nodes, which are connected in the hierarchically node to the other sub-level nodes. The base
of this topology is similar to the Bus & Star-topologies.

Hybrid Topology
In this type of Topology you can formulate two or more than thousands of topologies in the way to form a
consequent topology.

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 19 of 76


All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 20 of 76
The Rules of Topologies
The Consideration in setting up a tree topology by using the Ethernet technology with the rule of 5-4-3 .The
Aspect of the Ethernet protocol will have the requirement of the system which is sent out on the network
cable which reaches within a specific length of time. Each Concentrator or a repeater has a small amount of
time.

This has the rule that between any two nodes of the there can only be a maximum of five segments which is
connected through four repeaters and connectors. In addition, only 3 of the segments may be populated
(trunk) segments if they are made of coaxial cable. A populated segment is one that has one or more nodes
attached to it.

This rule does not apply to the other network protocols or the Ethernet networks where all fiber optic
cabling or a combination of a fiber backbone with UTP cabling is used. If there is a combination of fiber
optic backbone and UTP cabling, the rule would translate to a 7-6-5 rule. The speed of networking switches
is vastly improved over older technologies, and while every effort should be made to limit network segment
traversal, efficient switching can allow much larger numbers of segments to be traversed with little or no
impact to the network.

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 21 of 76


The Considerations when chossing a topology

Money: The linear bus network is the expensive component to install a network,

Length of Cable Needed:The linear bus network uses the shorter length of cable

Future Growth: The Star Topology which is expanding a network is done by adding another concentrator

Cable Type : The most common cable in schools is the unshielded twisted pair, which is most often used
with the star topologies.

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 22 of 76


The Explanation of the network diagram of WinSoft
The Call Center is the office which carries the purpose of receiving and transmitting a large volume of
requests by telephone. An inbound call center is operated by a company to administrate the incoming
product support or information inquiries from consumers. Outbound call centers are operated for
telemarketing, solicitation of charitable or political donations, debt collection and market research. In
addition to a call center, collective handling of letter, fax, live support software, social media and e-mail at
one location is known as a contact center.

A call center is operated through an extensive open workspace for call center agents, with work stations that
include a computer for each agent, a telephone set or headset connected to a telecom switch, and one or
more supervisor stations. It can be independently operated or networked with additional centers, often linked
to a corporate computer network, including mainframes, microcomputers and LANs. Increasingly, the voice
and data pathways into the center are linked through a set of new technologies called computer telephony
integration.

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 23 of 76


Task 2

The Open System Interconnection(OSI)


The OSI Model defines the networking framework to implement the protocols in seven layers.

The purpose of the OSI reference model is to provide guidance the vendors and developers so the digital
communication products and software programs they create will interoperate, and to facilitate clear
comparisons among communications tools.

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 24 of 76


The Physical layer
This layer conveys the bit stream electrical impulse light or radio signal through the network at the electrical
and mechanical level. It provides the hardware by sending and receiving data on carrier, including defining
cable, cards and physical aspects.

In this layer The tree topology is used in order to connect the computers which has used cables and the hub
In here Central Device is the main hub. The Computers use cables and internet services which are contolled
by the routers during data transfer.

Data link layer


In this layer The Data packets are encoded and decoded into bits .It Furnishes the transmission protocol
knowledge and management and handles errors in the physical layer, flow control and frame
synchronization. Ethernet is known as the main data link layer.

Each and every Computer has switches and supplies electronic through them .The Data link layer has used
the bridge and WAP as the main devices for data transferring in this Data link layer. The data link layer has
the role maintaining the data link between the computers to enable communications of the Company
Winsoft.

Network layer
This layer known as the Network layer provides the switching and routing technologies, creating logical
paths, known as the virtual circuits, for transmitting data from node to node.

The Central Device in this Network layer is the router and IP, IPX and ICMP are protocols in data link layer
Thw Data is transferred through protocols by using routers in the Company Winsoft. Each departments has
to depend on the network layer of Winsoft.

Transport layer
This layer known as the transport layer provides transparent data between the systems or the hosts.It is
responsible for the end to end error recovery and flow control.

Typically, the transport layer cannot accept large messages, but there are strict message size limits imposed
by the network layer. Message transferring is the major activity in transport layer in Winsoft.

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 25 of 76


Session layer
This layer establishes, manages and terminates the connection between applications. The NetBIOS, sockets,
named pipes and RPC are the main protocols which are used in the session layer and gateway is the major
component here.

The Session layer enables the communication sessions which is to be established between the processes or
applications which are running on two different computers and establishes, maintains and terminates the
communication sessions between applications in Winsoft (pvt) Ltd.

Presentation layer
This layer known as the Presentation layer provides independence from the differences in data
representation by translating from application to network format.In this layer the gateway and redirector are
the network devices and JPEG/ ASCII/ EBDIC/ TIFF/ GIF and PICT are the main protocols in presentation
layer.

All the different formats from all sources are made into a common uniform format that the rest of the OSI
model can understand.

Application layer
This Application known as the application layer supports application end user processes. The User
applications are the centralized devices in this layer and this layer provides the application services for file
transfers-mail, and the other network software services.

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 26 of 76


The Application Layer Service Diagram

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 27 of 76


The Router
The Router is a device which is designed designed to receive, analyze and move incoming packets to
another network.This is used to convert the packets to another network interface, drop them, and perform
other actions which are related to a network.

The router has more capabilities than the other network devices such as the hub or the switch that are only
able to perform basic network functions. For Eg a hub is often used to transfer data between computers or
network devices, but does not analyze or do anything with the data it is transferring. By contrast, routers can
analyze the data being sent over a network, change how it is packaged, and send it to another network or
over a different network.

The Different types of Routers used in large networks

 Router
 Core Router
 Edge Router
 Virtual Router
 Wireless Router

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 28 of 76


The Switch
The Switch is a telecommunication device that is joined in a multiple device within the Local Area
Network(LAN) .The Company Cisco a specialist firm in creating materials and components manufactures
different networking equipment and Their switches are widely used in networking for their high
performance.

The Switch Receives a message from any device which is connected and transmits the message only to the
device for which the message is targeted.The Switch has a efficient way of handling and transmitting data
between multiple devices within a LAN.

The Two Types of Switches

 Managed Switch
 Unmanaged Switch

The Benefits of Managed Switch and Unmanaged Switch


The Managed Switches gives you a control on your LAN traffic and they offer you advanced features to
control the traffic. the features of an unmanaged switch are available in the Managed Switch .this has the
ability to configure manage and monitor your local area network.This provides you the needed help to
monitor and to decide who should access your network.

The Unmanaged switches cannot be configured as they are not qualified for configuration.They are just like
the Plug and Play devices and you need to connect your computer or other network devices directly to the
unmanaged switch.

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 29 of 76


The Server
In the Sense of Technology The server is the instance of a computer program that accepts and responds to
the requests made by another program; known as a client. any device that runs server software must be
considered a server as well. Servers are used to manage network resources.For eg a user can setup a server
to control the access to the network, by sending /receiving e-mail, manage print jobs, or host a website.

Many Servers are commited to the specific task often referred to as dedicated. As a result, there are many
number of dedicated server categories, like the print servers, file servers, network servers and database
servers. However, many servers today are shared servers which can take on the responsibility of e-mail,
DNS, FTP, and even multiple websites in the case of a web server.

Because they are commonly used to deliver the services that are required constantly, most servers are never
turned off. Consequently, when the servers fail, they create the network users or company many problems.
To alleviate these issues, servers are commonly high-end computers setup to be fault tolerant.

The Types of Servers

 Application Server
 Blade Server
 Cloud Server
 Dedicated Server
 Proxy Server
 Standalone Server
 Web Server

Voice Over Internet Protocol(VOIP)


VOIP is often known as Voice Over Internet Protocol in common terms its described as phone service via
the internet. If you have a reasonable quality Internet connection you can get phone service delivered
through your Internet connection instead of purchasing it from your local phone company.

VOIP is used by many people in addition to their telephone service since the VOIP Service provides and
offer lower rates than the traditional phone numbers.

How does VOIP Work?

1. VOIP via ATA


Ordinary Telephone-ATA-Ethernet-Router-Internet-VOIP Service Provider
2. VOIP via IP(Internet Protocol)Telephne
IP Phone-Ethernet-Router-Internet –VOIP Service Provide
3. VOIP Connected Directly
IP Phone-Ethernet-Router-Internet-Router-Ethernet-Ip Phone
All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 30 of 76
The Reasons For Using VOIP

 Low Cost
 Increased Functionality

Low Cost
The General phone Service via the VOIP costs less than equivalent service from the traditional services.
There are also some cost savings due to using a single network to carry the voice and data. This is especially
true when users have their existing under-utilized network capacity they can use for VOIP without any
additional costs.

In Extreme Cases Users see the VOIP phone calls a free of charge service.While the Internet Service costs a
lot The VOIP via this internet services may not charge you more so the users view the calls as free.

Increased Functionality
The VOIP makes impossible that cannot be impossible with the traditional phone service.

 Incoming phone calls will be automatically routed to your VOIP Phone


 Call Center agents who are using VOIP phones can work anywhere with a good Internet connection

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 31 of 76


IP Telephone
The implementation of the IP telephone system in the business has the requirement of the use of a very
specific type of phone: The IP Telephone.

The IP Phones are sometimes called the VoIP telephones, SIP phones or the softphones. These are just
different names for a device/software client that is designed to support the transmission of voice over the
internet, or what is better known as VoIP (or Voice over Internet Protocol) technology. IP Telephones come
in several types. Learn more about the different kinds of IP phones.

The Popular IP Phones are supported by the 3CX Phone System for Windows.

IP telephone system
An IP telephone system uses packet-switched Voice over IP (VoIP), or Internet telephony, to transmit
telephone calls over the Internet as opposed to the circuit-switched telephony used by the traditional Public
Switched Telephone Network (PSTN). Also known as VoIP phone systems, IP telephone systems typically
comprise a VoIP private branch exchange (an IP PBX) and desktop VoIP phones (IP Phones) that connect to
a VoIP service provider via a Local Area Network (LAN).

One of the key advantages to IP telephone systems is that whereas long-distance calls on a regular phone
system can be cost prohibitive, the same calls on an IP phone system are free — there are no fees beyond the
cost of Internet access.

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 32 of 76


Why Selecting IP Telephony?
IP telephony is a resource that allows you to transfer voice over the IP protocol, which results in cost
reduction; – up to 50% in domestic and international calls.

So Its simple implementation has enabled a constant evolution in the terms of reliability range and presence
in corporate environments.

Corporate use of the IP telephony allows calls within the company to have the low cost of 0, even when the
company has branches in different locations.

 Icon-Check Costs Reduction


 Icon-Check Low-Cost maintenance
 Icon-Check Real-time reports
 Icon-Check Greater Functionallity
 Icon-Check Centralized Operation
 Icon-Check Mobility
 Icon-Check Transfer
 Icon-Check Adaptability
 Icon-Check Wireless

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 33 of 76


Video Conferencing Equipment
The Video Centric is the UK largest stock of video conferencing equipment to hire for any of your meetings
or the events. The Video Centric providesc a hire service of video conferencing systems, cameras and
interactive technologies for organizations wishing to hire equipment for a day, week, month or quarter. We
hire out systems from all of the world’s leading video conferencing vendors – Cisco, Polycom, Life-size and
more – which can also be provided with an expert video engineer to help set up, install, administer and
remove at the end of the hire period.

The Video Centric also provides the hire of SMART Boards, SMART Podiums, SMART Kapp IQ boards,
video conferencing PTZ cameras and LCD displays for events, training sessions or any short term hire
requirements. Some of the video equipment available to hire includes the products below, subject to current
hire stock, however do give us a call to discuss your event or needs – we may have other available hire
equipment that could be better suited, or be able to provide you with a tailored solution based upon your
specific needs.

Wireless Equipment
This Equipment can help you set up a wireless network and helps you to avoid the costly infrastructure costs
associated with wired networks. The Equipment supporting 802.11b (2.4GHz) can travel up to 91 meters
indoors, and are rated up to 11 Mbps, though our experience has been that the maximum effective
throughput is only around 5Mbps. Equipment supporting the new 802.11a (5GHz) has an even longer
distance capability, and is rated up to 54 Mbps, though our experience has been that a maximum effective
throughput is only around 28 Mbps.

How It Works

The External Connection to the Internet


You can connect the external internet through the Cable Modem Line DSL or Dedicated Line(T1-T3)

Wireless Router
You can install the wireless router anywhere on your network. This router has the hard-wired link to the
network, and can be directly connected to the Cable Modem or DSL modem. This unit broadcasts to
wireless components on the LAN (servers, workstations, printers, etc). This unit can also serve as the DHCP
allocator as well. Units like the Linksys wireless router have a built in firewall that we configure through a
web interface. Units like the Delink also have a built in print server.

Wireless Access Point


We can install a wireless network connection to almost any device. If a component has a USB port, we can
use that, or we can connect to an existing Ethernet port as well. For laptops we can use a PCMCIA card for
laptops that fits right in your Type II PCMCIA slot. We can connect USB wireless access points to printers
as well, designating one of the servers/workstations to act as a print server

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 34 of 76


Security
We can configure your WLAN to be encrypted, which makes it more harder for others to "listen in" on your
wireless LAN traffic. We couple that with other security measures since Wireless Equivalent Privacy (WEP)
is intended to keep transmission private and not to restrict access to the network.

The 802.11a devices can use 152-bit encryption, but still needs vendor enhancements to keep transmissions
private. Be sure to select a vendor like ACE that understands the difference between what measures like
WEP are supposed to do, and what they really do. Your business depends on it.

Virtual Local Area Network (VLAN)


A local area network, or LAN, provides the nodes connected to it with direct (Layer 2) access to one
another. It is usually comprised of one or more Ethernet switches. Computers on different LANs talk to each
other using Layer 3 (IP), via a router.A virtual LAN (VLAN) abstracts the idea of the LAN; A VLAN might
comprise a subset of the ports on a single switch or subsets of ports on multiple switches. By default,
systems on one VLAN don't see the traffic associated with systems on other VLANs on the same network.

VLANs allow network administrators to partition their networks to match the functional and security
requirements of their systems without having to run new cables or make major changes in their current
network infrastructure.

Ports on switches can be assigned to one or more VLANs, allowing systems to be divided into logical
groups -- e.g., based on which department they are associated with -- and rules to be established about how
systems in the separate groups are allowed to communicate with each other. These can range from the
simple and practical (computers in one VLAN can see the printer on that VLAN, but computers outside that
VLAN cannot), to the complex and legal (e.g., computers in the trading departments cannot interact with
computers in the retail banking departments

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 35 of 76


Task 3
In the concept of Information technology.The Protocol is the special set of rules that end points in a
telecommunication connection use when they communicate.

The Computer Communication Protocol is the agreement which specifies a common language which two
computer uses to exchange messages.It defines the communication precisely. Every LAN has a topology, or
the way that the devices on a network are arranged and how they communicate with each other.

The Protocols exist at the several levels of the OSI layers model. On the internet, there is a suite of
protocols known as TCP/IP protocols that are consisting of transmission control protocol, internet protocol,
file transfer protocol, dynamic host configuration protocol, Border gateway protocol and a number of other
protocols.

Internet Protocol
The key Communnication which is used in the internet is called, the Internet Protocol usually known in the
short form IP. Each computer that connects to the internet must follow the Internet Protocol. IP specifies
exactly how a packet must be formed, and how a router must forward each packet on toward its destination.

Data packets are called IP Datagrams. A datagram travels across the Internet independent of the sender. To
make datagram routing and delivery possible, each computer attached to the internet is assigned a unique
address called as Internet address, often abbreviated IP address.

Transmission Control Protocol


TCP controls how information gets transmitted in packets over the Internet. By doing this, TCP makes the
Internet more reliable. TCP solves several problems in packet switching. If a router becomes overrun with
datagrams it must discard them. Due to this reason some datagrams might be lost during transmission. It is
the TCP that handles this problem of data loss by automatically checking for and re-sending the lost
datagrams. Another problem is some datagrams arrive in a different order than they were sent. TCP
automatically checks incoming datagrams and put in order. TCP checks for duplicate datagrams and discard
them.

TCP and IP work together


TCP(Transmission Control Protocol) handles the problems that IP handles without creating a duplicate of
the work that IP does.

They are so important and they work together that the entire set of communication protocols the Internet
uses is known as the TCP/IP protocol suite.

TCP/IP is also used on many local area networks

IP does not make physical connections between computers but relies on TCP for this function. IP is also
used in conjunction with other protocols that create connections.

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 36 of 76


File Transfer Protocol (FTP)
The File Transfer Protocol is the standard way to transfer and copy files from one location to another
location. For the company Winsoft (pvt) ltd which transfers a file from one computer to another over a
network. They transfer file to each department using file transfer protocol. Loan department, saving
department, pawning department and leasing department transfer important files through the protocol.

Hyper Text Transfer Protocol (HTTP)


The HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers
should take in response to various commands”. A HTTP client establishes a connection with a server HTTP
server and sends the server HTTP request, the server returns HTTP response. When the response is received,
the connection is terminated.

MailProtocols POP3 and SMTP


Email requires its own set of protocols and there is a variety, both for sending and for receiving mail. The
most common protocol for sending mail is Simple Mail Transfer Protocol (SMTP). When configuring email
clients, an Internet address for an SMTP server must be entered. The most common protocol used by PCs for
receiving mail is Post Office Protocol (POP). It is now in version 3 so it is called POP3. Email clients
require an address for a POP3 server before they can read mail. The SMTP and POP3 servers may or may
not be the same address. Both SMTP and POP3 use TCP for managing the transmission and delivery of mail
across the Internet.

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 37 of 76


UDP and ICMP
Another member of the TCP/IP suite is User Datagram Protocol (UDP). This protocol is used together with
IP when small amounts of information are involved. It is simpler than TCP and lacks the flow-control and
error-recovery functions of TCP. Thus, it uses fewer system resources.

A different type of protocol is Internet Control Message Protocol (ICMP). It defines a small number of
messages used for diagnostic and management purposes. It is also used by Ping and Trace route.

VOIP Protocols
Like every other aspect of Internet communications, VoIP has evolved rapidly since its introduction in 1995,
and continues to evolve today. The standards show the influence of their creators: the traditional
telecommunications players, the Internet community, and the communications equipment manufacturers
such as Cisco and 3Com.

In rough chronological order of introduction, the most widely used VoIP systems are

H.323 Developed by the International Telecommunications Union (ITU) and the Internet Engineering Task
Force (IETF)

MGCP (Megaco) Developed by Cisco as an alternative to H.323

SIP Developed by 3Com as an alternative to H.323

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 38 of 76


Task 4

WinSoft 1st Floor Diagram

Source : Cisco Networking

Colombo Head Office

 Reception
 Marketing Department(10 Staffs)
 The General Manager Room
 Accounts Department (8 Staffs)
 Customer Meeting Area (With Wifi Facilites)

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 39 of 76


Details of 1st Floor
The 1st Floor needs one router three switches twenty computers Access point Wireless End device and Wifi

Switch 1 Connected via Theoritical Router

Switch 2 PCs Connected along with one switch of the pc of general manager

Switch3 connected to switch1 for Accounts Department

8 PCs are connected in Wi-Fi for Customer Consultation Room.

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 40 of 76


Winsoft 2nd Floor

2nd Floor

 Call Center for Clients from United States of America(USA)-150Computers


 Video Conference Unit
 Tranning Unit with 50 Computers

The Needs of 2nd Floor

 2 Switch
 2 IP Phone
 1 Router
 2 Wireless End Devices
 1 Access Point

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 41 of 76


Winsoft 3rd Floor

3rd Floor

 Call Center for Clients from United Kingdom(120 Computers)


 Auditorium- Wifi Facilities
 The Server Room with IT Faciities
In Here Router to Switch is used through cable

In this third floor server There is Server Room, Calling center, Auditorium

The Servers are connected to the switch Fiber Optical cable for the reason of high rate data transmission
and network administrator pc which is also connected to the same switch. There is a Conference Hall in
with the allocation of 150 persons in there all PCs and Network have Wi-Fi connection.

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 42 of 76


WinSoft Kandy Branch

1st Floor

The Needs of 1st Floor

 1 Router
 3 Switches
 123 PCs
 Access Point
 Wireless End Device
 Wi-fi Connection
 Ip phone

The Switch to Switch Connection is using copper-cross device cable router to router and switch to pc
connection using copper straight connection through cable.

Purpose of this cross cable is RX (receiving terminal) connects to TX (transmitting) of one pc to another PC
and vice versa.

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 43 of 76


2nd Floor

In the 2nd floor the Auditorium computer is using fiber optical cable and Wi-Fi connection

There are two choices when choosing the right and required technology for our connection cable.the Copper
or Fiber Optic.

In Here router to switch, switch to IP phone cross over cable, router to Access point using cross-over
through cable and switch to video conference room using fiber optical cable for purpose of high data
transmission and access point use for connecting wireless devices

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 44 of 76


Task 5
The Selected server for Winsoft(pvt) ltd is Windows Server 2016. It is a server operating system developed
by Microsoft as part of the Windows NT family.It was developed coincidently along with windows 10.

The first version was ready for preview on October 1, 2014 together with first technical preview of System
Center.The Windows Server 2016 was released on September 26, 2016 at the event of Microsoft's Ignite
conference and became officaily available on October 12, 2016.

The Features

 Active Directory Federation Service


 Windows Defender : Windows Server Antimalware
 Remote Desktop Service: Supports OpenGL 4.4 and OpenCL 1.1
 Storage Services
 Web Application Proxy
 IIS 10: Supports HTTP/2
 Windows PowerShell 5.1

Networking Features

 DHCP: As Network Access Protection was initiated Windows Server 2012 The DHCP never
supports NAP in Windows server 2016
 DNS Client: Service binding and supports computers with more network interface
 DNS Server
 Windows Server Gateway
 IPAM(Internet Protocol Address Management)
 Network Controller
 Hyper-V Network Virtulizalition

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 45 of 76


The Options For Installation

 The Standard and Data Center offers three installation options


 The Server Core: This reduces the space required on the disk the potential attack service and the
requirements for the services. It is the recommended option unless you have a particular need for
additional user interface elements and graphical management tools.
 Server with Desktop Experience : This installs the standard user interface and the tools
including all the client features.
 Nano Server

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 46 of 76


The Systematic Details

Supported Server : Windows Server 2016

System Operating: Windows Server 2012

Supported Database Server

 Microsoft SQL Server 2016 RTM


 The 64-bit edition of SQL Server 2014 with Service Pack 1 (SP1)

Supporting Browsers

 Microsoft Edge
 Microsoft Internet Explorer 11
 Microsoft Internet Explorer 10
 Google Chrome (latest released version)
 Mozilla Firefox (latest released version plus immediate previous version)
 Apple Safari (latest released version)

Component

Domain Controllers

Requirement

 Windows Server 2016 Standard or Datacenter


 Windows Server 2012 R2 Standard or Datacenter
 Windows Server 2012 Standard or Datacenter
 Windows Server 2008 R2 Standard or Enterprise
 Windows Server 2008 R2 Datacenter RTM or later
 Windows Server 2008 Standard, Enterprise, or Datacenter

Component

Processor

Requirement

 x64 architecture-based computer


 AMD processor that supports the AMD64 platform
 Intel Itanium IA64 processors not supported

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 47 of 76


Component

Memory

Requirement

 Mailbox
 Edge Transport

Component

Disk Space

Requirement

 At least 30 GB drive
 An additional 500 MB of available disk space
 200 MB of available disk space on the system drive
 A hard disk that stores the message queue database on with at least 500 MB of free
space

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 48 of 76


Task 6

The Servers

(The Types of Servers and their Comparisions with Cost and Benefit)
The Server is a computer or a device on a network that manages network resources. There are many types of
servers.

The Web Servers which are connected to the internet are given a unique address made in a series of four
numbers.

Web Server
The Web Server serves static content to a Web browser by loading the file from the disk and serves across
the network to the users web browser. This entire exchange is initiated by the browser and server which
communicates with each other using HTTP.

Mail Server
The Mail Server is a storage area where the email is stored for the local areas.a set of user definable rules
decide how the mail server should react to the destination of a specific message. a database of user accounts
that the mail server recognizes and will deal with locally, and communications modules which are the
components that actually handle the transfer of messages to and from other mail servers and email clients.

There are many free and open source email server products such as Citadel, hMailServer, SmarterMail,
Apache James and Axigen.

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 49 of 76


Comparision among the mail Servers

HMail : This Server is created for unlimited use and it is easy to install and configure.
When it comes to the Disadvantages This Server lacks of native mobile and the support of web can be
identified.

Citadel : Easy to install and there are no limits on users and it is small foot print. But it may not scale well
for larger organizations

Apache James: Mailets provide modular design and flexibility and there is no GUI in Apache James mail
server

Zarafa : This server has a comprehensive mobile support and a pleasing user interface.

SmarterMail : It has a nice user interface and good support for mobile mail
The best mail server for winsoft is the SmarterMail server .The Company ViUX TM is an authorized lease
reseller of SmartMail licenses, which provide a low cost point of entry to Microsoft Exchange level features
for as little as $ per month. Unlimited Mailboxes price is $100

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 50 of 76


Application Server
An application server is typically used for complex transaction-based applications. To support high-end
needs, an application server has to have built-in redundancy, monitor for high-availability, high-performance
distributed application services and support for complex database access.

FTP Server
It works on one of the oldest of the Internet services, the file transfer protocol. It provides a secure file
transfer between computers while ensuring file security and transfer control

Proxy Server
It acts as a mediator between a client program and an external server to filter requests, improve performance
and share connections.

DateBase Server
Database server is the term used to refer to the back-end system of a database application using client/server
architecture.

Real Time Communication


Real-time communication servers, formerly known as chat servers or IRC Servers, and still sometimes
referred to as instant messaging (IM) servers, enable large numbers users to exchange information near
instantaneously.

Fax Server
It is one of the best options for organizations that seek minimum incoming and outgoing telephone
resources, but require to fax actual documents. Fax server is essential component for Winsoft because they
need to fax some document to some companies or their clients. Here these sending, receiving or distributing
faxes over the network. Here a fax server is equipped with one fax modem and which is plugged phone line.

A fax server is connected to the LAN and it can communicate with the computers in the network.

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 51 of 76


Chatting Server
It serves the users to exchange data in an environment similar to Internet newsgroup which provides real-
time discussion capabilities.

Printer Server
A print server is a software application, network device or computer that manages print requests and makes
printer queue status information available to end users and network administrators.

Open Source Server


From your underlying open source server operating system to the server software that help you get your job
done, open source software is a critical part of many IT infrastructures.

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 52 of 76


Task 7
Many people are willing to install a desktop system with the latest features for eg Ubuntu, Kubuntu, or
Xubuntu The A desktop system is typically used for personal computing tasks and has a graphical user
interface (GUI), while a server system typically has a command-line interface (CLI).

The Recommended Minimum System Requirements


The System Requirements here should allow even someone fairly new to installing Ubuntu or Gnu Linux to
easily install a usable system with enough room to be comfortable. A simple method is just try Ubuntu CD
as a live trial to check the hardware

 700 MHz processor (about Intel Celeron or better)


 512 MB RAM (system memory)
 5 GB of hard-drive space
 VGA capable of 1024x768 screen resolution
 Either a CD/DVD drive or a USB port is needed for the installer media
 Internet access is helpful
The setup of the Screen resolution must be at highest in which your graphics card can handle but when it
comes to the bootup process its better for the lowest graphics mode which allows your monitor for a better
setting.

On the other hand The hardware which is produced in the last few years with an efficient architecture or
machines are built for specific purposes which work well.

The CPUS with 64 bit (x86-64) must be fast enough to run Ubuntu and can run the 32-bit (x86) version as
well. However there is a CD available with 64 bits The 32bit seems to be easy to use and it runs into
problems.

The Ubuntu Desktop has 11.4 and it uses Unity as the default Graphic User Interface In order to run thie
Unity feature The System needs a more capable graphics adapter

 1000 Mhz Processor


 1024 Mib RAM
 3D Acceleration Capable Video Card

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 53 of 76


Visual Effects
The Visual Effects provides various graphics effects for your desktop to make it fun and easier to use.Even
if your computer is powerful enough to run the visual effects.you can off them and make your Ubuntu
device a usable feature.

Visual Effects can be turned off If you have the suitable GPU (Graphics Card or Intergrated Chipset)Which
is Supported.

The Supported GPU Manufactures are

 ATI
 Intel
 Nvidia

Installation Requirement for Ubuntu Server(CLI)

 300 Mhz x86 processor


 192 MIB of system memory (RAM)
 1Gb of Disk Space
 Graphics card and capability of 640x480
 CD Drive

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 54 of 76


LightWeight GUI Alternative
If you an old or less branded Computer For eg IBM or want to get rd of your hardware The Usage of a
medium lightweighted Desktop System such as Xubuntu or a lightweight such as Lubuntu is
recommended,They make more effiency use of your system resources. Even if you have the newest
equipment you can still use these two.

If your System has a less memory of 192 MIB The Installation CD can be used.

The System Requirements for Xubuntu between Ubuntu Server and Desktop

 512 MIB of System Memory(RAM)


 5GB of Disk Space
 Graphics Card and Monitor with Capability of 800x600 resolution
With Ubuntu your computer can consume even less memory.

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 55 of 76


Task 8

The Feedback

Customer Satisfaction Survey

Your Name(Optional)

Your Email ID

Date of Service

Name of the Technician

Did it Meet your expectations Yes/No

Your Comments

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 56 of 76


How would you describe the service of The network of WinSoft

Please tell how your internet is describing If any problems I can try to fix it

What are the likes and dislikes about the product

If any suggestions and Complaints please don’t hesistate to contact me I can give an
answer.

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 57 of 76


Task 9

The 1st Floor

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 58 of 76


The PC and Router connection is launched successful from the CEO Room The Data is sent and received

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 59 of 76


The 3rd PC trunk Connection Successful Data sent and received

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 60 of 76


All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 61 of 76
The PC Connection of The Reception is Successful

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 62 of 76


2nd Floor

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 63 of 76


Internet Protocol Configuration

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 64 of 76


Video Conference Connection Successful

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 65 of 76


Connected Message

The Two Connections of the IP Phones are Successful

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 66 of 76


3rd Floor

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 67 of 76


Configuration of the Server

Configuration of wireless ending device

Server to Wireless Connection successfully connected

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 68 of 76


Task 10

System Upgrades and Enhancements


You can handle the IT Projects which is from the beginning to the end with the minimal amount of
disruption to our operations If it is applicable we can work alongside our internal IT team to make sure that
they have the knowledge which is needed to go forward.

Every Project which we do for your benefits from our comprehensive project management process which
includes the team of engineers, consultants, and project managers who have extensive experience delivering
all types of technology transitions smoothly, with attention to reducing the organizational change and
turmoil that is usually part of the package.

The Process

 Budgeting
 Planning and testing
 Creation and execution of PCP(Project Communication Plan)
 Testing
 Project Close
 Post-Implementation Support

Projects Specific Challenges

 Server Virtualizaton
 Server and Workstation Replacements and Upgrades
 Network Infrastructure Upgrades
 New Network Implementation
 Office Moves and Expansions
 Server Upgrades and Replacements
 Document Management System Implementation and Upgrades
 Cloud Computing Implementation and Migration
 Security Assessments
 Disaster Recovery Planning

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 69 of 76


Performance Management Systems Solution
The Performance Management Systems solution is responsibility and useful for 2G/3G Network. It offers
solution for fixed/IP and wireless domains for customers that are evolving towards consolidated network
operations management. The solution addresses the needs of communication service providers (CSPs) and
large enterprises when it comes to the challenges of managing both fixed and mobile networks.

This is important for the CSP which is moving to the converged fixed-mobile network because it gives them
the ability to quickly and efficiently resolve problems, reduce customer churn and provide a basis for future
revenue enhancements by offering additional services that scale. Management Systems Solution can be used
as a powerful resource to monitor and control the system.

Network Enhancement Solutions


The Stress on network capacity will continue to increase with LTE and other 4G network roll-outs – due to
subscriber consumption of all available bandwidth.

Mobile data traffic will nearly double in volume annually over the next several years.

The only way that mobile network operators can meet demand for capacity and realize the revenue growth
potential of mobile data – either in the 3G or the 4G environment – is by improving the utilization and
performance of their current and future network resources. That means supporting increasing amounts of
multimedia traffic – more subscribers, more applications and more content – with available network
capacity. It also means delivering a better user experience.

Optimization Service Node Wireless Access enables operators to increase available network capacity by
50% – without adding new spectrum or costly infrastructure. By increasing available network capacity,
operators can

Defer capital expenditures (capex) for network upgrades and control operating expenses (opex) due to
increased efficiency

Deliver more content to more subscribers – increasing revenue growth

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 70 of 76


Task 11

Maintenance Schedule

Systems Time Remarks


Academic Unit and Personal 06:30-07:00 On Every Mondays
Web servers
Each Server 06:30-07:00 On Every Wednesdays
Image Servers 07:00-07:30 On Every Mondays
Admin server for Reception, 06:30-07:15 On Every Mondays
HR personal data enquiry
Admin server for finance, 06:30-07:15 On Every Mondays
marketing
Admin server for Calling 06:30-07:15 On Every Mondays
center
Admin servers 04:00-06:30/ 04:00-07:00 On Every Tuesdays to
Sundays/Every Monday
General Admin servers for
HR, CEO, SDS office Unavailable after normal Unavailable after normal
office hours office hours

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 71 of 76


Network Maintenance
While Performing proactive and scheduled maintenance ensures maximum reliability and the overall lowest
TCO through minimizing costs and productivity losses that are associated with downtime and replacement.

Preventative Maintenance is normally included within our standard support packages . however, we also
provide maintenance services to those clients who have an in-house IT team and who want their team to be
allocated to more specialized tasksOur program of pre-defined and fully documented preventative
maintenance tasks uses our qualified staff and industry recommended processes.

The Preventiative Maintenance tasks

 Server and Storage infrastrure


 Desktop infrastructure
 Network equipment
 Backup and security systems

Each and every maintenance task is performed at a standard frequency or on a nominated basis which is
appropriate for our environment

These tasks Include

 Patch Management
 Log file review and corrective action
 Security Vulnerabilty testing
 Anti-Virus and Anti-Spam management
 Active directory account review
 Archiving and data file management
 Routine backup verification and test restores
 Threshold trending and management – CPU, RAM, disk, network bandwidth
 Application interoperability and alerts
 Asset management tasks
 Custom maintenance tasks developed to meet unique requirements

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 72 of 76


Standard Maintence tasks

Server

Task Scope Standard


Frequency
Serverlogs : Compare event logs errors and RealTime
warnings against database of known errors.
Investigate any "unknown" errors for
severity. Escalate any appropriate errors as
Incidents via maintenance team
ServerPatching: Review Critical updates and Monthly
prepare for periodic application: Confirm a
suitable Change Window with the client,
check backups, apply critical patches, reboot,
and test server functions. Optionally apply
non-critical patches depending on server role.
Server Anti-Virus: Verify server anti-virus Real Time
protection software is running correctly and
virus definitions are being updated. Escalate
any Virus definition update failures as
Incidents. Compare Virus errors and
warnings against database of known errors.
Server Disk Capacity: Check remaining disk Real Time
capacity, all relevant partitions. Establish and
maintain relevant free disk space alert
thresholds. Escalate any disk space threshold
breaches as Incidents.

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 73 of 76


Task Scope Standard
Frequency
Server Optimization Monthly
Database Maintenance RealTime
Backup Notifications Daily
Backup Spot Notifications Quaterly

Desktop

Task Scope Standard


Frequency
Desktop patching Monthly
Desktop Antivirus Monthly
Active Directory Accounts Quaterly
DesktopAuditing Annual

BackUp

Task Scope Standard


Frequency
BackUp Notifications: Monitor backup Daily
notifications for previous run success / fail.
Log into servers to investigate failed
notifications
Back Up Spot Checks Quaterly
Back Up Media Quaterly
Review BackUp Scope and Retention Quaterly
Deliver Annual Data Annual
Diasaster Recovery Verification Custom

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 74 of 76


Security

Task Scope Standard


Frequency
Firewall logs Custom
Password Rotation Custom
Firewall FirmWare/Software Custom
Light Security Audit Custom
Security Audit Custom

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 75 of 76


References

 www.ianswer4u.com/2011/05/network-topology-typesof-
network.html#axzz4AxPiFq2d.
 www.pccservices.com/network_types.html
 https://blog.udemy.com/managed-vs-unmanagedswitch
 www.computerhope.com/jargon/s/server.htm
 www.voipinfo.org/wiki/view/What+is+VOIP
 https://bgnp.wordpress.com/2014/07/26/iptelephone
 www.videocentric.co.uk/productcat/hire-equipment/.
 http://searchnetworking.techtarget.com/definition/virtual-

All rights reserved ©ESOFT Metro Campus, Sri Lanka Page 76 of 76

You might also like