Академический Документы
Профессиональный Документы
Культура Документы
Assessment Title & No’s : Plan and Design a network solution for Learning Resource Center
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it
as my own without attributing the sources in the correct way. I further understand what it means to
copy another’s work.
I feel great pleasure to thank to everyone who assisted me with the preparation of this assignment and
to all those comments and criticisms have helped to keep the inclusion accurate and up to date. I’m
especially grateful to the following for their help: my lecturer Amma for helping me to understand
this subject. Also I would like to remember my colleagues, friends who shared their knowledge with
me to clear this scenario.
Although every care has been taken to check mistakes and misprints, yet it is very difficult to claim
perfection. Any error, omissions and suggestions for the improvement of this assignment, brought
to my notice will be thankfully acknowledged and incorporate in my next assignments.
Thank You
Table 1 ...............................................................................................................................................................24
Table 2 ...............................................................................................................................................................29
Table 3 ...............................................................................................................................................................30
Table 4 ...............................................................................................................................................................31
Table 5 ...............................................................................................................................................................39
Table 6 ...............................................................................................................................................................49
Figure 1 ..............................................................................................................................................................10
Figure 2 ..............................................................................................................................................................11
Figure 3 ..............................................................................................................................................................13
Figure 4 ..............................................................................................................................................................14
Figure 5 ..............................................................................................................................................................15
Figure 6 ..............................................................................................................................................................17
Figure 7 ..............................................................................................................................................................19
Figure 8 ..............................................................................................................................................................27
Figure 9 ..............................................................................................................................................................32
Figure 10 ............................................................................................................................................................33
Figure 11 ............................................................................................................................................................34
Local area networks is commonly used for to connect numbers of computer printer, scanner etc.in a
institutions, and also through LAN we could able to share data and files between the notes
Usually WAN uses for large geographical area coverage’s. Through WAN we could able to connect
one or more than one local area networks. WAN also be connected through public networks and
satellites
Network topologies
1. Bus topology
2. Ring topology
3. Mesh topology
4. Star topology
5. Tree topology
1. Bus topology
In this topology all the devices are connected to a centralized single linear cable. This cable is back
bone of the network
Connect all computers with the support of centralized main cable. It could easy to make network
connection with computer and other devices. The main disadvantage of bus topology is the networks
coverage depends on main cable. We couldn’t close two edges
Number of connections are limited. Because the man cable length is limited and we can
connect the nodes only between the terminators.
If we find the mistake in the man cable, the entire network will be shut down because
backbone is the only data transfer path for entire network.
It seems the minimum security
2. Ring topology
The ring topology will connected with a single cable in circular or round shape All the computer are
switch on during .Ring topology systems in place.
Figure 2
3. Mesh topology
In this topology each and every nodes are connected to other nodes (all devices are interconnected),
each node not only transfer its own data signal also they can relay data packet from other nodes
4. Star topology
All computers and devices will connected with a main switch and other computers will be connected
in star shape
Figure 4
The cost of network is higher compare to other network because we use central hub or switch
Limited network connection
6. Tree topology
This topology is a hierarchical manner of network nodes, there is root node at the top of the
hierarchy. There are client nodes under the root node. The root node (top level node) is commonly a
main frame computer client nodes are mini or microcomputer.
Figure 5
Even though there are many connection like a branches of a tree if there is any fault in part
other section can be functioning without any disturbance.
Easy to find the errors in the network.
Expand the new connections is easy and possible.
In this topology all the star connections and all the single nodes are connected to the
backbone so if there any failure in the backbone, the entire network will be shut down.
It is a very biggest and complexity topology. That’s why difficult to maintenance, high cost
and configure the network also difficult.
4. Hybrid Topology
Before starting about Hybrid topology, we saw that a network topology is a connection of various
links and nodes, communicating with each other for transfer of data. We also saw various
advantages and disadvantages of Star, Bus, Ring, Mesh and Tree topologies.
Now let’s discuss what Hybrid Network topology is and why it finds its application in Wide
Area Networks. Hybrid, as the name suggests, is mixture of two different things. Similarly in this
type of topology we integrate two or more different topologies to form a resultant topology
which has good points (as well as weaknesses) of all the constituent basic topologies rather than
having characteristics of one specific topology. This combination of topologies is done according
to the requirements of the organization.
For example
If there exists a ring topology in one office department while a bus topology in another
department, connecting these two will result in Hybrid topology. Remember connecting two
similar topologies cannot be termed as Hybrid topology. Star-Ring and Star-Bus networks are
most common examples of hybrid network.
Reliable : Unlike other networks, fault detection and troubleshooting is easy in this type of
topology. The part in which fault is detected can be isolated from the rest of network and
required corrective measures can be taken, WITHOUT affecting the functioning of rest of the
network.
Scalable: Its easy to increase the size of network by adding new components, without
disturbing existing architecture.
Flexible: Hybrid Network can be designed according to the requirements of the organization
and by optimizing the available resources. Special care can be given to nodes where traffic is
high as well as where chances of fault are high.
Effective: Hybrid topology is the combination of two or more topologies, so we can design it
in such a way that strengths of constituent topologies are maximized while there weaknesses
are neutralized. For example we saw Ring Topology has good data reliability (achieved by use
of tokens) and Star topology has high tolerance capability (as each node is not directly
connected to other but through central device), so these two can be used effectively in hybrid
star-ring topology.
Costly Hub: The hubs used to connect two distinct networks, are very expensive. These hubs
are different from usual hubs as they need to be intelligent enough to work with different
architectures and should be function even if a part of network is down.
Costly Infrastructure: As hybrid architectures are usually larger in scale, they require a lot
of cables, cooling systems, sophisticate network devices, etc.
Hybrid topology is a combination of star and bus topology so we need only one longest cable to
backbone for the entire network. After we have to divide all the nodes as groups for the use of those
nodes. Nodes are in a single group will be connected with a central connection point and all the central
connection points are connected with the backbone. we can simply add or remove a new network
device with backbone that will not affect the any other nodes or entire network, easy to find the fault
and maintenance also easy because nodes are grouped by a different star topology so if there any fault
in the network we quickly identify by checking the every single star also it is more than secure other
topologies, So that’s why I suggest Hybrid topology is the suitable topology for this scenario.
Provide a report on network related technologies and standards that would be employed to
fulfill the requirements of Winsoft (Pvt) Ltd and discuss how they would impact on your
solution (individually and / or collectively).
OSI Model
Open system interconnection model describes a networking framework to implement set of rules in 7
layers. This model is a theoretical framework to understand difficult interconnections in networking.
Control process transfer from one layer to another layer.
Figure 7
802.11 is the generic name of a family of related standards for Wi-Fi wireless networks. The
numbering system comes from the IEEE 802.11, which uses "802" to designate many standards of
computer networks including Ethernet (802.3).
802.11 standards define rules for communication in wireless local area networks (WLAN). Popular
802.11 standards contain 802.11a, 802.11g, and also 802.11n.
802.11 was the original standard of this family, ratified in 1997 defined WLAN 802.11 operating at
1-2 Mbps. This rule is obsolete today.
Each extension to the original 802.11 adds a unique font for the name. While 802.11g and 802.11n are
the most interesting for the average consumer, there are many other extensions or are under
development.
:-Establish a connection
IP addressing
IP address has two versions one is IPV-4 and other one is IPV-6, IPV-4 is 32bit scheme, IPV-4 allows
4.3 billion unique address. It represented in following type
192 . 168 . 10 . 1
Class A – first 1 byte for network ID and remaining 3 bytes for Host ID
Class B – first 2 bytes for network ID and remaining 2 bytes for Host ID
Class C – first 3 bytes for network ID and remaining 1 byte for Host ID
IPV-6 is 128bit scheme and this is the latest version, IPV-6 allows more users and n nodes to transfer
data between them. It allows nearly three hundred and forty trillion unique address.
Justification
OSI reference model to describe how information is transferred from one network component to
another, from the moment a user enters information using a keyboard and mouse so that when the
information is converted into electrical or light signals transferred along of a length of wire.
Developed the ISO seven-layer model to help vendors and network administrators to gain a better
understanding of how data is handled and transported between network devices, and to provide
guidance for the implementation of new standards and technologies network. To assist in this process,
is separated from the OSI reference model the process of network communication into seven layers
simple.
In our case each class room and conference hall are equipped with Wi-Fi connection, so the IEE 802.11
standard will help us.
We use IPV-4 version class C address to configure LAN network. To identify a particular node in
network.
Describe the importance of different protocols in data communication. And discuss the roles of
different protocols that you would have to employ in this solution and how they enable the
effective utilization of your networking system
Example:
Table 1
Routable protocol
Routing protocols give a platform to routers to advertise their own routing table and learn other router
information which are enable to learn, and define which path is the best path to routes to a destination.
TCP/IP is one of the example for routable protocol.
Non routable protocol is used device address to transfer data without using IP address, this can be used
in a LAN network (this must be used with in interior network), and this protocol is limited to smaller
LANs.
HTTP is the underlying protocol used by the World Wide Web. HTTP defines how messages
formatted and transferred, and what actions Web servers and internet browsers should take in response
to several commands. For an example, when we enter a particular URL in our browser, this actually
sends an HTTP command to the Web server directing it to search and transmit the requested Web
page.
This is a protocol for transferring email messages between clients to servers. Most e-mail systems that
send mail over the Internet use SMTP to send messages from one server to another; messages can be
retrieved with an email client using POP or IMAP. In addition, SMTP is generally used to send
messages from a mail client to a mail server. This is why it is necessary to specify both the POP or
IMAP server and the SMTP server when you configure your email application.
TCP is one of the main protocols in network technology. The IP protocol deals only with data packets,
TCP enables two hosts to establish a network connection and interchange streams of data. TCP
guarantees transfer of data and also guarantees that data packets will be transported in the same order
in which they were sent.
IP specifies the format of data packets, also named datagrams, and the addressing pattern. Most
networks association IP with a higher-level protocol named Transmission Control Protocol (TCP),
which establishes a virtual connection between a destination and a source.
IP by itself is something like the postal scheme. It allows us to address a data package and drop it in
the system, but there is no straight link between us and the recipient. TCP / IP, on the other pointer,
establish a network connection between two hosts so that they can transfer messages back and forth
for a period of time.
The current version of IP is IPv4 and the new version is IPv6, is under development.
Sarah. A Networking Technologies Page 25
Ethernet
Originally known as Alto Aloha Network, Ethernet is a network protocol widely used local area (LAN)
originally created by Xerox PARC in 1973 by Robert Metcalfe, as the first network to offer Carrier
Sense Multiple Access / Collision Detection Ethernet is a solution fast, reliable network that is still
widely used today, Here is a list of the different standards of Ethernet and additional information about
each is shown.
Ethernet II is a revised version of Ethernet rewritten by the Digital Equipment Corporation, Intel and
Xerox. Ethernet II, also known as DIX and 802.3.
Fast Ethernet is also known as 802.3u 100BASE-T or is a communication protocol that allows
computers on a local area network to share information with each other at a rate of 100 million bits
per second instead of the normal 10 million BPS. Fast Ethernet works over Category 5 cabling twisted
pair.
There are two available standards 100BASE-T. The first standard known as 100BASE-T uses CSMA
/ CD. The second standard, known as 802.12 or 100VG-AnyLAN is similar to another standard;
however, a different Ethernet frame to send their data is used.
1. 100BASE-T4 uses four pairs of telephone grade wire twisted pair is used for networks that
require low quality twisted pair 100-Mbps Ethernet.
2. 100BASE-TX Powered by ANSI = 100BASE-TX is also known as 100BASE-X, 100BASE-
TX uses two data wire to wire twisted pair
3. 100BASE-FX = Powered by ANSI, uses 2 100BASE-FX fiber cable supports.
Design a comprehensive network solution for the main and city center and explain how your
design meets the requirements of Winsoft (Pvt) Ltd.
Figure 7
Figure 8
The design requirements document supports the specifications identified in the Prepare and Plan
phases for the following:
Availability
Scalability
Security
Manageability
The design must be flexible enough to allow for changes or additions as new goals or needs
emerge.
The technology must be integrated into the current operations and network management
infrastructure
One main router, server and main switch in the Colombo branch .five sub switches connect to
main switch. In any problem into switches easy find in to the main switch. Where the problem and
easily give a solution. In the kandy branch to same setup. colombo branch to Kandy branch connect
to firewall system .fire wall system is high security give in to this company.
In a Colombo company. 1st floor details, 2 switches, Wi-Fi connection, Computers for the employees,
Computer for the reception, Computer for the GM’s room .2nd Floor details 2 switches, Wi-Fi
connection, Training Center with 50 computers, Calling Center for USA clients - 150 computers. 3rd
Floor details Firewall, Router, Server, Main switch, Calling Center for UK clients with 120
computers, Auditorium – with Wi-Fi facilities. Kandy branch 1st floor details, 1 Main switch, firewall,
One switch, One server, One router ,Computer for the receptionist ,100 computers for the Australian
clients, Wi-Fi connection 2nd floor details, 2 Switches, 30 computers for the training center, Calling
Center for Asian clients - 80 computers, Wi-Fi connection for the Auditorium
Critically discuss the role of software and hardware components that you would employ in this
solution and how you would utilize them to create your new network infrastructure
Software components:
In server based networking there should be a server computer and other computers in the network are
called clients. Client pc’s request and receive related network services from the server computer so
the server computer has a specialized operating system. Server computer is usually higher
performance system. Using server based networking model client pc’s are able to design with
minimum hardware requirements. Winsoft (Pvt) Ltd uses windows 7 operating system for the client
computers because it is more user friendly than other operating systems and windows server 2012 for
server computer.
Table 2
Item Description
Microsoft windows server 2012 R2 Standard edition
Microsoft windows 8 pro Original version
EMC AVAMAR backup
ESET NOD32 business edition Antivirus
Microsoft office 2013 Professional
Adobe suite Adobe collection
Hardware components:
Hubs and switch: Hub is a network equipment it connect computers in a private network, we can use
hub for small network. If the network larger we may use switches to divide the groups of hubs, it helps
to reduce the network traffic. In our case Colombo -04 building has computer labs, each lab has more
the 35 computer so we have to use both hub and switch together.
Wi-Fi router: it is usually used to access internet without wire connection. Commonly portable devices
use Wi-Fi connection. In our case each class room and conference halls are equipped with Wi-Fi
connection.
Router: it is a network device operates at the network layer, it connects multiple networks together it
can use to connect two or more LAN or WAN together. In our case we have both LAN and WAN
networks for this company
Hardware components
Task 06:
Provide the different types of servers that you would have to utilize in this solution and
comprehensively analyze and compare the different types of servers available in the market (based
on the cost and benefits of them) and make the best selection. Justify your answer.
We have chosen HP G8 ML350p (668267-005) as the server computer for Winsoft (Pvt) Ltd . This server pc
supports Microsoft Windows platforms (Operating system) and supports Linux also. Compare to other severs
this cost is reasonable.
It has more RAM memory, memory slots, and Maximum cache than other servers and it support 1000-base
specific standard. In future if we need to extend our network we can increase the main memory. That’s why I
prefer this for our given scenario.
In a network, all devices are interconnected to share resources. When a particular device is ask for a
resource from another device, the first device is mentioned to as a client. Because all devices are part
of a network act in association, almost any device can be referred to as a client. Based on this, there
can be different type of clients in a network. For example, if we send a data form city center to main
building, first the data will go to Ethernet port of that particular computer after that Ethernet port will
send that data to switch, which is connected with particular computer, then the switch will check the
address of the data and pass the data to the router after that router will pass that data to main building
router via internet, then the router will check the address of the data and pass that to switch the switch
will check the address of the data and transfer to the Ethernet port of that addressed computer then the
user can access the data.
Figure 9
A Network Interface Card (NIC) is a device that lets computers to be combined together in a
network, naturally a Local Area Network (LAN). Networked computers communicate with each
other using a specific protocol for transferring data packets among the different machines or nodes.
The network interface card acts as an translator, letting the machine to mutually send and obtain
data on a LAN. Information Technology (IT) specialists frequently use these cards to setup wired
or wireless networks.
After building a LAN, a network interface card is set up in every single computer on the network
and must use the same architecture such as Ethernet cards, Token Ring cards, or an alternate
technology. An Ethernet network interface card is set up in an existing slot inside the computer,
classically on the motherboard. The NIC allocates a unique Media Access Control (MAC) address
A card's back plate structures a port that turns a data cable, such as an Ethernet cable, that runs
from every NIC to a central hub or switch. The hub acts like a transmission, passing data among
the computers through their MAC addresses as well as let them to share assets like printers and
scanners. Furthermore, in a wired network, a cable actually joins each computer to each other or
to a hub.
Wireless Networks
Wireless cards are installed like their wired counterparts, but rather than a port for a cable, the card
features a small antenna. The NIC interconnects with a central wireless switch or hub via radio
waves. Wireless LANs are frequently suitable, but might have several limitations depending on
the material a structure is made from.
Choosing the Right NIC
Figure 10
When purchasing components for a LAN, it is essential to ensure that the NICs and hub or switch
have the similar abilities. The whole network must be either wired or wireless, except if
components are specifically chosen that have both functionalities. In addition, different versions
of hardware usually support new features plus greater data speeds than older tools.
Several NIC cards work with wired connections although others are wireless. Most NICs support
either wired Ethernet or WiFi wireless standards. Ethernet NICs plug into the system bus of the
PC and contain jacks for network cables, while WiFi NICs contain built-in transmitters .
Network switch
Figure 11
A network switch can support 10/100 Mbit/s or 10/100/1000 Mbit/s port transfer rates. It is likely
to have numerous network switches operating at diverse speeds on the same network. On the other
hand, this form of setup gives itself to bottlenecks and restricts the potential routes available for
the flow of data.
The network switch functions as the traffic management system within the network, directing data
packets to the correct destination. These devices are used to link minor devices to the network as
well as to make sure the full cost effectiveness and the ability to share properties.
The characteristic to setup of a network switch is two computers, one printer, and a wireless
router. Every devices are connected to the network switch, and each item have to be clearly well-
known and connection rules produced.
When the setup is complete, every computer on the network, will use the similar printer. They also
can transfer files to each other and anyone with a wireless card can access the network, print and
transfer files. The network switch is intended to let the resources to be shared without decreasing
performance.
Network Cable
The unshielded twisted pair (UTP) cable is used in several Ethernet networks. Each pair of wires
that is housed inside of the lining cable is twisted into some additional rotations to prevent
interfering from new devices on the network. The arrangement of this type of cable increases its
consistency as well as it helps to reduce network disasters.
Figure 12
Coaxial cable, or coax, is a different common type of network cable. It has a copper conductor in
its center and a plastic coating serves as an insulator among the center conductor and also a metal
shield. The cable is then protected with a coating. The thicker the coating which less pliable affords
extra shield.
Figure 13
Ethernet crossover cable is used to connect a computer network made up of two or more
computers. This kind of network cable rejects the need for network switches or routers. The cable
also let the computers to be connected with their network adaptors, such as the network interface
card (NIC).
As wireless networks become more and more popular, network cable is becoming less necessary.
Still, many systems, especially large scale systems, continue to rely on network cables.
Name ………………………………
Position ………………………………
a. Excellent (……)
b. Average (……)
c. Low (……)
d. Bad (……)
8. How would you rate the competence of the technician?
a. Excellent (……)
b. Average (……)
c. Low (……)
d. Bad (……)
a. Excellent (……)
b. Average (……)
c. Low (……)
d. Bad (……)
Total
90
80
70
60
Points Title
50
40
Total
30
20
10
0
Miss. Mr. raja Mrs. Mr. Mr. Mr.
ramya rainjan kamal suthan sathees
Figure 14
Report
Our first question is How is the internet speed?, if most of the users are select excellent and average,
that’s fine so we don’t need to worry about the internet connection. Else we have to change the high
performance internet router or we have to get another new faster internet connection.
The second question is how is the data transferring speed? , if most of the users are select excellent
and average, that’s fine so we don’t need to worry about that. Else we need to replace the high speed
The fifth question is how is the security level? , if most of the users are select excellent and average,
that’s fine so we don’t need to worry about the security level. Else we need to install a high
performance antivirus or security guard.
Record your test results obtained in Activity 04 (with proper descriptions and screenshots) and
analyze with the expected outputs. Evaluate your analysis.
Figure 15
Figure 17
Figure 18
Record (with proper descriptions and screenshots where appropriate) your test results obtained in
Activity 04 and analyze with the expected outputs. Evaluate your analysis.
Ping is a tool that helps to verify IP-level connectivity when troubleshooting, the ping command to
send an ICMP echo request to a destination host name or IP address. Use Ping when we want to verify
that a host computer can send IP packets to a destination host. We may also use the Ping tool to isolate
network hardware problems and incompatible configurations.
In our case we need to test whether the configuration working as expected or not. So we can test using
ping command, if got reply from destination host like given below then our configuration is working
correctly.
Switch working Check Power connection Power button on Blink green light
Clint System are Check Power connection Power button on Blink green light
working
Check windows OS windows OS worked successfully
lost = 0
Discuss the enhancements that you would implement after a period of one year from the
execution of the solution to improve the aspects including but not limited to bandwidth,
quality, security and scalability
Scalability
: Scalable network designs can grow to include new user groups and remote sites and
Can support new applications without impacting the level of service delivered to existing users.
Availability
: A network designed for availability is one that delivers consistent, reliable perform-
Acne, 24 hours a day, 7 days a week. In addition, the failure of a single link or piece of equipment
Should not significantly impact network performance.
Security
: Security is a feature that must be designed into the network, not added on after the net-
Work is complete. Planning the location of security devices, filters, and firewall features is critical
To safeguarding network resources.
Manageability
: No matter how good the initial network design is, the available network staff
Must be able to manage and support the network. A network that is too complex or difficult to
Maintain cannot function effectively and efficiently
We have select hybrid topology for our solution so if we need to develop our network after one year
we can easily extend our network any time,
Examples:
If we need new client computer in a same building, we can easily create by connecting
switches with backbone.
If we need new client section or conference hall, we need only a Wi-Fi router for connect
them with our network.
If we want to connect a new LAN in different city building, we can easily connect by using
internet router with our main building router.
Increase security coverage while simplifying management across your physical, virtual, and
cloud deployments.
Monitoring VLAN Traffic software in feature
Fastest, most flexible platform: optimized for internal, perimeter, data center, distributed, and
cloud deployments E.G
Security
Security is a feature that must be designed into the network, not added on after the net-work
is complete. Planning the location of security devices, filters, and firewall features is critical
to safeguarding network resources.
To be effective against today's evolving threat landscape, your security solution needs to reliably
control network traffic through awareness of applications, users, and content. To be efficient, it needs
to be consolidated, simple to manage, and easily scalable.
To provide consistently top-rated security, greater visibility, and unmatched performance, we give
you the unique combination of the most advanced threat intelligence from FortiGuard Labs with
our intuitive FortiOS Operating System, and purpose-built FortiASIC processors.
Today’s networks are more likely to face an attack originating from the access layer of the internal
network than from external sources. As a result, the design of server farm security is different from
the older DMZ model. A layer of firewall features and intrusion protection is required between the
servers and the internal networks, and between the servers and the external users. An additional
security layer between the servers may also be required. The sensitivity of data stored on the
servers and contained in the transactions traveling the network determines the appropriate security
policy for the design of the server farm.
Quality of Service (QoS) is a industry standard to ensure high performance for critical applications.
In this mechanism network administrator can use their existing equipment to give more through
put on service delivery without changing the network architecture or hardware. In this technology
some traffic is given preference over the others for its uses and this require reliable and guaranteed
delivery. So QoS is helps to achieve this goal. There are list of network characteristics managed
by QoS.
Gives administrators control over network resources and allows them to manage the network from
a business, rather than a technical, perspective. Ensures that time-sensitive and mission-critical
applications have the resources they require, while allowing other applications access to the
network.
Reduces costs by using existing resources efficiently, thereby delaying or reducing the need for
expansion or upgrades.
Task 11:
Design a comprehensive maintenance schedule including data backup, with the types of data
that will be backup based on users.
Maintenance schedule
Chief network administrator responsible all network issues chief network administrator can give
order and make time schedule for maintenance of the company
Before you start make sure you have the minimum requirements to install Windows Server
DVD drive
Super VGA (800 x 600) or higher-resolution monitor
Keyboard and Microsoft® mouse (or other compatible pointing device)
Internet access
You can then download the evalution copy of Windows Server 2012 from here, Download
the ISO and burn it to some DVD:
1- Insert the Windows Server 2012 DVD, and once you get the following message press
Enter to boot from the setup
3- Once the setup files are loaded, the setup will start with the following screen. You can
change these to meet your needs (the default values should be fine for now)
5- You will see the following screen, wait until it finishes loading
8- Now it will ask you for the drive (or partition) you want to install Windows on. Here I’m
installing it on the one partition I have here. NOTE: This will remove the content of the
partition. Either you create a partition to install windows on, or you can test this on a testing
machine
9- Now once we picked our partition, clicking on next from previous screen will start the
setup. This process might take a while.
11- The setup will finalize your settings, might take a couple of minutes
13 – Once you Log in, Windows Server 2012 will show the Server Manager
The default installation of Windows 2008 sets your IP v4 and IP v6 addresses to use
DHCP. Since we will be configuring this computer to be a domain controller, you must
change the IP address of the computer to be a static IP address.
To change your IP address, click on "View Network Connections" in the Server Manager
screen. This will display the list of active network interfaces.
7 8 9 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6
Task
1
Task
2
Task
3
Task
4
References
https://www.fortinet.com/products/firewalls/firewall/fortigate-high-end.html.
http://technet.microsoft.com/en-
US/evalcenter/hh670538.aspx?ocid=&wt.mc_id=TEC_108_1_33. [Accessed 16
March 2017].
Free Essay Examples and Research Papers | StudyMode. 2017. Free Essay Examples
https://www.fortinet.com/products/firewalls/firewall/fortigate-high-end.html
http://catalogue.pearsoned.co.uk/samplechapter/1587132125.pdf
http://technet.microsoft.com/en-
US/evalcenter/hh670538.aspx?ocid=&wt.mc_id=TEC_108_1_33
http://edugeeks.in/wp-content/
http://fcit.usf.edu/network/
http://studydroid.com/
http://en.wikipedia.org/wiki/Main_Page
4.3 document and analyses test results against expected results Task 09
M2.1relevant theories and techniques have been applied To achieve M2, you must provide a
comprehensive solution for the
scenario given here (Task 04) by
applying correct techniques and
theories
M3.3 A range of methods of presentation have been used and To achieve M3 your documentation
technical language has been accurately used must be well structured adhering to
the formatting guidelines with non-
overlapping facts.
Data provided are accurate, reliable
and consistent.
Appropriate technical terms must
have been used with correct screen
shots where appropriate.
Strengths: Weaknesses: